WorldWideScience

Sample records for non-intrusive diagnosis technique

  1. Uncertainty quantification for criticality problems using non-intrusive and adaptive Polynomial Chaos techniques

    International Nuclear Information System (INIS)

    Gilli, L.; Lathouwers, D.; Kloosterman, J.L.; Hagen, T.H.J.J. van der; Koning, A.J.; Rochman, D.

    2013-01-01

    Highlights: ► Non-intrusive spectral techniques are applied to perform UQ of criticality problems. ► A new adaptive algorithm based on the definition of sparse grid is derived. ► The method is applied to two reference criticality problems. - Abstract: In this paper we present the implementation and the application of non-intrusive spectral techniques for uncertainty analysis of criticality problems. Spectral techniques can be used to reconstruct stochastic quantities of interest by means of a Fourier-like expansion. Their application to uncertainty propagation problems can be performed in a non-intrusive fashion by evaluating a set of projection integrals that are used to reconstruct the spectral expansion. This can be done either by using standard Monte Carlo integration approaches or by adopting numerical quadrature rules. We present the derivation of a new adaptive quadrature algorithm, based on the definition of a sparse grid, which can be used to reduce the computational cost associated with non-intrusive spectral techniques. This new adaptive algorithm and the Monte Carlo integration alternative are then applied to two reference problems. First, a stochastic multigroup diffusion problem is introduced by considering the microscopic cross-sections of the system to be random quantities. Then a criticality benchmark is defined for which a set of resonance parameters in the resolved region are assumed to be stochastic

  2. EU-project AEROJET. Non-intrusive measurements of aircraft engine exhaust emissions

    Energy Technology Data Exchange (ETDEWEB)

    Schaefer, K.; Heland, J. [Fraunhofer-Inst. fuer Atmosphaerische Umweltforschung (IFU), Garmisch-Partenkirchen (Germany); Burrows, R. [Rolls-Royce Ltd. (United Kingdom). Engine Support Lab.; Bernard, M. [AUXITROL, S.A. (France). Aerospace Equipment Div.; Bishop, G. [British Aerospace (United Kingdom). Sowerby Research Centre; Lindermeir, E. [Deutsche Forschungsanstalt fuer Luft- und Raumfahrt e. V. (DLR), Bonn (Germany). Inst. fuer Optoelektronik; Lister, D.H. [Defence and Research Agency, Hants (United Kingdom). Propulsion and Development Dept.; Wiesen, P. [Bergische Univ. Wuppertal (Gesamthochshule) (Germany); Hilton, M. [University of Reading (United Kingdom). Dept. of Physics

    1997-12-31

    The main goal of the AEROJET programme is to demonstrate the equivalence of remote measurement techniques to conventional extractive methods for both gaseous and particulate measurements. The different remote measurement techniques are compared and calibrated. A demonstrator measurement system for exhaust gases, temperature and particulates including data-analysis software is regarded as result of this project. Non-intrusive measurements are the method of choice within the AEROJET project promising to avoid the disadvantages of the gas sampling techniques which are currently used. Different ground based non-intrusive measurement methods are demonstrated during a final evaluation phase. Several non-intrusive techniques are compared with conventional gas sampling and analysis techniques. (R.P.) 3 refs.

  3. EU-project AEROJET. Non-intrusive measurements of aircraft engine exhaust emissions

    Energy Technology Data Exchange (ETDEWEB)

    Schaefer, K; Heland, J [Fraunhofer-Inst. fuer Atmosphaerische Umweltforschung (IFU), Garmisch-Partenkirchen (Germany); Burrows, R [Rolls-Royce Ltd. (United Kingdom). Engine Support Lab.; Bernard, M [AUXITROL, S.A. (France). Aerospace Equipment Div.; Bishop, G [British Aerospace (United Kingdom). Sowerby Research Centre; Lindermeir, E [Deutsche Forschungsanstalt fuer Luft- und Raumfahrt e. V. (DLR), Bonn (Germany). Inst. fuer Optoelektronik; Lister, D H [Defence and Research Agency, Hants (United Kingdom). Propulsion and Development Dept.; Wiesen, P [Bergische Univ. Wuppertal (Gesamthochshule) (Germany); Hilton, M [University of Reading (United Kingdom). Dept. of Physics

    1998-12-31

    The main goal of the AEROJET programme is to demonstrate the equivalence of remote measurement techniques to conventional extractive methods for both gaseous and particulate measurements. The different remote measurement techniques are compared and calibrated. A demonstrator measurement system for exhaust gases, temperature and particulates including data-analysis software is regarded as result of this project. Non-intrusive measurements are the method of choice within the AEROJET project promising to avoid the disadvantages of the gas sampling techniques which are currently used. Different ground based non-intrusive measurement methods are demonstrated during a final evaluation phase. Several non-intrusive techniques are compared with conventional gas sampling and analysis techniques. (R.P.) 3 refs.

  4. Application of non-intrusive geophysical techniques at the Mixed Waste Landfill, Technical Area 3, Sandia National Laboratories, New Mexico

    International Nuclear Information System (INIS)

    Peace, J.L.; Goering, T.J.

    1996-03-01

    The Environmental Restoration Project at Sandia National Laboratories, New Mexico is tasked with assessment and remediation of the Mixed Waste Landfill in Technical Area 3. The Mixed Waste Landfill is an inactive radioactive and mixed waste disposal site. The landfill contains disposal pits and trenches of questionable location and dimension. Non-intrusive geophysical techniques were utilized to provide an effective means of determining the location and dimension of suspected waste disposal trenches before Resource Conservation and Recovery Act intrusive assessment activities were initiated. Geophysical instruments selected for this investigation included a Geonics EM-31 ground conductivity meter, the new Geonics EM-61 high precision, time-domain metal detector, and a Geometrics 856 total field magnetometer. The results of these non-intrusive geophysical techniques were evaluated to enhance the efficiency and cost-effectiveness of future waste-site investigations at Environmental Restoration Project sites

  5. Techniques de débitmétrie polyphasique non intrusive. Revue bibliographique Non Intrusive Multiphase Flow Measurement Techniques. Bibliographic Review

    Directory of Open Access Journals (Sweden)

    Lynch J.

    2006-11-01

    Full Text Available Cet article présente les différentes techniques de débitmétrie polyphasique non intrusive décrites dans la littérature du domaine public. Ces techniques sont considérées du point de vue de leur application dans le cadre de la production pétrolière sous-marine (mélange eau/huile/gaz. A partir d'une analyse des différentes méthodes physiques qui peuvent être utilisées, des perspectives d'avenir sont proposées. Several operations in the oil reservoir exploitation industry call for flowmeters capable of delivering information on the quantity and rate of flow of the different phases (gas, oil, water, solids . . . present in a pipeline. Amongst these are the estimation of remaining reserves and of well performance, control of production units such as multiphase pumping systems and fiscal monitoring in the case of pipeline networking. Existing methods, based on phase separation, require separate test lines and thus tend to be cumbersome, give only intermittent values of flow parameters and need to be calibrated due to the intrusive nature of the measurements. These drawbacks are seen to be all the more critical in subsea production where the ideal flowmeter would be compact, require little maintenance and supply precise real time data for network and multiphase pump control. In recent years flow measurement in two or more phase systems has received increasing attention both in laboratory studies and for applications in a variety of industries (for example : nuclear power production and food processing as well as of course oil production. We review here the many methods considered for non-intrusive flow metering with two or more components from the point of view of an industrial (in particular subsea oil production application. The situation is rendered delicate, in particular for density measurement, by the uncontrolled nature of the flow which may occur in any of several regimes with differing spatial distributions of the components

  6. Non-invasive spectroscopic techniques in the diagnosis of non-melanoma skin cancer

    Science.gov (United States)

    Drakaki, E.; Sianoudis, IA; Zois, EN; Makropoulou, M.; Serafetinides, AA; Dessinioti, C.; Stefanaki, E.; Stratigos, AJ; Antoniou, C.; Katsambas, A.; Christofidou, E.

    2017-11-01

    The number of non-melanoma skin cancers is increasing worldwide and has become an important health and economic issue. Early detection and treatment of skin cancer can significantly improve patient outcome. Therefore there is an increase in the demand for proper management and effective non-invasive diagnostic modalities in order to avoid relapses or unnecessary treatments. Although the gold standard of diagnosis for non-melanoma skin cancers is biopsy followed by histopathology evaluation, optical non-invasive diagnostic tools have obtained increased attention. Emerging non-invasive or minimal invasive techniques with possible application in the diagnosis of non-melanoma skin cancers include high-definition optical coherence tomography, fluorescence spectroscopy, oblique incidence diffuse reflectance spectrometry among others spectroscopic techniques. Our findings establish how those spectrometric techniques can be used to more rapidly and easily diagnose skin cancer in an accurate and automated manner in the clinic.

  7. A non-intrusive and continuous-in-space technique to investigate the wave transformation and breaking over a breakwater

    Directory of Open Access Journals (Sweden)

    Ferrari Simone

    2016-01-01

    Full Text Available To design longshore breakwaters, the evaluation of the wave motion transformations over the structures and of the energy they are able to absorb, dissipate and reflect is necessary. To characterize features and transformations of monochromatic wave trains above a breakwater, both submerged and emerged, we have designed and developed a non-intrusive and continuous-in-space technique, based on Image Analysis, and carried out an experimental campaign, in a laboratory flume equipped with a wave-maker, in order to test it. The investigation area was lighted with a light sheet and images were recorded by a video-camera. The working fluid was seeded with non buoyant particles to make it bright and clearly distinct from dark background and breakwater. The technique, that is based on a robust algorithm to identify the free surface, has showed to properly work also in prohibitive situations for traditional resistive probes (e.g., very shallow waters and/or breaking waves and to be able to measure the free surface all over the investigation field in a non-intrusive way. Two kind of analysis were mainly performed, a statistical and a spectral one. The peculiarities of the measurement technique allowed to describe the whole wave transformation and to supply useful information for design purposes.

  8. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D. L.; Michlich, B. J.

    2000-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute nuclear technology and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested

  9. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D.L.; Micklich, B.J.

    2001-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute 'nuclear technology' and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested. (author)

  10. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  11. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  12. Contextualising Water Use in Residential Settings: A Survey of Non-Intrusive Techniques and Approaches

    Directory of Open Access Journals (Sweden)

    Davide Carboni

    2016-05-01

    Full Text Available Water monitoring in households is important to ensure the sustainability of fresh water reserves on our planet. It provides stakeholders with the statistics required to formulate optimal strategies in residential water management. However, this should not be prohibitive and appliance-level water monitoring cannot practically be achieved by deploying sensors on every faucet or water-consuming device of interest due to the higher hardware costs and complexity, not to mention the risk of accidental leakages that can derive from the extra plumbing needed. Machine learning and data mining techniques are promising techniques to analyse monitored data to obtain non-intrusive water usage disaggregation. This is because they can discern water usage from the aggregated data acquired from a single point of observation. This paper provides an overview of water usage disaggregation systems and related techniques adopted for water event classification. The state-of-the art of algorithms and testbeds used for fixture recognition are reviewed and a discussion on the prominent challenges and future research are also included.

  13. Development of non-intrusive monitoring techniques - ESDRED and TEM projects at Mont Terri and the Grimsel test site

    International Nuclear Information System (INIS)

    Breen, B.; Johnson, M.; Frieg, B.; Blechschmidt, I.; Manukyan, E.; Marelli, S.; Maurer, H.R.

    2008-01-01

    The EC Integrated Project, IP ESDRED (Engineering Studies and Demonstration of Repository Designs) was commissioned to establish a sound technical basis for demonstrating the safety of disposing of spent fuel and long-lived radioactive wastes in deep geological formations and to underpin the development of a common European view on the main issues related to the management and disposal of radioactive waste. The in situ development of non-intrusive monitoring techniques is included within the programme as an important component of the overall ESDRED programme. Monitoring will play an important role in providing information to the repository operator and to society in general and to support decision-making about if and when, to move from one phase to the next. The challenges, when constructing engineered barrier systems (EBS) to isolate the waste, is the ability to monitor the waste and the barriers, once isolated. Conventional monitoring systems depend upon wires or cable s to transfer information from the monitoring sensors outside the barriers. Monitoring sensors also have a limited lifetime and new sensors cannot be emplaced without disturbing the barrier. The development of non-intrusive monitoring systems which do not rely upon 'hard-wired' connection, thus providing the opportunity for continued monitoring after isolation. The ESDRED partners developed a programme utilising cross-hole seismic tomography to monitor an experimental demonstration by Nagra at Mont Terri Underground Research Laboratory (URL). The work programme includes PhD studies to conduct full seismic waveform analysis and to develop algorithms to address natural anisotropy in the Opalinus clay at Mont Terri. Following on from the ESDRED developments, some of ESDRED partner organisations identified a further opportunity for developing in situ monitoring techniques utilising the construction and testing programme of a low pH shotcrete plug being constructed in granite at the Grimsel Test Site

  14. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring.

    Science.gov (United States)

    Alcalá, José M; Ureña, Jesús; Hernández, Álvaro; Gualda, David

    2017-02-11

    The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN) are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs), which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN) prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM), is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people' demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented.

  15. CHARACTERISATION OF MULTIPHASE FLUID-STRUCTURE INTERACTION USING NON-INTRUSIVE OPTICAL TECHNIQUES

    Directory of Open Access Journals (Sweden)

    M. AL-ATABI

    2011-04-01

    Full Text Available The purpose of this study is to determine experimentally the effectiveness of passive drag reduction techniques (which involve adjusting surface geometry within a chaotic multiphase flow system. To quantify the intrusion and disturbance caused, a liquid-air blast atomiser continuously discharges within a test section of air at atmospheric pressure, with a circular cylinder placed 25 cylinder diameters (250 mm downstream of the nozzle. This cylinder is then replaced with other cylinders which have modified surface geometry. The data was obtained using Particle Image Velocimetry (PIV and determines the fluid motion resulting from spray structure interaction of a liquid spray with a circular cylinder. Subtraction of non intruded spray images from intruded spray images at the same locations, using the time averaged analysis allows the direct comparison of the amount of disturbance each geometric variant has on the spray. Using this data alongside velocity profiles time averaged trends were compared. Drag reduction from V-shaped grooves provides the greatest disturbance reduction. This is due to the reduced shear stress around its cross section and the addition of small liquid eddies within each V-groove creates a gliding surface. These features proved to be most effective when monitoring drag reduction in multiphase flow-structure interaction.

  16. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor .... and after amplification is finally read by a digital multimeter (Fluke make: 179 true ... To study the response of the present FO refractometer, propylene glycol has been ... values of all the samples were initially measured by Abbe's refractometer.

  17. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring

    Directory of Open Access Journals (Sweden)

    José M. Alcalá

    2017-02-01

    Full Text Available The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs, which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM, is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people’ demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented.

  18. Non-intrusive measurement and hydrodynamics characterization of gas-solid fluidized beds: a review

    Science.gov (United States)

    Sun, Jingyuan; Yan, Yong

    2016-11-01

    Gas-solid fluidization is a well-established technique to suspend or transport particles and has been applied in a variety of industrial processes. Nevertheless, our knowledge of fluidization hydrodynamics is still limited for the design, scale-up and operation optimization of fluidized bed reactors. It is, therefore, essential to characterize the two-phase flow behaviours in gas-solid fluidized beds and monitor the fluidization processes for control and optimization. A range of non-intrusive techniques have been developed or proposed for measuring the fluidization dynamic parameters and monitoring the flow status without disturbing or distorting the flow fields. This paper presents a comprehensive review of the non-intrusive measurement techniques and the current state of knowledge and experience in the characterization and monitoring of gas-solid fluidized beds. These techniques are classified into six main categories as per sensing principles, electrostatic, acoustic emission and vibration, visualization, particle tracking, laser Doppler anemometry and phase Doppler anemometry as well as pressure-fluctuation methods. Trends and future developments in this field are also discussed.

  19. Non-intrusive measurement and hydrodynamics characterization of gas–solid fluidized beds: a review

    International Nuclear Information System (INIS)

    Sun, Jingyuan; Yan, Yong

    2016-01-01

    Gas–solid fluidization is a well-established technique to suspend or transport particles and has been applied in a variety of industrial processes. Nevertheless, our knowledge of fluidization hydrodynamics is still limited for the design, scale-up and operation optimization of fluidized bed reactors. It is, therefore, essential to characterize the two-phase flow behaviours in gas–solid fluidized beds and monitor the fluidization processes for control and optimization. A range of non-intrusive techniques have been developed or proposed for measuring the fluidization dynamic parameters and monitoring the flow status without disturbing or distorting the flow fields. This paper presents a comprehensive review of the non-intrusive measurement techniques and the current state of knowledge and experience in the characterization and monitoring of gas–solid fluidized beds. These techniques are classified into six main categories as per sensing principles, electrostatic, acoustic emission and vibration, visualization, particle tracking, laser Doppler anemometry and phase Doppler anemometry as well as pressure-fluctuation methods. Trends and future developments in this field are also discussed. (topical review)

  20. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    -intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results......Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non...

  1. Appraisal and control of sexual and non-sexual intrusive thoughts in university students.

    Science.gov (United States)

    Clark, D A; Purdon, C; Byers, E S

    2000-05-01

    This study examined differences in the appraisal and thought control strategies associated with the perceived control of unwanted sexual and non-sexual intrusive thoughts. Eleven appraisal dimensions, subjective physiological arousal and 10 thought control strategies were measured in 171 university students who were administered the Revised Obsessive Intrusions Inventory-Sex Version, a self-report measure of unwanted intrusive thoughts. Thought-action fusion (TAF) likelihood was a significant unique predictor of the perceived controllability of respondents' most upsetting sexual and non-sexual intrusive thought. Moreover greater subjective physiological arousal was a significant predictor of reduced control over sexual intrusions, whereas worry that one might act on an intrusive thought and greater effort to control the intrusion were significant unique predictors of the control of non-sexual intrusive thoughts. Various thought control strategies were more often used in response to non-sexual than sexual cognitions. The results are discussed in terms of the differential role of various appraisal processes in the control of unwanted sexual and non-sexual thoughts.

  2. Non-Intrusive Optical Diagnostic Methods for Flowfield Characterization

    Science.gov (United States)

    Tabibi, Bagher M.; Terrell, Charles A.; Spraggins, Darrell; Lee, Ja. H.; Weinstein, Leonard M.

    1997-01-01

    Non-intrusive optical diagnostic techniques such as Electron Beam Fluorescence (EBF), Laser-Induced Fluorescence (LIF), and Focusing Schlieren (FS) have been setup for high-speed flow characterization and large flowfield visualization, respectively. Fluorescence emission from the First Negative band of N2(+) with the (0,0) vibration transition (at lambda =391.44 nm) was obtained using the EBF technique and a quenching rate of N2(+)* molecules by argon gas was reported. A very high sensitivity FS system was built and applied in the High-Speed Flow Generator (HFG) at NASA LaRC. A LIF system is available at the Advanced Propulsion Laboratory (APL) on campus and a plume exhaust velocity measurement, measuring the Doppler shift from lambda = 728.7 nm of argon gas, is under way.

  3. A method to screen obstructive sleep apnea using multi-variable non-intrusive measurements

    International Nuclear Information System (INIS)

    De Silva, S; Abeyratne, U R; Hukins, C

    2011-01-01

    Obstructive sleep apnea (OSA) is a serious sleep disorder. The current standard OSA diagnosis method is polysomnography (PSG) testing. PSG requires an overnight hospital stay while physically connected to 10–15 channels of measurement. PSG is expensive, inconvenient and requires the extensive involvement of a sleep technologist. As such, it is not suitable for community screening. OSA is a widespread disease and more than 80% of sufferers remain undiagnosed. Simplified, unattended and cheap OSA screening methods are urgently needed. Snoring is commonly associated with OSA but is not fully utilized in clinical diagnosis. Snoring contains pseudo-periodic packets of energy that produce characteristic vibrating sounds familiar to humans. In this paper, we propose a multi-feature vector that represents pitch information, formant information, a measure of periodic structure existence in snore episodes and the neck circumference of the subject to characterize OSA condition. Snore features were estimated from snore signals recorded in a sleep laboratory. The multi-feature vector was applied to a neural network for OSA/non-OSA classification and K-fold cross-validated using a random sub-sampling technique. We also propose a simple method to remove a specific class of background interference. Our method resulted in a sensitivity of 91 ± 6% and a specificity of 89 ± 5% for test data for AHI THRESHOLD = 15 for a database consisting of 51 subjects. This method has the potential as a non-intrusive, unattended technique to screen OSA using snore sound as the primary signal

  4. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  5. Development of a Non-Intrusive Diagnosis Technique for Gas Lifted Oil Wells

    International Nuclear Information System (INIS)

    Abidi, Tawfik; Guellouz, Mohamed Sadok; Harbaoui, Mohamed; Ellejmi, Mohamed

    2009-01-01

    In the present study a numerical model, representative of a real gas-lifted oil well, is used to perform flow simulations under different states of the oil reservoir. The simulations results helped to establish correlations between the well state and the measurable parameters at the well head. The uniqueness of these correlations, allows the reliable diagnosis of the state of the well by inferring the anomalies affecting it based on easily measurable parameters with no need to stop the oil production

  6. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  7. Non-intrusive optical study of gas and its exchange in human maxillary sinuses

    Science.gov (United States)

    Persson, L.; Andersson, M.; Svensson, T.; Cassel-Engquist, M.; Svanberg, K.; Svanberg, S.

    2007-07-01

    We demonstrate a novel non-intrusive technique based on tunable diode laser absorption spectroscopy to investigate human maxillary sinuses in vivo. The technique relies on the fact that free gases have much sharper absorption features (typical a few GHz) than the surrounding tissue. Molecular oxygen was detected at 760 nm. Volunteers have been investigated by injecting near-infrared light fibre-optically in contact with the palate inside the mouth. The multiply scattered light was detected externally by a handheld probe on and around the cheek bone. A significant signal difference in oxygen imprint was observed when comparing volunteers with widely different anamnesis regarding maxillary sinus status. Control measurements through the hand and through the cheek below the cheekbone were also performed to investigate any possible oxygen offset in the setup. These provided a consistently non-detectable signal level. The passages between the nasal cavity and the maxillary sinuses were also non-intrusively optically studied, to the best of our knowledge for the first time. These measurements provide information on the channel conductivity which may prove useful in facial sinus diagnostics. The results suggest that a clinical trial together with an ear-nose-throat (ENT) clinic should be carried out to investigate the clinical use of the new technique.

  8. Non-Intrusive Intelligibility Prediction Using a Codebook-Based Approach

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Kavalekalam, Mathew Shaji; Xenaki, Angeliki

    2017-01-01

    It could be beneficial for users of hearing aids if these were able to automatically adjust the processing according to the speech intelligibility in the specific acoustic environment. Most speech intelligibility metrics are intrusive, i.e., they require a clean reference signal, which is rarely...... a high correlation between the proposed non-intrusive codebookbased STOI (NIC-STOI) and the intrusive STOI indicating that NIC-STOI is a suitable metric for automatic classification of speech signals...

  9. Advanced inspection technology for non intrusive inspection (NII) program

    International Nuclear Information System (INIS)

    Zamir Mohamed Daud

    2003-01-01

    In the current economic environment, plants and facilities are under pressure to introduced cost saving as well as profit maximising measures. Among the many changes in the way things are run is a move towards Risk Based Inspection (RBI), with an emphasis on longer operating periods between shutdowns as well as to utilise components to their maximum capability. Underpinning and RBI program requires good data from an effective online inspections program, which would not require the shutdown of critical components. One methodology of online inspection is known as Non Intrusive Inspection (NII), an inspection philosophy with the objective of replacing internal inspection of a vessel by doing Non Destructive Testing (NDT) and inspections externally. To this end, a variety of advanced NDT techniques are needed to provide accurate online measurements. (Author)

  10. Characterization of mixed waste for sorting and inspection using non-intrusive methods

    International Nuclear Information System (INIS)

    Roberson, G.P.; Ryon, R.W.; Bull, N.L.

    1994-12-01

    Characterization of mixed wastes (that is, radioactive and otherwise hazardous) requires that all hazardous, non-conforming, and radioactive materials be identified, localized, and quantified. With such information, decisions can be made regarding whether the item is treatable or has been adequately treated. Much of the required information can be gained without taking representative samples and analyzing them in a chemistry laboratory. Non-intrusive methods can be used to provide this information on-line at the waste treatment facility. Ideally, the characterization would be done robotically, and either automatically or semi-automatically in order to improve efficiency and safety. For the FY94 Mixed Waste Operations (MWO) project, a treatable waste item is defined as a homogeneous metal object that has external radioactive or heavy metal hazardous contamination. Surface treatment of some kind would therefore be the treatment method to be investigated. The authors developed sorting and inspection requirements, and assessed viable non-intrusive techniques to meet these requirements. They selected radiography, computed tomography and X-ray fluorescence. They have characterized selected mock waste items, and determined minimum detectable amounts of materials. They have demonstrated the efficiency possible by integrating radiographic with tomographic data. Here, they developed a technique to only use radiographic data where the material is homogeneous (fast), and then switching to tomography in those areas where heterogeneity is detected (slower). They also developed a tomographic technique to quantify the volume of each component of a mixed material. This is useful for such things as determining ash content. Lastly, they have developed a document in MOSAIC, an Internet multi-media browser. This document is used to demonstrate the ability to share data and information world-wide

  11. Non-intrusive measurement and hydrodynamics characterization of gas–solid fluidized beds: a review

    OpenAIRE

    Sun, Jingyuan; Yan, Yong

    2016-01-01

    Gas-solid fluidization is a well-established technique to suspend or transport particles and has been applied in a variety of industrial processes. Nevertheless, our knowledge of fluidization hydrodynamics is still limited for the design, scale-up and operation optimization of fluidized bed reactors. It is therefore essential to characterize the two-phase flow behaviours in gas-solid fluidized beds and monitor the fluidization processes for control and optimization. A range of non-intrusive t...

  12. A Comprehensive Review and meta-analysis on Applications of Machine Learning Techniques in Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Manojit Chattopadhyay

    2018-05-01

    Full Text Available Securing a machine from various cyber-attacks has been of serious concern for researchers, statutory bodies such as governments, business organizations and users in both wired and wireless media. However, during the last decade, the amount of data handling by any device, particularly servers, has increased exponentially and hence the security of these devices has become a matter of utmost concern. This paper attempts to examine the challenges in the application of machine learning techniques to intrusion detection. We review different inherent issues in defining and applying the machine learning techniques to intrusion detection. We also attempt to identify the best technological solution for changing usage pattern by comparing different machine learning techniques on different datasets and summarizing their performance using various performance metrics. This paper highlights the research challenges and future trends of intrusion detection in dynamic scenarios of intrusion detection problems in diverse network technologies.

  13. Intrusion detection techniques for plant-wide network in a nuclear power plant

    International Nuclear Information System (INIS)

    Rajasekhar, P.; Shrikhande, S.V.; Biswas, B.B.; Patil, R.K.

    2012-01-01

    Nuclear power plants have a lot of critical data to be sent to the operator workstations. A plant wide integrated communication network, with high throughput, determinism and redundancy, is required between the workstations and the field. Switched Ethernet network is a promising prospect for such an integrated communication network. But for such an integrated system, intrusion is a major issue. Hence the network should have an intrusion detection system to make the network data secure and enhance the network availability. Intrusion detection is the process of monitoring the events occurring in a network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of network security policies, acceptable user policies, or standard security practices. This paper states the various intrusion detection techniques and approaches which are applicable for analysis of a plant wide network. (author)

  14. Non-Intrusive Battery Health Monitoring

    Directory of Open Access Journals (Sweden)

    Gajewski Laurent

    2017-01-01

    Full Text Available The “Non-intrusive battery health monitoring”, developed by Airbus Defence and Space (ADS in cooperation with the CIRIMAT-CNRS laboratory and supported by CNES, aims at providing a diagnosis of the battery ageing in flight, called State of Health (SOH, using only the post-treatment of the battery telemetries. The battery current and voltage telemetries are used by a signal processing tool on ground to characterize and to model the battery at low frequencies which allows monitoring the evolution of its degradation with great accuracy. The frequential behaviour estimation is based on inherent disturbances on the current during the nominal functioning of the battery. For instance, on-board thermal control or equipment consumption generates random disturbances on battery current around an average current. The battery voltage response to these current random disturbances enables to model the low frequency impedance of the battery by a signal processing tool. The re-created impedance is then compared with the evolution model of the low frequencies impedance as a function of the battery ageing to estimate accurately battery degradation. Hence, this method could be applied to satellites which are already in orbit and whose battery telemetries acquisition system fulfils the constraints determined in the study. This innovative method is an improvement of present state-of-the-art and is important to have a more accurate in-flight knowledge of battery ageing which is crucial for mission and operation planning and also for possible satellite mission extension or deorbitation. This method is patented by Airbus Defence and Space and CNES.

  15. Reduction of Motion Artifacts and Improvement of R Peak Detecting Accuracy Using Adjacent Non-Intrusive ECG Sensors

    Directory of Open Access Journals (Sweden)

    Minho Choi

    2016-05-01

    Full Text Available Non-intrusive electrocardiogram (ECG monitoring has many advantages: easy to measure and apply in daily life. However, motion noise in the measured signal is the major problem of non-intrusive measurement. This paper proposes a method to reduce the noise and to detect the R peaks of ECG in a stable manner in a sitting arrangement using non-intrusive sensors. The method utilizes two capacitive ECG sensors (cECGs to measure ECG, and another two cECGs located adjacent to the sensors for ECG are added to obtain the information on motion. Then, active noise cancellation technique and the motion information are used to reduce motion noise. To verify the proposed method, ECG was measured indoors and during driving, and the accuracy of the detected R peaks was compared. After applying the method, the sum of sensitivity and positive predictivity increased 8.39% on average and 26.26% maximally in the data. Based on the results, it was confirmed that the motion noise was reduced and that more reliable R peak positions could be obtained by the proposed method. The robustness of the new ECG measurement method will elicit benefits to various health care systems that require noninvasive heart rate or heart rate variability measurements.

  16. Multi-Use Non-Intrusive Flow Characterization System (FCS), Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The innovation is a Multi-Use Non-Intrusive Flow Characterization System (FCS) for densified, normal boiling point, and two-phase cryogenic flows, capable of...

  17. Novel Non-Intrusive Vibration Monitoring System for Turbopumps, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — AI Signal Research, Inc. proposes to develop a Non-Intrusive Vibration Measurement System (NI-VMS) for turbopumps which will provide effective on-board/off-board...

  18. Novel Non-Intrusive Vibration Monitoring System for Turbopumps, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — ASRI proposes to develop an advanced and commercially viable Non-Intrusive Vibration Monitoring System (NI-VMS) which can provide effective on-line/off-line engine...

  19. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  20. Medication Adherence using Non-intrusive Wearable Sensors

    Directory of Open Access Journals (Sweden)

    T. H. Lim

    2017-12-01

    Full Text Available Activity recognition approaches have been applied in home ambient systems to monitor the status and well- being of occupant especially for home care systems. With the advancement of embedded wireless sensing devices, various applications have been proposed to monitor user´s activities and maintain a healthy lifestyle. In this paper, we propose and evaluate a Smart Medication Alert and Treatment Electronic Systems (SmartMATES using a non-intrusive wearable activity recognition sensing system to monitor and alert an user for missing medication prescription. Two sensors are used to collect data from the accelerometer and radio transceiver. Based on the data collected, SmartMATES processes the data and generate a model for the various actions including taking medication. We have evaluated the SmartMATES on 9 participants. The results show that the SmartMATES can identify and prevent missing dosage in a less intrusive way than existing mobile application and traditional approaches.

  1. Active Learning Framework for Non-Intrusive Load Monitoring: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Xin

    2016-05-16

    Non-Intrusive Load Monitoring (NILM) is a set of techniques that estimate the electricity usage of individual appliances from power measurements taken at a limited number of locations in a building. One of the key challenges in NILM is having too much data without class labels yet being unable to label the data manually for cost or time constraints. This paper presents an active learning framework that helps existing NILM techniques to overcome this challenge. Active learning is an advanced machine learning method that interactively queries a user for the class label information. Unlike most existing NILM systems that heuristically request user inputs, the proposed method only needs minimally sufficient information from a user to build a compact and yet highly representative load signature library. Initial results indicate the proposed method can reduce the user inputs by up to 90% while still achieving similar disaggregation performance compared to a heuristic method. Thus, the proposed method can substantially reduce the burden on the user, improve the performance of a NILM system with limited user inputs, and overcome the key market barriers to the wide adoption of NILM technologies.

  2. Multifidelity, Multidisciplinary Design Under Uncertainty with Non-Intrusive Polynomial Chaos

    Science.gov (United States)

    West, Thomas K., IV; Gumbert, Clyde

    2017-01-01

    The primary objective of this work is to develop an approach for multifidelity uncertainty quantification and to lay the framework for future design under uncertainty efforts. In this study, multifidelity is used to describe both the fidelity of the modeling of the physical systems, as well as the difference in the uncertainty in each of the models. For computational efficiency, a multifidelity surrogate modeling approach based on non-intrusive polynomial chaos using the point-collocation technique is developed for the treatment of both multifidelity modeling and multifidelity uncertainty modeling. Two stochastic model problems are used to demonstrate the developed methodologies: a transonic airfoil model and multidisciplinary aircraft analysis model. The results of both showed the multifidelity modeling approach was able to predict the output uncertainty predicted by the high-fidelity model as a significant reduction in computational cost.

  3. Diagnostic Indicators for Shipboard Mechanical Systems Using Non-Intrusive Load Monitoring

    National Research Council Canada - National Science Library

    McKay, Thomas D

    2006-01-01

    This thesis examines the use of Non-intrusive Load Monitoring (NILM) in auxiliary shipboard systems, such as a low pressure air system, to determine the state of equipment in larger connected systems, such as the main propulsion engines...

  4. Large scale applicability of a Fully Adaptive Non-Intrusive Spectral Projection technique: Sensitivity and uncertainty analysis of a transient

    International Nuclear Information System (INIS)

    Perkó, Zoltán; Lathouwers, Danny; Kloosterman, Jan Leen; Hagen, Tim van der

    2014-01-01

    Highlights: • Grid and basis adaptive Polynomial Chaos techniques are presented for S and U analysis. • Dimensionality reduction and incremental polynomial order reduce computational costs. • An unprotected loss of flow transient is investigated in a Gas Cooled Fast Reactor. • S and U analysis is performed with MC and adaptive PC methods, for 42 input parameters. • PC accurately estimates means, variances, PDFs, sensitivities and uncertainties. - Abstract: Since the early years of reactor physics the most prominent sensitivity and uncertainty (S and U) analysis methods in the nuclear community have been adjoint based techniques. While these are very effective for pure neutronics problems due to the linearity of the transport equation, they become complicated when coupled non-linear systems are involved. With the continuous increase in computational power such complicated multi-physics problems are becoming progressively tractable, hence affordable and easily applicable S and U analysis tools also have to be developed in parallel. For reactor physics problems for which adjoint methods are prohibitive Polynomial Chaos (PC) techniques offer an attractive alternative to traditional random sampling based approaches. At TU Delft such PC methods have been studied for a number of years and this paper presents a large scale application of our Fully Adaptive Non-Intrusive Spectral Projection (FANISP) algorithm for performing the sensitivity and uncertainty analysis of a Gas Cooled Fast Reactor (GFR) Unprotected Loss Of Flow (ULOF) transient. The transient was simulated using the Cathare 2 code system and a fully detailed model of the GFR2400 reactor design that was investigated in the European FP7 GoFastR project. Several sources of uncertainty were taken into account amounting to an unusually high number of stochastic input parameters (42) and numerous output quantities were investigated. The results show consistently good performance of the applied adaptive PC

  5. Intelligent Position Aware Mobile Services for Seamless and Non-Intrusive Clocking-in

    Directory of Open Access Journals (Sweden)

    Sergio Ríos Aguilar

    2014-03-01

    Full Text Available This paper analyzes the viability of the use of employees smartphones as a valid tool for companies in order to conduct presence control. A Mobile Location Aware Information System is also proposed for a non intrusive Presence Control using exclusively terminal-based reactive location technologies, meeting cost minimization, and universal access criteria. The focus is providing trust to the employees, so that they feel safe and in control of when the location data is gathered while satisfying the control needs of the employer. LAMS platform is a state-of-the-art framework for synchronous mobile location-aware content personalization, using A-GPS terminal-based/network assisted mobile positioning techniques and UAProf data processing at the origin server.

  6. A Proposal for Non-Intrusive Namespaces in OCaml

    OpenAIRE

    Couderc , Pierrick; Canou , Benjamin; Chambart , Pierre; Le Fessant , Fabrice

    2014-01-01

    International audience; We present a work-in-progress about adding namespaces to OCaml. Inspired by other lan-guages such as Scala or C++, our aim is to de-sign and formalize a simple and non-intrusive namespace mechanism without complexifying the core language. Namespaces in our ap-proach are a simple way to define libraries while avoiding name clashes. They are also meant to simplify the build process, clarify-ing and reducing (to zero whenever possible) the responsibility of external tools.

  7. Evolution of optically nondestructive and data-non-intrusive credit card verifiers

    Science.gov (United States)

    Sumriddetchkajorn, Sarun; Intaravanne, Yuttana

    2010-04-01

    Since the deployment of the credit card, the number of credit card fraud cases has grown rapidly with a huge amount of loss in millions of US dollars. Instead of asking more information from the credit card's holder or taking risk through payment approval, a nondestructive and data-non-intrusive credit card verifier is highly desirable before transaction begins. In this paper, we review optical techniques that have been proposed and invented in order to make the genuine credit card more distinguishable than the counterfeit credit card. Several optical approaches for the implementation of credit card verifiers are also included. In particular, we highlight our invention on a hyperspectral-imaging based portable credit card verifier structure that offers a very low false error rate of 0.79%. Other key features include low cost, simplicity in design and implementation, no moving part, no need of an additional decoding key, and adaptive learning.

  8. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  9. A survey of intrusion detection techniques in Cloud

    OpenAIRE

    Modi, C.; Patel, D.; Patel, H.; Borisaniya, B.; Patel, A.; Rajarajan, M.

    2013-01-01

    Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and...

  10. Nuisance alarm suppression techniques for fibre-optic intrusion detection systems

    Science.gov (United States)

    Mahmoud, Seedahmed S.; Visagathilagar, Yuvaraja; Katsifolis, Jim

    2012-02-01

    The suppression of nuisance alarms without degrading sensitivity in fibre-optic intrusion detection systems is important for maintaining acceptable performance. Signal processing algorithms that maintain the POD and minimize nuisance alarms are crucial for achieving this. A level crossings algorithm is presented for suppressing torrential rain-induced nuisance alarms in a fibre-optic fence-based perimeter intrusion detection system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr, and intrusion events can be detected simultaneously during rain periods. The use of a level crossing based detection and novel classification algorithm is also presented demonstrating the suppression of nuisance events and discrimination of nuisance and intrusion events in a buried pipeline fibre-optic intrusion detection system. The sensor employed for both types of systems is a distributed bidirectional fibre-optic Mach Zehnder interferometer.

  11. Indian program for development of technologies relevant to reliable, non-intrusive, concealed-contraband detection

    International Nuclear Information System (INIS)

    Auluck, S.K.H.

    2007-01-01

    Generating capability for reliable, non-intrusive detection of concealed-contraband, particularly, organic contraband like explosives and narcotics, has become a national priority. This capability spans a spectrum of technologies. If a technology mission addressing the needs of a highly sophisticated technology like PFNA is set up, the capabilities acquired would be adequate to meet the requirements of many other sets of technologies. This forms the background of the Indian program for development of technologies relevant to reliable, non-intrusive, concealed contraband detection. One of the central themes of the technology development programs would be modularization of the neutron source and detector technologies, so that common elements can be combined in different ways for meeting a variety of application requirements. (author)

  12. [INVITED] Non-intrusive optical imaging of face to probe physiological traits in Autism Spectrum Disorder

    Science.gov (United States)

    Samad, Manar D.; Bobzien, Jonna L.; Harrington, John W.; Iftekharuddin, Khan M.

    2016-03-01

    Autism Spectrum Disorders (ASD) can impair non-verbal communication including the variety and extent of facial expressions in social and interpersonal communication. These impairments may appear as differential traits in the physiology of facial muscles of an individual with ASD when compared to a typically developing individual. The differential traits in the facial expressions as shown by facial muscle-specific changes (also known as 'facial oddity' for subjects with ASD) may be measured visually. However, this mode of measurement may not discern the subtlety in facial oddity distinctive to ASD. Earlier studies have used intrusive electrophysiological sensors on the facial skin to gauge facial muscle actions from quantitative physiological data. This study demonstrates, for the first time in the literature, novel quantitative measures for facial oddity recognition using non-intrusive facial imaging sensors such as video and 3D optical cameras. An Institutional Review Board (IRB) approved that pilot study has been conducted on a group of individuals consisting of eight participants with ASD and eight typically developing participants in a control group to capture their facial images in response to visual stimuli. The proposed computational techniques and statistical analyses reveal higher mean of actions in the facial muscles of the ASD group versus the control group. The facial muscle-specific evaluation reveals intense yet asymmetric facial responses as facial oddity in participants with ASD. This finding about the facial oddity may objectively define measurable differential markers in the facial expressions of individuals with ASD.

  13. Multivariate exploration of non-intrusive load monitoring via spatiotemporal pattern network

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Chao; Akintayo, Adedotun; Jiang, Zhanhong; Henze, Gregor P.; Sarkar, Soumik

    2018-02-01

    Non-intrusive load monitoring (NILM) of electrical demand for the purpose of identifying load components has thus far mostly been studied using univariate data, e.g., using only whole building electricity consumption time series to identify a certain type of end-use such as lighting load. However, using additional variables in the form of multivariate time series data may provide more information in terms of extracting distinguishable features in the context of energy disaggregation. In this work, a novel probabilistic graphical modeling approach, namely the spatiotemporal pattern network (STPN) is proposed for energy disaggregation using multivariate time-series data. The STPN framework is shown to be capable of handling diverse types of multivariate time-series to improve the energy disaggregation performance. The technique outperforms the state of the art factorial hidden Markov models (FHMM) and combinatorial optimization (CO) techniques in multiple real-life test cases. Furthermore, based on two homes' aggregate electric consumption data, a similarity metric is defined for the energy disaggregation of one home using a trained model based on the other home (i.e., out-of-sample case). The proposed similarity metric allows us to enhance scalability via learning supervised models for a few homes and deploying such models to many other similar but unmodeled homes with significantly high disaggregation accuracy.

  14. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  15. A Survey on Anomaly Based Host Intrusion Detection System

    Science.gov (United States)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  16. Non-intrusive measurements of frictional forces between micro-spheres and flat surfaces

    Science.gov (United States)

    Lin, Wei-Hsun; Daraio, Chiara; Daraio's Group Team

    2014-03-01

    We report a novel, optical pump-probe experimental setup to study micro-friction phenomena between micro-particles and a flat surface. We present a case study of stainless steel microspheres, of diameter near 250 μm, in contact with different surfaces of variable roughness. In these experiments, the contact area between the particles and the substrates is only a few nanometers wide. To excite the particles, we deliver an impulse using a pulsed, high-power laser. The reaction force resulting from the surface ablation induced by the laser imparts a controlled initial velocity to the target particle. This initial velocity can be varied between 10-5 to 1 m/s. We investigate the vibrating and rolling motions of the micro-particles by detecting their velocity and displacement with a laser vibrometer and a high-speed microscope camera. We calculate the effective Hamaker constant from the vibrating motion of a particle, and study its relation to the substrate's surface roughness. We analyze the relation between rolling friction and the minimum momentum required to break surface bonding forces. This non-contact and non-intrusive technique could be employed to study a variety of contact and tribology problems at the microscale.

  17. Machine learning techniques for medical diagnosis of diabetes using iris images.

    Science.gov (United States)

    Samant, Piyush; Agarwal, Ravinder

    2018-04-01

    Complementary and alternative medicine techniques have shown their potential for the treatment and diagnosis of chronical diseases like diabetes, arthritis etc. On the same time digital image processing techniques for disease diagnosis is reliable and fastest growing field in biomedical. Proposed model is an attempt to evaluate diagnostic validity of an old complementary and alternative medicine technique, iridology for diagnosis of type-2 diabetes using soft computing methods. Investigation was performed over a close group of total 338 subjects (180 diabetic and 158 non-diabetic). Infra-red images of both the eyes were captured simultaneously. The region of interest from the iris image was cropped as zone corresponds to the position of pancreas organ according to the iridology chart. Statistical, texture and discrete wavelength transformation features were extracted from the region of interest. The results show best classification accuracy of 89.63% calculated from RF classifier. Maximum specificity and sensitivity were absorbed as 0.9687 and 0.988, respectively. Results have revealed the effectiveness and diagnostic significance of proposed model for non-invasive and automatic diabetes diagnosis. Copyright © 2018 Elsevier B.V. All rights reserved.

  18. Non-intrusive load characterization of an airfoil using PIV

    Energy Technology Data Exchange (ETDEWEB)

    Oudheusden, B.W. van; Scarano, F.; Casimiri, E.W.F. [Dept. of Aerospace Engineering, Delft Univ. of Tech., Delft (Netherlands)

    2006-06-15

    An assessment is made of the feasibility of using PIV velocity data for the non-intrusive aerodynamic force characterization (lift, drag and pitching moment) of an airfoil. The method relies upon the application of control-volume approaches in combination with the deduction of the pressure from the PIV experimental data, by making use of the momentum equation. First, the consistency of the method is verified by means of synthetic data obtained from CFD. Subsequently, the procedure was applied in an experimental investigation, in which the PIV approach is validated against standard pressure-based methods (surface pressure distribution and wake rake). (orig.)

  19. Coplanar capacitance sensors for detecting water intrusion in composite structures

    International Nuclear Information System (INIS)

    Nassr, Amr A; El-Dakhakhni, Wael W; Ahmed, Wael H

    2008-01-01

    Composite materials are becoming more affordable and widely used for retrofitting, rehabilitating and repairing reinforced concrete structures designed and constructed under older specifications. However, the mechanical properties and long-term durability of composite materials may degrade severely in the presence of water intrusion. This study presents a new non-destructive evaluation (NDE) technique for detecting the water intrusion in composite structures by evaluating the dielectric properties of different composite system constituent materials. The variation in the dielectric signatures was employed to design a coplanar capacitance sensor with high sensitivity to detect such defects. An analytical model was used to study the effect of the sensor geometry on the output signal and to optimize sensor design. A finite element model was developed to validate analytical results and to evaluate other sensor design-related parameters. Experimental testing of a concrete specimen wrapped with composite laminate and containing a series of pre-induced water intrusion defects was conducted in order to validate the concept of the new technique. Experimental data showed excellent agreement with the finite element model predictions and confirmed sensor performance

  20. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  1. Recent developments in building diagnosis techniques

    CERN Document Server

    2016-01-01

    This book presents a collection of recent research on building diagnosis techniques related to construction pathology, hygrothermal behavior and durability, and diagnostic techniques. It highlights recent advances and new developments in the field of building physics, building anomalies in materials and components, new techniques for improved energy efficiency analysis, and diagnosis techniques such as infrared thermography. This book will be of interest to a wide readership of professionals, scientists, students, practitioners, and lecturers.

  2. Non-intrusive Quality Analysis of Monitoring Data

    CERN Document Server

    Brightwell, M; Suwalska, Anna

    2010-01-01

    Any large-scale operational system running over a variety of devices requires a monitoring mechanism to assess the health of the overall system. The Technical Infrastructure Monitoring System (TIM) at CERN is one such system, and monitors a wide variety of devices and their properties, such as electricity supplies, device temperatures, liquid flows etc. Without adequate quality assurance, the data collected from such devices leads to false-positives and false-negatives, reducing the effectiveness of the monitoring system. The quality must, however, be measured in a non-intrusive way, so that the critical path of the data flow is not affected by the quality computation. The quality computation should also scale to large volumes of incoming data. To address these challenges, we develop a new statistical module, which monitors the data collected by TIM and reports its quality to the operators. The statistical module uses Oracle RDBMS as the underlying store, and builds hierarchical summaries on the basic events ...

  3. The Electrical Self-Potential Method as a Non-Intrusive Snow-Hydrological Sensor

    Science.gov (United States)

    Kulessa, B.; Thompson, S. S.; Luethi, M. P.; Essery, R.

    2015-12-01

    Building on growing momentum in the application of geophysical techniques to snow problems and, specifically, on new theory and an electrical geophysical snow hydrological model published recently; we demonstrate for the first time that the electrical self-potential geophysical technique can sense in-situ bulk meltwater fluxes. This has broad and immediate implications for snow measurement practice, modelling and operational snow forecasting. Our ability to measure, quantify and assimilate hydrological properties and processes of snow in operational models is disproportionally poor compared to the significance of seasonal snowmelt as a global water resource and major risk factor in flood and avalanche forecasting. Encouraged by recent theoretical, modelling and laboratory work, we show here that the diurnal evolution of aerially-distributed self-potential magnitudes closely track those of bulk meltwater fluxes in melting in-situ snowpacks at Rhone and Jungfraujoch glaciers, Switzerland. Numerical modelling infers temporally-evolving liquid water contents in the snowpacks on successive days in close agreement with snow-pit measurements. Muting previous concerns, the governing physical and chemical properties of snow and meltwater became temporally invariant for modelling purposes. Because measurement procedure is straightforward and readily automated for continuous monitoring over significant spatial scales, we conclude that the self-potential geophysical method is a highly-promising non-intrusive snow-hydrological sensor for measurement practice, modelling and operational snow forecasting.

  4. Differences in clinical intrusive thoughts between obsessive-compulsive disorder, generalized anxiety disorder, and hypochondria.

    Science.gov (United States)

    Romero-Sanchiz, Pablo; Nogueira-Arjona, Raquel; Godoy-Ávila, Antonio; Gavino-Lázaro, Aurora; Freeston, Mark H

    2017-11-01

    Differences and similarities between intrusive thoughts typical of obsessive-compulsive disorder, generalized anxiety disorder, and hypochondriasis are relevant for their differential diagnosis, formulation, and psychological treatment. Previous research in non-clinical samples pointed out the relevance of some process variables, such as responsibility, guilt, or neutralization strategies. This research is aimed to investigate the differences and similarities between clinical obsessions, worries, and illness intrusions in some of these process variables. A second aim is to identify models based on these variables that could reliably differentiate between them. Three groups of patients with obsessive-compulsive disorder (n = 35; 60% women, mean age 38.57), generalized anxiety disorder (n = 36; 61.1% women, mean age 41.50), and hypochondriasis (n = 34; 70.6% women, mean age 31.59) were evaluated using the Cognitive Intrusions Questionnaire-Transdiagnostic Version (Romero-Sanchiz, Nogueira-Arjona, Godoy-Ávila, Gavino-Lázaro, & Freeston, ). The results showed that some appraisals (e.g., responsibility or egodystonicity), emotions (e.g., guilt or insecurity), neutralization strategies, and other variables (e.g., verbal content or trigger from body sensation) are relevant for the discrimination between obsessions, worries, and illness intrusions. The results also showed 3 stable models based on these variables for the discrimination between these thoughts. The implication of these results in the diagnosis, formulation, and psychological treatment of obsessive-compulsive disorder, generalized anxiety disorder, and hypochondriasis is discussed. Copyright © 2017 John Wiley & Sons, Ltd.

  5. QOS and Control-Theoretic Techniques for Intrusion Tolerance

    National Research Council Canada - National Science Library

    Ye, Nong

    2004-01-01

    ...), even in the face of intrusions. This report examines two host-based resources, a router and a web server, and presents simulated models of modifications that can be made to these resources to make them QoS-capable...

  6. multiUQ: An intrusive uncertainty quantification tool for gas-liquid multiphase flows

    Science.gov (United States)

    Turnquist, Brian; Owkes, Mark

    2017-11-01

    Uncertainty quantification (UQ) can improve our understanding of the sensitivity of gas-liquid multiphase flows to variability about inflow conditions and fluid properties, creating a valuable tool for engineers. While non-intrusive UQ methods (e.g., Monte Carlo) are simple and robust, the cost associated with these techniques can render them unrealistic. In contrast, intrusive UQ techniques modify the governing equations by replacing deterministic variables with stochastic variables, adding complexity, but making UQ cost effective. Our numerical framework, called multiUQ, introduces an intrusive UQ approach for gas-liquid flows, leveraging a polynomial chaos expansion of the stochastic variables: density, momentum, pressure, viscosity, and surface tension. The gas-liquid interface is captured using a conservative level set approach, including a modified reinitialization equation which is robust and quadrature free. A least-squares method is leveraged to compute the stochastic interface normal and curvature needed in the continuum surface force method for surface tension. The solver is tested by applying uncertainty to one or two variables and verifying results against the Monte Carlo approach. NSF Grant #1511325.

  7. Non-intrusive, fast and sensitive ammonia detection by laser photothermal deflection

    International Nuclear Information System (INIS)

    Vries, H.S.M. de; Harren, F.J.M.; Wyers, G.P.; Otjes, R.P.; Slanina, J.; Reuss, J.

    1995-01-01

    A recently developed non-intrusive photothermal deflection (PTD) instrument allows sensitive, rapid and quantitative detection of local ammonia concentrations in the air. Ammonia is vibrationally excited by an infrared CO 2 laser in an intracavity configuration. A HeNe beam passing over the CO 2 laser beam (multipass arrangement) is deflected by the induced refractive index gradient. The detection limit for ammonia in ambient air is 0.5 ppbv with a spatial resolution of a few mm 3 . The time resolution is 0.1 s (single line) or 15 s (multi line). The system is fully automated and suited for non-stop measuring periods of at least one week. Results were compared to those obtained with a continuous-flow denuder (CFD). (author)

  8. Data Fusion for Network Intrusion Detection: A Review

    Directory of Open Access Journals (Sweden)

    Guoquan Li

    2018-01-01

    Full Text Available Rapid progress of networking technologies leads to an exponential growth in the number of unauthorized or malicious network actions. As a component of defense-in-depth, Network Intrusion Detection System (NIDS has been expected to detect malicious behaviors. Currently, NIDSs are implemented by various classification techniques, but these techniques are not advanced enough to accurately detect complex or synthetic attacks, especially in the situation of facing massive high-dimensional data. Besides, the inherent defects of NIDSs, namely, high false alarm rate and low detection rate, have not been effectively solved. In order to solve these problems, data fusion (DF has been applied into network intrusion detection and has achieved good results. However, the literature still lacks thorough analysis and evaluation on data fusion techniques in the field of intrusion detection. Therefore, it is necessary to conduct a comprehensive review on them. In this article, we focus on DF techniques for network intrusion detection and propose a specific definition to describe it. We review the recent advances of DF techniques and propose a series of criteria to compare their performance. Finally, based on the results of the literature review, a number of open issues and future research directions are proposed at the end of this work.

  9. Non-Intrusive Solution of Stochastic and Parametric Equations

    KAUST Repository

    Matthies, Hermann

    2015-01-07

    the subspace spanned by the approximating functions. Usually this will involve minimising some norm of the difference between the true parametric solution and the approximation. Such methods are sometimes called pseudo-spectral projections, or regression solutions. On the other hand, methods which try to ensure that the approximation satisfies the parametric equation as well as possible are often based on a Rayleigh-Ritz or Galerkin type of “ansatz”, which leads to a coupled system for the unknown coefficients. This is often taken as an indication that the original solver can not be used, i.e. that these methods are “intrusive”. But in many circumstances these methods may as well be used in a non-intrusive fashion. Some very effective new methods based on low-rank approximations fall in the class of “not obviously non-intrusive” methods; hence it is important to show here how this may be computed non-intrusively.

  10. Non-Intrusive Solution of Stochastic and Parametric Equations

    KAUST Repository

    Matthies, Hermann

    2015-01-01

    the subspace spanned by the approximating functions. Usually this will involve minimising some norm of the difference between the true parametric solution and the approximation. Such methods are sometimes called pseudo-spectral projections, or regression solutions. On the other hand, methods which try to ensure that the approximation satisfies the parametric equation as well as possible are often based on a Rayleigh-Ritz or Galerkin type of “ansatz”, which leads to a coupled system for the unknown coefficients. This is often taken as an indication that the original solver can not be used, i.e. that these methods are “intrusive”. But in many circumstances these methods may as well be used in a non-intrusive fashion. Some very effective new methods based on low-rank approximations fall in the class of “not obviously non-intrusive” methods; hence it is important to show here how this may be computed non-intrusively.

  11. Non-Intrusive Magneto-Optic Detecting System for Investigations of Air Switching Arcs

    International Nuclear Information System (INIS)

    Zhang Pengfei; Zhang Guogang; Dong Jinlong; Liu Wanying; Geng Yingsan

    2014-01-01

    In current investigations of electric arc plasmas, experiments based on modern testing technology play an important role. To enrich the testing methods and contribute to the understanding and grasping of the inherent mechanism of air switching arcs, in this paper, a non-intrusive detecting system is described that combines the magneto-optic imaging (MOI) technique with the solution to inverse electromagnetic problems. The detecting system works in a sequence of main steps as follows: MOI of the variation of the arc flux density over a plane, magnetic field information extracted from the magneto-optic (MO) images, arc current density distribution and spatial pattern reconstruction by inverting the resulting field data. Correspondingly, in the system, an MOI set-up is designed based on the Faraday effect and the polarization properties of light, and an intelligent inversion algorithm is proposed that involves simulated annealing (SA). Experiments were carried out for high current (2 kA RMS) discharge cases in a typical low-voltage switchgear. The results show that the MO detection system possesses the advantages of visualization, high resolution and response, and electrical insulation, which provides a novel diagnostics tool for further studies of the arc. (low temperature plasma)

  12. Non intrusive measurement of residual moisture rate of plutonium oxide powder in sealed boxes; Mesure non intrusive du taux d`humidite residuel de la poudre d`oxyde de plutonium contenue dans des boites scellees

    Energy Technology Data Exchange (ETDEWEB)

    Pochet, T.; Edeline, J.C.; Domenech, T.

    1993-12-31

    This document deals with the best method to create a non intrusive measurement of residual moisture of plutonium oxide in stainless steel sealed boxes (sensibility, precision, reproducibility and feasibility in laboratory). This method is the neutron spectrometry by {sup 3}He (n,p) {sup 3}He reaction. (TEC). 16 refs., 16 figs., 2 tabs.

  13. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  14. Investigation of non-premixed flame combustion characters in GO2/GH2 shear coaxial injectors using non-intrusive optical diagnostics

    Science.gov (United States)

    Dai, Jian; Yu, NanJia; Cai, GuoBiao

    2015-12-01

    Single-element combustor experiments are conducted for three shear coaxial geometry configuration injectors by using gaseous oxygen and gaseous hydrogen (GO2/GH2) as propellants. During the combustion process, several spatially and timeresolved non-intrusive optical techniques, such as OH planar laser induced fluorescence (PLIF), high speed imaging, and infrared imaging, are simultaneously employed to observe the OH radical concentration distribution, flame fluctuations, and temperature fields. The results demonstrate that the turbulent flow phenomenon of non-premixed flame exhibits a remarkable periodicity, and the mixing ratio becomes a crucial factor to influence the combustion flame length. The high speed and infrared images have a consistent temperature field trend. As for the OH-PLIF images, an intuitionistic local flame structure is revealed by single-shot instantaneous images. Furthermore, the means and standard deviations of OH radical intensity are acquired to provide statistical information regarding the flame, which may be helpful for validation of numerical simulations in future. Parameters of structure configurations, such as impinging angle and oxygen post thickness, play an important role in the reaction zone distribution. Based on a successful flame contour extraction method assembled with non-linear anisotropic diffusive filtering and variational level-set, it is possible to implement a fractal analysis to describe the fractal characteristics of the non-premixed flame contour. As a result, the flame front cannot be regarded as a fractal object. However, this turbulent process presents a self-similarity characteristic.

  15. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  16. Non-intrusive uncertainty quantification of computational fluid dynamics simulations: notes on the accuracy and efficiency

    Science.gov (United States)

    Zimoń, Małgorzata; Sawko, Robert; Emerson, David; Thompson, Christopher

    2017-11-01

    Uncertainty quantification (UQ) is increasingly becoming an indispensable tool for assessing the reliability of computational modelling. Efficient handling of stochastic inputs, such as boundary conditions, physical properties or geometry, increases the utility of model results significantly. We discuss the application of non-intrusive generalised polynomial chaos techniques in the context of fluid engineering simulations. Deterministic and Monte Carlo integration rules are applied to a set of problems, including ordinary differential equations and the computation of aerodynamic parameters subject to random perturbations. In particular, we analyse acoustic wave propagation in a heterogeneous medium to study the effects of mesh resolution, transients, number and variability of stochastic inputs. We consider variants of multi-level Monte Carlo and perform a novel comparison of the methods with respect to numerical and parametric errors, as well as computational cost. The results provide a comprehensive view of the necessary steps in UQ analysis and demonstrate some key features of stochastic fluid flow systems.

  17. Non-intrusive uncertainty quantification in structural-acoustic systems using polynomial chaos expansion method

    Directory of Open Access Journals (Sweden)

    Wang Mingjie

    2017-01-01

    Full Text Available A framework of non-intrusive polynomial chaos expansion method (PC was proposed to investigate the statistic characteristics of the response of structural-acoustic system containing random uncertainty. The PC method does not need to reformulate model equations, and the statistics of the response can be evaluated directly. The results show that compared to the direct Monte Carlo method (MCM based on the original numerical model, the PC method is effective and more efficient.

  18. Non-intrusive accurate and traceable flow measurements in nuclear power plant systems

    Energy Technology Data Exchange (ETDEWEB)

    Gurevich, A.; Kanda, V.; Sharp, B.; Lopez, A. [Advanced Measurement and Analysis Group Inc., ON (Canada); Gurevich, Y. [Daystar Technologies Inc., ON (Canada)

    2014-07-01

    Ultrasonic cross correlation flow meters, are a non-intrusive flow measurement technology based on measurement of the transport velocity of turbulent structures, and have many advantages over other ultrasonic flow measurement methods. The cross correlation flow meter CROSSFLOW, produced and operated by the Canadian company Advanced Measurement and Analysis Group Inc., is used in nuclear power plants around the world, for various application. This paper describes the operating principals of the ultrasonic cross correlation flow meter, its advantages over other ultrasonic flow measurement methods, its application around the world. (author)

  19. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  20. Engineering evaluation of intrusion prevention strategies for single-shell tanks

    International Nuclear Information System (INIS)

    Jenkins, C.E.

    1994-01-01

    In this study, previously implemented actions to prevent liquid intrusion into out-of-service single-shell tanks (SSTs), i.e., interim isolation or partial interim isolation, are investigated and expanded to identify additional cost-effective intrusion prevention techniques that could be reasonably taken until SSTs are ready for waste retrieval. Possible precipitation, groundwater, and condensation pathways and internal tank connections that could provide possible pathways for liquids are examined. Techniques to block identified potential pathways are developed and costed to determine the potential benefit to costed trade-offs for implementing the techniques. (Note: Surveillance data show increased waste surface levels for several SSTs that indicate possible liquid intrusion despite interim isolation activities.)

  1. Non-intrusive Assessment of Photosystem II and Photosystem I in Whole Coral Tissues

    Directory of Open Access Journals (Sweden)

    Milán Szabó

    2017-08-01

    Full Text Available Reef building corals (phylum Cnidaria harbor endosymbiotic dinoflagellate algae (genus Symbiodinium that generate photosynthetic products to fuel their host's metabolism. Non-invasive techniques such as chlorophyll (Chl fluorescence analyses of Photosystem II (PSII have been widely used to estimate the photosynthetic performance of Symbiodinium in hospite. However, since the spatial origin of PSII chlorophyll fluorescence in coral tissues is uncertain, such signals give limited information on depth-integrated photosynthetic performance of the whole tissue. In contrast, detection of absorbance changes in the near infrared (NIR region integrates signals from deeper tissue layers due to weak absorption and multiple scattering of NIR light. While extensively utilized in higher plants, NIR bio-optical techniques are seldom applied to corals. We have developed a non-intrusive measurement method to examine photochemistry of intact corals, based on redox kinetics of the primary electron donor in Photosystem I (P700 and chlorophyll fluorescence kinetics (Fast-Repetition Rate fluorometry, FRRf. Since the redox state of P700 depends on the operation of both PSI and PSII, important information can be obtained on the PSII-PSI intersystem electron transfer kinetics. Under moderate, sub-lethal heat stress treatments (33°C for ~20 min, the coral Pavona decussata exhibited down-regulation of PSII electron transfer kinetics, indicated by slower rates of electron transport from QA to plastoquinone (PQ pool, and smaller relative size of oxidized PQ with concomitant decrease of a specifically-defined P700 kinetics area, which represents the active pool of PSII. The maximum quantum efficiency of PSII (Fv/Fm and functional absorption cross-section of PSII (σPSII remained unchanged. Based on the coordinated response of P700 parameters and PSII-PSI electron transport properties, we propose that simple P700 kinetics parameters as employed here serve as indicators of

  2. An ontology-based intrusion patterns classification system | Shonubi ...

    African Journals Online (AJOL)

    Studies have shown that computer intrusions have been on the increase in recent times. Many techniques and patterns are being used by intruders to gain access to data on host computer networks. In this work, intrusion patterns were identified and classified and inherent knowledge were represented using an ontology of ...

  3. State-of-the-art review of quality assurance techniques for vitrified high level waste

    International Nuclear Information System (INIS)

    Miller, P.L.H.

    1984-07-01

    Quality assurance is required for certain chemical and physical properties of both the molten glass pour and the solidified glass within the stainless steel container. It is also required to monitor the physical condition of the container lid weld. A review is presented of techniques which are used or which might be adapted for use in the quality assurance of vitrified high level waste. For the most part only non-intrusive methods have been considered, however, some techniques which are not strictly non-intrusive have been reviewed where a non-intrusive technique has not been identified or where there are other advantages associated with the particular technique. In order to identify suitable candidate techniques reference has been made to an extensive literature survey and experts in the fields of nuclear waste technology, glass technology, non-destructive testing, chemical analysis and remote analysis have been contacted. The opinions of manufacturers and users of specific techniques have also been sought. A summary is also given of those techniques which can most readily be applied to the problem of quality assurance for vitrified waste as well as recommendations for further research into techniques which might be adapted to suit this application. (author)

  4. Application of magnetic resonance elastography as a non-invasive technique for diagnosis of liver fibrosis

    Directory of Open Access Journals (Sweden)

    YANG Minglei

    2016-03-01

    Full Text Available At present, liver biopsy is the gold standard for the diagnosis and grading of liver fibrosis, but its limitations have been widely acknowledged. The non-invasive detection methods are needed in clinical practice, and at present, magnetic resonance elastography (MRE is a hot research topic. This article reviews the advances in the clinical application of MRE in related fields, and studies have shown that MRE has a high diagnostic value due to its high sensitivity and specificity in the diagnosis and grading of liver fibrosis and an area under the receiver operating characteristic curve as high as 0.95. Compared with serological and other imaging diagnostic methods, MRE can determine fibrosis stage more accurately and has good reproducibility and objectivity. MRE can be widely applied in all patients except those with hemochromatosis, with special advantages in the diagnosis for patients with obesity and ascites, and can make up for the disadvantages of other methods. This article points out that MRE may become the best non-invasive method for the assessment of liver fibrosis, especially advanced fibrosis.

  5. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  6. Non-intrusive long-term monitoring approaches

    International Nuclear Information System (INIS)

    Smathers, D.; Mangan, D.

    1998-01-01

    In order to promote internatinal confidence that the US and Russia are disarming per their commitments under Article 6 of the Non-Proliferation Treaty, an international verification regime may be applied to US and Russian excess fissile materials. Initially, it is envisioned that this verification regime would be applied at storage facilities; however, it should be anticipated that the verification regime would continue throughout any material disposition activities, should such activities be pursued. once the materials are accepted into the verification regime, it is assumed that long term monitoring will be used to maintain continuity of knowledge. The requirements for long term storage monitoring include unattended operation for extended periods of time, minimal intrusiveness on the host nation's safety and security activities, data collection incorporating data authentication, and monitoring redundancy to allow resolution of anomalies and to continue coverage in the event of equipment failures. Additional requirements include effective data review and analysis processes, operation during storage facility loading, procedure for removal of inventory items for safety-related surveillance, and low cost, reliable equipment. A monitoring system might include both continuous monitoring of storagecontainers and continuous area monitoring. These would be complemented with periodic on-site inspections. A fissile material storage facility is not a static operation. The initial studies have shown there are a number of valid reasons why a host nation may need them to remove material from the storage facility. A practical monitoring system must be able to accommodate necessary material movements

  7. Geophysics and geochemistry techniques in seawater intrusion monitoring and mapping at Kerpan, Kedah

    International Nuclear Information System (INIS)

    Bashillah Baharuddin; Nazrul Hizam Yusoff; Abdul Rahim Samsudin

    2002-01-01

    Lately, groundwater contamination has become a public concern. Seawater intrusion is not a new issue, and only it started to magnetize attention from lots of parties since at also a contributor to groundwater contamination. Therefore a study about seawater intrusion is carried out and the selected area is Kerpan, Kedah. This information is useful particularly in agriculture because any contamination that cause by chlorine (seawater) intrusion can affect crops production. For Kerpan Project, two modernized electric resistivity survey instruments, the Terrameter SAS 4000 and SAS 300C are used which provide image profiles. This profiles have the capability to access a comprehensive geological interpretation by examine subsurface electric characteristics such as resistivity, permittivity and chargeability (John, 1997). At Kerpan, Kedah a study about salinity in canals was also carried out to monitor if there is any seawater intrusion that can get through the canals. The study was done since that the canals are directly to the sea. Instrument for this study is STD 12-plus. (Author)

  8. A Non-Intrusive Cyber Physical Social Sensing Solution to People Behavior Tracking: Mechanism, Prototype, and Field Experiments.

    Science.gov (United States)

    Jia, Yunjian; Zhou, Zhenyu; Chen, Fei; Duan, Peng; Guo, Zhen; Mumtaz, Shahid

    2017-01-13

    Tracking people's behaviors is a main category of cyber physical social sensing (CPSS)-related people-centric applications. Most tracking methods utilize camera networks or sensors built into mobile devices such as global positioning system (GPS) and Bluetooth. In this article, we propose a non-intrusive wireless fidelity (Wi-Fi)-based tracking method. To show the feasibility, we target tracking people's access behaviors in Wi-Fi networks, which has drawn a lot of interest from the academy and industry recently. Existing methods used for acquiring access traces either provide very limited visibility into media access control (MAC)-level transmission dynamics or sometimes are inflexible and costly. In this article, we present a passive CPSS system operating in a non-intrusive, flexible, and simplified manner to overcome above limitations. We have implemented the prototype on the off-the-shelf personal computer, and performed real-world deployment experiments. The experimental results show that the method is feasible, and people's access behaviors can be correctly tracked within a one-second delay.

  9. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  10. Data Mining for Intrusion Detection

    Science.gov (United States)

    Singhal, Anoop; Jajodia, Sushil

    Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This chapter discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested.

  11. The effect of destination linked feature selection in real-time network intrusion detection

    CSIR Research Space (South Africa)

    Mzila, P

    2013-07-01

    Full Text Available techniques in the network intrusion detection system (NIDS) is the feature selection technique. The ability of NIDS to accurately identify intrusion from the network traffic relies heavily on feature selection, which describes the pattern of the network...

  12. Improved Classification by Non Iterative and Ensemble Classifiers in Motor Fault Diagnosis

    Directory of Open Access Journals (Sweden)

    PANIGRAHY, P. S.

    2018-02-01

    Full Text Available Data driven approach for multi-class fault diagnosis of induction motor using MCSA at steady state condition is a complex pattern classification problem. This investigation has exploited the built-in ensemble process of non-iterative classifiers to resolve the most challenging issues in this area, including bearing and stator fault detection. Non-iterative techniques exhibit with an average 15% of increased fault classification accuracy against their iterative counterparts. Particularly RF has shown outstanding performance even at less number of training samples and noisy feature space because of its distributive feature model. The robustness of the results, backed by the experimental verification shows that the non-iterative individual classifiers like RF is the optimum choice in the area of automatic fault diagnosis of induction motor.

  13. An innovative methodology for the non-destructive diagnosis of architectural elements of ancient historical buildings.

    Science.gov (United States)

    Fais, Silvana; Casula, Giuseppe; Cuccuru, Francesco; Ligas, Paola; Bianchi, Maria Giovanna

    2018-03-12

    In the following we present a new non-invasive methodology aimed at the diagnosis of stone building materials used in historical buildings and architectural elements. This methodology consists of the integrated sequential application of in situ proximal sensing methodologies such as the 3D Terrestrial Laser Scanner for the 3D modelling of investigated objects together with laboratory and in situ non-invasive multi-techniques acoustic data, preceded by an accurate petrographical study of the investigated stone materials by optical and scanning electron microscopy. The increasing necessity to integrate different types of techniques in the safeguard of the Cultural Heritage is the result of the following two interdependent factors: 1) The diagnostic process on the building stone materials of monuments is increasingly focused on difficult targets in critical situations. In these cases, the diagnosis using only one type of non-invasive technique may not be sufficient to investigate the conservation status of the stone materials of the superficial and inner parts of the studied structures 2) Recent technological and scientific developments in the field of non-invasive diagnostic techniques for different types of materials favors and supports the acquisition, processing and interpretation of huge multidisciplinary datasets.

  14. Non-contrast MR angiography for diagnosis of congenital heart disease

    International Nuclear Information System (INIS)

    Matsuo, Mikaru; Yoshioka, Kunihiro; Takahashi, Shin; Oyama, Kotaro

    2006-01-01

    Fast imaging employing steady state acquisition (FIESTA) has been reported to be suitable for cardiac imaging in adolescents and adults. The purpose of this study was to establish the applicability and limitation of MR Angiography using FIESTA in the diagnosis of congenital heart disease. Thirty-five patients with congenital heart disease underwent MR Angiography using FIESTA and the 3D Gd-enhanced fast spoiled gradient recalled acquisition in the steady state (SPGR) technique. The measurements of the vascular diameters and diagnostic quality of the two techniques were compared. Correlations between FIESTA and the 3D Gd-fast SPGR technique were excellent in vascular diameter (aAo 0.90, arch 0.78, dAo 0.92, SCA 0.70, RPA 0.90, LPA 0.95). The agreement of the vascular diameters in the Bland-Altman method was good (aAo 0.22 mm, arch 0.07 mm, dAo 0.14 mm, SCA 0.31 mm, RPA 0.45 mm, LPA 0.12 mm). However, MR angiography (MRA) by 3D Gd-enhanced SPGR had a higher resolution than that by FIESTA. Due to signal loss caused at the regions of vascular stenosis or Blalock-Taussig shunt on FIESTA, we could not evaluate the vascular diameter or patency at those lesions. FIESTA is a useful technique of non-enhanced MRA for non-invasive diagnosis of congenital heart disease. However, MRA by FIESTA was not adequate for multiplanar reconstruction. (author)

  15. Non-Intrusive Load Monitoring of HVAC Components using Signal Unmixing

    Energy Technology Data Exchange (ETDEWEB)

    Rahimpour, Alireza [University of Tennessee, Knoxville (UTK); Qi, Hairong [ORNL; Fugate, David L [ORNL; Kuruganti, Teja [ORNL

    2015-01-01

    Heating, Ventilating and Air Conditioning units (HVAC) are a major electrical energy consumer in buildings. Monitoring of the operation and energy consumption of HVAC would increase the awareness of building owners and maintenance service providers of the condition and quality of performance of these units, enabling conditioned-based maintenance which would help achieving higher energy efficiency. In this paper, a novel non-intrusive load monitoring method based on group constrained non-negative matrix factorization is proposed for monitoring the different components of HVAC unit by only measuring the whole building aggregated power signal. At the first level of this hierarchical approach, power consumption of the building is decomposed to energy consumption of the HVAC unit and all the other electrical devices operating in the building such as lighting and plug loads. Then, the estimated power signal of the HVAC is used for estimating the power consumption profile of the HVAC major electrical loads such as compressors, condenser fans and indoor blower. Experiments conducted on real data collected from a building testbed maintained at the Oak Ridge National Laboratory (ORNL) demonstrate high accuracy on the disaggregation task.

  16. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  17. Chain-computerisation for better privacy protection : a new approach to developing non-intrusive information infrastructures that improve privacy protection

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    1999-01-01

    This is the second of a series of two articles in which the author presents some key elements from his recently completed thesis about functional, non-intrusive information infrastructures for interorganisational public policy implementation. The development of these information infrastructures

  18. Non-invasive diagnostics of the maxillary and frontal sinuses based on diode laser gas spectroscopy.

    Science.gov (United States)

    Lewander, Märta; Lindberg, Sven; Svensson, Tomas; Siemund, Roger; Svanberg, Katarina; Svanberg, Sune

    2012-03-01

    Suspected, but objectively absent, rhinosinusitis constitutes a major cause of visits to the doctor, high health care costs, and the over-prescription of antibiotics, contributing to the serious problem of resistant bacteria. This situation is largely due to a lack of reliable and widely applicable diagnostic methods. A novel method for the diagnosis of rhinosinusitis based on non-intrusive diode laser gas spectroscopy is presented. The technique is based on light absorption by free gas (oxygen and water vapour) inside the sinuses, and has the potential to be a complementary diagnostic tool in primary health care. The method was evaluated on 40 patients with suspected sinus problems, referred to the diagnostic radiology clinic for low-dose computed tomography (CT), which was used as the reference technique. The data obtained with the new laser-based method correlated well with the grading of opacification and ventilation using CT. The sensitivity and specificity were estimated to be 93% and 61%, respectively, for the maxillary sinuses, and 94% and 86%, respectively, for the frontal sinuses. Good reproducibility was shown. The laser-based technique presents real-time clinical data that correlate well to CT findings, while being non-intrusive and avoiding the use of ionizing radiation.

  19. A Non-Intrusive Cyber Physical Social Sensing Solution to People Behavior Tracking: Mechanism, Prototype, and Field Experiments

    Directory of Open Access Journals (Sweden)

    Yunjian Jia

    2017-01-01

    Full Text Available Tracking people’s behaviors is a main category of cyber physical social sensing (CPSS-related people-centric applications. Most tracking methods utilize camera networks or sensors built into mobile devices such as global positioning system (GPS and Bluetooth. In this article, we propose a non-intrusive wireless fidelity (Wi-Fi-based tracking method. To show the feasibility, we target tracking people’s access behaviors in Wi-Fi networks, which has drawn a lot of interest from the academy and industry recently. Existing methods used for acquiring access traces either provide very limited visibility into media access control (MAC-level transmission dynamics or sometimes are inflexible and costly. In this article, we present a passive CPSS system operating in a non-intrusive, flexible, and simplified manner to overcome above limitations. We have implemented the prototype on the off-the-shelf personal computer, and performed real-world deployment experiments. The experimental results show that the method is feasible, and people’s access behaviors can be correctly tracked within a one-second delay.

  20. ELISA technique standardization for strongyloidiasis diagnosis

    International Nuclear Information System (INIS)

    Huapaya, P.; Espinoza, I.; Huiza, A.; Universidad Nacional Mayor de San Marcos, Lima; Sevilla, C.

    2002-01-01

    To standardize ELISA technique for human Strongyloides stercoralis infection diagnosis a crude antigen was prepared using filariform larvae obtained from positive stool samples cultured with charcoal. Harvested larvae were crushed by sonication and washed by centrifugation in order to obtain protein extracts to be used as antigen. Final protein concentration was 600 μg/mL. Several kinds of ELISA plates were tested and antigen concentration, sera dilution, conjugate dilution and cut off were determined to identify infection. Sera from patients with both hyper-infection syndrome and intestinal infection demonstrated by parasitological examination were positive controls and sera from people living in non-endemic areas with no infection demonstrated by parasitological examination were negative controls. Best values were 5 μg/mL for antigen, 1/64 for sera, 1/1000 for conjugate; optical density values for positive samples were 1,2746 (1,1065 - 1,4206, DS = 0,3284) and for negative samples 0,4457 (0,3324 - 0,5538, DS = 0,2230). Twenty sera samples from positive subjects and one hundred from negative subjects were examined, obtaining 90% sensitivity and 88% specificity. The results show this technique could be useful as strongyloidiasis screening test in population studies

  1. Status and challenges of residential and industrial non-intrusive load monitoring

    DEFF Research Database (Denmark)

    Adabi, Ali; Mantey, Patrick; Holmegaard, Emil

    2015-01-01

    in recent years due to improvement in algorithms and methodologies. Currently, the important challenges facing residential NILM are inaccessibility of electricity meter high sampling data, and lack of reliable high resolution datasets. For industrial NILM the identification is more challenging due......Non-Intrusive Load Monitoring (NILM) is the process of identification of loads from an aggregate power interface using disaggregation algorithms. This paper identifies the current status, methodologies and challenges of NILM in residential and industrial settings. NILM has advanced substantially...... to increased number of loads and the variability of equipment type, temporal patterns and industrial secrecy. From our examination of data and its use in NILM, we observe that the number of devices that can be recognized and the training period required to achiever recognition is not only a function...

  2. Reactor core flow measurements during plant start-up using non-intrusive flow meter CROSSFLOW

    Energy Technology Data Exchange (ETDEWEB)

    Kanda, V.; Sharp, B.; Gurevich, A., E-mail: vkanda@amag-inc.com, E-mail: bsharp@amag-inc.com, E-mail: agurevich@amag-inc.com [Advanced Measurement & Analysis Group Inc., Ontario (Canada); Gurevich, Y., E-mail: yuri.gurevich@daystartech.ca [Daystar Technologies Inc., Ontario (Canada); Selvaratnarajah, S.; Lopez, A., E-mail: sselvaratnarajah@amag-inc.com, E-mail: alopez@amag-inc.com [Advanced Measurement & Analysis Group Inc., Ontario (Canada)

    2013-07-01

    For the first time, direct measurements of the total reactor coolant flow and the flow distribution between the inner reactor zone and the outer zone were conducted using the non-intrusive clamp on ultrasonic cross-correlation flow meter, CROSSFLOW, developed and manufactured by Advanced Measurement & Analysis Group Inc. (AMAG). The measurements were performed at Bruce Power A Unit 1 on the Pump Discharge piping of the Primary Heat Transport (PHT) system during start-up. This paper describes installation processes, hydraulic testing, uncertainty analysis and traceability of the measurements to certified standards. (author)

  3. Non-intrusive telemetry applications in the oilsands: from visible light and x-ray video to acoustic imaging and spectroscopy

    Science.gov (United States)

    Shaw, John M.

    2013-06-01

    While the production, transport and refining of oils from the oilsands of Alberta, and comparable resources elsewhere is performed at industrial scales, numerous technical and technological challenges and opportunities persist due to the ill defined nature of the resource. For example, bitumen and heavy oil comprise multiple bulk phases, self-organizing constituents at the microscale (liquid crystals) and the nano scale. There are no quantitative measures available at the molecular level. Non-intrusive telemetry is providing promising paths toward solutions, be they enabling technologies targeting process design, development or optimization, or more prosaic process control or process monitoring applications. Operation examples include automated large object and poor quality ore during mining, and monitoring the thickness and location of oil water interfacial zones within separation vessels. These applications involve real-time video image processing. X-ray transmission video imaging is used to enumerate organic phases present within a vessel, and to detect individual phase volumes, densities and elemental compositions. This is an enabling technology that provides phase equilibrium and phase composition data for production and refining process development, and fluid property myth debunking. A high-resolution two-dimensional acoustic mapping technique now at the proof of concept stage is expected to provide simultaneous fluid flow and fluid composition data within porous inorganic media. Again this is an enabling technology targeting visualization of diverse oil production process fundamentals at the pore scale. Far infrared spectroscopy coupled with detailed quantum mechanical calculations, may provide characteristic molecular motifs and intermolecular association data required for fluid characterization and process modeling. X-ray scattering (SAXS/WAXS/USAXS) provides characteristic supramolecular structure information that impacts fluid rheology and process

  4. New Non-Intrusive Inspection Technologies for Nuclear Security and Nonproliferation

    Science.gov (United States)

    Ledoux, Robert J.

    2015-10-01

    Comprehensive monitoring of the supply chain for nuclear materials has historically been hampered by non-intrusive inspection systems that have such large false alarm rates that they are impractical in the flow of commerce. Passport Systems, Inc. (Passport) has developed an active interrogation system which detects fissionable material, high Z material, and other contraband in land, sea and air cargo. Passport's design utilizes several detection modalities including high resolution imaging, passive radiation detection, effective-Z (EZ-3D™) anomaly detection, Prompt Neutrons from Photofission (PNPF), and Nuclear Resonance Fluorescence (NRF) isotopic identification. These technologies combine to: detect fissionable, high-Z, radioactive and contraband materials, differentiate fissionable materials from high-Z shielding materials, and isotopically identify actinides, Special Nuclear Materials (SNM), and other contraband (e.g. explosives, drugs, nerve agents). Passport's system generates a 3-D image of the scanned object which contains information such as effective-Z and density, as well as a 2-D image and isotopic and fissionable information for regions of interest.

  5. Chain-computerisation for interorganisational public policy implementation : A new approach to developing non-intrusive information infrastructures that improve public policy implementation

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    1999-01-01

    In two articles the author presents some key elements from his recently completed thesis about functional, non-intrusive information infrastructures for interorganisational public policy implementation. The development of these information infrastructures requires a new approach,

  6. Non-intrusive low-rank separated approximation of high-dimensional stochastic models

    KAUST Repository

    Doostan, Alireza; Validi, AbdoulAhad; Iaccarino, Gianluca

    2013-01-01

    This work proposes a sampling-based (non-intrusive) approach within the context of low-. rank separated representations to tackle the issue of curse-of-dimensionality associated with the solution of models, e.g., PDEs/ODEs, with high-dimensional random inputs. Under some conditions discussed in details, the number of random realizations of the solution, required for a successful approximation, grows linearly with respect to the number of random inputs. The construction of the separated representation is achieved via a regularized alternating least-squares regression, together with an error indicator to estimate model parameters. The computational complexity of such a construction is quadratic in the number of random inputs. The performance of the method is investigated through its application to three numerical examples including two ODE problems with high-dimensional random inputs. © 2013 Elsevier B.V.

  7. Non-intrusive low-rank separated approximation of high-dimensional stochastic models

    KAUST Repository

    Doostan, Alireza

    2013-08-01

    This work proposes a sampling-based (non-intrusive) approach within the context of low-. rank separated representations to tackle the issue of curse-of-dimensionality associated with the solution of models, e.g., PDEs/ODEs, with high-dimensional random inputs. Under some conditions discussed in details, the number of random realizations of the solution, required for a successful approximation, grows linearly with respect to the number of random inputs. The construction of the separated representation is achieved via a regularized alternating least-squares regression, together with an error indicator to estimate model parameters. The computational complexity of such a construction is quadratic in the number of random inputs. The performance of the method is investigated through its application to three numerical examples including two ODE problems with high-dimensional random inputs. © 2013 Elsevier B.V.

  8. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  9. Application of non-monotonic logic to failure diagnosis of nuclear power plant

    International Nuclear Information System (INIS)

    Takahashi, M.; Kitamura, M.; Sugiyama, K.

    1989-01-01

    A prototype diagnosis system for nuclear power plants was developed based on Truth Maintenance systems: TMS and Dempster-Shafer probability theory. The purpose of this paper is to establish basic technique for more intelligent, man-computer cooperative diagnosis system. The developed system is capable of carrying out the diagnostic inference under the imperfect observation condition with the help of the proposed belief revision procedure with TMS and the systematic uncertainty treatment with Dempster-Shafer theory. The usefulness and potentiality of the present non-monotonic logic were demonstrated through simulation experiments

  10. Non-intrusive reduced order modeling of nonlinear problems using neural networks

    Science.gov (United States)

    Hesthaven, J. S.; Ubbiali, S.

    2018-06-01

    We develop a non-intrusive reduced basis (RB) method for parametrized steady-state partial differential equations (PDEs). The method extracts a reduced basis from a collection of high-fidelity solutions via a proper orthogonal decomposition (POD) and employs artificial neural networks (ANNs), particularly multi-layer perceptrons (MLPs), to accurately approximate the coefficients of the reduced model. The search for the optimal number of neurons and the minimum amount of training samples to avoid overfitting is carried out in the offline phase through an automatic routine, relying upon a joint use of the Latin hypercube sampling (LHS) and the Levenberg-Marquardt (LM) training algorithm. This guarantees a complete offline-online decoupling, leading to an efficient RB method - referred to as POD-NN - suitable also for general nonlinear problems with a non-affine parametric dependence. Numerical studies are presented for the nonlinear Poisson equation and for driven cavity viscous flows, modeled through the steady incompressible Navier-Stokes equations. Both physical and geometrical parametrizations are considered. Several results confirm the accuracy of the POD-NN method and show the substantial speed-up enabled at the online stage as compared to a traditional RB strategy.

  11. Effective approach toward Intrusion Detection System using data mining techniques

    Directory of Open Access Journals (Sweden)

    G.V. Nadiammai

    2014-03-01

    Full Text Available With the tremendous growth of the usage of computers over network and development in application running on various platform captures the attention toward network security. This paradigm exploits security vulnerabilities on all computer systems that are technically difficult and expensive to solve. Hence intrusion is used as a key to compromise the integrity, availability and confidentiality of a computer resource. The Intrusion Detection System (IDS plays a vital role in detecting anomalies and attacks in the network. In this work, data mining concept is integrated with an IDS to identify the relevant, hidden data of interest for the user effectively and with less execution time. Four issues such as Classification of Data, High Level of Human Interaction, Lack of Labeled Data, and Effectiveness of Distributed Denial of Service Attack are being solved using the proposed algorithms like EDADT algorithm, Hybrid IDS model, Semi-Supervised Approach and Varying HOPERAA Algorithm respectively. Our proposed algorithm has been tested using KDD Cup dataset. All the proposed algorithm shows better accuracy and reduced false alarm rate when compared with existing algorithms.

  12. Expansion tunnel characterization and development of non-intrusive microwave plasma diagnostics

    Science.gov (United States)

    Dufrene, Aaron T.

    The focus of this research is the development of non-intrusive microwave diagnostics for characterization of expansion tunnels. The main objectives of this research are to accurately characterize the LENS XX expansion tunnel facility, develop non-intrusive RF diagnostics that will work in short-duration expansion tunnel testing, and to determine plasma properties and other information that might otherwise be unknown, less accurate, intrusive, or more difficult to determine through conventional methods. Testing was completed in LENS XX, a new large-scale expansion tunnel facility at CUBRC, Inc. This facility is the largest known expansion tunnel in the world with an inner diameter of 24 inches, a 96 inch test section, and an end-to-end length of more than 240 ft. Expansion tunnels are currently the only facilities capable of generating high-enthalpy test conditions with minimal or no freestream dissociation or ionization. However, short test times and freestream noise at some conditions have limited development of these facilities. To characterize the LENS XX facility, the first step is to evaluate the facility pressure, vacuum, temperature, and other mechanical restrictions to derive a theoretical testing parameter space. Test condition maps are presented for a variety of parameters and gases based on 1D perfect gas dynamics. Test conditions well beyond 10 km/s or 50 MJ/kg are identified with minimum test times of 200 us. Additionally, a four-chamber expansion tube configuration is considered for extending the stagnation enthalpy range of the facility even further. A microwave shock speed diagnostic measures primary and secondary shock speeds accurately every 30 in. down the entire length of the facility resulting in a more accurate determination of freestream conditions required for computational comparisons. The high resolution of this measurement is used to assess shock speed attenuation as well as secondary diaphragm performance. Negligible shock attenuation is

  13. Preliminary experimental results for a non-intrusive scheme for the detection of flaws in metal pipelines

    Science.gov (United States)

    Aydin, K.; Shinde, S.; Suhail, M.; Vyas, A.; Zieher, K. W.

    2002-05-01

    An acoustic pulse echo scheme for non-intrusive detection of flaws in metal pipelines has been investigated in the laboratory. The primary pulse is generated by a pulsed magnetic field enclosing a short section of a free pipe. The detection is by an electrostatic detector surrounding a short section of the pipe. Reflected pulses from thin areas, with a longitudinal extension of about one pipe radius and a reduction of the wall thickness of 40%, can be detected clearly.

  14. Mandibular canine intrusion with the segmented arch technique: A finite element method study.

    Science.gov (United States)

    Caballero, Giselle Milagros; Carvalho Filho, Osvaldo Abadia de; Hargreaves, Bernardo Oliveira; Brito, Hélio Henrique de Araújo; Magalhães Júnior, Pedro Américo Almeida; Oliveira, Dauro Douglas

    2015-06-01

    Mandibular canines are anatomically extruded in approximately half of the patients with a deepbite. Although simultaneous orthodontic intrusion of the 6 mandibular anterior teeth is not recommended, a few studies have evaluated individual canine intrusion. Our objectives were to use the finite element method to simulate the segmented intrusion of mandibular canines with a cantilever and to evaluate the effects of different compensatory buccolingual activations. A finite element study of the right quadrant of the mandibular dental arch together with periodontal structures was modeled using SolidWorks software (Dassault Systèmes Americas, Waltham, Mass). After all bony, dental, and periodontal ligament structures from the second molar to the canine were graphically represented, brackets and molar tubes were modeled. Subsequently, a 0.021 × 0.025-in base wire was modeled with stainless steel properties and inserted into the brackets and tubes of the 4 posterior teeth to simulate an anchorage unit. Finally, a 0.017 × 0.025-in cantilever was modeled with titanium-molybdenum alloy properties and inserted into the first molar auxiliary tube. Discretization and boundary conditions of all anatomic structures tested were determined with HyperMesh software (Altair Engineering, Milwaukee, Wis), and compensatory toe-ins of 0°, 4°, 6°, and 8° were simulated with Abaqus software (Dassault Systèmes Americas). The 6° toe-in produced pure intrusion of the canine. The highest amounts of periodontal ligament stress in the anchor segment were observed around the first molar roots. This tooth showed a slight tendency for extrusion and distal crown tipping. Moreover, the different compensatory toe-ins tested did not significantly affect the other posterior teeth. The segmented mechanics simulated in this study may achieve pure mandibular canine intrusion when an adequate amount of compensatory toe-in (6°) is incorporated into the cantilever to prevent buccal and lingual crown

  15. Non-contact ultrasound techniques

    International Nuclear Information System (INIS)

    Khazali Mohd Zin

    2001-01-01

    Non-contact ultrasound plays significant role in material characterisation and inspection. Unlike conventional ultrasonic techniques, non-contact ultrasonic is mostly applicable to areas where the former has its weaknesses and limitations. It is interesting to note that the non-contact ultrasonic technique has an important significant application in industry. The technique is signified by the fact that the object to be inspected is further away from the ultrasonic source, no couplant is needed and inconsistent pressure between the transducer and the specimen can be eliminated. The paper discusses some of the non-contact ultrasound technique and its applications. (Author)

  16. Conjunctive Management of Multi-Aquifer System for Saltwater Intrusion Mitigation

    Science.gov (United States)

    Tsai, F. T. C.; Pham, H. V.

    2015-12-01

    Due to excessive groundwater withdrawals, many water wells in Baton Rouge, Louisiana experience undesirable chloride concentration because of saltwater intrusion. The study goal is to develop a conjunctive management framework that takes advantage of the Baton Rouge multi-aquifer system to mitigate saltwater intrusion. The conjunctive management framework utilizes several hydraulic control techniques to mitigate saltwater encroachment. These hydraulic control approaches include pumping well relocation, freshwater injection, saltwater scavenging, and their combinations. Specific objectives of the study are: (1) constructing scientific geologic architectures of the "800-foot" sand, the "1,000-foot" sand, the "1,200-foot" sand, the "1,500-foot" sand, the "1,700-foot" sand, and the "2,000-foot" sand, (2) developing scientific saltwater intrusion models for these sands. (3) using connector wells to draw native groundwater from one sand and inject to another sand to create hydraulic barriers to halt saltwater intrusion, (4) using scavenger wells or well couples to impede saltwater intrusion progress and reduce chloride concentration in pumping wells, and (5) reducing cones of depression by relocating and dispersing pumping wells to different sands. The study utilizes optimization techniques and newest LSU high performance computing (HPC) facilities to derive solutions. The conjunctive management framework serves as a scientific tool to assist policy makers to solve the urgent saltwater encroachment issue in the Baton Rouge area. The research results will help water companies as well as industries in East Baton Rouge Parish and neighboring parishes by reducing their saltwater intrusion threats, which in turn would sustain Capital Area economic development.

  17. The use of ultrasonographic techniques for the diagnosis of retinopathy of prematurity

    International Nuclear Information System (INIS)

    Modzejewska, M.

    2006-01-01

    Introduction: Ultrasonographic techniques are commonly used for the imaging of various tissue structures and organs, including the eyeball and orbit. The non-invasive ultrasound imaging is safe for the patient and may be repeated after a short time unlike in the case of other radiological techniques. In pediatric ophthalmology, ultrasonography plays a major role as an auxiliary examination for the diagnosis of various intraocular diseases, pathologies of the retina and choroid, and retrobulbar conditions. Ultrasonography is of major importance in diagnosing eye disorders associated with opacity preventing visual inspection of the posterior eye segment. Methods: Among ultrasonographic techniques in pediatric ophthalmology the most frequently used are B-scan, A-scan, and Doppler ultrasonography. Because of the resolution of ultrasonographic methods in comparison to radiological techniques, they play an important role in monitoring the dynamics of pathological processes in retinopathy of prematurity (ROP). Other radiological methods such as CT, MRI or subtractive angiography do not offer a detailed view of retinal attachment or vitreo-retinal proliferation. Conclusion: Ultrasonography as an auxiliary examination at subsequent stages of ROP helps to document the changes and in case of corneal opacity connected with progression of vitreo-retinal abnormalities is the basis for the diagnosis. (author)

  18. Assessment of Optical Coherence Tomography Imaging in the Diagnosis of Non-Melanoma Skin Cancer and Benign Lesions Versus Normal Skin:

    DEFF Research Database (Denmark)

    Mogensen, Mette; Jørgensen, Thomas Martini; Nürnberg, Birgit Meincke

    2009-01-01

    BACKGROUND Optical coherence tomography (OCT) is an optical imaging technique that may be useful in diagnosis of non-melanoma skin cancer (NMSC). OBJECTIVES To describe OCT features in NMSC such as actinic keratosis (AK) and basal cell carcinoma (BCC) and in benign lesions and to assess the diagn......BACKGROUND Optical coherence tomography (OCT) is an optical imaging technique that may be useful in diagnosis of non-melanoma skin cancer (NMSC). OBJECTIVES To describe OCT features in NMSC such as actinic keratosis (AK) and basal cell carcinoma (BCC) and in benign lesions and to assess...

  19. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    Science.gov (United States)

    Ganapathy, S.; Yogesh, P.; Kannan, A.

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. PMID:23056036

  20. Non-invasive techniques for determining musculoskeleton body composition

    International Nuclear Information System (INIS)

    Cohn, S.H.

    1984-01-01

    In vivo neutron activation analysis, combined with gamma spectrometry, has ushered in a new era of clinical diagnosis and evaluation of therapies, as well as investigation into and modelling of body composition in both normal individuals and patients suffering from various diseases and dysfunctions. Body composition studies have provided baseline data on such vital constituents as nitrogen, potassium and calcium. The non-invasive measurement techniques are particularly suitable for study of the musculo-skeletal changes in body composition. Of particular relevance here is the measurement of calcium loss in astronauts during prolonged space flights

  1. Diagnosis of non-exudative (DRY) age related macular degeneration by non-invasive photon-correlation spectroscopy.

    Science.gov (United States)

    Fankhauser, Franz Ii; Ott, Maria; Munteanu, Mihnea

    2016-01-01

    Photon-correlation spectroscopy (PCS) (quasi-elastic light scattering spectroscopy, dynamic light scattering spectroscopy) allows the non-invasively reveal of local dynamics and local heterogeneities of macromolecular systems. The capability of this technique to diagnose the retinal pathologies by in-vivo investigations of spatial anomalies of retinas displaying non-exudative senile macular degeneration was evaluated. Further, the potential use of the technique for the diagnosis of the macular degeneration was analyzed and displayed by the Receiver Operating Curve (ROC). The maculae and the peripheral retina of 73 normal eyes and of 26 eyes afflicted by an early stage of non-exudative senile macular degeneration were characterized by time-correlation functions and analyzed in terms of characteristic decay times and apparent size distributions. The characteristics of the obtained time-correlation functions of the eyes afflicted with nonexudative macular degeneration and of normal eyes differed significantly, which could be referred to a significant change of the nano- and microstructure of the investigated pathologic maculas. Photon-correlation spectroscopy is able to assess the macromolecular and microstructural aberrations in the macula afflicted by non-exudative, senile macular degeneration. It has been demonstrated that macromolecules of this disease show a characteristic abnormal behavior in the macula.

  2. Human intrusion: New ideas?

    International Nuclear Information System (INIS)

    Cooper, J.R.

    2002-01-01

    Inadvertent human intrusion has been an issue for the disposal of solid radioactive waste for many years. This paper discusses proposals for an approach for evaluating the radiological significance of human intrusion as put forward by ICRP with contribution from work at IAEA. The approach focuses on the consequences of the intrusion. Protective actions could, however, include steps to reduce the probability of human intrusion as well as the consequences. (author)

  3. The diagnosis and treatment of non-occlusive gut ischaemia

    International Nuclear Information System (INIS)

    Schindler, G.; Bruch, H.P.; Wuerzburg Univ.

    1991-01-01

    Non-occlusive gut ischaemia is a disease of advanced age. Its causes are reduced cardiac output or shock, facilitated by digitalis, adrenaline, ergotamine and diuretics. The persisting microcirculation and development of gut necrois leads to an increase in certain serum enzymes, such as lactate, LDH and CK-NB. The early application of mesenteric angiography using a DSA technique reveals four grades of under-perfusion. Early and correct diagnosis of the disease should lead to intra-arterial treatment with prostaglandin. In 10 out of 42 cases, conservative therapy led to re-perfusion of the gut. (orig.) [de

  4. Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection

    Science.gov (United States)

    Elfers, Carsten; Horstmann, Mirko; Sohr, Karsten; Herzog, Otthein

    Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine learning techniques have been proposed. However, one critical issue is that the amount of reference data that contains serious intrusions is very sparse. In this paper we present an inference process with linear chain conditional random fields that aims to solve this problem by using domain knowledge about the alerts of different intrusion sensors represented in an ontology.

  5. Non-intrusive gesture recognition system combining with face detection based on Hidden Markov Model

    Science.gov (United States)

    Jin, Jing; Wang, Yuanqing; Xu, Liujing; Cao, Liqun; Han, Lei; Zhou, Biye; Li, Minggao

    2014-11-01

    A non-intrusive gesture recognition human-machine interaction system is proposed in this paper. In order to solve the hand positioning problem which is a difficulty in current algorithms, face detection is used for the pre-processing to narrow the search area and find user's hand quickly and accurately. Hidden Markov Model (HMM) is used for gesture recognition. A certain number of basic gesture units are trained as HMM models. At the same time, an improved 8-direction feature vector is proposed and used to quantify characteristics in order to improve the detection accuracy. The proposed system can be applied in interaction equipments without special training for users, such as household interactive television

  6. Non-invasive and non-intrusive gas flow measurement based on the dynamic thermal characteristics of a pipeline

    Science.gov (United States)

    Fan, Zichuan; Cai, Maolin; Xu, Weiqing

    2012-10-01

    This paper proposes a non-intrusive and non-invasive method for measuring the gas flow rate in pneumatic industry. A heater unit is fixed on the partial circumference of the external wall of a pipeline and emits specific thermal pulses in a predetermined mode. Two sensors attached to the external wall detect the upstream temperature, and the gas flow can be measured according to the relationship between the flow rate and the dynamic thermal characteristics of the pipeline. To determine the preferable relationship, the temperature field model of the measurement system is built. Then, based on the measurement modes and the corresponding simulations, the objective functions for the gas flow specified on different dynamic thermal characteristics are established. Additionally, the minimum measurement time of the method, named reference time scale, is proposed. Further, robustness tests of the measurement method are derived by considering the influences of multiple factors on the objective functions. The experiments confirm that this method does not need to open the pipeline and disturb the flow regime in order to obtain the data; this method also avoids the typical time-consuming and complex operations, resists ambient temperature disturbance and achieves approximately acceptable results.

  7. Non-invasive and non-intrusive gas flow measurement based on the dynamic thermal characteristics of a pipeline

    International Nuclear Information System (INIS)

    Fan, Zichuan; Cai, Maolin; Xu, Weiqing

    2012-01-01

    This paper proposes a non-intrusive and non-invasive method for measuring the gas flow rate in pneumatic industry. A heater unit is fixed on the partial circumference of the external wall of a pipeline and emits specific thermal pulses in a predetermined mode. Two sensors attached to the external wall detect the upstream temperature, and the gas flow can be measured according to the relationship between the flow rate and the dynamic thermal characteristics of the pipeline. To determine the preferable relationship, the temperature field model of the measurement system is built. Then, based on the measurement modes and the corresponding simulations, the objective functions for the gas flow specified on different dynamic thermal characteristics are established. Additionally, the minimum measurement time of the method, named reference time scale, is proposed. Further, robustness tests of the measurement method are derived by considering the influences of multiple factors on the objective functions. The experiments confirm that this method does not need to open the pipeline and disturb the flow regime in order to obtain the data; this method also avoids the typical time-consuming and complex operations, resists ambient temperature disturbance and achieves approximately acceptable results. (paper)

  8. Computational neural network regression model for Host based Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Gautam

    2016-09-01

    Full Text Available The current scenario of information gathering and storing in secure system is a challenging task due to increasing cyber-attacks. There exists computational neural network techniques designed for intrusion detection system, which provide security to single machine and entire network's machine. In this paper, we have used two types of computational neural network models, namely, Generalized Regression Neural Network (GRNN model and Multilayer Perceptron Neural Network (MPNN model for Host based Intrusion Detection System using log files that are generated by a single personal computer. The simulation results show correctly classified percentage of normal and abnormal (intrusion class using confusion matrix. On the basis of results and discussion, we found that the Host based Intrusion Systems Model (HISM significantly improved the detection accuracy while retaining minimum false alarm rate.

  9. Multilayer Statistical Intrusion Detection in Wireless Networks

    Science.gov (United States)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  10. Motion Capture Technique Applied Research in Sports Technique Diagnosis

    Directory of Open Access Journals (Sweden)

    Zhiwu LIU

    2014-09-01

    Full Text Available The motion capture technology system definition is described in the paper, and its components are researched, the key parameters are obtained from motion technique, the quantitative analysis are made on technical movements, the method of motion capture technology is proposed in sport technical diagnosis. That motion capture step includes calibration system, to attached landmarks to the tester; to capture trajectory, and to analyze the collected data.

  11. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  12. Pediatric abdominal non-Hodgkin's lymphoma: diagnosis through surgical and non-surgical procedures.

    Science.gov (United States)

    Aguiar, Arthur Almeida; Lima, Luciana Cavalvanti; Araújo, Cláudia Corrêa de; Gallindo, Rodrigo Melo

    2017-12-29

    To describe the success rate and the complications after procedures to diagnose abdominal non-Hodgkin's lymphoma in children and adolescents. A retrospective cross-sectional study was conducted with a population consisting of children and adolescents with abdominal non-Hodgkin's lymphoma diagnosed between September 1994 and December 2012. The sample comprised of 100 patients who underwent 113 diagnostic procedures, including urgent surgery (n=21), elective surgery (n=36), and non-surgical diagnosis (n=56). The most frequent procedures were laparotomy (46.9%) and ultrasound-guided core biopsy (25.6%). The rate of diagnostic success was 95.2% for urgent surgeries; 100% for elective surgeries and 82.1% for non-surgical procedures (p<0.05). The rates of complication during the three diagnosis procedures considered were significant (p<0.001; 95.2% of the urgent surgeries, 83.8% of the elective surgeries, and 10.7% of the non-surgical procedures). The length of time before resuming a full diet and starting chemotherapy was significantly reduced for patients who underwent non-surgical procedures when compared with the other procedures (p<0.001). Non-surgical procedures for the diagnosis of pediatric abdominal non-Hodgkin's lymphoma are an effective option with low morbidity rate, allowing an earlier resumption of a full diet and chemotherapy initiation. Furthermore, non-surgical procedures should also be considered for obtaining tumor samples from patients with extensive disease. Copyright © 2017. Published by Elsevier Editora Ltda.

  13. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    International Nuclear Information System (INIS)

    James L. Jones

    2003-01-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more ''out-of-the-box'' solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed ''out-of-the-box'' solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense

  14. Application status of on-line nuclear techniques in analysis of coal quality

    International Nuclear Information System (INIS)

    Cai Shaohui

    1993-01-01

    Nuclear techniques are favourable for continuous on-line analysis, because they are fast, non-intrusive. They can be used in the adverse circumstances in coal industry. The paper reviews the application status of on-line nuclear techniques in analysis of coal quality and economic benefits derived from such techniques in developed countries

  15. The evolution of Interior Intrusion Detection Technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  16. Improving Accuracy of Intrusion Detection Model Using PCA and optimized SVM

    Directory of Open Access Journals (Sweden)

    Sumaiya Thaseen Ikram

    2016-06-01

    Full Text Available Intrusion detection is very essential for providing security to different network domains and is mostly used for locating and tracing the intruders. There are many problems with traditional intrusion detection models (IDS such as low detection capability against unknown network attack, high false alarm rate and insufficient analysis capability. Hence the major scope of the research in this domain is to develop an intrusion detection model with improved accuracy and reduced training time. This paper proposes a hybrid intrusiondetection model by integrating the principal component analysis (PCA and support vector machine (SVM. The novelty of the paper is the optimization of kernel parameters of the SVM classifier using automatic parameter selection technique. This technique optimizes the punishment factor (C and kernel parameter gamma (γ, thereby improving the accuracy of the classifier and reducing the training and testing time. The experimental results obtained on the NSL KDD and gurekddcup dataset show that the proposed technique performs better with higher accuracy, faster convergence speed and better generalization. Minimum resources are consumed as the classifier input requires reduced feature set for optimum classification. A comparative analysis of hybrid models with the proposed model is also performed.

  17. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  18. A web-based non-intrusive ambient system to measure and classify activities of daily living.

    Science.gov (United States)

    Stucki, Reto A; Urwyler, Prabitha; Rampa, Luca; Müri, René; Mosimann, Urs P; Nef, Tobias

    2014-07-21

    The number of older adults in the global population is increasing. This demographic shift leads to an increasing prevalence of age-associated disorders, such as Alzheimer's disease and other types of dementia. With the progression of the disease, the risk for institutional care increases, which contrasts with the desire of most patients to stay in their home environment. Despite doctors' and caregivers' awareness of the patient's cognitive status, they are often uncertain about its consequences on activities of daily living (ADL). To provide effective care, they need to know how patients cope with ADL, in particular, the estimation of risks associated with the cognitive decline. The occurrence, performance, and duration of different ADL are important indicators of functional ability. The patient's ability to cope with these activities is traditionally assessed with questionnaires, which has disadvantages (eg, lack of reliability and sensitivity). Several groups have proposed sensor-based systems to recognize and quantify these activities in the patient's home. Combined with Web technology, these systems can inform caregivers about their patients in real-time (e.g., via smartphone). We hypothesize that a non-intrusive system, which does not use body-mounted sensors, video-based imaging, and microphone recordings would be better suited for use in dementia patients. Since it does not require patient's attention and compliance, such a system might be well accepted by patients. We present a passive, Web-based, non-intrusive, assistive technology system that recognizes and classifies ADL. The components of this novel assistive technology system were wireless sensors distributed in every room of the participant's home and a central computer unit (CCU). The environmental data were acquired for 20 days (per participant) and then stored and processed on the CCU. In consultation with medical experts, eight ADL were classified. In this study, 10 healthy participants (6 women

  19. Non-intrusive Packet-Layer Model for Monitoring Video Quality of IPTV Services

    Science.gov (United States)

    Yamagishi, Kazuhisa; Hayashi, Takanori

    Developing a non-intrusive packet-layer model is required to passively monitor the quality of experience (QoE) during service. We propose a packet-layer model that can be used to estimate the video quality of IPTV using quality parameters derived from transmitted packet headers. The computational load of the model is lighter than that of the model that takes video signals and/or video-related bitstream information such as motion vectors as input. This model is applicable even if the transmitted bitstream information is encrypted because it uses transmitted packet headers rather than bitstream information. For developing the model, we conducted three extensive subjective quality assessments for different encoders and decoders (codecs), and video content. Then, we modeled the subjective video quality assessment characteristics based on objective features affected by coding and packet loss. Finally, we verified the model's validity by applying our model to unknown data sets different from training data sets used above.

  20. The electrical self-potential method is a non-intrusive snow-hydrological sensor

    Science.gov (United States)

    Thompson, S. S.; Kulessa, B.; Essery, R. L. H.; Lüthi, M. P.

    2015-08-01

    Our ability to measure, quantify and assimilate hydrological properties and processes of snow in operational models is disproportionally poor compared to the significance of seasonal snowmelt as a global water resource and major risk factor in flood and avalanche forecasting. Encouraged by recent theoretical, modelling and laboratory work, we show here that the diurnal evolution of aerially-distributed self-potential magnitudes closely track those of bulk meltwater fluxes in melting in-situ snowpacks at Rhone and Jungfraujoch glaciers, Switzerland. Numerical modelling infers temporally-evolving liquid water contents in the snowpacks on successive days in close agreement with snow-pit measurements. Muting previous concerns, the governing physical and chemical properties of snow and meltwater became temporally invariant for modelling purposes. Because measurement procedure is straightforward and readily automated for continuous monitoring over significant spatial scales, we conclude that the self-potential geophysical method is a highly-promising non-intrusive snow-hydrological sensor for measurement practice, modelling and operational snow forecasting.

  1. A Non-Intrusive GMA Welding Process Quality Monitoring System Using Acoustic Sensing.

    Science.gov (United States)

    Cayo, Eber Huanca; Alfaro, Sadek Crisostomo Absi

    2009-01-01

    Most of the inspection methods used for detection and localization of welding disturbances are based on the evaluation of some direct measurements of welding parameters. This direct measurement requires an insertion of sensors during the welding process which could somehow alter the behavior of the metallic transference. An inspection method that evaluates the GMA welding process evolution using a non-intrusive process sensing would allow not only the identification of disturbances during welding runs and thus reduce inspection time, but would also reduce the interference on the process caused by the direct sensing. In this paper a nonintrusive method for weld disturbance detection and localization for weld quality evaluation is demonstrated. The system is based on the acoustic sensing of the welding electrical arc. During repetitive tests in welds without disturbances, the stability acoustic parameters were calculated and used as comparison references for the detection and location of disturbances during the weld runs.

  2. Advanced in-flight measurement techniques

    CERN Document Server

    Lawson, Nicholas; Jentink, Henk; Kompenhans, Jürgen

    2013-01-01

    The book presents a synopsis of the main results achieved during the 3 year EU-project "Advanced Inflight Measurement Techniques (AIM)" which applied advanced image based measurement techniques to industrial flight testing. The book is intended to be not only an overview on the AIM activities but also a guide on the application of advanced optical measurement techniques for future flight testing. Furthermore it is a useful guide for engineers in the field of experimental methods and flight testing who face the challenge of a future requirement for the development of highly accurate non-intrusive in-flight measurement techniques.

  3. Network Intrusion Forensic Analysis Using Intrusion Detection System

    OpenAIRE

    Manish Kumar; Dr. M. Hanumanthappa; Dr. T.V. Suresh Kumar

    2011-01-01

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investi...

  4. Value of the region of interest technique in the scintigraphic diagnosis of primary bone tumors

    International Nuclear Information System (INIS)

    Buell, U.; Keyl, W.; Meister, P.; Pfeifer, J.P.; Hartel, P.; Muenchen Univ.

    1981-01-01

    Employing ROI-technique, a ratio Q was obtained from relating accumulation of 99 sup(m)Tc-MDP at the site of the bone lesion (n = 150) with that of contralateral non-involved osseous areas. Values of Q were correlated with histologic tumor diagnosis, its dignity and frequency. Values of Q of greater than 3.0 were found in 95% of all sarcomas, in 100% of the osteosarcomas but in only 3.8% of all benign bone tumors. Values ranging from 1.0 to 1.2 were exclusively measured in benign tumors (e.g., in 52% of juvenile bone cysts and in 67% of non-ossifing fibromas). Since the threshold - separating benign from malignant lesions - at Q = 3.0 was blurred by tumorlike lesions, metastases and especially by Paget's disease, this method does not precisely predict dignity. However, this method may complement radiographic evaluation with low values supporting the diagnosis of a benign lesion. The combined findings of radiography and these rations gained by nuclear imaging may help determine the pathway of a patient through further diagnosis and treatment. (orig.) [de

  5. ELISA technique standardisation for human toxocariasis diagnosis

    International Nuclear Information System (INIS)

    Espinoza, Y.; Suarez, R.; Huiza, A.

    2003-01-01

    To standardise ELISA technique for toxocara canis human infection diagnosis by using excreted-secreted antigen prepared in our country. T. canis eggs were collected by incubation with formalin (2%) at 28 o C in order to obtain third stage larvae that were freed and incubated in RPMI at 37 o C for 7 days; the medium was replaced by a similar one and stored at -20 o C. Antigen was concentrated and protein dosage was made. Sera from patients with toxocariasis and newborns were used as positive and negative controls by ELISA technique, dilutions 1/4 to 1/1024. Polystyrene plates were sensitised with antigen in several concentrations and conjugated peroxidase with horseradish IgG, anti human IgG and substrate OPD were used. Absorbance was read with spectrophotometer (Multiskan plus labsystems) at 492 nm. Cut off point was determined by negative sera absorbencies arithmetic mean plus 3 standard deviations. Antigen concentration was 50 ug/mL, sera dilution 1/128, conjugate dilution 1/1000 with optical density above 0,241. ELISA technique for serologic diagnosis of human infection by toxocara canis could be used in epidemiological studies in our country. Its efficacy will be determined in future studies

  6. The evolution of interior intrusion detection technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combination developed when commercial sensors were unavailable and the future application of expert systems. 5 refs

  7. The evolution of interior intrusion detection technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-01-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the U.S. Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). The authors also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  8. Recent advances in non-vascular interventional diagnosis and treatment of thyroid nodules

    International Nuclear Information System (INIS)

    Lu Liming; Zhou Weisheng

    2009-01-01

    Non-vascular interventional diagnostic methods of thyroid nodules include ultrasonography-guided fine-needle aspiration cytology (USgFNAC) and ultrasonography-guided core-needle biopsy (USgCNB). USgFNAC is a practical method used to select and to guide the treatment of various thyroid nodules, however, it is difficult to make a differentiation between benign and malignant lesions simply to rely on the findings of a small number of cells. USgCNB has the advantage of being able to obtain satisfactory specimen enough for making a histological diagnosis, although this procedure is contraindicated in some patients. Non-vascular interventional treatments of thyroid nodules include percutaneous ethanol injection (PEI) and ultrasonography-guided interstitial laser photocoagulation (USgILP). Both PEI and USgILP have fine effect on the benign thyroid nodules. Compared with PEI, laser-induced necrosis can be well controlled, thus, the adverse reactions, such as the formation of fibrosis adjacent to the nodule, vocal cord paralysis, etc. can be avoided.Non-vascular interventional treatments may cause some untoward effects. For the diagnosis and treatment of thyroid nodules, the non-vascular interventional procedure is simple, safe, effective and economic with less complications, therefore, this technique is worth being popularized in clinical practice. (authors)

  9. Toolbox for non-intrusive structural and functional analysis of recombinant VLP based vaccines: a case study with hepatitis B vaccine.

    Directory of Open Access Journals (Sweden)

    Anke M Mulder

    Full Text Available BACKGROUND: Fundamental to vaccine development, manufacturing consistency, and product stability is an understanding of the vaccine structure-activity relationship. With the virus-like particle (VLP approach for recombinant vaccines gaining popularity, there is growing demand for tools that define their key characteristics. We assessed a suite of non-intrusive VLP epitope structure and function characterization tools by application to the Hepatitis B surface antigen (rHBsAg VLP-based vaccine. METHODOLOGY: The epitope-specific immune reactivity of rHBsAg epitopes to a given monoclonal antibody was monitored by surface plasmon resonance (SPR and quantitatively analyzed on rHBsAg VLPs in-solution or bound to adjuvant with a competitive enzyme-linked immunosorbent assay (ELISA. The structure of recombinant rHBsAg particles was examined by cryo transmission electron microscopy (cryoTEM and in-solution atomic force microscopy (AFM. PRINCIPAL FINDINGS: SPR and competitive ELISA determined relative antigenicity in solution, in real time, with rapid turn-around, and without the need of dissolving the particulate aluminum based adjuvant. These methods demonstrated the nature of the clinically relevant epitopes of HBsAg as being responsive to heat and/or redox treatment. In-solution AFM and cryoTEM determined vaccine particle size distribution, shape, and morphology. Redox-treated rHBsAg enabled 3D reconstruction from CryoTEM images--confirming the previously proposed octahedral structure and the established lipid-to-protein ratio of HBsAg particles. Results from these non-intrusive biophysical and immunochemical analyses coalesced into a comprehensive understanding of rHBsAg vaccine epitope structure and function that was important for assuring the desired epitope formation, determinants for vaccine potency, and particle stability during vaccine design, development, and manufacturing. SIGNIFICANCE: Together, the methods presented here comprise a novel

  10. DWI-MRI: Single, Informative, and Noninvasive Technique for Prostate Cancer Diagnosis

    Directory of Open Access Journals (Sweden)

    Elhousseiny I. Ibrahiem

    2012-01-01

    Full Text Available Aim. To evaluate diffusion weighted image-MRI (DWI as a single diagnostic noninvasive MRI technique for prostate cancer (PCa diagnosis. Material and Methods. A prospective study was conducted between July 2008 and July 2009. Candidates patients were equal or more than 40 years old, with suspicious digital rectal examination (more than clinical T2 or PSA >4 ng/mL. Informed consent was signed. DWI-MRI was performed at 1.5 T with a body coil combined with a spine coil in consecutive 100 cases. The histopathology of biopsies has been used as reference standard. Two examiners were evaluating MRI and TRUS, both of them were blinded regarding pathological findings. Accuracy, specificity, and sensitivity were statistically analyzed. Results. Based on pathological diagnosis: group A (cancerous; 75 cases and group B (non-cancerous; 25 cases. Mean age was 65.3 and 62.8 years in groups A and B, respectively. Mean PSA was 30.7 and 9.2 ng/mL in groups A and B, respectively. Sensitivity of DWI was 58.3% while specificity was 83.8%. Accuracy of lesion detection was 52.4–77.8% (<0.05. Moreover, DWI at ADC value 1.2×10−3 mL/sec could determine 82.4% of true positive cases (<0.05. ADC values were lower with Gleason score ≥7 (<0.05. Conclusion. DWI could represent a non invasive single diagnostic tool not only in detection and localization but also in prediction of Gleason score whenever DWI is used prior to invasive TRUS biopsy. Furthermore, targeted single biopsy could be planned after DWI to minimize patient morbidity by invasive techniques.

  11. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  12. A Real-Time Intrusion Detection System using Data Mining Technique

    Directory of Open Access Journals (Sweden)

    Fang-Yie Leu

    2008-04-01

    Full Text Available Presently, most computers authenticate user ID and password before users can login these systems. However, danger soon comes if the two items are known to hackers. In this paper, we propose a system, named Intrusion Detection and Identification System (IDIS, which builds a profile for each user in an intranet to keep track his/her usage habits as forensic features with which IDIS can identify who the underlying user in the intranet is. Our experimental results show that the recognition accuracy of students of computer science department is up to 98.99%.

  13. Resident Load Influence Analysis Method for Price Based on Non-intrusive Load Monitoring and Decomposition Data

    Science.gov (United States)

    Jiang, Wenqian; Zeng, Bo; Yang, Zhou; Li, Gang

    2018-01-01

    In the non-invasive load monitoring mode, the load decomposition can reflect the running state of each load, which will help the user reduce unnecessary energy costs. With the demand side management measures of time of using price, a resident load influence analysis method for time of using price (TOU) based on non-intrusive load monitoring data are proposed in the paper. Relying on the current signal of the resident load classification, the user equipment type, and different time series of self-elasticity and cross-elasticity of the situation could be obtained. Through the actual household load data test with the impact of TOU, part of the equipment will be transferred to the working hours, and users in the peak price of electricity has been reduced, and in the electricity at the time of the increase Electrical equipment, with a certain regularity.

  14. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  15. Count out your intrusions: Effects of verbal encoding on intrusive memories

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.

    2009-01-01

    Peri-traumatic information processing is thought to affect the development of intrusive trauma memories. This study aimed to replicate and improve the study by Holmes, Brewin, and Hennessy (2004, Exp. 3) on the role of peri-traumatic verbal processing in analogue traumatic intrusion development.

  16. Options for human intrusion

    International Nuclear Information System (INIS)

    Bauser, M.; Williams, R.

    1993-01-01

    This paper addresses options for dealing with human intrusion in terms of performance requirements and repository siting and design requirements. Options are presented, along with the advantages and disadvantages of certain approaches. At the conclusion, a conceptual approach is offered emphasizing both the minimization of subjective judgements concerning future human activity, and specification of repository requirements to minimize the likelihood of human intrusion and any resulting, harmful effects should intrusion occur

  17. Dating of authigenic clays related to igneous intrusions in Hunter Valley Coals

    International Nuclear Information System (INIS)

    Zwingmann, H.

    2000-01-01

    The Sydney Basin is composed mainly of Permian and Triassic marine and non-marine clastic sedimentary strata together with economically significant coal deposits and volumetrically minor igneous rocks. Many of these igneous rocks are also economically significant not only for their use in the construction industry but also for their deleterious effects on coal mining, particularly in underground mines utilising longwall extraction systems. Igneous activity in the Sydney Basin ranges from Early Permian to Tertiary in age and although episodic in nature, activity was unlikely to have ceased for periods of more than approximately 10 million years (Carr and Facer 1980; Embleton et al. 1982). Dating of the time of emplacement of igneous rocks using the K-Ar isotopic system is a relatively straightforward procedure if suitable analytical facilities and samples of appropriate, fresh, primary minerals are available. In the case of intrusions in coal seams, however, the occurrence of fresh, primary minerals is very rare due to widespread alteration produced by interaction between the igneous rock and fluids in the coal seam. This interaction produces a variety of secondary minerals with most primary minerals and glass being altered to clays (mainly kaolinite) and carbonates. Consequently, relatively few isotopic dates for intrusions into coal seams have been determined. A detailed study of several hundred samples of igneous rocks from the Sydney Basin found only six samples of intrusions into coal seams that were suitable for conventional K-Ar dating (Carr and Facer 1980). Techniques for K-Ar dating of authigenic illite, developed in response to the need by the petroleum industry to understand the timing of diagenesis in petroleum source-rocks and reservoirs, are now well established (Clauer and Chaudhuri 1995). As part of a larger project on the impact of igneous intrusions on coal mining and the alienation of coal reserves, a preliminary investigation of the timing of

  18. Individual differences in experiencing intrusive memories : The role of the ability to resist proactive interference

    NARCIS (Netherlands)

    Verwoerd, Johan; Wessel, Ineke; de Jong, Peter J.

    This study explored whether a relatively poor ability to resist or inhibit interference from irrelevant information in working memory is associated with experiencing undesirable intrusive memories. Non-selected participants (N = 91) completed a self-report measure of intrusive memories, and carried

  19. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    Science.gov (United States)

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  20. Research on the technology of detecting the SQL injection attack and non-intrusive prevention in WEB system

    Science.gov (United States)

    Hu, Haibin

    2017-05-01

    Among numerous WEB security issues, SQL injection is the most notable and dangerous. In this study, characteristics and procedures of SQL injection are analyzed, and the method for detecting the SQL injection attack is illustrated. The defense resistance and remedy model of SQL injection attack is established from the perspective of non-intrusive SQL injection attack and defense. Moreover, the ability of resisting the SQL injection attack of the server has been comprehensively improved through the security strategies on operation system, IIS and database, etc.. Corresponding codes are realized. The method is well applied in the actual projects.

  1. New trend in non-invasive prenatal diagnosis.

    Science.gov (United States)

    Ferrari, M; Carrera, P; Lampasona, V; Galbiati, S

    2015-12-07

    The presence of fetal DNA in maternal plasma represents a source of genetic material which can be obtained non-invasively. To date, the translation of noninvasive prenatal diagnosis from research into clinical practice has been rather fragmented, and despite the advances in improving the analytical sensitivity of methods, distinguishing between fetal and maternal sequences remains very challenging. Thus, the field of noninvasive prenatal diagnosis of genetic diseases has yet to attain a routine application in clinical diagnostics. On the contrary, fetal sex determination in pregnancies at high risk of sex-linked disorders, tests for fetal RHD genotyping and non-invasive assessment of chromosomal aneuploidies are now available worldwide. Copyright © 2014 Elsevier B.V. All rights reserved.

  2. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  3. Computer vision techniques for the diagnosis of skin cancer

    CERN Document Server

    Celebi, M

    2014-01-01

    The goal of this volume is to summarize the state-of-the-art in the utilization of computer vision techniques in the diagnosis of skin cancer. Malignant melanoma is one of the most rapidly increasing cancers in the world. Early diagnosis is particularly important since melanoma can be cured with a simple excision if detected early. In recent years, dermoscopy has proved valuable in visualizing the morphological structures in pigmented lesions. However, it has also been shown that dermoscopy is difficult to learn and subjective. Newer technologies such as infrared imaging, multispectral imaging, and confocal microscopy, have recently come to the forefront in providing greater diagnostic accuracy. These imaging technologies presented in this book can serve as an adjunct to physicians and  provide automated skin cancer screening. Although computerized techniques cannot as yet provide a definitive diagnosis, they can be used to improve biopsy decision-making as well as early melanoma detection, especially for pa...

  4. Treatment of Intrusive Suicidal Imagery Using Eye Movements

    Directory of Open Access Journals (Sweden)

    Jaël S. van Bentum

    2017-06-01

    Full Text Available Suicide and suicidal behavior are major public health concerns, and affect 3–9% of the population worldwide. Despite increased efforts for national suicide prevention strategies, there are still few effective interventions available for reducing suicide risk. In this article, we describe various theoretical approaches for suicide ideation and behavior, and propose to examine the possible effectiveness of a new and innovative preventive strategy. A model of suicidal intrusion (mental imagery related to suicide, also referred to as suicidal flash-forwards is presented describing one of the assumed mechanisms in the etiology of suicide and the mechanism of therapeutic change. We provide a brief rationale for an Eye Movement Dual Task (EMDT treatment for suicidal intrusions, describing techniques that can be used to target these suicidal mental images and thoughts to reduce overall behavior. Based on the available empirical evidence for the mechanisms of suicidal intrusions, this approach appears to be a promising new treatment to prevent suicidal behavior as it potentially targets one of the linking pins between suicidal ideation and suicidal actions.

  5. Non-destructive evaluation of nuclear material storage container integrity using an acoustic technique

    International Nuclear Information System (INIS)

    Miller, R.F.; Pechersky, M.J.; Raju, P.K.

    1994-01-01

    A non-intrusive method for determining the gas mixture in a sealed container using acoustics has been conceived. Analysis has shown that it is possible to both excite the acoustic resonance of the gas cavity, and detect when resonance occurs from the outside surface of the container. The resonant frequency of the acoustic cavity is dependent on the molecular weight of the gas that fills it. A change in the mixture of gases within the cavity alters the gas molecular weight and can produce a detectable change in the resonant frequency of the cavity. This concept provides a method of monitoring and/or analyzing the gas mixture in a sealed container without taking physical samples. An advantage of this technique is that it eliminates safety and contamination risks associated with breaching a pressure boundary and taking a sample of potentially hazardous gases in order to monitor or analyze the mixture

  6. PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM USING VARIOUS TECHNIQUES – A REVIEW

    Directory of Open Access Journals (Sweden)

    S. Devaraju

    2013-09-01

    Full Text Available Nowadays, the security has become a critical part of any organization or industry information systems. The Intrusion Detection System is an effective method to deal with the new kind of threats such as DoS, Porbe, R2L and U2R. In this paper, we analyze the various approaches such as Hidden Semi Markov Model, Conditional Random Fields and Layered Approach, Bayesian classification, Data Mining techniques, Clustering Algorithms such as K-Means and Fuzzy c-Means, Back Propagation Neural Network, SOM Neural Network, Rough Set Neural Network Algorithm, Genetic Algorithm, Pattern Matching, Principle Component Analysis, Linear Discriminant Analysis, Independent Component Analysis, Multivariate Statistical Analysis, SOM/PSO algorithm etc. The performance is measured for two different datasets using various approaches. The datasets are trained and tested for identifying the new attacks that will affect the hosts or networks. The well known KDD Cup 1999 or DARPA 1999 dataset has been used to improve the accuracy and performance. The four groups of attacks are identified as Probe, DoS, U2R and R2L. The dataset used for training set is 494,021 and testing set is 311,028. The aim is to improve the detection rate and performance of the proposed system.

  7. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  8. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  9. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  10. Supportive Noninvasive Tool for the Diagnosis of Breast Cancer Using a Thermographic Camera as Sensor

    Directory of Open Access Journals (Sweden)

    Marco Antonio Garduño-Ramón

    2017-03-01

    Full Text Available Breast cancer is the leading disease in incidence and mortality among women in developing countries. The opportune diagnosis of this disease strengthens the survival index. Mammography application is limited by age and periodicity. Temperature is a physical magnitude that can be measured by using multiple sensing techniques. IR (infrared thermography using commercial cameras is gaining relevance in industrial and medical applications because it is a non-invasive and non-intrusive technology. Asymmetrical temperature in certain human body zones is associated with cancer. In this paper, an IR thermographic sensor is applied for breast cancer detection. This work includes an automatic breast segmentation methodology, to spot the hottest regions in thermograms using the morphological watershed operator to help the experts locate the tumor. A protocol for thermogram acquisition considering the required time to achieve a thermal stabilization is also proposed. Breast thermograms are evaluated as thermal matrices, instead of gray scale or false color images, increasing the certainty of the provided diagnosis. The proposed tool was validated using the Database for Mastology Research and tested in a voluntary group of 454 women of different ages and cancer stages with good results, leading to the possibility of being used as a supportive tool to detect breast cancer and angiogenesis cases.

  11. An energy estimation framework for event-based methods in Non-Intrusive Load Monitoring

    International Nuclear Information System (INIS)

    Giri, Suman; Bergés, Mario

    2015-01-01

    Highlights: • Energy estimation is NILM has not yet accounted for complexity of appliance models. • We present a data-driven framework for appliance modeling in supervised NILM. • We test the framework on 3 houses and report average accuracies of 5.9–22.4%. • Appliance models facilitate the estimation of energy consumed by the appliance. - Abstract: Non-Intrusive Load Monitoring (NILM) is a set of techniques used to estimate the electricity consumed by individual appliances in a building from measurements of the total electrical consumption. Most commonly, NILM works by first attributing any significant change in the total power consumption (also known as an event) to a specific load and subsequently using these attributions (i.e. the labels for the events) to estimate energy for each load. For this last step, most published work in the field makes simplifying assumptions to make the problem more tractable. In this paper, we present a framework for creating appliance models based on classification labels and aggregate power measurements that can help to relax many of these assumptions. Our framework automatically builds models for appliances to perform energy estimation. The model relies on feature extraction, clustering via affinity propagation, perturbation of extracted states to ensure that they mimic appliance behavior, creation of finite state models, correction of any errors in classification that might violate the model, and estimation of energy based on corrected labels. We evaluate our framework on 3 houses from standard datasets in the field and show that the framework can learn data-driven models based on event labels and use that to estimate energy with lower error margins (e.g., 1.1–42.3%) than when using the heuristic models used by others

  12. On the non-intrusive evaluation of fluid forces with the momentum equation approach

    International Nuclear Information System (INIS)

    David, L; Jardin, T; Farcy, A

    2009-01-01

    The aim of this paper is to discuss the advantages and difficulties linked with the experimental application of the momentum equation approach as a non-intrusive way to predict the unsteady loads experienced by an airfoil in motion. First, in order to evaluate the influence of the varying parameters relative to the calculation of the corresponding drag and lift coefficients, numerical flow fields obtained by means of DNS are used. The comprehension of the impact of the spatial and temporal resolutions, velocity accuracy or third velocity component on the estimation of forces allows us to quantify the accuracy of the approach and helps in specifying the parameters setting which could lead to a consistent experimental application. In a second step, the approach is applied to experimental flow fields measured through the use of time resolved particle image velocimetry (TR-PIV). A low Reynolds number flow around an impulsively started airfoil is considered. The loads and vorticity flow fields are correlated and compared with those obtained by DNS

  13. Numerical Continuation Methods for Intrusive Uncertainty Quantification Studies

    Energy Technology Data Exchange (ETDEWEB)

    Safta, Cosmin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Najm, Habib N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Phipps, Eric Todd [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-09-01

    Rigorous modeling of engineering systems relies on efficient propagation of uncertainty from input parameters to model outputs. In recent years, there has been substantial development of probabilistic polynomial chaos (PC) Uncertainty Quantification (UQ) methods, enabling studies in expensive computational models. One approach, termed ”intrusive”, involving reformulation of the governing equations, has been found to have superior computational performance compared to non-intrusive sampling-based methods in relevant large-scale problems, particularly in the context of emerging architectures. However, the utility of intrusive methods has been severely limited due to detrimental numerical instabilities associated with strong nonlinear physics. Previous methods for stabilizing these constructions tend to add unacceptably high computational costs, particularly in problems with many uncertain parameters. In order to address these challenges, we propose to adapt and improve numerical continuation methods for the robust time integration of intrusive PC system dynamics. We propose adaptive methods, starting with a small uncertainty for which the model has stable behavior and gradually moving to larger uncertainty where the instabilities are rampant, in a manner that provides a suitable solution.

  14. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungwon Lee

    2009-05-01

    Full Text Available TheIP-based Ubiquitous Sensor Network (IP-USN is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System called RIDES (Robust Intrusion DEtection System for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  15. Endoscopic techniques for diagnosis and correction of complications after retroperitoneal pancreas transplantation

    Directory of Open Access Journals (Sweden)

    A. V. Pinchuk

    2016-01-01

    Full Text Available Relevance. Timely diagnosis and treatment of postoperative complications after pancreas transplantation is an actual problem of modern clinical transplantation. Purpose. The assessment of the endoscopy potential for the diagnosis and correction of postoperative complications after pancreas transplantation. Materials and methods. Since October 2011, simultaneous retroperitoneal pancreas-kidney transplantation has been performed in 27 patients. In 8 cases, the use of endoscopic techniques allowed a timely identification and treatment of the complications occurred. Conclusions. Endoscopic techniques proved to be highly efficient in the diagnosis and treatment of surgical complications and immunological impairments after retroperitoneal pancreas transplantation. 

  16. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  17. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  18. Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation

    Directory of Open Access Journals (Sweden)

    Basant Subba

    2016-06-01

    Full Text Available Present Intrusion Detection Systems (IDSs for MANETs require continuous monitoring which leads to rapid depletion of a node's battery life. To address this issue, we propose a new IDS scheme comprising a novel cluster leader election process and a hybrid IDS. The cluster leader election process uses the Vickrey–Clarke–Groves mechanism to elect the cluster leader which provides the intrusion detection service. The hybrid IDS comprises a threshold based lightweight module and a powerful anomaly based heavyweight module. Initially, only the lightweight module is activated. The decision to activate the heavyweight module is taken by modeling the intrusion detection process as an incomplete information non-cooperative game between the elected leader node and the potential malicious node. Simulation results show that the proposed scheme significantly reduces the IDS traffic and overall power consumption in addition to maintaining a high detection rate and accuracy.

  19. Analogue modelling on the interaction between shallow magma intrusion and a strike-slip fault: Application on the Middle Triassic Monzoni Intrusive Complex (Dolomites, Italy)

    Science.gov (United States)

    Michail, Maria; Coltorti, Massimo; Gianolla, Piero; Riva, Alberto; Rosenau, Matthias; Bonadiman, Costanza; Galland, Olivier; Guldstrand, Frank; Thordén Haug, Øystein; Rudolf, Michael; Schmiedel, Tobias

    2017-04-01

    The southwestern part of the Dolomites in Northern Italy has undergone a short-lived Ladinian (Middle Triassic) tectono-magmatic event, forming a series of significant magmatic features. These intrusive bodies deformed and metamorphosed the Permo-Triassic carbonate sedimentary framework. In this study we focus on the tectono-magmatic evolution of the shallow shoshonitic Monzoni Intrusive Complex of this Ladinian event (ca 237 Ma), covering an area of 20 km^2. This NW-SE elongated intrusive structure (5 km length) shows an orogenic magmatic affinity which is in contrast to the tectonic regime at the time of intrusion. Strain analysis shows anorogenic transtensional displacement in accordance with the ENE-WSW extensional pattern in the central Dolomites during the Ladinian. Field interpretations led to a detailed description of the regional stratigraphic sequence and the structural features of the study area. However, the geodynamic context of this magmatism and the influence of the inherited strike-slip fault on the intrusion, are still in question. To better understand the specific natural prototype and the general mechanisms of magma emplacement in tectonically active areas, we performed analogue experiments defined by, but not limited to, first order field observations. We have conducted a systematic series of experiments in different tectonic regimes (static conditions, strike-slip, transtension). We varied the ratio of viscous to brittle stresses between magma and country rock, by injecting Newtonian fluids both of high and low viscosity (i.e. silicone oil/vegetable oil) into granular materials of varying cohesion (sand, silica flour, glass beads). The evolving surface and side view of the experiments were monitored by photogrammetric techniques for strain analyses and topographic evolution. In our case, the combination of the results from field and analogue experiments brings new insights regarding the tectonic regime, the geometry of the intrusive body, and

  20. Acoustic Emission Signal Processing Technique to Characterize Reactor In-Pile Phenomena

    Energy Technology Data Exchange (ETDEWEB)

    Vivek Agarwal; Magdy Samy Tawfik; James A Smith

    2014-07-01

    Existing and developing advanced sensor technologies and instrumentation will allow non-intrusive in-pile measurement of temperature, extension, and fission gases when coupled with advanced signal processing algorithms. The transmitted measured sensor signals from inside to the outside of containment structure are corrupted by noise and are attenuated, thereby reducing the signal strength and signal-to-noise ratio. Identification and extraction of actual signal (representative of an in-pile phenomenon) is a challenging and complicated process. In this paper, empirical mode decomposition technique is proposed to reconstruct actual sensor signal by partially combining intrinsic mode functions. Reconstructed signal corresponds to phenomena and/or failure modes occurring inside the reactor. In addition, it allows accurate non-intrusive monitoring and trending of in-pile phenomena.

  1. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  2. A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks

    Directory of Open Access Journals (Sweden)

    H.H. Soliman

    2012-11-01

    Full Text Available An explosive growth in the field of wireless sensor networks (WSNs has been achieved in the past few years. Due to its important wide range of applications especially military applications, environments monitoring, health care application, home automation, etc., they are exposed to security threats. Intrusion detection system (IDS is one of the major and efficient defensive methods against attacks in WSN. Therefore, developing IDS for WSN have attracted much attention recently and thus, there are many publications proposing new IDS techniques or enhancement to the existing ones. This paper evaluates and compares the most prominent anomaly-based IDS systems for hierarchical WSNs and identifying their strengths and weaknesses. For each IDS, the architecture and the related functionality are briefly introduced, discussed, and compared, focusing on both the operational strengths and weakness. In addition, a comparison of the studied IDSs is carried out using a set of critical evaluation metrics that are divided into two groups; the first one related to performance and the second related to security. Finally based on the carried evaluation and comparison, a set of design principles are concluded, which have to be addressed and satisfied in future research of designing and implementing IDS for WSNs.

  3. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  4. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  5. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  6. Two-phase flow measurements using a photochromic dye activation technique

    International Nuclear Information System (INIS)

    Kawaji, M.

    1998-01-01

    A novel flow visualization method called photochromic dye activation (PDA) technique has been used to investigate flow structures and mechanisms in various two-phase flow regimes. This non-intrusive flow visualization technique utilizes light activation of a photochromic dye material dissolved in a clear liquid and is a molecular tagging technique, requiring no seed particles. It has been used to yield both quantitative and qualitative flow data in the liquid phase in annular flow, slug flow and stratified-wavy flows. (author)

  7. The use of film imaging techniques in the diagnosis of mammary intraductal papilloma (report of 23 cases)

    International Nuclear Information System (INIS)

    Wei Shaohua; Liu Genshou

    2001-01-01

    Objective: To summarize the value of the film imaging techniques in the diagnosis of mammary intraductal papilloma. Methods: Retrospectively analysis 23 in patients with mammary intraductal papilloma which was confirmed by diagnosis with multiple function ultrasound instrument, mammography and breast duct imaging techniques. Results: The diagnosis sensitivities of multiple function ultrasound instrument and breast duct imaging techniques were 66.7% and 70.6% respectively (P > 0.05). Both of them had a definite value in diagnosis of mammary intraductal papilloma. Conclusion: Film imaging techniques are valuable to locate lesions, but is not useful for making pathological diagnosis

  8. Nocturnal insomnia symptoms and stress-induced cognitive intrusions in risk for depression: A 2-year prospective study

    Science.gov (United States)

    Pillai, Vivek; Drake, Christopher L.

    2018-01-01

    Nearly half of US adults endorse insomnia symptoms. Sleep problems increase risk for depression during stress, but the mechanisms are unclear. During high stress, individuals having difficulty falling or staying asleep may be vulnerable to cognitive intrusions after stressful events, given that the inability to sleep creates a period of unstructured and socially isolated time in bed. We investigated the unique and combined effects of insomnia symptoms and stress-induced cognitive intrusions on risk for incident depression. 1126 non-depressed US adults with no history of DSM-5 insomnia disorder completed 3 annual web-based surveys on sleep, stress, and depression. We examined whether nocturnal insomnia symptoms and stress-induced cognitive intrusions predicted depression 1y and 2y later. Finally, we compared depression-risk across four groups: non-perseverators with good sleep, non-perseverators with insomnia symptoms, perseverators with good sleep, and perseverators with insomnia symptoms. Insomnia symptoms (β = .10–.13, p insomnia had the highest rates of depression (13.0%), whereas good sleeping non-perseverators had the lowest rates (3.3%, Relative Risk = 3.94). Perseverators with sleep latency >30 m reported greater depression than good sleeping perseverators (t = 2.09, p < .04). Cognitive intrusions following stress creates a depressogenic mindset, and nocturnal wakefulness may augment the effects of cognitive arousal on depression development. Poor sleepers may be especially vulnerable to cognitive intrusions when having difficulty initiating sleep. As treatable behaviors, nighttime wakefulness and cognitive arousal may be targeted to reduce risk for depression in poor sleepers. PMID:29438400

  9. A 3D imaging system for the non-intrusive in-flight measurement of the deformation of an aircraft propeller and a helicopter rotor

    Science.gov (United States)

    Stasicki, Bolesław; Boden, Fritz; Ludwikowski, Krzysztof

    2017-02-01

    The non-intrusive in-flight deformation measurement and the resulting local pitch of an aircraft propeller or helicopter rotor blade is a demanding task. The idea of an imaging system integrated and rotating with the air-craft propeller has already been presented at the 30th International Congress on High-Speed Imaging and Photonics (ICHSIP30) in 2012. Since then this system has been designed, constructed and tested in the laboratory as well as in-flight on the Cobra VUT100 of Evektor Aerotechnik, Kunovice (CZ). The major aim of the EU FP7 project AIM2 ("Advanced In-flight Measurement techniques 2" - contract No. 266107) was to ascertain the feasibility of this technique under extreme conditions - vibration and large centrifugal forces - to real flight testing. Based on the gained experience a new rotating system for the application on helicopter rotors has recently been constructed and tested on the whirl tower of Airbus Helicopters, Donauwoerth (D). In this paper the principle of the applied Image Pattern Correlation Technique (IPCT), a specialized type of Digital Image Correlation (DIC), is outlined and the construction of both rotating 3D image acquisition systems dedicated to the in-flight deformation measurement of the aircraft propeller and helicopter rotor are described. Furthermore, the results of the ground and in-flight tests of these systems will be shown and discussed. The obtained results will be helpful for manufacturers in the design of their future aircrafts.

  10. An international perspective on Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  11. Predicting Seawater Intrusion in Coastal Groundwater Boreholes Using Self-Potential Data

    Science.gov (United States)

    Graham, M.; MacAllister, D. J.; Jackson, M.; Vinogradov, J.; Butler, A. P.

    2017-12-01

    Many coastal groundwater abstraction wells are under threat from seawater intrusion: this is exacerbated in summer by low water tables and increased abstraction. Existing hydrochemistry or geophysical techniques often fail to predict the timing of intrusion events. We investigate whether the presence and transport of seawater can influence self-potentials (SPs) measured within groundwater boreholes, with the aim of using SP monitoring to provide early warning of saline intrusion. SP data collection: SP data were collected from a coastal groundwater borehole and an inland borehole (> 60 km from the coast) in the Seaford Chalk of southern England. The SP gradient in the inland borehole was approximately 0.05 mV/m, while that in the coastal borehole varied from 0.16-0.26 mV/m throughout the monitoring period. Spectral analysis showed that semi-diurnal fluctuations in the SP gradient were several orders of magnitude higher at the coast than inland, indicating a strong influence from oceanic tides. A characteristic decrease in the gradient, or precursor, was observed in the coastal borehole several days prior to seawater intrusion. Modelling results: Hydrodynamic transport and geoelectric modelling suggest that observed pressure changes (associated with the streaming potential) are insufficient to explain either the magnitude of the coastal SP gradient or the semi-diurnal SP fluctuations. By contrast, a model of the exclusion-diffusion potential closely matches these observations and produces a precursor similar to that observed in the field. Sensitivity analysis suggests that both a sharp saline front and spatial variations in the exclusion efficiency arising from aquifer heterogeneities are necessary to explain the SP gradient observed in the coastal borehole. The presence of the precursor in the model depends also on the presence and depth of fractures near the base of the borehole. Conclusions: Our results indicate that SP monitoring, combined with hydrodynamic

  12. Comparison of two techniques for diagnosis of giardiasis in dogs

    Directory of Open Access Journals (Sweden)

    Decock C.

    2003-03-01

    Full Text Available Giardiasis is an intestinal parasitosis affecting dogs and able to infect human beings. Its diagnosis can not be done with the only clinical signs, the main of which is non characteristic diarrhoea. It implicates to perform further tests to detect the parasite. The zinc sulfate concentration technique (ZSCT is the more effective one if performed on two or three successive days. Fecal ELISA kits have been developed to detect Giardia in humans and were found to be less sensitive than the ZSCT in dogs. In this study, we used 30 infected Beagles to compare the sensitivity of one, two or three fecal examinations following ZSCT and one or two ELISA tests. We conclude that if a single ZSCT is insufficient, two or three ZSCT and one or two ELISA using the commercial kit ProSpecT® Giardia have almost the same sensitivity.

  13. ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.; Crispo, Bruno; Etalle, Sandro

    2007-01-01

    We present an architecture designed for alert verification (i.e., to reduce false positives) in network intrusion-detection systems. Our technique is based on a systematic (and automatic) anomaly-based analysis of the system output, which provides useful context information regarding the network

  14. Recent research findings on non-invasive diagnosis of liver fibrosis

    Directory of Open Access Journals (Sweden)

    WU Qiong

    2015-02-01

    Full Text Available Early diagnosis of liver fibrosis and dynamic monitoring of relevant changes have great implications for the treatment and prognosis improvement of chronic liver diseases. So far, liver biopsy remains the “golden standard” for the diagnosis and staging of liver fibrosis. However, due to its inherent limitations, a great effort has been made to develop more accurate non-invasive diagnostic methods, including serum fibrosis markers and mathematical models, ultrasound, contrast-enhanced ultrasonography, ultrasonic elastography, computed tomography, magnetic resonance imaging, and nuclear medicine. The advantages and disadvantages of relevant methods are discussed. Furthermore, proper selection of the non-invasive diagnostic methods for clinical application and the means for mutual verification are analyzed. As for the future direction, it is expected to employ the above methods for combined analysis and comprehensive assessment, in order to enhance the clinical value of non-invasive liver fibrosis diagnosis.

  15. Immunological diagnosis of human hydatid cyst using Western immunoblotting technique

    Directory of Open Access Journals (Sweden)

    Mahboubeh Hadipour

    2016-01-01

    Full Text Available Background: Echinococcosis is a parasitic disease with worldwide distribution which is caused by the tapeworms Echinococcus granulosus. Diagnosis of the disease relies on imaging techniques, but the techniques are not able to differentiate the cyst from benign or malignant tumors; hence, appropriate serologic methods are required for the differential diagnosis of the infection. Materials and Methods: In this investigation, different sheep hydatid cyst antigens probed with thirty sera of patients with hydatid cyst and also thirty human normal sera using Western immunoblotting technique. Considering results of surgery as gold standard, sensitivity and specificity of Western blotting was estimated. Results: Sera of 29, 26, and 16 patients with hydatid cyst reacted with specific bands of hydatid cyst fluid (HCF, protoscolex crude antigen, and cyst wall crude antigen, respectively. However, none of the normal human sera reacted with those specific bands. Conclusion: A 20 kDa band of sheep HCF is an appropriate antigen for serodiagnosis of hydatid cyst infection.

  16. Using nuclear medicine technique in thyroid cancer diagnosis with comparison to ultrasound

    International Nuclear Information System (INIS)

    Chau, T.G.

    2007-01-01

    Full text: We used the following tests- thyroid uptake with I-131, Thyroid imaging with I-131 and Thyroid ultrasound and lymph node metastasis ultrasound. The results are as follows: 1.Thyroid uptake with I-131: This test was for the evaluation of normal thyroid tissue and function of thyroid cancer: The mean of uptake were: 12,7% at 2h and 28,53 % at 24 h after addition I-131. There was no relation to I-131 uptake with tumor size. (2) Thyroid imaging with I131: Diagnosis sensitivity was 98,1%. The cold nodules on scintigram were 92,5%. The warm nodules were 16,8%. And there were no hot nodules. (3) Thyroid ultrasound and lymph node metastasis ultrasound. Diagnosis sensitivity was 98,3%. Diagnosis sensitivity of lymph node metastasis is 94,1%, accuracy 96,6%. Nuclear medicine technique contributed very much to the diagnosis of thyroid cancer and other cancer diseases. We are using SPECT and other nuclear medicine technique in oncology diagnosis and follow-up therapy. (author)

  17. A Survey on Cross-Layer Intrusion Detection System for Wireless ...

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... forwarding, and open wireless medium are the factors that make ... Wireless Sensor Network (WSN) is a kind of network that ... These tiny sensors are mainly small sized and have low ..... they were integrated to WSN for intrusion detection in ..... Anomaly Detection Techniques for Smart City Wireless Sensor.

  18. An Automata Based Intrusion Detection Method for Internet of Things

    Directory of Open Access Journals (Sweden)

    Yulong Fu

    2017-01-01

    Full Text Available Internet of Things (IoT transforms network communication to Machine-to-Machine (M2M basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.

  19. Actinic Keratosis and Non-Invasive Diagnostic Techniques: An Update

    Science.gov (United States)

    Casari, Alice; Chester, Johanna; Pellacani, Giovanni

    2018-01-01

    Actinic keratosis represents the earliest manifestation of non-melanoma skin cancer. Because of their risk of progression to invasive squamous cell carcinoma, an earlier diagnosis and treatment are mandatory. Their diagnosis sometimes could represent a challenge even for expert dermatologists. Dermoscopy, confocal laser microscopy and optical coherence tomography could help clinicians in diagnosis. PMID:29316678

  20. Evaluation of different parasitological techniques in the diagnosis of canine helminthiasis

    Directory of Open Access Journals (Sweden)

    Marcelle Temporim Novaes

    2015-12-01

    Full Text Available ABSTRACT. Novaes M.T. & Martins I.V.F. [Evaluation of different parasitological techniques in the diagnosis of canine helminthiasis.] Avaliação de diferentes técnicas parasitológicas no diagnóstico de helmintoses caninas. Revista Brasileira de Medicina Veterinária, 37(Supl.1:71-76, 2015. Laboratório de Parasitologia, Hospital Veterinário, Universidade Federal do Espírito Santo, Rua Alto Universitário, s/n, Guararema, Alegre, ES 29500-000, Brasil. E-mail: marcelle_temporim@hotmail.com Were collected 100 fecal samples from dogs from August 2014 to April 2015 from the Zoonosis Control Center (CCZ of Cachoeiro de Itapemirim-ES. These were sent to the laboratory of Parasitology of the Veterinary Hospital of UFES, and analyzed in duplicate by the techniques of Kato-Katz, Hoffman, TF-Test Modified/Dog and Willis in order to evaluate the technique that present higher sensitivity, convenience and lower expenses with materials for parasitological diagnosis. Statistical analysis was performed using Fisher’s exact test and kappa the 5% significance level. Together they showed up 68 positive samples, 31, 34, 26 and 62 for technical Kato-Katz, Hoffman, TF-Test and Willis respectively. The results showed that the use of Willis technique should be adopted as the standard for egg Ancylostoma spp., since the techniques Kato-Katz, Hoffman and TF-Test showed a low sensitivity for diagnosis of this parasite, and technic of Hoffman should be used as standard for Toxocara spp. In relation to convenience and lower expenses, Willis technique, should be preferred, because the runtime and the microscope slide reading is fast, requiring only the use of a supersaturated solution.

  1. Techniques for early diagnosis of oral squamous cell carcinoma: Systematic review

    Science.gov (United States)

    Carreras-Torras, Clàudia

    2015-01-01

    Background and objectives The diagnosis of early oral potentially malignant disorders (OPMD) and oral squamous cell carcinoma (OSCC) is of paramount clinical importance given the mortality rate of late stage disease. The aim of this study is to review the literature to assess the current situation and progress in this area. Material and Methods A search in Cochrane and PubMed (January 2006 to December 2013) has been used with the key words “squamous cell carcinoma”, “early diagnosis” “oral cavity”, “Potentially Malignant Disorders” y “premalignant lesions”. The inclusion criteria were the use of techniques for early diagnosis of OSCC and OPMD, 7 years aged articles and publications written in English, French or Spanish. The exclusion criteria were case reports and studies in other languages. Results Out of the 89 studies obtained initially from the search 60 articles were selected to be included in the systematic review: 1 metaanalysis, 17 systematic reviews, 35 prospective studies, 5 retrospective studies, 1 consensus and 1 semi-structured interviews. Conclusions The best diagnostic technique is that which we have sufficient experience and training. Definitely tissue biopsy and histopathological examination should remain the gold standard for oral cancer diagnose. In this systematic review it has not been found sufficient scientific evidence on the majority of proposed techniques for early diagnosis of OSCC, therefore more extensive and exhaustive studies are needed. Key words: Squamous cell carcinoma, early diagnosis, oral cavity, potentially malignant disorders, premalignant lesions. PMID:25662554

  2. Magnetic Resonance Techniques Applied to the Diagnosis and Treatment of Parkinson’s Disease

    Science.gov (United States)

    de Celis Alonso, Benito; Hidalgo-Tobón, Silvia S.; Menéndez-González, Manuel; Salas-Pacheco, José; Arias-Carrión, Oscar

    2015-01-01

    Parkinson’s disease (PD) affects at least 10 million people worldwide. It is a neurodegenerative disease, which is currently diagnosed by neurological examination. No neuroimaging investigation or blood biomarker is available to aid diagnosis and prognosis. Most effort toward diagnosis using magnetic resonance (MR) has been focused on the use of structural/anatomical neuroimaging and diffusion tensor imaging (DTI). However, deep brain stimulation, a current strategy for treating PD, is guided by MR imaging (MRI). For clinical prognosis, diagnosis, and follow-up investigations, blood oxygen level-dependent MRI, DTI, spectroscopy, and transcranial magnetic stimulation have been used. These techniques represent the state of the art in the last 5 years. Here, we focus on MR techniques for the diagnosis and treatment of Parkinson’s disease. PMID:26191037

  3. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  4. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    Part of the stakeholder consultation addressed strategies that media audiences are developing to cope with pressures and intrusions in a changing media environment, characterised by digitalisation and interactive possibilities. We interviewed ten stakeholders representing interests such as content...... production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...... no consensual motivation, nor any clear avenue for action. Therefore, we have analysed different discursive positions that prevent acknowledging or taking action upon the pressures and intrusions that we presented to these stakeholders. The discursive positions are outlined below....

  5. Imaging techniques in the diagnosis of liver echinococcosis

    International Nuclear Information System (INIS)

    Lotritsch, K.H.; Goebel, N.

    1986-01-01

    Liver echinococcosis, the most frequently occuring form of parasitosis, is caused by the following two types of tapeworm: echinococcus granulosus and echinococcus multilocularis. Both types are to be found in Austria, the latter even being endemic. Imaging techniques such as computed tomography and sonography enable the diagnosis to be made easily, quickly and accurately, although the number of conditions to be considered in the differential diagnosis is considerable. A comparison of the two methods in 32 patients, 25 with echinococcus multilocularis and 7 with echinococcus granulosus demonstrates that ultrasound is slightly inferior to computed tomography. However, ultrasound should be the primary method of investigation and is of great importance in followup, whilst computed tomography is necessary pre-operatively to assess the extrahepatic involvement. (Author)

  6. Techniques for the diagnosis of Fasciola infections in animals: room for improvement.

    Science.gov (United States)

    Alvarez Rojas, Cristian A; Jex, Aaron R; Gasser, Robin B; Scheerlinck, Jean-Pierre Y

    2014-01-01

    The common liver fluke, Fasciola hepatica, causes fascioliasis, a significant disease in mammals, including livestock, wildlife and humans, with a major socioeconomic impact worldwide. In spite of its impact, and some advances towards the development of vaccines and new therapeutic agents, limited attention has been paid to the need for practical and reliable methods for the diagnosis of infection or disease. Accurate diagnosis is central to effective control, particularly given an emerging problem with drug resistance in F. hepatica. Traditional coprological techniques have been widely used, but are often unreliable. Although there have been some advances in establishing immunologic techniques, these tools can suffer from a lack of diagnostic specificity and/or sensitivity. Nonetheless, antigen detection tests seem to have considerable potential, but have not yet been adequately evaluated in the field. Moreover, advanced nucleic acid-based methods appear to offer the most promise for the diagnosis of current infection. This chapter (i) provides a brief account of the biology and significance of F. hepatica/fascioliasis, (ii) describes key techniques currently in use, (iii) compares their advantages/disadvantages and (iv) reviews polymerase chain reaction-based methods for specific diagnosis and/or the genetic characterization of Fasciola species. © 2014 Elsevier Ltd. All rights reserved.

  7. Multi-User Low Intrusive Occupancy Detection

    Directory of Open Access Journals (Sweden)

    Azkario Rizky Pratama

    2018-03-01

    Full Text Available Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS of BLE (Bluetooth Low Energy nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach.

  8. Non-intrusive load monitoring based on low frequency active power measurements

    Directory of Open Access Journals (Sweden)

    Chinthaka Dinesh

    2016-03-01

    Full Text Available A Non-Intrusive Load Monitoring (NILM method for residential appliances based on active power signal is presented. This method works effectively with a single active power measurement taken at a low sampling rate (1 s. The proposed method utilizes the Karhunen Loéve (KL expansion to decompose windows of active power signals into subspace components in order to construct a unique set of features, referred to as signatures, from individual and aggregated active power signals. Similar signal windows were clustered in to one group prior to feature extraction. The clustering was performed using a modified mean shift algorithm. After the feature extraction, energy levels of signal windows and power levels of subspace components were utilized to reduce the number of possible appliance combinations and their energy level combinations. Then, the turned on appliance combination and the energy contribution from individual appliances were determined through the Maximum a Posteriori (MAP estimation. Finally, the proposed method was modified to adaptively accommodate the usage patterns of appliances at each residence. The proposed NILM method was validated using data from two public databases: tracebase and reference energy disaggregation data set (REDD. The presented results demonstrate the ability of the proposed method to accurately identify and disaggregate individual energy contributions of turned on appliance combinations in real households. Furthermore, the results emphasise the importance of clustering and the integration of the usage behaviour pattern in the proposed NILM method for real households.

  9. Diagnosis of human fascioliasis by stool and blood techniques: update for the present global scenario.

    Science.gov (United States)

    Mas-Coma, S; Bargues, M D; Valero, M A

    2014-12-01

    Before the 1990s, human fascioliasis diagnosis focused on individual patients in hospitals or health centres. Case reports were mainly from developed countries and usually concerned isolated human infection in animal endemic areas. From the mid-1990s onwards, due to the progressive description of human endemic areas and human infection reports in developing countries, but also new knowledge on clinical manifestations and pathology, new situations, hitherto neglected, entered in the global scenario. Human fascioliasis has proved to be pronouncedly more heterogeneous than previously thought, including different transmission patterns and epidemiological situations. Stool and blood techniques, the main tools for diagnosis in humans, have been improved for both patient and survey diagnosis. Present availabilities for human diagnosis are reviewed focusing on advantages and weaknesses, sample management, egg differentiation, qualitative and quantitative diagnosis, antibody and antigen detection, post-treatment monitoring and post-control surveillance. Main conclusions refer to the pronounced difficulties of diagnosing fascioliasis in humans given the different infection phases and parasite migration capacities, clinical heterogeneity, immunological complexity, different epidemiological situations and transmission patterns, the lack of a diagnostic technique covering all needs and situations, and the advisability for a combined use of different techniques, at least including a stool technique and a blood technique.

  10. Fractal analysis of SEM images and mercury intrusion porosimetry data for the microstructural characterization of microcrystalline cellulose-based pellets

    International Nuclear Information System (INIS)

    Gomez-Carracedo, A.; Alvarez-Lorenzo, C.; Coca, R.; Martinez-Pacheco, R.; Concheiro, A.; Gomez-Amoza, J.L.

    2009-01-01

    The microstructure of theophylline pellets prepared from microcrystalline cellulose, carbopol and dicalcium phosphate dihydrate, according to a mixture design, was characterized using textural analysis of gray-level scanning electron microscopy (SEM) images and thermodynamic analysis of the cumulative pore volume distribution obtained by mercury intrusion porosimetry. Surface roughness evaluated in terms of gray-level non-uniformity and fractal dimension of pellet surface depended on agglomeration phenomena during extrusion/spheronization. Pores at the surface, mainly 1-15 μm in diameter, determined both the mechanism and the rate of theophylline release, and a strong negative correlation between the fractal geometry and the b parameter of the Weibull function was found for pellets containing >60% carbopol. Theophylline mean dissolution time from these pellets was about two to four times greater. Textural analysis of SEM micrographs and fractal analysis of mercury intrusion data are complementary techniques that enable complete characterization of multiparticulate drug dosage forms

  11. An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems

    Science.gov (United States)

    Hieb, Jeffrey; Graham, James; Guan, Jian

    This paper presents an ontological framework that permits formal representations of process control systems, including elements of the process being controlled and the control system itself. A fault diagnosis algorithm based on the ontological model is also presented. The algorithm can identify traditional process elements as well as control system elements (e.g., IP network and SCADA protocol) as fault sources. When these elements are identified as a likely fault source, the possibility exists that the process fault is induced by a cyber intrusion. A laboratory-scale distillation column is used to illustrate the model and the algorithm. Coupled with a well-defined statistical process model, this fault diagnosis approach provides cyber security enhanced fault diagnosis information to plant operators and can help identify that a cyber attack is underway before a major process failure is experienced.

  12. Anomaly based intrusion detection for a biometric identification system using neural networks

    CSIR Research Space (South Africa)

    Mgabile, T

    2012-10-01

    Full Text Available detection technique that analyses the fingerprint biometric network traffic for evidence of intrusion. The neural network algorithm that imitates the way a human brain works is used in this study to classify normal traffic and learn the correct traffic...

  13. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    International Conference on Computational Intelligence and Natural Computing, volume 2, pages 413–416, June 2009. • Rung Ching Chen, Kai -Fan Cheng, and...Chia-Fen Hsieh . “Using rough set and support vector machine for network intrusion detection.” International Journal of Network Security & Its...intrusion detection using FP tree rules.” Journal Of Advanced Networking and Applications, 1(1):30–39, 2009. • Ming-Yang Su, Gwo-Jong Yu , and Chun-Yuen

  14. From intrusive to oscillating thoughts.

    Science.gov (United States)

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  15. NUMERICAL MODELLING AS NON-DESTRUCTIVE METHOD FOR THE ANALYSES AND DIAGNOSIS OF STONE STRUCTURES: MODELS AND POSSIBILITIES

    Directory of Open Access Journals (Sweden)

    Nataša Štambuk-Cvitanović

    1999-12-01

    Full Text Available Assuming the necessity of analysis, diagnosis and preservation of existing valuable stone masonry structures and ancient monuments in today European urban cores, numerical modelling become an efficient tool for the structural behaviour investigation. It should be supported by experimentally found input data and taken as a part of general combined approach, particularly non-destructive techniques on the structure/model within it. For the structures or their detail which may require more complex analyses three numerical models based upon finite elements technique are suggested: (1 standard linear model; (2 linear model with contact (interface elements; and (3 non-linear elasto-plastic and orthotropic model. The applicability of these models depend upon the accuracy of the approach or type of the problem, and will be presented on some characteristic samples.

  16. Nocturnal insomnia symptoms and stress-induced cognitive intrusions in risk for depression: A 2-year prospective study.

    Science.gov (United States)

    Kalmbach, David A; Pillai, Vivek; Drake, Christopher L

    2018-01-01

    Nearly half of US adults endorse insomnia symptoms. Sleep problems increase risk for depression during stress, but the mechanisms are unclear. During high stress, individuals having difficulty falling or staying asleep may be vulnerable to cognitive intrusions after stressful events, given that the inability to sleep creates a period of unstructured and socially isolated time in bed. We investigated the unique and combined effects of insomnia symptoms and stress-induced cognitive intrusions on risk for incident depression. 1126 non-depressed US adults with no history of DSM-5 insomnia disorder completed 3 annual web-based surveys on sleep, stress, and depression. We examined whether nocturnal insomnia symptoms and stress-induced cognitive intrusions predicted depression 1y and 2y later. Finally, we compared depression-risk across four groups: non-perseverators with good sleep, non-perseverators with insomnia symptoms, perseverators with good sleep, and perseverators with insomnia symptoms. Insomnia symptoms (β = .10-.13, p good sleeping non-perseverators had the lowest rates (3.3%, Relative Risk = 3.94). Perseverators with sleep latency >30 m reported greater depression than good sleeping perseverators (t = 2.09, p stress creates a depressogenic mindset, and nocturnal wakefulness may augment the effects of cognitive arousal on depression development. Poor sleepers may be especially vulnerable to cognitive intrusions when having difficulty initiating sleep. As treatable behaviors, nighttime wakefulness and cognitive arousal may be targeted to reduce risk for depression in poor sleepers.

  17. The contribution of thought-action fusion and thought suppression in the development of obsession-like intrusions in normal participants.

    Science.gov (United States)

    Rassin, E

    2001-09-01

    Both thought-action fusion (TAF: i.e., a cognitive bias implying an inflated sense of responsibility for one's own thoughts) and thought suppression have been claimed to contribute to the development of obsession-like intrusions. Therefore, it seems plausible that conjunction of these phenomena results in highly intense intrusions. However, possible interactions between TAF and thought suppression have not yet been investigated experimentally. In the current study, healthy volunteers were exposed to a TAF-like intrusion. They were, then, randomly assigned to a suppression (n=21) or non-suppression condition (n=19). Next, visual analogue scales (VASs) were completed measuring anxiety, feelings of responsibility and guilt, urge to neutralise and so on. Contrary to expectation, several VAS scores were lower for participants in the suppression group than for those in the non-suppression group. Hence, it is concluded that thought suppression may, at least in the short term, alleviate discomfort caused by TAF-like intrusions.

  18. Experimental mesenteric ischemia. Radioisotopic diagnosis

    International Nuclear Information System (INIS)

    Alberti, Carlos; Dallaglio, Juan; Sarra, Luis; Obiols, Eugenio; Rodriguez Santos, Emilio; Delgado, Eduardo; Castelleti, Luis

    1995-01-01

    A non-invasive radionuclide technique with 99-Tc-DMP for the early diagnosis of small bowel infarction due to mesenteric artery compression, was evaluated. The usefulness of 99-Tc-DMP and critical pressure of mesenteric artery were demonstrated. The diagnosis was performed before one hour had passed from the beginning of the ischemia

  19. Development of hotcell non-destructive examination techniques

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Young Uhn; Yu, S. C.; Kang, B. S.; Byun, K. S. [Chungbuk National University, Chungju (Korea)

    2002-01-01

    The purpose of this project is to establish non-destructive examination techniques which needs to determine the status of spent nuclear fuel and/or bundles. Through the project, we will establish an image reconstruction tomography which is a kind of non-destructive techniques in Hotcell. The tomography technique can be used to identify the 2-dimensional density distribution of fission products in the spent fuel rods and/or bundles. And form results of the measurement and analysis of magnetic properties of neutron irradiated material in the press vessel and reactor, we will develop some techniques to test its hardness and defects. In 2001, the first year, we have established mathematical background and necessary data and informations to develop the techniques. We will try to find some experimental results that are necessary in developing the Hotcell non-destructive examination techniques in the coming year. 14 refs., 65 figs., 5 tabs. (Author)

  20. Attacks and Intrusion Detection in Cloud Computing Using Neural Networks and Particle Swarm Optimization Algorithms

    Directory of Open Access Journals (Sweden)

    Ahmad Shokuh Saljoughi

    2018-01-01

    Full Text Available Today, cloud computing has become popular among users in organizations and companies. Security and efficiency are the two major issues facing cloud service providers and their customers. Since cloud computing is a virtual pool of resources provided in an open environment (Internet, cloud-based services entail security risks. Detection of intrusions and attacks through unauthorized users is one of the biggest challenges for both cloud service providers and cloud users. In the present study, artificial intelligence techniques, e.g. MLP Neural Network sand particle swarm optimization algorithm, were used to detect intrusion and attacks. The methods were tested for NSL-KDD, KDD-CUP datasets. The results showed improved accuracy in detecting attacks and intrusions by unauthorized users.

  1. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  2. Non-operative diagnosis - effect on repeat-operation rates in the UK breast screening programme

    International Nuclear Information System (INIS)

    Wallis, M.G.; Cheung, S.; Kearins, O.; Lawrence, G.M.

    2009-01-01

    Non-operative diagnosis rates in the UK breast screening programme have improved dramatically from 48.8% in 1994/95 (only nine units achieved the then minimum standard of 70%) to 94% in 2005/06 (only seven units failed to achieve the target of 90%). Preoperative and operative history of all 120,550 women diagnosed with screen-detected breast cancer in the UK between April 1994 and March 2006 was derived from different national databases. In 2005/06, 2,790 (17.8%) of the 15,688 women having surgery needed two or more operations. In 2001/02 (non-operative diagnosis rate 87%), the re-operation rate was 23.8% (2,377 of 9,969). Extrapolation backwards to 1994/95 (non-operative diagnosis rate 48.8%) suggests a re-operation rate of 62%. Analysis over the 4 years from April 2002 (n=34,198) demonstrates that 4,089 (12%) women with a correct non-operative diagnosis of invasive disease required additional surgery compared to 1,166 (48%) of women who were under-staged (diagnosed as non-invasive based on core biopsy, but actually suffering from invasive disease). Failure to achieve a non-operative diagnosis of invasive disease (n=1,542) or non-invasive disease (n=2,247) resulted in re-operation rates of 65 and 43% respectively. Given the impact of not having a diagnosis pre-operatively, or of under-staging invasive carcinoma, it seems timely to introduce more sophisticated standards. (orig.)

  3. Non-intrusive measurement of tritium activity in waste drums by modelling a 3He leak quantified by mass spectrometry

    International Nuclear Information System (INIS)

    Demange, D.

    2002-01-01

    This study deals with a new method that makes it possible to measure very low tritium quantities inside radioactive waste drums. This indirect method is based on measuring the decaying product, 3 He, and requires a study of its behaviour inside the drum. Our model considers 3 He as totally free and its leak through the polymeric joint of the drum as two distinct phenomena: permeation and laminar flow. The numerical simulations show that a pseudo-stationary state takes place. Thus, the 3 He leak corresponds to the tritium activity inside the drum but it appears, however, that the leak peaks when the atmospheric pressure variations induce an overpressure in the drum. Nevertheless, the confinement of a drum in a tight chamber makes it possible to quantify the 3 He leak. This is a non-intrusive measurement of its activity, which was experimentally checked by using reduced models, representing the drum and its confinement chamber. The drum's confinement was optimised to obtain a reproducible 3 He leak measurement. The gaseous samples taken from the chamber were purified using selective adsorption onto activated charcoals at 77 K to remove the tritium and pre-concentrate the 3 He. The samples were measured using a leak detector mass spectrometer. The adaptation of the signal acquisition and the optimisation of the analysis parameters made it possible to reach the stability of the external calibrations using standard gases with a 3 He detection limit of 0.05 ppb. Repeated confinement of the reference drums demonstrated the accuracy of this method. The uncertainty of this non-intrusive measurement of the tritium activity in 200-liter drums is 15% and the detection limit is about 1 GBq after a 24 h confinement. These results led to the definition of an automated tool able to systematically measure the tritium activity of all storage waste drums. (authors)

  4. A Multiagent-based Intrusion Detection System with the Support of Multi-Class Supervised Classification

    Science.gov (United States)

    Shyu, Mei-Ling; Sainani, Varsha

    The increasing number of network security related incidents have made it necessary for the organizations to actively protect their sensitive data with network intrusion detection systems (IDSs). IDSs are expected to analyze a large volume of data while not placing a significantly added load on the monitoring systems and networks. This requires good data mining strategies which take less time and give accurate results. In this study, a novel data mining assisted multiagent-based intrusion detection system (DMAS-IDS) is proposed, particularly with the support of multiclass supervised classification. These agents can detect and take predefined actions against malicious activities, and data mining techniques can help detect them. Our proposed DMAS-IDS shows superior performance compared to central sniffing IDS techniques, and saves network resources compared to other distributed IDS with mobile agents that activate too many sniffers causing bottlenecks in the network. This is one of the major motivations to use a distributed model based on multiagent platform along with a supervised classification technique.

  5. Intrusive trauma memory: A review and functional analysis

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.; Holmes, E.A.

    2009-01-01

    Our contribution to this special issue focuses on the phenomenon of intrusive trauma memory. While intrusive trauma memories can undoubtedly cause impairment, we argue that they may exist for a potentially adaptive reason. Theory and experimental research on intrusion development are reviewed and

  6. Cubic Bezier Curve Approach for Automated Offline Signature Verification with Intrusion Identification

    Directory of Open Access Journals (Sweden)

    Arun Vijayaragavan

    2014-01-01

    Full Text Available Authentication is a process of identifying person’s rights over a system. Many authentication types are used in various systems, wherein biometrics authentication systems are of a special concern. Signature verification is a basic biometric authentication technique used widely. The signature matching algorithm uses image correlation and graph matching technique which provides false rejection or acceptance. We proposed a model to compare knowledge from signature. Intrusion in the signature repository system results in copy of the signature that leads to false acceptance. Our approach uses a Bezier curve algorithm to identify the curve points and uses the behaviors of the signature for verification. An analyzing mobile agent is used to identify the input signature parameters and compare them with reference signature repository. It identifies duplication of signature over intrusion and rejects it. Experiments are conducted on a database with thousands of signature images from various sources and the results are favorable.

  7. Aspects of cold intrusions over Greece during autumn

    Science.gov (United States)

    Mita, Constantina; Marinaki, Aggeliki; Zeini, Konstantina; Konstantara, Metaxia

    2010-05-01

    This study is focused on the description of atmospheric disturbances that caused intense cold intrusions over Greece during autumn for a period of 25 years (1982-2006). The study was based on data analysis from the meteorological station network of the Hellenic National Meteorological Service (HNMS) and the European Centre for Medium Range Weather Forecasts (ECMWF). Initially, the days with temperature at the isobaric surface of 850 hPa less or equal to the mean temperature for the 10-day period the day under investigation belongs to are isolated, composing a new confined data set which was further used. An event of intense cold intrusion is identified based on a subjective set of criteria, considering the temperature decrease at the level of 850 hPa and its duration. In particular, the criteria that were used to identify a cold intrusion were: temperature variation between two successive days at the isobaric level of 850 hPa being equal or greater than 50 C at least once during the event and duration of the event of at least two successive days with continuous temperature decrease. Additionally, the synoptic analysis of the atmospheric disturbances involved using weather charts from ECMWF, revealed that all cases were related to low pressure systems at the level of 500 hPa, accompanied by cold air masses. Moreover, a methodology proposed to classify the cold intrusions based on general circulation characteristics of the atmosphere, resulted in seven major categories. More than half of the events belong in two categories, originated northwest of the greater Greek area (Greece and parts of neighbouring countries), between 400 and 600 N. Further analysis indicated that the frequency of events increases from September to November and the majority of the events lasted two to three days. Additionally, the non-parametric Mann-Kendall test was used for the investigation of the statistical significance of the trends appearing in the results. The tests revealed that over

  8. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  9. Non-intrusive measurement of emission indices. A new approach to the evaluation of infrared spectra emitted by aircraft engine exhaust gases

    Energy Technology Data Exchange (ETDEWEB)

    Lindermeir, E.; Haschberger, P.; Tank, V. [Deutsche Forschungsanstalt fuer Luft- und Raumfahrt e.V. (DLR), Wessling (Germany). Inst. fuer Optoelektronik

    1997-12-31

    A non-intrusive method is used to determine the emission indices of a research aircraft`s engine in-flight. The principle is based on the Fourier Transform Infrared Spectrometer MIROR which was specifically designed and built for operation aboard aircrafts. This device measures the spectrum of the infrared radiation emitted by the hot exhaust gas under cruise conditions. From these spectra mixing ratios and emission indices can be derived. An extension to previously applied evaluation schemes is proposed: Whereas formerly the plume was assumed a homogeneous layer of gas, temperature and concentration profiles are now introduced to the evaluation procedure. (author) 5 refs.

  10. Rapid laccolith intrusion driven by explosive volcanic eruption.

    Science.gov (United States)

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  11. Use of behavioral biometrics in intrusion detection and online gaming

    Science.gov (United States)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2006-04-01

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

  12. Repeated magmatic intrusions at El Hierro Island following the 2011-2012 submarine eruption

    Science.gov (United States)

    Benito-Saz, Maria A.; Parks, Michelle M.; Sigmundsson, Freysteinn; Hooper, Andrew; García-Cañada, Laura

    2017-09-01

    After more than 200 years of quiescence, in July 2011 an intense seismic swarm was detected beneath the center of El Hierro Island (Canary Islands), culminating on 10 October 2011 in a submarine eruption, 2 km off the southern coast. Although the eruption officially ended on 5 March 2012, magmatic activity continued in the area. From June 2012 to March 2014, six earthquake swarms, indicative of magmatic intrusions, were detected underneath the island. We have studied these post-eruption intrusive events using GPS and InSAR techniques to characterize the ground surface deformation produced by each of these intrusions, and to determine the optimal source parameters (geometry, location, depth, volume change). Source inversions provide insight into the depth of the intrusions ( 11-16 km) and the volume change associated with each of them (between 0.02 and 0.13 km3). During this period, > 20 cm of uplift was detected in the central-western part of the island, corresponding to approximately 0.32-0.38 km3 of magma intruded beneath the volcano. We suggest that these intrusions result from deep magma migrating from the mantle, trapped at the mantle/lower crust discontinuity in the form of sill-like bodies. This study, using joint inversion of GPS and InSAR data in a post-eruption period, provides important insight into the characteristics of the magmatic plumbing system of El Hierro, an oceanic intraplate volcanic island.

  13. Comparing attentional control and intrusive thoughts in obsessive-compulsive disorder, generalized anxiety disorder and non clinical population.

    Directory of Open Access Journals (Sweden)

    Mehri Moradi

    2014-06-01

    Full Text Available Attention is an important factor in information processing; obsessive- compulsive disorder (OCD and generalized anxiety disorder (GAD are two main emotional disorders with a chronic course. This research examined the relationship among attentional control and intrusive thoughts (worry, rumination and obsession in these disorders. It was hypothesized that attentional control is a common factor in OCD and GAD. In addition, we compared worry, rumination and obsession among OCD, GAD and non- clinical participants.The research sample included three groups: OCD (n = 25, GAD (n = 30 and non- clinical samples (n = 56. Data were collected using the Attentional Control Scale (ACS, Rumination Response Scale (RRS, Pennsylvania State Worry Questionnaire (PSWQ, Beck Depression Inventory (BDI, Beck Anxiety Inventory (BAI, Obsessive-Compulsive Inventory-Revised (OCI-R and General Health Questionnaire (GHQ-28. Data were analyzed using MANOVA and MANCOVA by SPSS-17.Multivariate Analysis of Variance revealed that the OCD and GAD groups reported greater deficits in attentional control, higher obsessive-compulsive symptoms, rumination, worry, anxiety and depression compared to the control group.This research indicated a great attentional deficit in obsessive- compulsive disorder and generalized anxiety disorder. However, no significant difference was found between these two disorders.

  14. Mass memory formatter subsystem of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-09-01

    The Mass Memory Formatter was developed as part of the Adaptive Intrusion Data System (AIDS) to control a 2.4-megabit mass memory. The data from a Memory Controlled Processor is formatted before it is stored in the memory and reformatted during the readout mode. The data is then transmitted to a NOVA 2 minicomputer-controlled magnetic tape recorder for storage. Techniques and circuits are described

  15. In vitro radionuclide techniques in medical diagnosis

    International Nuclear Information System (INIS)

    1998-02-01

    The use of radionuclide based microanalytical techniques for medical diagnosis has been increasing in recent years. Several such methods are in routine use in advanced laboratories in the industrialized world, but are often beyond the capability of developing countries. The IAEA has organized several training activities and seminars to bring the benefits of such advances to laboratories in developing Member States. The most recent was an interregional training course in Tokyo, March 1996, in collaboration with the Japanese Atomic Energy Research Institute (JAERI). The course was conducted by international experts, local staff, and IAEA staff. With the intention of giving the main techniques used at the course to a wider distribution they have been compiled into the present technical document. It is hoped that laboratories in developing Member States that did not have participants at the training course will find the information provided useful and sufficiently detailed to enable their application in their home institutions

  16. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  17. The application of biomedical engineering techniques to the diagnosis and management of tropical diseases: a review.

    Science.gov (United States)

    Ibrahim, Fatimah; Thio, Tzer Hwai Gilbert; Faisal, Tarig; Neuman, Michael

    2015-03-23

    This paper reviews a number of biomedical engineering approaches to help aid in the detection and treatment of tropical diseases such as dengue, malaria, cholera, schistosomiasis, lymphatic filariasis, ebola, leprosy, leishmaniasis, and American trypanosomiasis (Chagas). Many different forms of non-invasive approaches such as ultrasound, echocardiography and electrocardiography, bioelectrical impedance, optical detection, simplified and rapid serological tests such as lab-on-chip and micro-/nano-fluidic platforms and medical support systems such as artificial intelligence clinical support systems are discussed. The paper also reviewed the novel clinical diagnosis and management systems using artificial intelligence and bioelectrical impedance techniques for dengue clinical applications.

  18. Testing a 1-D Analytical Salt Intrusion Model and the Predictive Equation in Malaysian Estuaries

    Science.gov (United States)

    Gisen, Jacqueline Isabella; Savenije, Hubert H. G.

    2013-04-01

    Little is known about the salt intrusion behaviour in Malaysian estuaries. Study on this topic sometimes requires large amounts of data especially if a 2-D or 3-D numerical models are used for analysis. In poor data environments, 1-D analytical models are more appropriate. For this reason, a fully analytical 1-D salt intrusion model, based on the theory of Savenije in 2005, was tested in three Malaysian estuaries (Bernam, Selangor and Muar) because it is simple and requires minimal data. In order to achieve that, site surveys were conducted in these estuaries during the dry season (June-August) at spring tide by moving boat technique. Data of cross-sections, water levels and salinity were collected, and then analysed with the salt intrusion model. This paper demonstrates a good fit between the simulated and observed salinity distribution for all three estuaries. Additionally, the calibrated Van der Burgh's coefficient K, Dispersion coefficient D0, and salt intrusion length L, for the estuaries also displayed a reasonable correlations with those calculated from the predictive equations. This indicates that not only is the salt intrusion model valid for the case studies in Malaysia but also the predictive model. Furthermore, the results from this study describe the current state of the estuaries with which the Malaysian water authority in Malaysia can make decisions on limiting water abstraction or dredging. Keywords: salt intrusion, Malaysian estuaries, discharge, predictive model, dispersion

  19. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  20. A Novel Algorithm for Intrusion Detection Based on RASL Model Checking

    Directory of Open Access Journals (Sweden)

    Weijun Zhu

    2013-01-01

    Full Text Available The interval temporal logic (ITL model checking (MC technique enhances the power of intrusion detection systems (IDSs to detect concurrent attacks due to the strong expressive power of ITL. However, an ITL formula suffers from difficulty in the description of the time constraints between different actions in the same attack. To address this problem, we formalize a novel real-time interval temporal logic—real-time attack signature logic (RASL. Based on such a new logic, we put forward a RASL model checking algorithm. Furthermore, we use RASL formulas to describe attack signatures and employ discrete timed automata to create an audit log. As a result, RASL model checking algorithm can be used to automatically verify whether the automata satisfy the formulas, that is, whether the audit log coincides with the attack signatures. The simulation experiments show that the new approach effectively enhances the detection power of the MC-based intrusion detection methods for a number of telnet attacks, p-trace attacks, and the other sixteen types of attacks. And these experiments indicate that the new algorithm can find several types of real-time attacks, whereas the existing MC-based intrusion detection approaches cannot do that.

  1. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  2. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  3. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  4. Negative Intrusive Thoughts and Dissociation as Risk Factors for Self-Harm

    Science.gov (United States)

    Batey, Helen; May, Jon; Andrade, Jackie

    2010-01-01

    Relationships between self-harm and vulnerability factors were studied in a general population of 432 participants, of whom 30% reported some experience of self-harm. This group scored higher on dissociation and childhood trauma, had lower self-worth, and reported more negative intrusive thoughts. Among the non-harming group, 10% scored similarly…

  5. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and...

  6. Current approaches on non-invasive prenatal diagnosis: Prenatal genomics, transcriptomics, personalized fetal diagnosis

    Directory of Open Access Journals (Sweden)

    Tuba Günel

    2014-12-01

    Full Text Available Recent developments in molecular genetics improved our knowledge on fetal genome and physiology. Novel scientific innovations in prenatal diagnosis have accelerated in the last decade changing our vision immensely. Data obtained from fetal genomic studies brought new insights to fetal medicine and by the advances in fetal DNA and RNA sequencing technology novel treatment strategies has evolved. Non-invasive prenatal diagnosis found ground in genetics and the results are widely studied in scientific arena. When Lo and colleges proved fetal genetic material can be extracted from maternal plasma and fetal DNA can be isolated from maternal serum, the gate to many exciting discoveries was open. Microarray technology and advances in sequencing helped fetal diagnosis as well as other areas of medicine. Today it is a very crucial prerequisite for physicians practicing prenatal diagnosis to have a profound knowledge in genetics. Prevailing practical use and application of fetal genomic tests in maternal and fetal medicine mandates obstetricians to update their knowledge in genetics. The purpose of this review is to assist physicians to understand and update their knowledge in fetal genetic testing from maternal blood, individualized prenatal counseling and advancements on the subject by sharing our experiences as İstanbul University Fetal Nucleic Acid Research Group.

  7. Modified diagnosis of cardiovascular diseases: Application and comparison of diagnostic techniques in clinical medicine, radiology, ultrasonography and nuclear medicine. Final report. Einsatz und Vergleich klinischer, roentgenologischer, sonographischer und nuklearmedizinischer Methoden zur abgestuften Diagnostik von Herzkrankheiten. Schlussbericht

    Energy Technology Data Exchange (ETDEWEB)

    Adam, W.; Boettcher, D.; Christl, H.; Baew-Christow, T.; Holper, H.; Meindl, S.; Meyer, U.; Pfannenstiel, P.

    1985-01-01

    The main point of interest of the project is the question whether ultrasonography, myocardial scintiscanning, and radionuclide angiocardiography can replace the invasive techniques of cardiovascular diagnosis, and thus save costs at that. The results show that the above non-invasive techniques are indispensable in case of a diagnosis for cardiosurgery, almost sufficient in case of valvular heart disease, and sufficient in all cases of cardiomyopathy. Optimally planned application of the non-invasive methods could save about DM 7.3 millions a year in the FRG. (TRV).

  8. Evaluation of conventional castaneda and lysis centrifugation blood culture techniques for diagnosis of human brucellosis.

    Science.gov (United States)

    Mantur, Basappa G; Mangalgi, Smita S

    2004-09-01

    We investigated the role of the lysis centrifugation blood culture technique over the conventional Castaneda technique for the diagnosis of human brucellosis. The lysis centrifugation technique has been found to be more sensitive in both acute (20% higher sensitivity; P centrifugation was in the mean detection time, which was only 2.4 days in acute and 2.7 days in chronic cases, with 103 out of 110 (93.6%) and 17 out of 20 (85%) cultures from acute and chronic brucellosis, respectively, detected before the conventional culture was positive. Our results confirmed the potential usefulness of the lysis technique in diagnosis and institution of appropriate antibiotic therapy.

  9. Intrusive Memories of Distressing Information: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Eva Battaglini

    Full Text Available Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42 viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13 demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13. Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC and dorsolateral prefrontal cortex (dlPFC, inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories.

  10. Acceptance- and imagery-based strategies can reduce chocolate cravings: A test of the elaborated-intrusion theory of desire.

    Science.gov (United States)

    Schumacher, Sophie; Kemps, Eva; Tiggemann, Marika

    2017-06-01

    The elaborated-intrusion theory of desire proposes that craving is a two-stage process whereby initial intrusions about a desired target are subsequently elaborated with mental imagery. The present study tested whether the craving reduction strategies of cognitive defusion and guided imagery could differentially target the intrusion and elaboration stages, respectively, and thus differentially impact the craving process. Participants were randomly assigned to a cognitive defusion, a guided imagery or a mind-wandering control condition. Pre- and post-intervention chocolate-related thoughts, intrusiveness of thoughts, vividness of imagery, craving intensity, and chocolate consumption were compared. Experiment 1 recruited a general sample of young women (n = 94), whereas Experiment 2 recruited a sample of chocolate cravers who wanted to reduce their chocolate consumption (n = 97). Across both experiments, cognitive defusion lowered intrusiveness of thoughts, vividness of imagery and craving intensity. Guided imagery reduced chocolate-related thoughts, intrusiveness, vividness and craving intensity for chocolate cravers (Experiment 2), but not for the general sample (Experiment 1). There were no group differences in chocolate consumption in either experiment. Results add to existing evidence supporting the elaborated-intrusion theory of desire in the food domain, and suggest that acceptance- and imagery-based techniques have potential for use in combatting problematic cravings. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. 201thallium myocardial scintigraphy. A non-invasive method for diagnosis of ischaemic heart disease

    International Nuclear Information System (INIS)

    Kyst Madsen, J.; Utne, H.E.

    1982-01-01

    Myocardial perfusion scintigraphy with the isotope 201 thallium is a new non-invasive technique for the diagnosis of ischaemic heart disease. This article presents the results of scintigraphy in four persons with presumably healthy hearts and 12 with ischaemic heart disease. In addition, some foreign works are reviewed. The method possesses only slightly greater nosographical sensitivity than the exercise ECG alone but can be employed to advantage if the results of the exercise ECG are inconclusive e.g. on account of bundle branch block, digoxin therapy etc. Another, although somewhat more special indication, is employment prior to and after coronary artery by-pass operation with subsequent control of the result. (authors)

  12. The Influence of Emotional Inhibition on Intrusive Thoughts in a Non-Clinical Sample

    Directory of Open Access Journals (Sweden)

    Zahra Salehzadeh Einabad

    2017-06-01

    Full Text Available Background Given the studies insisting on the impacts of cultural issues on the emotion regulation strategies in eastern cultures and lack of study on the effects of emotional inhibition in our culture, this research aimed to investigate the influences of emotional inhibition on intrusive thoughts in non-clinical sample. Methods A quasi-experimental design was adopted with 45 participants that were randomly assigned to 2 groups (emotional inhibition and control groups. Participants which were selected according to cluster sampling answered to some questionnaires, including depression, general health, and emotion regulation. Then, a clip and a related instruction were presented for each group. They were asked to perform according to instruction after watching movie and tick on a paper whenever the thoughts of movie come to their mind. Data were analyzed using t test in SPSS-23. Results There are not significant differences between groups in terms of mood, emotion regulation, depression, and general health in the pre-test. Similarly, results indicated that there is not a significant differences between groups. Conclusions This research showed that the usefulness of emotional inhibition depends on the culture. In fact, in Eastern cultures, using emotion regulation strategies such as suppression and emotional inhibition are common so that avoidance is a short term and useful emotion regulation mechanism.

  13. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  14. Human intrusion: issues concerning its assessment

    International Nuclear Information System (INIS)

    Grimwood, P.D.; Smith, G.M.

    1989-01-01

    The potential significance of human intrusion in the performance assessment of radioactive waste repositories has been increasingly recognized in recent years. It is however an area of assessment in which subjective judgments dominate. This paper identifies some of the issues involved. These include regulatory criteria, scenario development, probability assignment, consequence assessment and measures to mitigate human intrusion

  15. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  16. Magmatic intrusions in the lunar crust

    Science.gov (United States)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  17. Comparative study on 3 imaging techniques and serum marker CA15-3 in diagnosis of breast cancer

    International Nuclear Information System (INIS)

    Zahng Shiqin; Hu Xin; Li Hong'e; Yan Huaixin

    2009-01-01

    Objective: To investigate the clinical value of detecting breast cancer with 3 imaging techniques(Ultrasound, Full-field digital mammography, Magnetic resonance imagery) and serum marker CA15-3. Methods: Sixty-six pathologically proven patients with breast cancer were examined with Ultrasound before operation, 58 cases were examined with Full-field digital mammography, 30 cases were examined by Magnetic resonance imagery, the serum marker CA15-3 was detected with CLIA in 58 cases. Results: The accurate rates of US, MO and MRI for diagnosis of breast cancer were respectively significantly higher than that of CA15-3(P 0.05) (the accuracy of US was 86.4%, the accuracy of MO was 93.2%, the accuracy of MRI was 96.7%). Conclusion: Ultrasonography,due to its reasonably good accuracy with very low cost, might be selected as the first choice of non-invasive diagnosis of breast cancer. (authors)

  18. A New Generic Taxonomy on Hybrid Malware Detection Technique

    OpenAIRE

    Robiah, Y.; Rahayu, S. Siti; Zaki, M. Mohd; Shahrin, S.; Faizal, M. A.; Marliza, R.

    2009-01-01

    Malware is a type of malicious program that replicate from host machine and propagate through network. It has been considered as one type of computer attack and intrusion that can do a variety of malicious activity on a computer. This paper addresses the current trend of malware detection techniques and identifies the significant criteria in each technique to improve malware detection in Intrusion Detection System (IDS). Several existing techniques are analyzing from 48 various researches and...

  19. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  20. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  1. The Application of Biomedical Engineering Techniques to the Diagnosis and Management of Tropical Diseases: A Review

    Directory of Open Access Journals (Sweden)

    Fatimah Ibrahim

    2015-03-01

    Full Text Available This paper reviews a number of biomedical engineering approaches to help aid in the detection and treatment of tropical diseases such as dengue, malaria, cholera, schistosomiasis, lymphatic filariasis, ebola, leprosy, leishmaniasis, and American trypanosomiasis (Chagas. Many different forms of non-invasive approaches such as ultrasound, echocardiography and electrocardiography, bioelectrical impedance, optical detection, simplified and rapid serological tests such as lab-on-chip and micro-/nano-fluidic platforms and medical support systems such as artificial intelligence clinical support systems are discussed. The paper also reviewed the novel clinical diagnosis and management systems using artificial intelligence and bioelectrical impedance techniques for dengue clinical applications.

  2. Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks

    Directory of Open Access Journals (Sweden)

    Wenjuan Li

    2018-01-01

    Full Text Available Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN has thus been developed by allowing intrusion detection system (IDS nodes to exchange data with each other. Insider attacks are a great threat for such types of collaborative networks, where an attacker has the authorized access within the network. In literature, a challenge-based trust mechanism is effective at identifying malicious nodes by sending challenges. However, such mechanisms are heavily dependent on two assumptions, which would cause CIDNs to be vulnerable to advanced insider attacks in practice. In this work, we investigate the influence of advanced on–off attacks on challenge-based CIDNs, which can respond truthfully to one IDS node but behave maliciously to another IDS node. To evaluate the attack performance, we have conducted two experiments under a simulated and a real CIDN environment. The obtained results demonstrate that our designed attack is able to compromise the robustness of challenge-based CIDNs in practice; that is, some malicious nodes can behave untruthfully without a timely detection.

  3. Application of learning techniques based on kernel methods for the fault diagnosis in industrial processes

    Directory of Open Access Journals (Sweden)

    Jose M. Bernal-de-Lázaro

    2016-05-01

    Full Text Available This article summarizes the main contributions of the PhD thesis titled: "Application of learning techniques based on kernel methods for the fault diagnosis in Industrial processes". This thesis focuses on the analysis and design of fault diagnosis systems (DDF based on historical data. Specifically this thesis provides: (1 new criteria for adjustment of the kernel methods used to select features with a high discriminative capacity for the fault diagnosis tasks, (2 a proposed approach process monitoring using statistical techniques multivariate that incorporates a reinforced information concerning to the dynamics of the Hotelling's T2 and SPE statistics, whose combination with kernel methods improves the detection of small-magnitude faults; (3 an robustness index to compare the diagnosis classifiers performance taking into account their insensitivity to possible noise and disturbance on historical data.

  4. Fault diagnosis in nuclear power plants using an artificial neural network technique

    International Nuclear Information System (INIS)

    Chou, H.P.; Prock, J.; Bonfert, J.P.

    1993-01-01

    Application of artificial intelligence (AI) computational techniques, such as expert systems, fuzzy logic, and neural networks in diverse areas has taken place extensively. In the nuclear industry, the intended goal for these AI techniques is to improve power plant operational safety and reliability. As a computerized operator support tool, the artificial neural network (ANN) approach is an emerging technology that currently attracts a large amount of interest. The ability of ANNs to extract the input/output relation of a complicated process and the superior execution speed of a trained ANN motivated this study. The goal was to develop neural networks for sensor and process faults diagnosis with the potential of implementing as a component of a real-time operator support system LYDIA, early sensor and process fault detection and diagnosis

  5. Application of Geophysical Method for Determining Seawater Intrusion in Coastal Aquifer

    International Nuclear Information System (INIS)

    Mohd Muzamil Mohd Hashim; Kamarudin Samuding; Mohd Hafiz Zawawi; Daung, J.A.D.; Mohd Hafiz Zulkurnain; Kamaruzaman Mohamad

    2016-01-01

    A study of seawater intrusion has been proposed in the coastal area of Pahang. Electrical resistivity tomography (ERT) is a geophysical technique that used in this study. The survey was conducted at UMP, Tanjung Batu and Nenasi using Wenner-Schlumberger protocol. Electrical resistivity profile obtained from the survey indicates an area with low resistivity value (<5Ωm) associated with the resistivity value of seawater. (author)

  6. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  7. Evidential reasoning research on intrusion detection

    Science.gov (United States)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  8. Real-Time Recognition Non-Intrusive Electrical Appliance Monitoring Algorithm for a Residential Building Energy Management System

    Directory of Open Access Journals (Sweden)

    Kofi Afrifa Agyeman

    2015-08-01

    Full Text Available The concern of energy price hikes and the impact of climate change because of energy generation and usage forms the basis for residential building energy conservation. Existing energy meters do not provide much information about the energy usage of the individual appliance apart from its power rating. The detection of the appliance energy usage will not only help in energy conservation, but also facilitate the demand response (DR market participation as well as being one way of building energy conservation. However, energy usage by individual appliance is quite difficult to estimate. This paper proposes a novel approach: an unsupervised disaggregation method, which is a variant of the hidden Markov model (HMM, to detect an appliance and its operation state based on practicable measurable parameters from the household energy meter. Performing experiments in a practical environment validates our proposed method. Our results show that our model can provide appliance detection and power usage information in a non-intrusive manner, which is ideal for enabling power conservation efforts and participation in the demand response market.

  9. 1H NMR- based metabolomics approaches as non- invasive tools for diagnosis of endometriosis

    Directory of Open Access Journals (Sweden)

    Negar Ghazi

    2016-01-01

    Full Text Available Background: So far, non-invasive diagnostic approaches such as ultrasound, magnetic resonance imaging, or blood tests do not have sufficient diagnostic power for endometriosis disease. Lack of a non-invasive diagnostic test contributes to the long delay between onset of symptoms and diagnosis of endometriosis. Objective: The present study focuses on the identification of predictive biomarkers in serum by pattern recognition techniques and uses partial least square discriminant analysis, multi-layer feed forward artificial neural networks (ANNs and quadratic discriminant analysis (QDA modeling tools for the early diagnosis of endometriosis in a minimally invasive manner by 1H- NMR based metabolomics. Materials and Methods: This prospective cohort study was done in Pasteur Institute, Iran in June 2013. Serum samples of 31 infertile women with endometriosis (stage II and III who confirmed by diagnostic laparoscopy and 15 normal women were collected and analyzed by nuclear magnetic resonance spectroscopy. The model was built by using partial least square discriminant analysis, QDA, and ANNs to determine classifier metabolites for early prediction risk of disease. Results: The levels of 2- methoxyestron, 2-methoxy estradiol, dehydroepiandrostion androstendione, aldosterone, and deoxy corticosterone were enhanced significantly in infertile group. While cholesterol and primary bile acids levels were decreased. QDA model showed significant difference between two study groups. Positive and negative predict value levels obtained about 71% and 78%, respectively. ANNs provided also criteria for detection of endometriosis. Conclusion: The QDA and ANNs modeling can be used as computational tools in noninvasive diagnose of endometriosis. However, the model designed by QDA methods is more efficient compared to ANNs in diagnosis of endometriosis patients.

  10. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  11. An Immune-inspired Adaptive Automated Intrusion Response System Model

    Directory of Open Access Journals (Sweden)

    Ling-xi Peng

    2012-09-01

    Full Text Available An immune-inspired adaptive automated intrusion response system model, named as , is proposed. The descriptions of self, non-self, immunocyte, memory detector, mature detector and immature detector of the network transactions, and the realtime network danger evaluation equations are given. Then, the automated response polices are adaptively performed or adjusted according to the realtime network danger. Thus, not only accurately evaluates the network attacks, but also greatly reduces the response times and response costs.

  12. A review on prognostic techniques for non-stationary and non-linear rotating systems

    Science.gov (United States)

    Kan, Man Shan; Tan, Andy C. C.; Mathew, Joseph

    2015-10-01

    The field of prognostics has attracted significant interest from the research community in recent times. Prognostics enables the prediction of failures in machines resulting in benefits to plant operators such as shorter downtimes, higher operation reliability, reduced operations and maintenance cost, and more effective maintenance and logistics planning. Prognostic systems have been successfully deployed for the monitoring of relatively simple rotating machines. However, machines and associated systems today are increasingly complex. As such, there is an urgent need to develop prognostic techniques for such complex systems operating in the real world. This review paper focuses on prognostic techniques that can be applied to rotating machinery operating under non-linear and non-stationary conditions. The general concept of these techniques, the pros and cons of applying these methods, as well as their applications in the research field are discussed. Finally, the opportunities and challenges in implementing prognostic systems and developing effective techniques for monitoring machines operating under non-stationary and non-linear conditions are also discussed.

  13. Evaluation of modified Dennis parasitological technique for diagnosis of bovine fascioliasis.

    Science.gov (United States)

    Correa, Stefanya; Martínez, Yudy Liceth; López, Jessika Lissethe; Velásquez, Luz Elena

    2016-02-23

    Bovine fascioliasis causes important economic losses, estimated at COP$ 12,483 billion per year; its prevalence is 25% in dairy cattle. Parasitological techniques are required for it diagnosis. The Dennis technique, modified in 2002, is the one used in Colombia, but its sensitivity, specificity and validity are not known.  To evaluate the validity and performance of the modified Dennis technique for diagnosis of bovine fascioliasis using as reference test the observation of parasites in the liver.  We conducted a diagnostic evaluation study. We selected a convenience sample of discarded bovines sacrificed between March and June, 2013, in Frigocolanta for the study. We collected 25 g of feces from each animal and their liver and bile ducts were examined for Fasciola hepatica. The sensitivity, specificity, predictive positive value, predictive negative value, and validity index were calculated with 95% confidence intervals. The post-mortem evaluation was used as the gold standard.  We analyzed 180 bovines. The sensitivity and specificity of the modified Dennis technique were 73.2% (95% CI=58.4% - 87.9%) and 84.2% (95% CI= 77.7% - 90.6%), respectively. The positive predictive value was 57.7% (95% CI= 43.3% - 72.1%) and the negative one 91.4% (95% CI= 86.2% - 96.6%). The prevalence of bovine fascioliasis was 22.8% (95% CI= 16.4% - 29.2%).  The validity and the performance of the modified Dennis technique were higher than those of the traditional one, which makes it a good screening test for diagnosing fascioliasis for population and prevalence studies and during animal health campaigns.

  14. Feature Selection of Network Intrusion Data using Genetic Algorithm and Particle Swarm Optimization

    Directory of Open Access Journals (Sweden)

    Iwan Syarif

    2016-12-01

    Full Text Available This paper describes the advantages of using Evolutionary Algorithms (EA for feature selection on network intrusion dataset. Most current Network Intrusion Detection Systems (NIDS are unable to detect intrusions in real time because of high dimensional data produced during daily operation. Extracting knowledge from huge data such as intrusion data requires new approach. The more complex the datasets, the higher computation time and the harder they are to be interpreted and analyzed. This paper investigates the performance of feature selection algoritms in network intrusiona data. We used Genetic Algorithms (GA and Particle Swarm Optimizations (PSO as feature selection algorithms. When applied to network intrusion datasets, both GA and PSO have significantly reduces the number of features. Our experiments show that GA successfully reduces the number of attributes from 41 to 15 while PSO reduces the number of attributes from 41 to 9. Using k Nearest Neighbour (k-NN as a classifier,the GA-reduced dataset which consists of 37% of original attributes, has accuracy improvement from 99.28% to 99.70% and its execution time is also 4.8 faster than the execution time of original dataset. Using the same classifier, PSO-reduced dataset which consists of 22% of original attributes, has the fastest execution time (7.2 times faster than the execution time of original datasets. However, its accuracy is slightly reduced 0.02% from 99.28% to 99.26%. Overall, both GA and PSO are good solution as feature selection techniques because theyhave shown very good performance in reducing the number of features significantly while still maintaining and sometimes improving the classification accuracy as well as reducing the computation time.

  15. THE PALEOPROTEROZOIC IMANDRA-VARZUGA RIFTING STRUCTURE (KOLA PENINSULA: INTRUSIVE MAGMATISM AND MINERAGENY

    Directory of Open Access Journals (Sweden)

    V. V. Chashchin

    2014-01-01

    Full Text Available The article provides data on the structure of the Paleoproterozoic intercontinental Imandra-Varzuga rifting structure (IVS and compositions of intrusive formations typical of the early stage of the IVS development and associated mineral resources. IVS is located in the central part of the Kola region. Its length is about 350 km, and its width varies from 10 km at the flanks to 50 km in the central part. IVS contains an association of the sedimentary-volcanic, intrusive and dyke complexes. It is a part of a large igneous Paleoproterozoic province of the Fennoscandian Shield spreading for a huge area (about 1 million km2, which probably reflects the settings of the head part of the mantle plume. Two age groups of layered intrusions were associated with the initial stage of the IVS development. The layered intrusions of the Fedorovo-Pansky and Monchegorsk complexes (about 2.50 Ga are confined to the northern flank and the western closure of IVS, while intrusions of the Imandra complex (about 2.45 Ga are located at the southern flank of IVS. Intrusions of older complexes are composed of rock series from dunite to gabbro and anorthosites (Monchegorsk complex and from orthopyroxenite to gabbro and anorthosites (Fedorovo-Pansky complex. Some intrusions of this complexes reveal features of multiphase ones. The younger Imandra complex intrusions (about 2.45 Ga are stratified from orthopyroxenite to ferrogabbro. Their important feature is comagmatical connection with volcanites. All the intrusive complexes have the boninite-like mantle origin enriched by lithophyle components. Rocks of these two complexеs with different age have specific geochemical characteristics. In the rocks of the Monchegorsk and Fedorovo-Pansky complexes, the accumulation of REE clearly depends on the basicity of the rocks, the spectrum of REE is non-fractionated and ‘flat’, and the Eu positive anomaly is slightly manifested. In the rocks of the Imandra complex, the level of

  16. Analog fault diagnosis by inverse problem technique

    KAUST Repository

    Ahmed, Rania F.

    2011-12-01

    A novel algorithm for detecting soft faults in linear analog circuits based on the inverse problem concept is proposed. The proposed approach utilizes optimization techniques with the aid of sensitivity analysis. The main contribution of this work is to apply the inverse problem technique to estimate the actual parameter values of the tested circuit and so, to detect and diagnose single fault in analog circuits. The validation of the algorithm is illustrated through applying it to Sallen-Key second order band pass filter and the results show that the detecting percentage efficiency was 100% and also, the maximum error percentage of estimating the parameter values is 0.7%. This technique can be applied to any other linear circuit and it also can be extended to be applied to non-linear circuits. © 2011 IEEE.

  17. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  18. Examination techniques for non-magnetic rings

    International Nuclear Information System (INIS)

    Metala, M.J.; Kilpatrick, N.L.; Frank, W.W.

    1990-01-01

    Until the introduction of 18Mn18Cr rings a few years ago, most non-magnetic steel rings for generator rotors were made from 18Mn5Cr alloy steel, which is highly susceptible to stress corrosion cracking in the presence of water. This, the latest in a series of papers on the subject of non-magnetic rings by the authors' company, provides a discussion of nondestructive examination of 18Mn5Cr rings for stress corrosion distress. With rings on the rotor, fluorescent penetrant, ultrasonic and special visual techniques are applied. With rings off the rotor, the fluorescent penetrant technique is used, with and without stress enhancement

  19. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  20. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    Science.gov (United States)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    We will present a detailed microstructural and geochemical study of reactive liquid flow in Unit 9 of the Rum Eastern Layered Intrusion. In the study region, Unit 9 comprises an underlying lens-like body of peridotite overlain by a sequence of troctolite and gabbro (termed allivalite), with some local and minor anorthosite. The troctolite is separated from the overlying gabbro by a distinct, sub-horizontal, undulose horizon (the major wavy horizon). Higher in the stratigraphy is another, similar, horizon (the minor wavy horizon) that separates relatively clinopyroxene-poor gabbro from an overlying gabbro. To the north of the peridotite lens, both troctolite and gabbro grade into poikilitic gabbro. Clinopyroxene habit in the allivalite varies from thin rims around olivine in troctolite, to equigranular crystals in gabbro, to oikocrysts in the poikilitic gabbro. The poikilitic gabbros contain multiple generations of clinopyroxene, with Cr-rich (~1.1 wt.% Cr2O3), anhedral cores with moderate REE concentrations (core1) overgrown by an anhedral REE-depleted second generation with moderate Cr (~0.7 wt.% Cr2O3) (core2). These composite cores are rimmed by Cr-poor (~0.2 wt.% Cr2O3) and REE-poor to moderate clinopyroxene. We interpret these microstructures as a consequence of two separate episodes of partial melting triggered by the intrusion of hot olivine-phyric picrite to form the discontinuous lenses that comprise the Unit 9 peridotite. Loss of clinopyroxene-saturated partial melt from the lower part of the allivalite immediately following the early stages of sill intrusion resulted in the formation of clinopyroxene-poor gabbro. The spatial extent of clinopyroxene loss is marked by the minor wavy horizon. A further partial melting event stripped out almost all clinopyroxene from the lowest allivalite, to form a troctolite, with the major wavy horizon marking the extent of melting during this second episode. The poikilitic gabbro formed from clinopyroxene-saturated melt

  1. Differential diagnosis between adrenal adenomas and non-adenomas with gadolinium MR in delayed scans: another diagnostic possibility

    International Nuclear Information System (INIS)

    Mondello, Eduardo J.; Eyheremendy, Eduardo P.; Stoisa, Daniela

    2001-01-01

    Purpose: To determine the value of measuring delayed post gadolinium signal intensity by displaying a curve, to make the differential diagnosis between adrenal adenomas and non-adenomas, and compare it to chemical shift MR imaging and unenhanced/delayed contrast enhanced CT. Material and methods: Nine adrenal masses have been evaluated by unenhanced/delayed contrast enhanced CT, chemical shift MR imaging and Dynamic Scan at 5, 15, 30 minutes or more, with measurement curves. The 'in phase' imaging have been compared to the 'out phase' ones. Results: Adenomas have shown drop of the curve at 30 minutes of the contrast injection. Non-adenomas have conserved an ascending curve with the same delay. Conclusion: Gadolinium-enhanced MR imaging at delayed scans can characterize adrenal masses as adenomas or non-adenomas. This technique could be considered as a new complementary diagnostic method. (author)

  2. A new intrusion prevention model using planning knowledge graph

    Science.gov (United States)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  3. Synergy of climate change and local pressures on saltwater intrusion in heterogeneous coastal aquifers

    Science.gov (United States)

    Abou Najm, M.; Safi, A.; El-Fadel, M.; Doummar, J.; Alameddine, I.

    2016-12-01

    The relative importance of climate change induced sea level rise on the salinization of a highly urbanized karstified coastal aquifers were compared with non-sustainable pumping. A 3D variable-density groundwater flow and solute transport model was used to predict the displacement of the saltwater-freshwater interface in a pilot aquifer located along the Eastern Mediterranean. The results showed that the influence of sea level rise was marginal when compared with the encroachment of salinity associated with anthropogenic abstraction. Model predictions of salinity mass and volumetric displacement of the interface corresponding to a long-term monthly transient model showed that the saltwater intrusion dynamic is highly sensitive to change in the abstraction rates which were estimated based on combinations of water consumption rates and population growth rates. Salinity encroachment, however, appeared to be more sensitive to water consumption rates in comparison to population growth rates, where a 50% increase in the rate of former led to four times more intrusion as compared to an equivalent increase in population growth rate over 20 years. Coupling both increase in population growth and increased consumption rates had a synergistic effect that aggravated the intrusion beyond the sum of the individual impacts. Adaptation strategies targeting a decrease in groundwater exploitation proved to be effective in retarding the intrusion.

  4. Non-immunologic methods of diagnosis of babesiosis

    Directory of Open Access Journals (Sweden)

    G. Wagner

    1992-01-01

    Full Text Available The diagnosis of tick-borne diseases such as babesiosis still depends on observing the parasite in the infected erythrocyte. Microscopic observation is tedious and often problematic in both early and carrier infections. Better diagnostic methods are needed to prevent clinical disease, especially when susceptible cattle are being moved into disease enzootic areas. This study evaluates two techniques for early diagnosis of Babesia bovis infections in cattle, DNA probes specific for the organism and fluorescent probes specific nucleic acid. The radioisotopically labeled DNA probes are used in slot blot hybridizations whith lysed blood samples, not purified DNA. Thusfar, the probe is specific for B. bovis and can detect as few as 1000 B. bovis parasites in 10µl of blood. The specificity of the fluorescent probe depends on the characteristic morphology of the babesia in whole blood samples, as determined microscopically. The fluorescent probe detects as afew as 10,000 B. bovis parasites in 10*l as blood. The application of each method for alboratory and field use is discussed.

  5. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients

    Directory of Open Access Journals (Sweden)

    Usha Bapat

    2012-01-01

    Full Text Available To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients′ above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life

  6. Automated analysis of non-mass-enhancing lesions in breast MRI based on morphological, kinetic, and spatio-temporal moments and joint segmentation-motion compensation technique

    Science.gov (United States)

    Hoffmann, Sebastian; Shutler, Jamie D.; Lobbes, Marc; Burgeth, Bernhard; Meyer-Bäse, Anke

    2013-12-01

    Dynamic contrast-enhanced magnetic resonance imaging (DCE-MRI) represents an established method for the detection and diagnosis of breast lesions. While mass-like enhancing lesions can be easily categorized according to the Breast Imaging Reporting and Data System (BI-RADS) MRI lexicon, a majority of diagnostically challenging lesions, the so called non-mass-like enhancing lesions, remain both qualitatively as well as quantitatively difficult to analyze. Thus, the evaluation of kinetic and/or morphological characteristics of non-masses represents a challenging task for an automated analysis and is of crucial importance for advancing current computer-aided diagnosis (CAD) systems. Compared to the well-characterized mass-enhancing lesions, non-masses have no well-defined and blurred tumor borders and a kinetic behavior that is not easily generalizable and thus discriminative for malignant and benign non-masses. To overcome these difficulties and pave the way for novel CAD systems for non-masses, we will evaluate several kinetic and morphological descriptors separately and a novel technique, the Zernike velocity moments, to capture the joint spatio-temporal behavior of these lesions, and additionally consider the impact of non-rigid motion compensation on a correct diagnosis.

  7. Biological intrusion barriers for large-volume waste-disposal sites

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Cline, J.F.; Rickard, W.H.

    1982-01-01

    intrusion of plants and animals into shallow land burial sites with subsequent mobilization of toxic and radiotoxic materials has occured. Based on recent pathway modeling studies, such intrusions can contribute to the dose received by man. This paper describes past work on developing biological intrusion barrier systems for application to large volume waste site stabilization. State-of-the-art concepts employing rock and chemical barriers are discussed relative to long term serviceability and cost of application. The interaction of bio-intrusion barrier systems with other processes affecting trench cover stability are discussed to ensure that trench cover designs minimize the potential dose to man. 3 figures, 6 tables

  8. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    OpenAIRE

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumben...

  9. Identification of Human Intrusion Types into Radwaste Disposal Facility

    International Nuclear Information System (INIS)

    Budi Setiawan

    2007-01-01

    Human intrusion has long been recognized as a potentially important post-closure safety issue for rad waste disposal facility. It is due to the difficulties in predicting future human activities. For the preliminary study of human intrusion, identification of human intrusion types need to be recognized and investigated also the approaching of problem solving must be known to predict the prevention act and accepted risk. (author)

  10. Evaluation of an advanced physical diagnosis course using consumer preferences methods: the nominal group technique.

    Science.gov (United States)

    Coker, Joshua; Castiglioni, Analia; Kraemer, Ryan R; Massie, F Stanford; Morris, Jason L; Rodriguez, Martin; Russell, Stephen W; Shaneyfelt, Terrance; Willett, Lisa L; Estrada, Carlos A

    2014-03-01

    Current evaluation tools of medical school courses are limited by the scope of questions asked and may not fully engage the student to think on areas to improve. The authors sought to explore whether a technique to study consumer preferences would elicit specific and prioritized information for course evaluation from medical students. Using the nominal group technique (4 sessions), 12 senior medical students prioritized and weighed expectations and topics learned in a 100-hour advanced physical diagnosis course (4-week course; February 2012). Students weighted their top 3 responses (top = 3, middle = 2 and bottom = 1). Before the course, 12 students identified 23 topics they expected to learn; the top 3 were review sensitivity/specificity and high-yield techniques (percentage of total weight, 18.5%), improving diagnosis (13.8%) and reinforce usual and less well-known techniques (13.8%). After the course, students generated 22 topics learned; the top 3 were practice and reinforce advanced maneuvers (25.4%), gaining confidence (22.5%) and learn the evidence (16.9%). The authors observed no differences in the priority of responses before and after the course (P = 0.07). In a physical diagnosis course, medical students elicited specific and prioritized information using the nominal group technique. The course met student expectations regarding education of the evidence-based physical examination, building skills and confidence on the proper techniques and maneuvers and experiential learning. The novel use for curriculum evaluation may be used to evaluate other courses-especially comprehensive and multicomponent courses.

  11. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  12. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  13. Laser Raman detection of platelet as a non-invasive approach for early and differential diagnosis of Alzheimer's disease

    International Nuclear Information System (INIS)

    Chen, P; Wang, X H; Cheng, Y; Peng, J; Shen, A G; Hu, J M; Tian, Q; Shang, X L; Liu, Z C; Yao, X Q; Wang, J Z; Baek, S J; Park, A

    2011-01-01

    Early and differential diagnosis of Alzheimer's disease (AD) is a problem that puzzled many doctors. Reliable markers in easy-assembling samples are of considerable clinical diagnostic value. In this work, laser Raman spectroscopy (LRS) was developed a new method that potentially allows early and differential diagnosis of AD from the platelet sample. Raman spectra of platelets isolated from different ages of AD transgenic mice and non-transgenic controls were collected and analyzed. Multilayer perceptron networks (MLP) classification method was used to classify spectra and establish the diagnostic models. For differential diagnosis, spectra of platelets isolated from AD, Parkinson's disease (PD) and vascular dementia (VD) mice were also discriminated. Two notable spectral differences at 740 and 1654 cm -1 were revealed in the mean spectrum of platelets isolated from AD transgenic mice and the controls. MLP displayed a powerful ability in the classifying of early, advanced AD and the control group, and in differential diagnosis of PD and advanced AD, as well as VD and advanced AD. The results suggest that platelet detecting by LRS coupled with MLP analysis appears to be an easy and accurate method for early and differential diagnosis of AD. This technique could be rapidly promoted from laboratory to the hospital

  14. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  15. Heart rate, startle response, and intrusive trauma memories

    Science.gov (United States)

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  16. Non-intrusive investigation of flow and heat transfer characteristics of a channel with a built-in circular cylinder

    Science.gov (United States)

    Vyas, Apoorv; Mishra, Biswajit; Agrawal, Atul; Srivastava, Atul

    2018-03-01

    Interferometry-based experimental investigation of heat transfer phenomena associated with a channel fitted with a circular cylinder has been reported. Experiments have been performed with water as the working fluid, and the range of Reynolds number considered is 75 ≤ Re ≤ 165. The circular cylinder, placed at the inlet section of the channel, provides a blockage ratio of 0.5. The experimental methodology has been benchmarked against the results of transient numerical simulations. In order to assess the performance of the channel fitted with a circular cylinder for possible heat transfer enhancement from the channel wall(s), experiments have also been performed on a plane channel (without a cylinder). The interferometry-based experiments clearly highlighted the influence of the built-in cylinder in generating the flow instabilities and alterations in the thermal boundary layer profile along the heated wall of the channel. The phenomenon of vortex shedding behind the cylinder was successfully captured. A gradual increase in the vortex shedding frequency was observed with increasing Reynolds number. Quantitative data in the form of two-dimensional temperature distributions revealed an increase in the strength of wall thermal gradients in the wake region of the cylinder due to the periodic shedding of the vortices. In turn, a clear enhancement in the wall heat transfer rates was observed for the case of the channel fitted with a cylinder vis-à-vis the plane channel. To the best of the knowledge of the authors, the work reported is one of the first attempts to provide the planar field experimental data for a channel configuration with a built-in circular cylinder using non-intrusive imaging techniques and has the potential to serve as one of the benchmark studies for validating the existing as well as future numerical studies in the related area.

  17. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  18. Diagnosis technique for the detection of mechanical faults in power breakers; Tecnica de diagnostico para la deteccion de fallas mecanicas en interruptores de potencia

    Energy Technology Data Exchange (ETDEWEB)

    Linan, Roberto; Perez, Marciano; Estrada, J. Manuel [Instituto de Investigaciones Electricas, Cuernavaca (Mexico)

    1996-12-31

    This article reports a non-invasive diagnosis technique for the detection of mechanical faults in power breakers, supporting it with the recording and analysis of vibration signals of the equipment under test. Also, an assessment of four breakers using this technique is presented. [Espanol] En el presente articulo se reporta una tecnica de diagnostico no invasiva para detectar fallas mecanicas en interruptores de potencia, apoyandose en el registro y analisis de senales de vibracion del equipo bajo prueba. Asimismo, se presenta la evaluacion de cuatro interruptores usando esta tecnica.

  19. Diagnosis technique for the detection of mechanical faults in power breakers; Tecnica de diagnostico para la deteccion de fallas mecanicas en interruptores de potencia

    Energy Technology Data Exchange (ETDEWEB)

    Linan, Roberto; Perez, Marciano; Estrada, J Manuel [Instituto de Investigaciones Electricas, Cuernavaca (Mexico)

    1997-12-31

    This article reports a non-invasive diagnosis technique for the detection of mechanical faults in power breakers, supporting it with the recording and analysis of vibration signals of the equipment under test. Also, an assessment of four breakers using this technique is presented. [Espanol] En el presente articulo se reporta una tecnica de diagnostico no invasiva para detectar fallas mecanicas en interruptores de potencia, apoyandose en el registro y analisis de senales de vibracion del equipo bajo prueba. Asimismo, se presenta la evaluacion de cuatro interruptores usando esta tecnica.

  20. The appraisal of intrusive thoughts in relation to obsessional-compulsive symptoms.

    Science.gov (United States)

    Barrera, Terri L; Norton, Peter J

    2011-01-01

    Research has shown that although intrusive thoughts occur universally, the majority of individuals do not view intrusive thoughts as being problematic (Freeston, Ladouceur, Thibodeau, & Gagnon, 1991; Rachman & de Silva, 1978; Salkovskis & Harrison, 1984). Thus, it is not the presence of intrusive thoughts that leads to obsessional problems but rather some other factor that plays a role in the development of abnormal obsessions. According to the cognitive model of obsessive-compulsive disorder (OCD) put forth by Salkovskis (1985), the crucial factor that differentiates between individuals with OCD and those without is the individual's appraisal of the naturally occurring intrusive thoughts. This study aimed to test Salkovskis's model by examining the role of cognitive biases (responsibility, thought-action fusion, and thought control) as well as distress in the relationship between intrusive thoughts and obsessive-compulsive symptoms in an undergraduate sample of 326 students. An existing measure of intrusive thoughts (the Revised Obsessional Intrusions Inventory) was modified for this study to include a scale of distress associated with each intrusive thought in addition to the current frequency scale. When the Yale-Brown Obsessive-Compulsive Scale was used as the measure of OCD symptoms, a significant interaction effect of frequency and distress of intrusive thoughts resulted. Additionally, a significant three-way interaction of Frequency × Distress × Responsibility was found when the Obsessive Compulsive Inventory-Revised was used as the measure of OCD symptoms. These results indicate that the appraisal of intrusive thoughts is important in predicting OCD symptoms, thus providing support for Salkovskis's model of OCD.

  1. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  2. Saharan dust intrusions in Spain: Health impacts and associated synoptic conditions.

    Science.gov (United States)

    Díaz, Julio; Linares, Cristina; Carmona, Rocío; Russo, Ana; Ortiz, Cristina; Salvador, Pedro; Trigo, Ricardo Machado

    2017-07-01

    A lot of papers have been published about the impact on mortality of Sahara dust intrusions in individual cities. However, there is a lack of studies that analyse the impact on a country and scarcer if in addition the analysis takes into account the meteorological conditions that favour these intrusions. The main aim is to examine the effect of Saharan dust intrusions on daily mortality in different Spanish regions and to characterize the large-scale atmospheric circulation anomalies associated with such dust intrusions. For determination of days with Saharan dust intrusions, we used information supplied by the Ministry of Agriculture, Food & Environment, it divides Spain into 9 main areas. In each of these regions, a representative province was selected. A time series analysis has been performed to analyse the relationship between daily mortality and PM 10 levels in the period from 01.01.04 to 31.12.09, using Poisson regression and stratifying the analysis by the presence or absence of Saharan dust advections. The proportion of days on which there are Saharan dust intrusions rises to 30% of days. The synoptic pattern is characterised by an anticyclonic ridge extending from northern Africa to the Iberian Peninsula. Particulate matter (PM) on days with intrusions are associated with daily mortality, something that does not occur on days without intrusions, indicating that Saharan dust may be a risk factor for daily mortality. In other cases, what Saharan dust intrusions do is to change the PM-related mortality behaviour pattern, going from PM 2.5 . A study such as the one conducted here, in which meteorological analysis of synoptic situations which favour Saharan dust intrusions, is combined with the effect on health at a city level, would seem to be crucial when it comes to analysing the differentiated mortality pattern in situations of Saharan dust intrusions. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. Multiparametric approach to diagnosis of non-Q-wave acute myocardial infarction

    International Nuclear Information System (INIS)

    Carpeggiani, C.; L'Abbate, A.; Marzullo, P.

    1989-01-01

    The present study investigated whether the lack of enzyme increase is reason enough to exclude necrosis in patients with ischemic heart disease who develop electrocardiographic sustained ST-T changes in the absence of Q waves. In 15 consecutive patients with angina who developed sustained ST-T changes during hospitalization, the presence of myocardial necrosis was investigated by a prospective multiparametric approach. Serum enzymes and myoglobin, pyrophosphate uptake, 2-dimensional echocardiography, perfusion scintigraphy, left ventriculography and coronary angiography were evaluated. According to creatine kinase and creatine kinase-MB peak at twice the upper normal value, the diagnosis of acute myocardial infarction applied only to 40% of patients. However, myoglobin was positive in 80% and a perfusion defect could be documented by an electrocardiographic gated microsphere technique in 100% of patients. The positivity of myoglobin increased to 100% and of creatine kinase and creatine kinase-MB to 87 and 60%, respectively, when a peak value twice the individual lowest value was considered for positivity. The 100% presence of perfusion defects associated with the high prevalence of both positive pyrophosphate uptake (87%) and regional dyssynergies (87 and 73%, respectively, by left ventriculography and echocardiography) strongly suggest that sustained (greater than or equal to 7 days) ST-T changes in this population were indicative of myocardial necrosis. Thus, by conventional enzymatic approach, diagnosis of non-Q-wave infarction can be missed in a sizable number of patients and present important clinical implications

  4. An evaluation of classification algorithms for intrusion detection ...

    African Journals Online (AJOL)

    An evaluation of classification algorithms for intrusion detection. ... Log in or Register to get access to full text downloads. ... Most of the available IDSs use all the 41 features in the network to evaluate and search for intrusive pattern in which ...

  5. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  6. Sound Power Estimation by Laser Doppler Vibration Measurement Techniques

    Directory of Open Access Journals (Sweden)

    G.M. Revel

    1998-01-01

    Full Text Available The aim of this paper is to propose simple and quick methods for the determination of the sound power emitted by a vibrating surface, by using non-contact vibration measurement techniques. In order to calculate the acoustic power by vibration data processing, two different approaches are presented. The first is based on the method proposed in the Standard ISO/TR 7849, while the second is based on the superposition theorem. A laser-Doppler scanning vibrometer has been employed for vibration measurements. Laser techniques open up new possibilities in this field because of their high spatial resolution and their non-intrusivity. The technique has been applied here to estimate the acoustic power emitted by a loudspeaker diaphragm. Results have been compared with those from a commercial Boundary Element Method (BEM software and experimentally validated by acoustic intensity measurements. Predicted and experimental results seem to be in agreement (differences lower than 1 dB thus showing that the proposed techniques can be employed as rapid solutions for many practical and industrial applications. Uncertainty sources are addressed and their effect is discussed.

  7. Non-intrusive measurement of tritium activity in waste drums by modelling a {sup 3}He leak quantified by mass spectrometry; Mesure non intrusive de l'activite de futs de dechets trities par modelisation d'une fuite {sup 3}He et sa quantification par spectrometrie de masse

    Energy Technology Data Exchange (ETDEWEB)

    Demange, D

    2002-07-03

    This study deals with a new method that makes it possible to measure very low tritium quantities inside radioactive waste drums. This indirect method is based on measuring the decaying product, {sup 3}He, and requires a study of its behaviour inside the drum. Our model considers {sup 3}He as totally free and its leak through the polymeric joint of the drum as two distinct phenomena: permeation and laminar flow. The numerical simulations show that a pseudo-stationary state takes place. Thus, the {sup 3}He leak corresponds to the tritium activity inside the drum but it appears, however, that the leak peaks when the atmospheric pressure variations induce an overpressure in the drum. Nevertheless, the confinement of a drum in a tight chamber makes it possible to quantify the {sup 3}He leak. This is a non-intrusive measurement of its activity, which was experimentally checked by using reduced models, representing the drum and its confinement chamber. The drum's confinement was optimised to obtain a reproducible {sup 3}He leak measurement. The gaseous samples taken from the chamber were purified using selective adsorption onto activated charcoals at 77 K to remove the tritium and pre-concentrate the {sup 3}He. The samples were measured using a leak detector mass spectrometer. The adaptation of the signal acquisition and the optimisation of the analysis parameters made it possible to reach the stability of the external calibrations using standard gases with a {sup 3}He detection limit of 0.05 ppb. Repeated confinement of the reference drums demonstrated the accuracy of this method. The uncertainty of this non-intrusive measurement of the tritium activity in 200-liter drums is 15% and the detection limit is about 1 GBq after a 24 h confinement. These results led to the definition of an automated tool able to systematically measure the tritium activity of all storage waste drums. (authors)

  8. On the relation between crustal deformation and seismicity during the 2012-2014 magmatic intrusions in El Hierro island.

    Science.gov (United States)

    Domínguez Cerdeña, Itahiza; García-Cañada, Laura; Ángeles Benito Saz, María; Del Fresno, Carmen

    2017-04-01

    The last volcanic eruption in the Canary Islands took place in 2011 less than 2 km offshore El Hierro island, after 3 months of measuring surface deformation (up to 5 cm) and locating more than 10 000 earthquakes. In the two years following the end of the submarine eruption on 5 March 2012, six deep magmatic intrusions were recorded beneath the island. Despite the short time duration of these intrusions, these events have been more energetic that the 2011 pre-eruptive intrusive event but none of them ended in a new eruption. These post-eruptive reactivations are some of the few examples in the world of well monitored magmatic intrusions related with monogenetic volcanism. In order to understand these processes we have analyzed the geodetic and seismic data with different techniques. First, we did a joint hypocentral relocation of the six seismic swarms, including more than 6 300 events, to analyze the relative distribution of the earthquakes from different intrusions. The uncertainties of the earthquakes relocations was reduced to an average value of 300 m. New earthquakes' distribution shows the alignments of the different intrusions and a temporal migration of the events to larger depths. Moreover, we show the results of the ground deformation using GPS data from the network installed on the island (for each of the six intrusive events) and their inversion considering spherical models. In most of the intrusions the optimal source model was shallower and southern than the corresponding seismicity hypocenters. The intruded magma volume ranges from 0.02 to 0.13 km3. Finally, we also computed the b value from the Gutenberg Richter equation by means of a bootstrap method. The spatial and temporal evolution of the b value for the seismicity show a clear correlation with the temporal evolution of the crustal deformation. The six magma intrusions can be grouped, depending on their location, in three pairs each one associated with each of the three active rifts of El

  9. A reactive transport investigation of a seawater intrusion experiment in a shallow aquifer, Skansehage Denmark

    DEFF Research Database (Denmark)

    Christensen, Flemming Damgaard; Engesgaard, Peter Knudegaard; Kipp, K.L.

    2001-01-01

    Previous investigations on seawater intrusion have mainly focused on either the physical density flow system with transport of a single non-reactive species or focused on the geochemical aspects neglecting density effects. This study focuses on both the geochemical and physical aspects of seawate...

  10. Intrusion of Magmatic Bodies Into the Continental Crust: 3-D Numerical Models

    Science.gov (United States)

    Gorczyk, Weronika; Vogt, Katharina

    2018-03-01

    Magma intrusion is a major material transfer process in the Earth's continental crust. Yet the mechanical behavior of the intruding magma and its host are a matter of debate. In this study we present a series of numerical thermomechanical simulations on magma emplacement in 3-D. Our results demonstrate the response of the continental crust to magma intrusion. We observe change in intrusion geometries between dikes, cone sheets, sills, plutons, ponds, funnels, finger-shaped and stock-like intrusions, and injection time. The rheology and temperature of the host are the main controlling factors in the transition between these different modes of intrusion. Viscous deformation in the warm and deep crust favors host rock displacement and plutons at the crust-mantle boundary forming deep-seated plutons or magma ponds in the lower to middle crust. Brittle deformation in the cool and shallow crust induces cone-shaped fractures in the host rock and enables emplacement of finger- or stock-like intrusions at shallow or intermediate depth. Here the passage of magmatic and hydrothermal fluids from the intrusion through the fracture pattern may result in the formation of ore deposits. A combination of viscous and brittle deformation forms funnel-shaped intrusions in the middle crust. Intrusion of low-density magma may more over result in T-shaped intrusions in cross section with magma sheets at the surface.

  11. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  12. Gearbox fault diagnosis based on time-frequency domain synchronous averaging and feature extraction technique

    Science.gov (United States)

    Zhang, Shengli; Tang, Jiong

    2016-04-01

    Gearbox is one of the most vulnerable subsystems in wind turbines. Its healthy status significantly affects the efficiency and function of the entire system. Vibration based fault diagnosis methods are prevalently applied nowadays. However, vibration signals are always contaminated by noise that comes from data acquisition errors, structure geometric errors, operation errors, etc. As a result, it is difficult to identify potential gear failures directly from vibration signals, especially for the early stage faults. This paper utilizes synchronous averaging technique in time-frequency domain to remove the non-synchronous noise and enhance the fault related time-frequency features. The enhanced time-frequency information is further employed in gear fault classification and identification through feature extraction algorithms including Kernel Principal Component Analysis (KPCA), Multilinear Principal Component Analysis (MPCA), and Locally Linear Embedding (LLE). Results show that the LLE approach is the most effective to classify and identify different gear faults.

  13. Dose and risk assessment for intrusion into mixed waste disposal sites

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Aaberg, R.L.

    1991-10-01

    Sites previously used for disposal of radioactive and hazardous chemical materials have resulted in situations that pose a potential threat to humans from inadvertent intrusion. An example generic scenario analysis was developed to demonstrate the evaluation of potential exposure to either cleanup workers or members of the public who intrude into buried waste containing both radioactive and hazardous chemical contaminants. The example scenarios consist of a collection of exposure routes (or pathways) with specific modeling assumptions for well-drilling and for excavation to construct buildings. These scenarios are used to describe conceptually some potential patterns of activity by non-protected human beings during intrusion into mixed-waste disposal sites. The dose from exposure to radioactive materials is calculated using the GENII software system and converted to risk by using factors from ICRP Publication 60. The hazard assessment for nonradioactive materials is performed using recent guidelines from the US Environmental Protection Agency (EPA). The example results are in the form of cancer risk for carcinogens and radiation exposure

  14. Intrusion detection model using fusion of chi-square feature selection and multi class SVM

    Directory of Open Access Journals (Sweden)

    Ikram Sumaiya Thaseen

    2017-10-01

    Full Text Available Intrusion detection is a promising area of research in the domain of security with the rapid development of internet in everyday life. Many intrusion detection systems (IDS employ a sole classifier algorithm for classifying network traffic as normal or abnormal. Due to the large amount of data, these sole classifier models fail to achieve a high attack detection rate with reduced false alarm rate. However by applying dimensionality reduction, data can be efficiently reduced to an optimal set of attributes without loss of information and then classified accurately using a multi class modeling technique for identifying the different network attacks. In this paper, we propose an intrusion detection model using chi-square feature selection and multi class support vector machine (SVM. A parameter tuning technique is adopted for optimization of Radial Basis Function kernel parameter namely gamma represented by ‘ϒ’ and over fitting constant ‘C’. These are the two important parameters required for the SVM model. The main idea behind this model is to construct a multi class SVM which has not been adopted for IDS so far to decrease the training and testing time and increase the individual classification accuracy of the network attacks. The investigational results on NSL-KDD dataset which is an enhanced version of KDDCup 1999 dataset shows that our proposed approach results in a better detection rate and reduced false alarm rate. An experimentation on the computational time required for training and testing is also carried out for usage in time critical applications.

  15. The Use of Artificial-Intelligence-Based Ensembles for Intrusion Detection: A Review

    Directory of Open Access Journals (Sweden)

    Gulshan Kumar

    2012-01-01

    Full Text Available In supervised learning-based classification, ensembles have been successfully employed to different application domains. In the literature, many researchers have proposed different ensembles by considering different combination methods, training datasets, base classifiers, and many other factors. Artificial-intelligence-(AI- based techniques play prominent role in development of ensemble for intrusion detection (ID and have many benefits over other techniques. However, there is no comprehensive review of ensembles in general and AI-based ensembles for ID to examine and understand their current research status to solve the ID problem. Here, an updated review of ensembles and their taxonomies has been presented in general. The paper also presents the updated review of various AI-based ensembles for ID (in particular during last decade. The related studies of AI-based ensembles are compared by set of evaluation metrics driven from (1 architecture & approach followed; (2 different methods utilized in different phases of ensemble learning; (3 other measures used to evaluate classification performance of the ensembles. The paper also provides the future directions of the research in this area. The paper will help the better understanding of different directions in which research of ensembles has been done in general and specifically: field of intrusion detection systems (IDSs.

  16. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    Seawater intrusion; coastal aquifers; density-dependent flow and ... The seawater intrusion mechanism in coastal aquifers generally causes the occurrence of ... (4) The dynamic viscosity of the fluid does not change with respect to salinity and.

  17. Diagnosis and interpretation of EEG on non-convulsive status epilepticus

    Directory of Open Access Journals (Sweden)

    Xiao-gang KANG

    2015-11-01

    Full Text Available It is difficult to diagnose non-convulsive status epilepticus (NCSE clinically because of the complicated etiology and various clinical and electroencephalographic features of NCSE without a universally accepted definition. Although the diagnosis of NCSE relies largely on electroencephalogram (EEG findings, the determination of NCSE on EEG is inevitably subjective, and the EEG changes of most patients is lack of specificity. As the diagnosis of NCSE is related to clinical and electroencephalographic manifestations, diagnostic criteria for NCSE should take into account both clinical and electroencephalographic features, and their response to antiepileptic drugs (AEDs. DOI: 10.3969/j.issn.1672-6731.2015.11.005

  18. A Machine Learning Based Intrusion Impact Analysis Scheme for Clouds

    Directory of Open Access Journals (Sweden)

    Junaid Arshad

    2012-01-01

    Full Text Available Clouds represent a major paradigm shift, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of on demand expandable computing infrastructures. However, Clouds introduce novel security challenges which need to be addressed to facilitate widespread adoption. This paper is focused on one such challenge - intrusion impact analysis. In particular, we highlight the significance of intrusion impact analysis for the overall security of Clouds. Additionally, we present a machine learning based scheme to address this challenge in accordance with the specific requirements of Clouds for intrusion impact analysis. We also present rigorous evaluation performed to assess the effectiveness and feasibility of the proposed method to address this challenge for Clouds. The evaluation results demonstrate high degree of effectiveness to correctly determine the impact of an intrusion along with significant reduction with respect to the intrusion response time.

  19. [Advances of Molecular Diagnostic Techniques Application in Clinical Diagnosis.

    Science.gov (United States)

    Ying, Bin-Wu

    2016-11-01

    Over the past 20 years,clinical molecular diagnostic technology has made rapid development,and became the most promising field in clinical laboratory medicine.In particular,with the development of genomics,clinical molecular diagnostic methods will reveal the nature of clinical diseases in a deeper level,thus guiding the clinical diagnosis and treatments.Many molecular diagnostic projects have been routinely applied in clinical works.This paper reviews the advances on application of clinical diagnostic techniques in infectious disease,tumor and genetic disorders,including nucleic acid amplification,biochip,next-generation sequencing,and automation molecular system,and so on.

  20. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  1. A two-stage flow-based intrusion detection model for next-generation networks.

    Science.gov (United States)

    Umer, Muhammad Fahad; Sher, Muhammad; Bi, Yaxin

    2018-01-01

    The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results.

  2. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  3. Non-tuberculous mycobacterial lung disease: diagnosis based on computed tomography of the chest

    Energy Technology Data Exchange (ETDEWEB)

    Kwak, Nakwon; Han, Sung Koo; Yim, Jae-Joon [Seoul National University College of Medicine, Division of Pulmonary and Critical Care Medicine, Department of Internal Medicine, 101 Daehak-Ro, Jongno-Gu, Seoul (Korea, Republic of); Lee, Chang Hyun; Lee, Hyun-Ju [Seoul National University College of Medicine, Department of Radiology, and Institute of Radiation Medicine, Seoul (Korea, Republic of); Kang, Young Ae [Yonsei University College of Medicine, Division of Pulmonology, Department of Internal Medicine, Severance Hospital, Institute of Chest Diseases, Seoul (Korea, Republic of); Lee, Jae Ho [Seoul National University Bundang Hospital, Department of Internal Medicine, Seongnam, Gyeonggi-do (Korea, Republic of)

    2016-12-15

    To elucidate the accuracy and inter-observer agreement of non-tuberculous mycobacterial lung disease (NTM-LD) diagnosis based on chest CT findings. Two chest radiologists and two pulmonologists interpreted chest CTs of 66 patients with NTM-LD, 33 with pulmonary tuberculosis and 33 with non-cystic fibrosis bronchiectasis. These observers selected one of these diagnoses for each case without knowing any clinical information except age and sex. Sensitivity and specificity were calculated according to degree of observer confidence. Inter-observer agreement was assessed using Fleiss' κ values. Multiple logistic regression was performed to elucidate which radiological features led to the correct diagnosis. The sensitivity of NTM-LD diagnosis was 56.4 % (95 % CI 47.9-64.7) and specificity 80.3 % (73.1-86.0). The specificity of NTM-LD diagnosis increased with confidence: 44.4 % (20.5-71.3) for possible, 77.4 % (67.4-85.0) for probable, 95.2 % (87.2-98.2) for definite (P < 0.001) diagnoses. Inter-observer agreement for NTM-LD diagnosis was moderate (κ = 0.453). Tree-in-bud pattern (adjusted odds ratio [aOR] 6.24, P < 0.001), consolidation (aOR 1.92, P = 0.036) and atelectasis (aOR 3.73, P < 0.001) were associated with correct NTM-LD diagnoses, whereas presence of pleural effusion (aOR 0.05, P < 0.001) led to false diagnoses. NTM-LD diagnosis based on chest CT findings is specific but not sensitive. (orig.)

  4. Intrusion problematic during water supply systems’ operation

    OpenAIRE

    Jesus Mora-Rodriguez, P. Amparo López-Jimenez, Helena M. Ramos

    2011-01-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuse...

  5. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection.

    Science.gov (United States)

    Hu, Weiming; Gao, Jun; Wang, Yanguo; Wu, Ou; Maybank, Stephen

    2014-01-01

    Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.

  6. Psychological distress two years after diagnosis of breast cancer

    DEFF Research Database (Denmark)

    Bleiker, E M; Pouwer, F; Van Der Ploeg, Henk M

    2000-01-01

    The present prospective study aimed at (1) investigating the frequency of high levels of psychological distress in women with early-stage breast cancer almost two years after diagnosis and (2) identifying characteristics associated with long-term distress. One hundred and seventy women participated...... of surgery). At the second measurement, subjective distress was assessed for a second time by means of the Impact of Events Scale (IES). Almost two years after diagnosis, 16% of the women reported a high level of psychological distress as measured by the Intrusion scale (IES). Best predictors of a high level...

  7. Non-intrusive measurement of tritium activity in waste drums by modelling a {sup 3}He leak quantified by mass spectrometry; Mesure non intrusive de l'activite de futs de dechets trities par modelisation d'une fuite {sup 3}He et sa quantification par spectrometrie de masse

    Energy Technology Data Exchange (ETDEWEB)

    Demange, D

    2002-07-03

    This study deals with a new method that makes it possible to measure very low tritium quantities inside radioactive waste drums. This indirect method is based on measuring the decaying product, {sup 3}He, and requires a study of its behaviour inside the drum. Our model considers {sup 3}He as totally free and its leak through the polymeric joint of the drum as two distinct phenomena: permeation and laminar flow. The numerical simulations show that a pseudo-stationary state takes place. Thus, the {sup 3}He leak corresponds to the tritium activity inside the drum but it appears, however, that the leak peaks when the atmospheric pressure variations induce an overpressure in the drum. Nevertheless, the confinement of a drum in a tight chamber makes it possible to quantify the {sup 3}He leak. This is a non-intrusive measurement of its activity, which was experimentally checked by using reduced models, representing the drum and its confinement chamber. The drum's confinement was optimised to obtain a reproducible {sup 3}He leak measurement. The gaseous samples taken from the chamber were purified using selective adsorption onto activated charcoals at 77 K to remove the tritium and pre-concentrate the {sup 3}He. The samples were measured using a leak detector mass spectrometer. The adaptation of the signal acquisition and the optimisation of the analysis parameters made it possible to reach the stability of the external calibrations using standard gases with a {sup 3}He detection limit of 0.05 ppb. Repeated confinement of the reference drums demonstrated the accuracy of this method. The uncertainty of this non-intrusive measurement of the tritium activity in 200-liter drums is 15% and the detection limit is about 1 GBq after a 24 h confinement. These results led to the definition of an automated tool able to systematically measure the tritium activity of all storage waste drums. (authors)

  8. Toddler inhibited temperament, maternal cortisol reactivity and embarrassment, and intrusive parenting.

    Science.gov (United States)

    Kiel, Elizabeth J; Buss, Kristin A

    2013-06-01

    The relevance of parenting behavior to toddlers' development necessitates a better understanding of the influences on parents during parent-child interactions. Toddlers' inhibited temperament may relate to parenting behaviors, such as intrusiveness, that predict outcomes later in childhood. The conditions under which inhibited temperament relates to intrusiveness, however, remain understudied. A multimethod approach would acknowledge that several levels of processes determine mothers' experiences during situations in which they witness their toddlers interacting with novelty. As such, the current study examined maternal cortisol reactivity and embarrassment about shyness as moderators of the relation between toddlers' inhibited temperament and maternal intrusive behavior. Participants included 92 24-month-old toddlers and their mothers. Toddlers' inhibited temperament and maternal intrusiveness were measured observationally in the laboratory. Mothers supplied saliva samples at the beginning of the laboratory visit and 20 minutes after observation. Maternal cortisol reactivity interacted with inhibited temperament in relation to intrusive behavior, such that mothers with higher levels of cortisol reactivity were observed to be more intrusive with more highly inhibited toddlers. Embarrassment related to intrusive behavior as a main effect. These results highlight the importance of considering child characteristics and psychobiological processes in relation to parenting behavior. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  9. TTP AL921102: An integrated geophysics program for non-intrusive characterization of mixed-waste landfill sites

    International Nuclear Information System (INIS)

    Hasbrouck, J.C.

    1992-11-01

    Chem-Nuclear Geotech, Inc. (Geotech), operating contractor for the US Department of Energy Grand Junction Projects Office, is conducting the Integrated Geophysics Program for Non-Intrusive Characterization of Mixed-Waste Landfill Sites (Technical Task Plan [TTP] AL921102). The TTP is part of the Mixed-Waste Landfill Integrated Demonstration (MWLID). The objective of this task was to demonstrate that an integrated program of surface geophysics can be used to effectively and nonintrusively characterize n-mixed-waste landfill sites. To accomplish this objective, integrated field demonstrations were conducted over two previously identified areas of interest (designated Areas A and B) within the MWLID test site at the Chemical Waste Landfill (CWL), Technical Area 3, at the Sandia National Laboratories, Albuquerque, New Mexico (Figures 1 and 2). Area A was centered roughly around the Chromic Acid and Organics Pits in the southeast-central portion of the landfill and Area B was centered around the ''60's Pits'' area in the northeast-central portion of the landfill. Pit locations were known in Area A and suspected in Area B. This progress report describes the geophysical surveys conducted by Geotech and presents preliminary displays and analyses. Volume 2 of this report contains the raw data for all the surveys conducted by Geotech for this TTP

  10. Evaluation of immunoperoxidase staining technique in the diagnosis of Acanthamoeba keratitis

    Directory of Open Access Journals (Sweden)

    Sharma Savitri

    2001-01-01

    Full Text Available Purpose: We describe a simple procedure of Immunoperoxidase (IP technique, using indigenously raised antibody, to screen corneal scrapings for Acanthamoeba cysts and trophozoites. This study sought to determine the utility of this test in the diagnosis of Acanthamoeba keratitis. Methods: A high titre polyclonal antibody against a local clinical isolate (axenic of Acanthamoeba species (trophozoite lysate antigen was raised in rabbits and used for standardization of IP technique for corneal scrapings. Twenty two smears of corneal scrapings, collected from patients showing Acanthamoeba cysts in corneal scrapings stained with calcofluorwhite (pool-1 and patients showing no cysts in similar scrapings (pool-2, were coded and stained by IP technique by a masked technician. All 22 patients had also been tested for bacteria, fungus, and Acanthamoeba in their corneal scrapings by smears and cultures. IP stained smears were examined for organisms including cysts and trophozoites of Acanthamoeba and background staining by two observers masked to the results of other smears and cultures. The validity of the IP test in detection of Acanthamoeba cysts and trophozoites was measured by sensitivity, specificity, positive predictive value and negative predictive value in comparison (McNemar test for paired comparison with calcofluor white staining and culture. Results: Based on the readings of observer 1 and compared to calcofluor white staining, the IP test had a sensitivity of 100%, a specificity of 94%, positive predictive value of 80% and negative predictive value of 100%. When compared to culture, the values were 83%, 100%, 100% and 94% respectively. Trophozoites missed in calcofluor white stained smears, were detected in 2 out of 6 cases of culture-positive Acanthamoeba keratitis. The Kappa coefficient of interobserver agreement was determined as fair (30.4%. Conclusion: The immunoperoxidase technique is a simple and useful test in the diagnosis of

  11. Using discriminant analysis to detect intrusions in external communication for self-driving vehicles

    Directory of Open Access Journals (Sweden)

    Khattab M.Ali Alheeti

    2017-08-01

    Full Text Available Security systems are a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoc networks is crucial to the reliable exchange of information and control data. In this paper, we propose an intelligent Intrusion Detection System (IDS to protect the external communication of self-driving and semi self-driving vehicles. This technology has the ability to detect Denial of Service (DoS and black hole attacks on vehicular ad hoc networks (VANETs. The advantage of the proposed IDS over existing security systems is that it detects attacks before they causes significant damage. The intrusion prediction technique is based on Linear Discriminant Analysis (LDA and Quadratic Discriminant Analysis (QDA which are used to predict attacks based on observed vehicle behavior. We perform simulations using Network Simulator 2 to demonstrate that the IDS achieves a low rate of false alarms and high accuracy in detection.

  12. Source characteristics and tectonic setting of mafic-ultramafic intrusions in North Xinjiang, NW China: Insights from the petrology and geochemistry of the Lubei mafic-ultramafic intrusion

    Science.gov (United States)

    Chen, Bao-Yun; Yu, Jin-Jie; Liu, Shuai-Jie

    2018-05-01

    The newly discovered Lubei sulfide-bearing mafic-ultramafic intrusion forms the western extension of the Huangshan-Jin'erquan mafic-ultramafic intrusion belt in East Tianshan, NW China. The Lubei intrusion comprises hornblende peridotite, lherzolite, and harzburgite in its southern portion, gabbro in its middle portion, and hornblende gabbro in its northern portion. Intrusive relationships indicate that three magma pulses were involved in the formation of the intrusion, and that they were likely evolved from a common primitive magma. Estimated compositions of the Lubei primitive magma are similar to those of island arc calc-alkaline basalt except for the low Na2O and CaO contents of the Lubei primitive magma. This paper reports on the mineral compositions, whole-rock major and trace element contents, and Rb-Sr and Sm-Nd isotopic compositions of the Lubei intrusion, and a zircon LA-MC-ICP-MS U-Pb age for hornblende gabbro. The Lubei intrusion is characterized by enrichment in large-ion lithophile elements, depletion in high-field-strength elements, and marked negative Nb and Ta anomalies, with enrichment in chondrite-normalized light rare earth elements. It exhibits low (87Sr/86Sr)i ratios of 0.70333-0.70636 and low (143Nd/144Nd)i ratios of 0.51214-0.51260, with positive εNd values of +4.01 to +6.33. LA-ICP-MS U-Pb zircon ages yielded a weighted-mean age of 287.9 ± 1.6 Ma for the Lubei intrusion. Contemporaneous mafic-ultramafic intrusions in different tectonic domains in North Xinjiang show similar geological and geochemical signatures to the Lubei intrusion, suggesting a source region of metasomatized mantle previously modified by hydrous fluids from the slab subducted beneath the North Xinjiang region in the early Permian. Metasomatism of the mantle was dominated by hydrous fluids and was related to subduction of the Paleo-Asian oceanic lithosphere during the Paleozoic. Sr-Nd-Pb isotopic compositions suggest that the mantle source was a mixture of depleted mid

  13. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS.

  14. Evolving techniques of diagnosis. Toward establishment of new paradigm for human machine cooperation

    International Nuclear Information System (INIS)

    Kitamura, Masaharu; Takahashi, Makoto; Kanamoto, Shigeru; Saeki, Akira; Washio, Takashi; Ohga, Yukiharu; Furuta, Kazuo; Yoshikawa, Shinji

    1998-01-01

    By monitoring equipments of a plant and state of a process, the diagnostic technique to detect a sign of abnormality properly to identify its reason has often been advanced on a lot of researches in various industrial fields containing atomic force. Some fundamental studies expected for such diagnostic technique to play an important role to keep and improve operational safety of a nuclear plant have been conducted since early period of the nuclear reaction development, but their contents are evolved and changed rapidly, in recent. The technique on the diagnosis was related closely to a statistical analysis method on signal fluctuation component, so-called reactor noise analysis method in early 1980s, but technical innovation step of their recent advancement were remarkable by introduction of new techniques such as chaos theory, wavelet analysis, model base application of expert system, artificial intelligence, and so on at middle of 1980s. And, when diagnosing in the field of atomic force, owing to be required for much high ability, studies on a multi method integration system considered complementary application of a plurality of technical methods and a cooperative method between human and mechanical intelligences, are also forwarded actively faster than those in other industrial areas. In this paper, in each important item, its technical nature and present state of its application to diagnosis are described with their future technical view. (G.K.)

  15. The use of data-mining techniques for developing effective decisionsupport systems: A case study of simulating the effects ofclimate change on coastal salinity intrusion

    Science.gov (United States)

    Conrads, Paul; Edwin Roehl, Jr.

    2017-01-01

    Natural-resource managers and stakeholders face difficult challenges when managing interactions between natural and societal systems. Potential changes in climate could alter interactions between environmental and societal systems and adversely affect the availability of water resources in many coastal communities. The availability of freshwater in coastal streams can be threatened by saltwater intrusion. Even though the collective interests and computer skills of the community of managers, scientists and other stakeholders are quite varied, there is an overarching need for equal access by all to the scientific knowledge needed to make the best possible decisions. This paper describes a decision support system, PRISM-2, developed to evaluate salinity intrusion due to potential climate change along the South Carolina coast in southeastern USA. The decision support system is disseminated as a spreadsheet application and integrates the output of global circulation models, watershed models and salinity intrusion models with real-time databases for simulation, graphical user interfaces, and streaming displays of results. The results from PRISM-2 showed that a 31-cm and 62-cm increase in sea level reduced the daily availability of freshwater supply to a coastal municipal intake by 4% and 12% of the time, respectively. Future climate change projections by a global circulation model showed a seasonal change in salinity intrusion events from the summer to the fall for the majority of events.

  16. Unique Challenges in WiFi Intrusion Detection

    OpenAIRE

    Milliken, Jonny

    2014-01-01

    The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more deta...

  17. A fuzzy multicriteria categorization of the GALDIT method to assess seawater intrusion vulnerability of coastal aquifers.

    Science.gov (United States)

    Kazakis, Nerantzis; Spiliotis, Mike; Voudouris, Konstantinos; Pliakas, Fotios-Konstantinos; Papadopoulos, Basil

    2018-04-15

    Groundwater constitutes the primary source of fresh water for >1.2 billion people living in coastal zones. However, the threat of seawater intrusion is widespread in coastal aquifers mainly due to overexploitation of groundwater. In the present study, a modified fuzzy multicriteria categorization into non-ordered categories method was developed in order to modify the standard GALDIT method and assess seawater intrusion vulnerability in a coastal aquifer of northern Greece. The method is based on six parameters: groundwater occurrence, aquifer hydraulic conductivity, groundwater level, distance from the shore, impact of the existing status of seawater intrusion, and aquifer thickness. Initially, the original method was applied and revealed a zone of high vulnerability running parallel to the coastline and covering an area of 8.6km 2 . The modified GALDIT-F method achieved higher discretization of vulnerability zones which is essential to build a rational management plan to prevent seawater intrusion. The GALDIT-F approach also distinguished an area of the aquifer that is influenced by geothermal fluids. In total, twenty-five categories were produced corresponding to different vulnerability degrees according to the initial method (High, Moderate, Low) as well as the area influenced by geothermal fluids. Finally, a road map was developed in order to adapt management strategies to GALDIT-F categories and prevent and mitigate seawater intrusion. The proposed management strategies of the coastal aquifer include managed aquifer recharge (MAR) implementation, reallocation of existing wells, optimization of pumping rates during the hydrological year, and a detailed monitoring plan. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  19. Non-contact remote monitoring technique of reactor structural elements

    International Nuclear Information System (INIS)

    Inoue, Hideo; Mori, Kazuo; Ozawa, Norimitsu; Akedo, Jun; Seimiya, Koichi; Chikamori, Kunio; Umezawa, Akihiko

    1998-01-01

    This study aims at development of technique to measure and estimate, at high precision, fine machining scratch, crack and so on formed on grinding tubular elements, especially inner faces of small diameter tube at an optical mirror grade, and at establishment of estimation technique on reliability and soundness of the tubular elements. In this fiscal year, on optical type non-contact monitoring technique, investigations on optical illumination condition and holding accuracy required for the non-contact holding mechanism were conducted by using a sensor head trially produced in 1995 fiscal year. And, in order to realize a high precision non-contact holding in a tube of optical detection system to upgrade static holding properties (holding stiffness, holding attitude, and so on) of pneumatic type inner tube non-contact holding mechanism, realization of increase in supplying air pressure and experiments using a holding mechanism to increase pore numbers of air injecting nozzle were conducted. And, on materials surface technique, effect of difference in pre-machining method (cutting and bright annealing) at inner face of small diameter stainless tube on their smooth machining property was examined. (G.K.)

  20. Pulmonary infiltrates in non-HIV immunocompromised patients: a diagnostic approach using non-invasive and bronchoscopic procedures

    Science.gov (United States)

    Rano, A; Agusti, C; Jimenez, P; Angrill, J; Benito, N; Danes, C; Gonzalez, J; Rovira, M; Pumarola, T; Moreno, A; Torres, A

    2001-01-01

    BACKGROUND—The development of pulmonary infiltrates is a frequent life threatening complication in immunocompromised patients, requiring early diagnosis and specific treatment. In the present study non-invasive and bronchoscopic diagnostic techniques were applied in patients with different non-HIV immunocompromised conditions to determine the aetiology of the pulmonary infiltrates and to evaluate the impact of these methods on therapeutic decisions and outcome in this population.
METHODS—The non-invasive diagnostic methods included serological tests, blood antigen detection, and blood, nasopharyngeal wash (NPW), sputum and tracheobronchial aspirate (TBAS) cultures. Bronchoscopic techniques included fibrobronchial aspirate (FBAS), protected specimen brush (PSB), and bronchoalveolar lavage (BAL). Two hundred consecutive episodes of pulmonary infiltrates were prospectively evaluated during a 30 month period in 52 solid organ transplant recipients, 53 haematopoietic stem cell transplant (HSCT) recipients, 68 patients with haematological malignancies, and 27 patients requiring chronic treatment with corticosteroids and/or immunosuppressive drugs.
RESULTS—An aetiological diagnosis was obtained in 162 (81%) of the 200 patients. The aetiology of the pulmonary infiltrates was infectious in 125 (77%) and non-infectious in 37 (23%); 38 (19%) remained undiagnosed. The main infectious aetiologies were bacterial (48/125, 24%), fungal (33/125, 17%), and viral (20/125, 10%), and the most frequent pathogens were Aspergillus fumigatus (n=29), Staphylococcus aureus (n=17), and Pseudomonas aeruginosa (n=12). Among the non-infectious aetiologies, pulmonary oedema (16/37, 43%) and diffuse alveolar haemorrhage (10/37, 27%) were the most common causes. Non-invasive techniques led to the diagnosis of pulmonary infiltrates in 41% of the cases in which they were used; specifically, the diagnostic yield of blood cultures was 30/191 (16%); sputum cultures 27/88 (31%); NPW 9/50 (18

  1. Diagnosis of Non-compacted Myocardium of the Left Ventricle in Children

    Directory of Open Access Journals (Sweden)

    I.B. Yershova

    2014-05-01

    Full Text Available The authors presented a review of published literature data on rare congenital abnormalities in children — a non-compacted myocardium of the left ventricle, which refers to unclassified cardiomyopathy. This pathology by the American Heart Association classification relates to genetic cardiomyopathy. Non-compacted myocardium of the left ventricle in children develops due to violation of myocardial induration of the fetus in utero. Diagnosis of the disease is difficult due to the lack of specific clinical signs. The authors also presented a clinical case of non-compacted left ventricular myocardium in 6-year-old girl.

  2. Diagnosis of toxoplasmosis and typing of Toxoplasma gondii.

    Science.gov (United States)

    Liu, Quan; Wang, Ze-Dong; Huang, Si-Yang; Zhu, Xing-Quan

    2015-05-28

    Toxoplasmosis, caused by the obligate intracellular protozoan Toxoplasma gondii, is an important zoonosis with medical and veterinary importance worldwide. The disease is mainly contracted by ingesting undercooked or raw meat containing viable tissue cysts, or by ingesting food or water contaminated with oocysts. The diagnosis and genetic characterization of T. gondii infection is crucial for the surveillance, prevention and control of toxoplasmosis. Traditional approaches for the diagnosis of toxoplasmosis include etiological, immunological and imaging techniques. Diagnosis of toxoplasmosis has been improved by the emergence of molecular technologies to amplify parasite nucleic acids. Among these, polymerase chain reaction (PCR)-based molecular techniques have been useful for the genetic characterization of T. gondii. Serotyping methods based on polymorphic polypeptides have the potential to become the choice for typing T. gondii in humans and animals. In this review, we summarize conventional non-DNA-based diagnostic methods, and the DNA-based molecular techniques for the diagnosis and genetic characterization of T. gondii. These techniques have provided foundations for further development of more effective and accurate detection of T. gondii infection. These advances will contribute to an improved understanding of the epidemiology, prevention and control of toxoplasmosis.

  3. Long-distance fiber optic sensing solutions for pipeline leakage, intrusion, and ground movement detection

    Science.gov (United States)

    Nikles, Marc

    2009-05-01

    An increasing number of pipelines are constructed in remote regions affected by harsh environmental conditions where pipeline routes often cross mountain areas which are characterized by unstable grounds and where soil texture changes between winter and summer increase the probability of hazards. Third party intentional interference or accidental intrusions are a major cause of pipeline failures leading to large leaks or even explosions. Due to the long distances to be monitored and the linear nature of pipelines, distributed fiber optic sensing techniques offer significant advantages and the capability to detect and localize pipeline disturbance with great precision. Furthermore pipeline owner/operators lay fiber optic cable parallel to transmission pipelines for telecommunication purposes and at minimum additional cost monitoring capabilities can be added to the communication system. The Brillouin-based Omnisens DITEST monitoring system has been used in several long distance pipeline projects. The technique is capable of measuring strain and temperature over 100's kilometers with meter spatial resolution. Dedicated fiber optic cables have been developed for continuous strain and temperature monitoring and their deployment along the pipeline has enabled permanent and continuous pipeline ground movement, intrusion and leak detection. This paper presents a description of the fiber optic Brillouin-based DITEST sensing technique, its measurement performance and limits, while addressing future perspectives for pipeline monitoring. The description is supported by case studies and illustrated by field data.

  4. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  5. Non-Destructive Techniques Based on Eddy Current Testing

    Science.gov (United States)

    García-Martín, Javier; Gómez-Gil, Jaime; Vázquez-Sánchez, Ernesto

    2011-01-01

    Non-destructive techniques are used widely in the metal industry in order to control the quality of materials. Eddy current testing is one of the most extensively used non-destructive techniques for inspecting electrically conductive materials at very high speeds that does not require any contact between the test piece and the sensor. This paper includes an overview of the fundamentals and main variables of eddy current testing. It also describes the state-of-the-art sensors and modern techniques such as multi-frequency and pulsed systems. Recent advances in complex models towards solving crack-sensor interaction, developments in instrumentation due to advances in electronic devices, and the evolution of data processing suggest that eddy current testing systems will be increasingly used in the future. PMID:22163754

  6. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...... the intersection of IDSs and blockchains. In particular, we introduce the background of intrusion detection and blockchain, discuss the applicability of blockchain to intrusion detection, and identify open challenges in this direction....

  7. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M.; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N.; Mazzoni, Elvis; Pappas, Ilias O.; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M. S.; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS. PMID:27994566

  8. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Directory of Open Access Journals (Sweden)

    Agata Błachnio

    2016-12-01

    Full Text Available The increase in the number of users of social networking sites has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2,628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Measure, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively and low context (positively; of the personality variables, conscientiousness and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of social networking sites (SNS.

  9. A novel non-invasive diagnostic sampling technique for cutaneous leishmaniasis.

    Directory of Open Access Journals (Sweden)

    Yasaman Taslimi

    2017-07-01

    Full Text Available Accurate diagnosis of cutaneous leishmaniasis (CL is important for chemotherapy and epidemiological studies. Common approaches for Leishmania detection involve the invasive collection of specimens for direct identification of amastigotes by microscopy and the culturing of promastigotes from infected tissues. Although these techniques are highly specific, they require highly skilled health workers and have the inherent risks of all invasive procedures, such as pain and risk of bacterial and fungal super-infection. Therefore, it is essential to reduce discomfort, potential infection and scarring caused by invasive diagnostic approaches especially for children. In this report, we present a novel non-invasive method, that is painless, rapid and user-friendly, using sequential tape strips for sampling and isolation of DNA from the surface of active and healed skin lesions of CL patients. A total of 119 patients suspected of suffering from cutaneous leishmaniasis with different clinical manifestations were recruited and samples were collected both from their lesions and from uninfected areas. In addition, 15 fungal-infected lesions and 54 areas of healthy skin were examined. The duration of sampling is short (less than one minute and species identification by PCR is highly specific and sensitive. The sequential tape stripping sampling method is a sensitive, non-invasive and cost-effective alternative to traditional diagnostic assays and it is suitable for field studies as well as for use in health care centers.

  10. Development of nuclear power plant diagnosis technique using neural networks

    International Nuclear Information System (INIS)

    Horiguchi, Masahiro; Fukawa, Naohiro; Nishimura, Kazuo

    1991-01-01

    A nuclear power plant diagnosis technique has been developed, called transient phenomena analysis, which employs neural network. The neural networks identify malfunctioning equipment by recognizing the pattern of main plant parameters, making it possible to locate the cause of an abnormality when a plant is in a transient state. In a case where some piece of equipment shows abnormal behavior, many plant parameters either directly or indirectly related to that equipment change simultaneously. When an abrupt change in a plant parameter is detected, changes in the 49 main plant parameters are classified into three types and a characteristic change pattern consisting of 49 data is defined. The neural networks then judge the cause of the abnormality from this pattern. This neural-network-based technique can recognize 100 patterns that are characterized by the causes of plant abnormality. (author)

  11. New device to measure dynamic intrusion/extrusion cycles of lyophobic heterogeneous systems.

    Science.gov (United States)

    Guillemot, Ludivine; Galarneau, Anne; Vigier, Gérard; Abensur, Thierry; Charlaix, Élisabeth

    2012-10-01

    Lyophobic heterogeneous systems (LHS) are made of mesoporous materials immersed in a non-wetting liquid. One application of LHS is the nonlinear damping of high frequency vibrations. The behaviour of LHS is characterized by P - ΔV cycles, where P is the pressure applied to the system, and ΔV its volume change due to the intrusion of the liquid into the pores of the material, or its extrusion out of the pores. Very few dynamic studies of LHS have been performed until now. We describe here a new apparatus that allows us to carry out dynamic intrusion/extrusion cycles with various liquid/porous material systems, controlling the temperature from ambient to 120 °C and the frequency from 0.01 to 20 Hz. We show that for two LHS: water/MTS and Galinstan/CPG, the energy dissipated during one cycle depends very weakly on the cycle frequency, in strong contrast to conventional dampers.

  12. Energy Efficient Monitoring for Intrusion Detection in Battery-Powered Wireless Mesh Networks

    KAUST Repository

    Hassanzadeh, Amin

    2011-07-18

    Wireless Mesh Networks (WMN) are easy-to-deploy, low cost solutions for providing networking and internet services in environments with no network infrastructure, e.g., disaster areas and battlefields. Since electric power is not readily available in such environments battery-powered mesh routers, operating in an energy efficient manner, are required. To the best of our knowledge, the impact of energy efficient solutions, e.g., involving duty-cycling, on WMN intrusion detection systems, which require continuous monitoring, remains an open research problem. In this paper we propose that carefully chosen monitoring mesh nodes ensure continuous and complete detection coverage, while allowing non-monitoring mesh nodes to save energy through duty-cycling. We formulate the monitoring node selection problem as an optimization problem and propose distributed and centralized solutions for it, with different tradeoffs. Through extensive simulations and a proof-of-concept hardware/software implementation we demonstrate that our solutions extend the WMN lifetime by 8%, while ensuring, at the minimum, a 97% intrusion detection rate.

  13. U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland

    DEFF Research Database (Denmark)

    Þórarinsson, Sigurjón Böðvar; Holm, Paul Martin; Tappe, Sebatstian

    2016-01-01

    Several major tholeiitic (e.g. the Skaergaard intrusion) and alkaline (e.g. the Kangerlussuaq Syenite) intrusive complexes of the North Atlantic Large Igneous Province are exposed along the Kangerlussuaq Fjord in East Greenland. The Kærven Complex forms a satellite intrusion to the Kangerlussuaq ...

  14. [Clinical guidelines for diagnosis, treatment and monitoring of patients with non-invasive breast cancer].

    Science.gov (United States)

    Brnijć, Zoran; Brkljacić, Boris; Drinković, Ivan; Jakić-Razumović, Jasminka; Kardum-Skelin, Ika; Krajina, Zdenko; Margaritoni, Marko; Strnad, Marija; Sarcević, Bozena; Tomić, Snjezana; Zic, Rado

    2012-01-01

    Breast cancer is the most common malignancy in women. Early diagnosis and more effective treatment of invasive breast cancer resulted in significant mortality reduction, improvement of survival and the quality of life of the patients. The management od non-invasive breast cancer, on the contrary, is still controversial and the problem of overdiagnosis and overtreatment of patients come to evidence. In the following text a multidisciplinary team of experts brings the first consensus guidelines aimed to standardize and optimize the criteria and management in diagnosis, treatment and monitoring of non-invasive breast cancer patients in the Republic of Croatia.

  15. Diagnosis of gluten related disorders: Celiac disease, wheat allergy and non-celiac gluten sensitivity.

    Science.gov (United States)

    Elli, Luca; Branchi, Federica; Tomba, Carolina; Villalta, Danilo; Norsa, Lorenzo; Ferretti, Francesca; Roncoroni, Leda; Bardella, Maria Teresa

    2015-06-21

    Cereal crops and cereal consumption have had a vital role in Mankind's history. In the recent years gluten ingestion has been linked with a range of clinical disorders. Gluten-related disorders have gradually emerged as an epidemiologically relevant phenomenon with an estimated global prevalence around 5%. Celiac disease, wheat allergy and non-celiac gluten sensitivity represent different gluten-related disorders. Similar clinical manifestations can be observed in these disorders, yet there are peculiar pathogenetic pathways involved in their development. Celiac disease and wheat allergy have been extensively studied, while non-celiac gluten sensitivity is a relatively novel clinical entity, believed to be closely related to other gastrointestinal functional syndromes. The diagnosis of celiac disease and wheat allergy is based on a combination of findings from the patient's clinical history and specific tests, including serology and duodenal biopsies in case of celiac disease, or laboratory and functional assays for wheat allergy. On the other hand, non-celiac gluten sensitivity is still mainly a diagnosis of exclusion, in the absence of clear-cut diagnostic criteria. A multimodal pragmatic approach combining findings from the clinical history, symptoms, serological and histological tests is required in order to reach an accurate diagnosis. A thorough knowledge of the differences and overlap in clinical presentation among gluten-related disorders, and between them and other gastrointestinal disorders, will help clinicians in the process of differential diagnosis.

  16. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  17. Gross community production and metabolic balance in the South Pacific Gyre, using a non intrusive bio-optical method

    Directory of Open Access Journals (Sweden)

    H. Claustre

    2008-03-01

    Full Text Available The very clear waters of the South Pacific Gyre likely constitute an end-member of oligotrophic conditions which remain essentially unknown with respect to its impact on carbon fixation and exportation. We describe a non-intrusive bio-optical method to quantify the various terms of a production budget (Gross community production, community losses, net community production in this area. This method is based on the analysis of the diel cycle in Particulate Organic Carbon (POC, derived from high frequency measurements of the particle attenuation coefficient cp. We report very high integrated rates of Gross Community Production within the euphotic layer (average of 846±484 mg C m−2 d−1 for 17 stations that are far above any rates determined using incubation techniques for such areas. Furthermore we show that the daily production of POC is essentially balanced by the losses so that the system cannot be considered as net heterotrophic. Our results thus agree well with geochemical methods, but not with incubation studies based on oxygen methods. We stress to the important role of deep layers, below the euphotic layer, in contributing to carbon fixation when incident irradiance at the ocean surface is high (absence of cloud coverage. These deep layers, not considered up to know, might fuel part of the heterotrophic processes in the upper layer, including through dissolved organic carbon. We further demonstrate that, in these extremely clear and stratified waters, integrated gross community production is proportional to the POC content and surface irradiance via an efficiency index ψ GCP*, the water column cross section for Gross Community Production. We finally discuss our results in the context of the role of oligotrophic gyre in the global carbon budget and of the possibility of using optical proxies from space for the development of growth community rather than primary production

  18. Disparities in cancer stage at diagnosis and survival of Aboriginal and non-Aboriginal South Australians.

    Science.gov (United States)

    Banham, David; Roder, David; Keefe, Dorothy; Farshid, Gelareh; Eckert, Marion; Cargo, Margaret; Brown, Alex

    2017-06-01

    This study tested the utility of retrospectively staging cancer registry data for comparing stage and stage-specific survivals of Aboriginal and non-Aboriginal people. Differences by area level factors were also explored. This test dataset comprised 950 Aboriginal cases and all other cases recorded on the South Australian cancer registry with a 1977-2010 diagnosis. A sub-set of 777 Aboriginal cases diagnosed in 1990-2010 were matched with randomly selected non-Aboriginal cases by year of birth, diagnostic year, sex, and primary site of cancer. Competing risk regression summarised associations of Aboriginal status, stage, and geographic attributes with risk of cancer death. Aboriginal cases were 10 years younger at diagnosis, more likely to present in recent diagnostic years, to be resident of remote areas, and have primary cancer sites of head & neck, lung, liver and cervix. Risk of cancer death was associated in the matched analysis with more advanced stage at diagnosis. More Aboriginal than non-Aboriginal cases had distant metastases at diagnosis (31.3% vs 22.0, pAboriginal residents had higher risks of cancer death than Aboriginal residents of metropolitan areas. Non-Aboriginal cases had the lowest risk of cancer death. Retrospective staging proved to be feasible using registry data. Results indicated more advanced stages for Aboriginal than matched non-Aboriginal cases. Aboriginal people had higher risks of cancer death, which persisted after adjusting for stage, and applied irrespective of remoteness of residence, with highest risk of death occurring among Aboriginal people from remote areas. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  20. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  1. Association between intrusive negative autobiographical memories and depression: A meta-analytic investigation.

    Science.gov (United States)

    Mihailova, Stella; Jobson, Laura

    2018-02-23

    The study investigated several associations between depression and intrusive negative autobiographical memories. A systematic literature search identified 23 eligible studies (N = 2,582), which provided 59 effect sizes. Separate meta-analyses indicated that depression was moderately, positively associated with intrusive memory frequency, memory distress, maladaptive memory appraisals, memory avoidance, and memory rumination. Intrusive memory vividness was not significantly associated with depression. There were insufficient data to examine the relationship between depression and memory vantage perspective. Between-study heterogeneity was high for intrusive memory frequency and memory avoidance, and the percentage of females in studies significantly moderated the relationship between these variables and depression. An additional exploratory meta-analysis (3 studies; N = 257) indicated that intrusive memories were experienced more frequently by those with posttraumatic stress disorder than those with depression. Overall, the findings suggest that intrusive memories warrant clinical attention as they may contribute to the maintenance of depressive symptomatology. Copyright © 2018 John Wiley & Sons, Ltd.

  2. Intensively exploited Mediterranean aquifers: resilience and proximity to critical points of seawater intrusion

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2013-11-01

    We investigate here seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta Aquifer, the Israel Coastal Aquifer and the Cyprus Akrotiri Aquifer. Using a generalized analytical sharp-interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future sea intrusion forcings. We identify two different critical limits of sea intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete sea intrusion upto the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that sea intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that the advance of seawater currently seriously threatens the Nile Delta Aquifer and the Israel Coastal Aquifer. The Cyprus Akrotiri Aquifer is currently somewhat less threatened by increased seawater intrusion.

  3. Intensively exploited Mediterranean aquifers: resilience to seawater intrusion and proximity to critical thresholds

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2014-05-01

    We investigate seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta, Israel Coastal and Cyprus Akrotiri aquifers. Using a generalized analytical sharp interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future seawater intrusion forcings. We identify two different critical limits of seawater intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete seawater intrusion up to the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that seawater intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that (a) the intruding seawater currently seriously threatens the Nile Delta aquifer, (b) in the Israel Coastal aquifer the sharp interface toe approaches the well location and (c) the Cyprus Akrotiri aquifer is currently somewhat less threatened by increased seawater intrusion.

  4. The diagnosis and treatment of non-occlusive gut ischaemia. Aktueller Stand der Diagnostik und Therapie der nicht-okklusiven Darmischaemie (NOD)

    Energy Technology Data Exchange (ETDEWEB)

    Schindler, G.; Bruch, H.P. (Wuerzburg Univ. (Germany). Abt. fuer Roentgendiagnostik Wuerzburg Univ. (Germany). Chirurgische Universitaetsklinik)

    1991-08-01

    Non-occlusive gut ischaemia is a disease of advanced age. Its causes are reduced cardiac output or shock, facilitated by digitalis, adrenaline, ergotamine and diuretics. The persisting microcirculation and development of gut necrois leads to an increase in certain serum enzymes, such as lactate, LDH and CK-NB. The early application of mesenteric angiography using a DSA technique reveals four grades of under-perfusion. Early and correct diagnosis of the disease should lead to intra-arterial treatment with prostaglandin. In 10 out of 42 cases, conservative therapy led to re-perfusion of the gut. (orig.).

  5. Hazard Models From Periodic Dike Intrusions at Kı¯lauea Volcano, Hawai`i

    Science.gov (United States)

    Montgomery-Brown, E. K.; Miklius, A.

    2016-12-01

    The persistence and regular recurrence intervals of dike intrusions in the East Rift Zone (ERZ) of Kı¯lauea Volcano lead to the possibility of constructing a time-dependent intrusion hazard model. Dike intrusions are commonly observed in Kı¯lauea Volcano's ERZ and can occur repeatedly in regions that correlate with seismic segments (sections of rift seismicity with persistent definitive lateral boundaries) proposed by Wright and Klein (USGS PP1806, 2014). Five such ERZ intrusions have occurred since 1983 with inferred locations downrift of the bend in Kı¯lauea's ERZ, with the first (1983) being the start of the ongoing ERZ eruption. The ERZ intrusions occur on one of two segments that are spatially coincident with seismic segments: Makaopuhi (1993 and 2007) and Nāpau (1983, 1997, and 2011). During each intrusion, the amount of inferred dike opening was between 2 and 3 meters. The times between ERZ intrusions for same-segment pairs are all close to 14 years: 14.07 (1983-1997), 14.09 (1997-2011), and 13.95 (1993-2007) years, with the Nāpau segment becoming active about 3.5 years after the Makaopuhi segment in each case. Four additional upper ERZ intrusions are also considered here. Dikes in the upper ERZ have much smaller opening ( 10 cm), and have shorter recurrence intervals of 8 years with more variability. The amount of modeled dike opening during each of these events roughly corresponds to the amount of seaward south flank motion and deep rift opening accumulated in the time between events. Additionally, the recurrence interval of 14 years appears to be unaffected by the magma surge of 2003-2007, suggesting that flank motion, rather than magma supply, could be a controlling factor in the timing and periodicity of intrusions. Flank control over the timing of magma intrusions runs counter to the historical research suggesting that dike intrusions at Kı¯lauea are driven by magma overpressure. This relatively free sliding may have resulted from decreased

  6. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  7. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  8. Multisensor Fusion for Intrusion Detection and Situational Awareness

    OpenAIRE

    Hallstensen, Christoffer V

    2017-01-01

    Cybercrime damage costs the world several trillion dollars annually. And al-though technical solutions to protect organizations from hackers are being con-tinuously developed, criminals learn fast to circumvent them. The question is,therefore, how to create leverage to protect an organization by improving in-trusion detection and situational awareness? This thesis seeks to contribute tothe prior art in intrusion detection and situational awareness by using a multi-sensor data fusion...

  9. When Intrusion Detection Meets Blockchain Technology: A Review

    OpenAIRE

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju; Wang, Yu; Han, Jinguang

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness ...

  10. Damage assessment using advanced non-intrusive inspection methods: integration of space, UAV, GPR, and field spectroscopy

    Science.gov (United States)

    Themistocleous, Kyriacos; Neocleous, Kyriacos; Pilakoutas, Kypros; Hadjimitsis, Diofantos G.

    2014-08-01

    The predominant approach for conducting road condition surveys and analyses is still largely based on extensive field observations. However, visual assessment alone cannot identify the actual extent and severity of damage. New non-invasive and cost-effective non-destructive (NDT) remote sensing technologies can be used to monitor road pavements across their life cycle, including remotely sensed aerial and satellite visual and thermal image (AI) data, Unmanned Aerial Vehicles (UAVs), Spectroscopy and Ground Penetrating Radar (GRP). These non-contact techniques can be used to obtain surface and sub-surface information about damage in road pavements, including the crack depth, and in-depth structural failure. Thus, a smart and cost-effective methodology is required that integrates several of these non-destructive/ no-contact techniques for the damage assessment and monitoring at different levels. This paper presents an overview of how an integration of the above technologies can be used to conduct detailed road condition surveys. The proposed approach can also be used to predict the future needs for road maintenance; this information is proven to be valuable to a strategic decision making tools that optimizes maintenance based on resources and environmental issues.

  11. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes

    Science.gov (United States)

    L., Passarelli; E., Rivalta; A., Shuler

    2014-01-01

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process. PMID:24469260

  12. Invasive candidiasis: future directions in non-culture based diagnosis.

    Science.gov (United States)

    Posch, Wilfried; Heimdörfer, David; Wilflingseder, Doris; Lass-Flörl, Cornelia

    2017-09-01

    Delayed initial antifungal therapy is associated with high mortality rates caused by invasive candida infections, since accurate detection of the opportunistic pathogenic yeast and its identification display a diagnostic challenge. diagnosis of candida infections relies on time-consuming methods such as blood cultures, serologic and histopathologic examination. to allow for fast detection and characterization of invasive candidiasis, there is a need to improve diagnostic tools. trends in diagnostics switch to non-culture-based methods, which allow specified diagnosis within significantly shorter periods of time in order to provide early and appropriate antifungal treatment. Areas covered: within this review comprise novel pathogen- and host-related testing methods, e.g. multiplex-PCR analyses, T2 magnetic resonance, fungus-specific DNA microarrays, microRNA characterization or analyses of IL-17 as biomarker for early detection of invasive candidiasis. Expert commentary: Early recognition and diagnosis of fungal infections is a key issue for improved patient management. As shown in this review, a broad range of novel molecular based tests for the detection and identification of Candida species is available. However, several assays are in-house assays and lack standardization, clinical validation as well as data on sensitivity and specificity. This underscores the need for the development of faster and more accurate diagnostic tests.

  13. Compensation techniques for non-linearities in H-bridge inverters

    Directory of Open Access Journals (Sweden)

    Daniel Zammit

    2016-12-01

    Full Text Available This paper presents compensation techniques for component non-linearities in H-bridge inverters as those used in grid-connected photovoltaic (PV inverters. Novel compensation techniques depending on the switching device current were formulated to compensate for the non-linearities in inverter circuits caused by the voltage drops on the switching devices. Both simulation and experimental results will be presented. Testing was carried out on a PV inverter which was designed and constructed for this research. Very satisfactory results were obtained from all the compensation techniques presented, however the exact compensation method was the most effective, providing the highest reduction in harmonics.

  14. Efficient cooling of rocky planets by intrusive magmatism

    Science.gov (United States)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  15. Bi-spectrum based-EMD applied to the non-stationary vibration signals for bearing faults diagnosis.

    Science.gov (United States)

    Saidi, Lotfi; Ali, Jaouher Ben; Fnaiech, Farhat

    2014-09-01

    Empirical mode decomposition (EMD) has been widely applied to analyze vibration signals behavior for bearing failures detection. Vibration signals are almost always non-stationary since bearings are inherently dynamic (e.g., speed and load condition change over time). By using EMD, the complicated non-stationary vibration signal is decomposed into a number of stationary intrinsic mode functions (IMFs) based on the local characteristic time scale of the signal. Bi-spectrum, a third-order statistic, helps to identify phase coupling effects, the bi-spectrum is theoretically zero for Gaussian noise and it is flat for non-Gaussian white noise, consequently the bi-spectrum analysis is insensitive to random noise, which are useful for detecting faults in induction machines. Utilizing the advantages of EMD and bi-spectrum, this article proposes a joint method for detecting such faults, called bi-spectrum based EMD (BSEMD). First, original vibration signals collected from accelerometers are decomposed by EMD and a set of IMFs is produced. Then, the IMF signals are analyzed via bi-spectrum to detect outer race bearing defects. The procedure is illustrated with the experimental bearing vibration data. The experimental results show that BSEMD techniques can effectively diagnosis bearing failures. Copyright © 2014 ISA. Published by Elsevier Ltd. All rights reserved.

  16. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  17. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  18. Towards Effective Network Intrusion Detection: A Hybrid Model Integrating Gini Index and GBDT with PSO

    Directory of Open Access Journals (Sweden)

    Longjie Li

    2018-01-01

    Full Text Available In order to protect computing systems from malicious attacks, network intrusion detection systems have become an important part in the security infrastructure. Recently, hybrid models that integrating several machine learning techniques have captured more attention of researchers. In this paper, a novel hybrid model was proposed with the purpose of detecting network intrusion effectively. In the proposed model, Gini index is used to select the optimal subset of features, the gradient boosted decision tree (GBDT algorithm is adopted to detect network attacks, and the particle swarm optimization (PSO algorithm is utilized to optimize the parameters of GBDT. The performance of the proposed model is experimentally evaluated in terms of accuracy, detection rate, precision, F1-score, and false alarm rate using the NSL-KDD dataset. Experimental results show that the proposed model is superior to the compared methods.

  19. USBcat - Towards an Intrusion Surveillance Toolset

    Directory of Open Access Journals (Sweden)

    Chris Chapman

    2014-10-01

    Full Text Available This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by observing the behaviour and communications of the intruder. Subsequently a more complete picture of the attacker's identity, objectives, capabilities, and infiltration could be formulated than is possible with present technologies. This research focused on developing an extensible framework to permit the covert investigation of malware. Additionally, a Universal Serial Bus (USB Mass Storage Device (MSD based covert channel was designed to enable remote command and control of the framework. The work was validated through the design, implementation and testing of a toolset.

  20. Diagnosis of gluten related disorders: Celiac disease, wheat allergy and non-celiac gluten sensitivity

    Science.gov (United States)

    Elli, Luca; Branchi, Federica; Tomba, Carolina; Villalta, Danilo; Norsa, Lorenzo; Ferretti, Francesca; Roncoroni, Leda; Bardella, Maria Teresa

    2015-01-01

    Cereal crops and cereal consumption have had a vital role in Mankind’s history. In the recent years gluten ingestion has been linked with a range of clinical disorders. Gluten-related disorders have gradually emerged as an epidemiologically relevant phenomenon with an estimated global prevalence around 5%. Celiac disease, wheat allergy and non-celiac gluten sensitivity represent different gluten-related disorders. Similar clinical manifestations can be observed in these disorders, yet there are peculiar pathogenetic pathways involved in their development. Celiac disease and wheat allergy have been extensively studied, while non-celiac gluten sensitivity is a relatively novel clinical entity, believed to be closely related to other gastrointestinal functional syndromes. The diagnosis of celiac disease and wheat allergy is based on a combination of findings from the patient’s clinical history and specific tests, including serology and duodenal biopsies in case of celiac disease, or laboratory and functional assays for wheat allergy. On the other hand, non-celiac gluten sensitivity is still mainly a diagnosis of exclusion, in the absence of clear-cut diagnostic criteria. A multimodal pragmatic approach combining findings from the clinical history, symptoms, serological and histological tests is required in order to reach an accurate diagnosis. A thorough knowledge of the differences and overlap in clinical presentation among gluten-related disorders, and between them and other gastrointestinal disorders, will help clinicians in the process of differential diagnosis. PMID:26109797

  1. Nuclear power plant monitoring and fault diagnosis methods based on the artificial intelligence technique

    International Nuclear Information System (INIS)

    Yoshikawa, S.; Saiki, A.; Ugolini, D.; Ozawa, K.

    1996-01-01

    The main objective of this paper is to develop an advanced diagnosis system based on the artificial intelligence technique to monitor the operation and to improve the operational safety of nuclear power plants. Three different methods have been elaborated in this study: an artificial neural network local diagnosis (NN ds ) scheme that acting at the component level discriminates between normal and abnormal transients, a model-based diagnostic reasoning mechanism that combines a physical causal network model-based knowledge compiler (KC) that generates applicable diagnostic rules from widely accepted physical knowledge compiler (KC) that generates applicable diagnostic rules from widely accepted physical knowledge. Although the three methods have been developed and verified independently, they are highly correlated and, when connected together, form a effective and robust diagnosis and monitoring tool. (authors)

  2. Techniques for Non-Invasive Monitoring of Arterial Blood Pressure

    Directory of Open Access Journals (Sweden)

    Agnes S. Meidert

    2018-01-01

    Full Text Available Since both, hypotension and hypertension, can potentially impair the function of vital organs such as heart, brain, or kidneys, monitoring of arterial blood pressure (BP is a mainstay of hemodynamic monitoring in acutely or critically ill patients. Arterial BP can either be obtained invasively via an arterial catheter or non-invasively. Non-invasive BP measurement provides either intermittent or continuous readings. Most commonly, an occluding upper arm cuff is used for intermittent non-invasive monitoring. BP values are then obtained either manually (by auscultation of Korotkoff sounds or palpation or automatically (e.g., by oscillometry. For continuous non-invasive BP monitoring, the volume clamp method or arterial applanation tonometry can be used. Both techniques enable the arterial waveform and BP values to be obtained continuously. This article describes the different techniques for non-invasive BP measurement, their advantages and limitations, and their clinical applicability.

  3. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  4. Early diagnosis of asthma in young children by using non-invasive biomarkers of airway inflammation and early lung function measurements: study protocol of a case-control study

    Science.gov (United States)

    van de Kant, Kim DG; Klaassen, Ester MM; Jöbsis, Quirijn; Nijhuis, Annedien J; van Schayck, Onno CP; Dompeling, Edward

    2009-01-01

    Background Asthma is the most common chronic disease in childhood, characterized by chronic airway inflammation. There are problems with the diagnosis of asthma in young children since the majority of the children with recurrent asthma-like symptoms is symptom free at 6 years, and does not have asthma. With the conventional diagnostic tools it is not possible to differentiate between preschool children with transient symptoms and children with asthma. The analysis of biomarkers of airway inflammation in exhaled breath is a non-invasive and promising technique to diagnose asthma and monitor inflammation in young children. Moreover, relatively new lung function tests (airway resistance using the interrupter technique) have become available for young children. The primary objective of the ADEM study (Asthma DEtection and Monitoring study), is to develop a non-invasive instrument for an early asthma diagnosis in young children, using exhaled inflammatory markers and early lung function measurements. In addition, aetiological factors, including gene polymorphisms and gene expression profiles, in relation to the development of asthma are studied. Methods/design A prospective case-control study is started in 200 children with recurrent respiratory symptoms and 50 control subjects without respiratory symptoms. At 6 years, a definite diagnosis of asthma is made (primary outcome measure) on basis of lung function assessments and current respiratory symptoms ('golden standard'). From inclusion until the definite asthma diagnosis, repeated measurements of lung function tests and inflammatory markers in exhaled breath (condensate), blood and faeces are performed. The study is registered and ethically approved. Discussion This article describes the study protocol of the ADEM study. The new diagnostic techniques applied in this study could make an early diagnosis of asthma possible. An early and reliable asthma diagnosis at 2–3 years will have consequences for the management of

  5. Licensing of non intrusive inspection equipment s for load and passengers vehicles that use X rays with energies up to 9 MeV. Mexican experience

    International Nuclear Information System (INIS)

    Munoz M, G. A.; Jimenez C, I.

    2013-10-01

    In the last years and like part of the extensive program of national security, in Mexico have been introduced a great quantity of non intrusive inspection equipment s for load and passengers vehicles that use X rays up to 9 MeV. Due to the great variety of equipment s, the Comision Nacional de Seguridad Nuclear y Salvaguardias (Mexican regulator organ) has established specific guidelines for their licensing and use supervision. In this work the adopted guidelines are exposed in the technical and administrative evaluation for the later licensing of these equipment s. Relative particular questions to the site of these equipment s and the impact in the public opinion that their use can generate are discussed. (author)

  6. Usefulness of percutaneous elastography by acoustic radiation force impulse for the non-invasive diagnosis of chronic pancreatitis

    Directory of Open Access Journals (Sweden)

    Camilo Julio Llamoza-Torres

    Full Text Available Objective: To determine the accuracy of the acoustic radiation force impulse (ARFI technique for the diagnosis of chronic pancreatitis. Materials and methods: We present an observational, single-center study that included patients with suspected chronic pancreatitis in the period between October 2012 and September 2015 who underwent endoscopic ultrasound (EUS and were classified according to the standard and Rosemont criteria. The same group of patients was assessed by the ARFI technology using ACUSON S2000™ equipment with Virtual Touch™ Quantification software for the assessment of pancreatic stiffness by obtaining the shear wave velocity (SWV in the head, body and tail of the pancreas. Data were analyzed using ANOVA and nonparametric correlation methods. Diagnostic accuracy was obtained by analyzing receiver operating characteristic (ROC curve. Results: A total of thirty-three patients were studied (45.5% women; mean age was 58.3 ± 11.8 years. Seventeen with a diagnosis of chronic pancreatitis and sixteen classified as normal according to standard criteria. A significant difference was detected between the means of SWV in pancreatic body of patients without (SWV: 1.27 m/s and with chronic pancreatitis (SWV 1.57 m/s, p = 0.037. The area under the ROC curve was 71.3% (95% CI 0.532-0.895 and the accuracy of ARFI for diagnosing chronic pancreatitis was 69.7% for a SWV of 1.4 m/s in the pancreatic body. The SWV means in head (r = 0.421, p < 0.05 and body (r = 0.455, p < 0.05 of the pancreas showed a significant correlation with the number of EUS criteria for chronic pancreatitis. Conclusion: Quantification of pancreatic stiffness with ARFI elastography technique has proven to be useful for the non-invasive diagnosis of chronic pancreatitis.

  7. Black-blood thrombus imaging (BTI): a contrast-free cardiovascular magnetic resonance approach for the diagnosis of non-acute deep vein thrombosis.

    Science.gov (United States)

    Xie, Guoxi; Chen, Hanwei; He, Xueping; Liang, Jianke; Deng, Wei; He, Zhuonan; Ye, Yufeng; Yang, Qi; Bi, Xiaoming; Liu, Xin; Li, Debiao; Fan, Zhaoyang

    2017-01-18

    Deep vein thrombosis (DVT) is a common but elusive illness that can result in long-term disability or death. Accurate detection of thrombosis and assessment of its size and distribution are critical for treatment decision-making. In the present study, we sought to develop and evaluate a cardiovascular magnetic resonance (CMR) black-blood thrombus imaging (BTI) technique, based on delay alternating with nutation for tailored excitation black-blood preparation and variable flip angle turbo-spin-echo readout, for the diagnosis of non-acute DVT. METHODS: This prospective study was approved by institutional review board and informed consent obtained from all subjects. BTI was first conducted in 11 healthy subjects for parameter optimization and then conducted in 18 non-acute DVT patients to evaluate its diagnostic performance. Two clinically used CMR techniques, contrast-enhanced CMR venography (CE-MRV) and three dimensional magnetization prepared rapid acquisition gradient echo (MPRAGE), were also conducted in all patients for comparison. All images obtained from patients were analyzed on a per-segment basis. Using the consensus diagnosis of CE-MRV as the reference, the sensitivity (SE), specificity (SP), positive and negative predictive values (PPV and NPV), and accuracy (ACC) of BTI and MPRAGE as well as their diagnostic agreement with CE-MRV were calculated. Besides, diagnostic confidence and interreader diagnostic agreement were evaluated for all three techniques. BTI with optimized parameters effectively nulled the venous blood flow signal and allowed directly visualizing the thrombus within the black-blood lumen. Higher SE (90.4% vs 67.6%), SP (99.0% vs. 97.4%), PPV (95.4% vs. 85.6%), NPV (97.8% vs 92.9%) and ACC (97.4% vs. 91.8%) were obtained by BTI in comparison with MPRAGE. Good diagnostic confidence and excellent diagnostic and interreader agreements were achieved by BTI, which were superior to MPRAGE on detecting the chronic thrombus. BTI allows

  8. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  9. Integral Analysis of Field Work and Laboratory Electrical Resistivity Imaging for Saline Water Intrusion Prediction in Groundwater

    Science.gov (United States)

    Zawawi, M. H.; Zahar, M. F.; Hashim, M. M. M.; Hazreek, Z. A. M.; Zahari, N. M.; Kamaruddin, M. A.

    2018-04-01

    Saline water intrusion is a serious threat to the groundwater as many part of the world utilize groundwater as their main source of fresh water supply. The usage of high salinity level of water as drinking water can lead to a very serious health hazard towards human. Saline water intrusion is a process by which induced flow of seawater into freshwater aquifer along the coastal area. It might happen due to human action and/or by natural event. The climate change and rise up of sea level may speed up the saline water intrusion process. The conventional method for distinguishing and checking saltwater interference to groundwater along the coast aquifers is to gather and test the groundwater from series of observation wells (borehole) with an end goal to give the important information about the hydrochemistry data to conclude whether the water in the well are safe to consume or not. An integrated approach of field and laboratory electrical resistivity investigation is proposed for indicating the contact region between saline and fresh groundwater. It was found that correlation for both soilbox produced almost identical curvilinear trends for 2% increment of seawater tested using sand sample. This project contributes towards predicting the saline water intrusion to the groundwater by non-destructive test that can replaced the conventional method of groundwater monitoring using series of boreholes in the coastal area

  10. Comparison of non-invasive tear film stability measurement techniques.

    Science.gov (United States)

    Wang, Michael Tm; Murphy, Paul J; Blades, Kenneth J; Craig, Jennifer P

    2018-01-01

    Measurement of tear film stability is commonly used to give an indication of tear film quality but a number of non-invasive techniques exists within the clinical setting. This study sought to compare three non-invasive tear film stability measurement techniques: instrument-mounted wide-field white light clinical interferometry, instrument-mounted keratoscopy and hand-held keratoscopy. Twenty-two subjects were recruited in a prospective, randomised, masked, cross-over study. Tear film break-up or thinning time was measured non-invasively by independent experienced examiners, with each of the three devices, in a randomised order, within an hour. Significant correlation was observed between instrument-mounted interferometric and keratoscopic measurements (p 0.05). Tear film stability values obtained from the hand-held device were significantly shorter and demonstrated narrower spread than the other two instruments (all p 0.05). Good clinical agreement exists between the instrument-mounted interferometric and keratoscopic measurements but not between the hand-held device and either of the instrument-mounted techniques. The results highlight the importance of specifying the instrument employed to record non-invasive tear film stability. © 2017 Optometry Australia.

  11. Contrast-enhanced Ultrasound for Non-tumor Liver Diseases

    Directory of Open Access Journals (Sweden)

    H Maruyama

    2012-03-01

    Full Text Available Contrast-enhanced ultrasound (CEUS is a simple, safe and reliable technique for the clinical management of patients with various liver diseases. Although the major target of the technique may be focal hepatic lesions, it is also effective for the diagnosis of non-tumor liver diseases, such as grading hepatic fibrosis, characterization of chronic liver diseases and diagnosis of portal vein thrombosis. This review article aimed to overview the recent application of CEUS in the assessment of non-tumor liver diseases. Keywords: Cirrhosis, contrast agent, fibrosis, idiopathic portal hypertension, microbubble, portal vein thrombosis, ultrasound.

  12. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  13. Alpha intrusion on ovenight polysomnogram

    Directory of Open Access Journals (Sweden)

    Nahapetian R

    2014-06-01

    Full Text Available No abstract available. Article truncated after 150 words. A 30 year-old Army veteran with a past medical history significant for chronic lumbar back pain stemming from a fall-from-height injury sustained in 2006 was referred to the sleep laboratory for evaluation of chronic fatigue and excessive daytime hypersomnolence. His Epworth sleepiness scale score was 16. He denied a history of snoring and witnessed apnea. Body Mass Index (BMI was 25.7 kg/m2. His main sleep related complaints were frequent nocturnal arousals, poor sleep quality, un-refreshing sleep, prolonged latency to sleep onset, and nightmares. An In-lab attended diagnostic polysomnogram was performed. Sleep efficiency was reduced (73% and overall arousal index was not significantly elevated (3.2 events/hour. The sleep study showed rapid eye movement (REM related sleep disordered breathing that did not meet diagnostic criteria for sleep apnea. There was no evidence for period limb movement disorder. However, the study was significant for alpha wave intrusion in stage N2 non-REM and stage ...

  14. Techniques of DNA hybridization detect small numbers of mycobacteria with no cross-hybridization with non-mycobacterial respiratory organisms

    International Nuclear Information System (INIS)

    Shoemaker, S.A.; Fisher, J.H.; Scoggin, C.H.

    1985-01-01

    The traditional methods used in identifying mycobacteria, such as acid-fast bacillus stains and culture, are often time-consuming, insensitive, and nonspecific. As part of an ongoing program to improve diagnosis and characterization of mycobacteria, the authors have found that deoxyribonucleic acid (DNA) hybridization techniques using isotopically labeled, single-stranded, total DNA can be used to detect as little as 10(-4) micrograms of Mycobacterium tuberculosis (MTb) DNA. This amount of DNA represents approximately 2 X 10(4) genomes. They have also shown the MTb DNA is sufficiently different from the DNA of non-mycobacterial microorganisms such that cross-hybridization with MTb DNA does not occur under the hybridization conditions employed. The authors speculate that DNA hybridization techniques may allow the rapid, sensitive, and specific identification of mycobacteria

  15. Diagnosis and Management of Gastroenteropathy Asssociated to Non-steroidal Anti-Inflammatory Drugs

    Directory of Open Access Journals (Sweden)

    Stella Ilone

    2016-09-01

    Full Text Available Non-steroidal anti-inflammatory drugs (NSAIDs is a group of drugs used to treat pain, inflammation, and fever. High consumption of NSAIDs associated with high gastrointestinal side effects. Common complaint from patients, which ranging from mild heartburn to the onset of gastrointestinal bleeding, often complicates the adequate administration of NSAIDs. Various methods have been developed to reduce the likelihood of gastroenteropathy complication. Early diagnosis, appropriate prompt treatment, as well as adequate monitoring will reduce morbidity and mortality from complications due to NSAIDs. This paper will discuss the diagnosis and management of gastro-enteropathy NSAID through approaching the underlying pathophysiology.

  16. Review on assessment methodology for human intrusion into a repository for radioactive waste

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility

  17. Review on assessment methodology for human intrusion into a repository for radioactive waste

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-09-15

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility.

  18. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  19. Identification of saline water intrusion in part of Cauvery deltaic region, Tamil Nadu, Southern India: using GIS and VES methods

    Science.gov (United States)

    Gnanachandrasamy, G.; Ramkumar, T.; Venkatramanan, S.; Chung, S. Y.; Vasudevan, S.

    2016-06-01

    We use electrical resistivity data arrayed in a 2715 km2 region with 30 locations to identify the saline water intrusion zone in part of Cauvery deltaic region, offshore Eastern India. From this dataset we are able to derive information on groundwater quality, thickness of aquifer zone, structural and stratigraphic conditions relevant to groundwater conditions, and permeability of aquifer systems. A total of 30 vertical electrode soundings (VES) were carried out by Schlumberger electrode arrangement to indicate complete lithology of this region using curve matching techniques. The electrical soundings exhibited that H and HK type curves were suitable for 16 shallow locations, and QH, KQ, K, KH, QQ, and HA curves were fit for other location. Low resistivity values suggested that saline water intrusion occurred in this region. According to final GIS map, most of the region was severely affected by seawater intrusion due to the use of over-exploitation of groundwater.The deteriorated groundwater resources in this coastal region should raise environmental and health concerns.

  20. Intrusion mechanics according to Burstone with the NiTi-SE-steel uprighting spring.

    Science.gov (United States)

    Sander, F G; Wichelhaus, A; Schiemann, C

    1996-08-01

    Intrusion mechanics according to Burstone can be regarded as a practicable method for the intrusion of incisors. 1. By applying the NiTi-SE-steel uprighting spring, relatively constant forces can be exerted over a large range of intrusion on both sides of the anterior tooth archwire. 2. By bending a 150 degrees tip-back bend or a curvature into the steel portion, the uprighting spring presented here is brought into the plastic range of the characteristic curve of force. 3. Application of sliding hooks on the intrusion spring permits readjustment for force transfer onto the anterior archwire. 4. Connecting the anterior archwire with the posterior elements by means of a steel ligature can be recommended only in some cases, because sagittally directed forces may be produced. 5. The adult patients presented showed an average intrusion of 0.6 mm/month, if a linear connection was presupposed. 6. An intrusive effect on the incisors could first be detected clinically after 6 to 8 weeks. 7. Application of a torque-key proves especially useful in controlling the incisor position during intrusion in order to avoid unnecessary radiography. 8. Actual prediction of the centre of resistance with the help of a cephalometric radiograph proved not to be feasible. 9. The calculated maximal intrusion of the mandibular incisors was 7 mm. 10. The torque-segmented archwire with crimped hooks and pseudoelastic springs between the molars and the crimped hooks proved very effective for retrusion and intrusion of maxillary incisors. The maxillary anterior teeth can be retruded by a total of 7 mm without readjustment. 11. Constant moments and forces could be transferred by applying preformed arch wires and segmented arch wires.

  1. Impression cytology diagnosis of ulcerative eyelid malignancy.

    Science.gov (United States)

    Sen, S; Lyngdoh, A D; Pushker, N; Meel, R; Bajaj, M S; Chawla, B

    2015-02-01

    The utility of impression cytology in ocular diseases has predominantly been restricted to the diagnosis of dry eye, limbal stem cell deficiency and conjunctival neoplasias. Its role in malignant eyelid lesions remains largely unexplored. Although scrape cytology is more popular for cutaneous lesions, impression cytology, being non-traumatic, has an advantage in small and delicate areas such as the eyelid. The present study has been designed to evaluate its role in the diagnosis and management of malignant eyelid lesions. Thirty-two histopathologically proven malignant eyelid lesions diagnosed over a 2-year period, including 13 basal cell carcinomas, 11 sebaceous carcinomas, four squamous cell carcinomas, two malignant melanomas and two poorly differentiated carcinomas, formed the study group. The results of impression cytology were compared with those of histopathology in the study group and with an age- and sex-matched group of benign cases as controls. The sensitivity of impression cytology was 84% (27/32) for the diagnosis of malignancy and 28% (9/32) for categorization of the type of malignancy. Impression cytology is a simple, useful, non-invasive technique for the detection of malignant ulcerative eyelid lesions. It is especially useful as a follow-up technique for the detection of recurrences. © 2014 John Wiley & Sons Ltd.

  2. Late Neoproterozoic layered mafic intrusion of arc-affinity in the Arabian-Nubian Shield: A case study from the Shahira layered mafic intrusion, southern Sinai, Egypt

    Energy Technology Data Exchange (ETDEWEB)

    Azer, M.K.; Obeid, M.A.; Gahalan, H.A.

    2016-07-01

    The Shahira Layered Mafic Intrusion (SLMI), which belongs to the late Neoproterozoic plutonic rocks of the Arabian-Nubian Shield, is the largest layered mafic intrusion in southern Sinai. Field relations indicate that it is younger than the surrounding metamorphic rocks and older than the post-orogenic granites. Based on variation in mineral paragenesis and chemical composition, the SLMI is distinguished into pyroxene-hornblende gabbro, hornblende gabbro and diorite lithologies. The outer zone of the mafic intrusion is characterized by fine-grained rocks (chilled margin gabbroic facies), with typical subophitic and/or microgranular textures. Different rock units from the mafic intrusion show gradational boundaries in between. They show some indications of low grade metamorphism, where primary minerals are transformed into secondary ones. Geochemically, the Shahira layered mafic intrusion is characterized by enrichment in LILE relative to HFSE (e.g. Nb, P, Zr, Ti, Y), and LREE relative to HREE [(La/Lu)n= 4.75–8.58], with subalkaline characters. It has geochemical characteristics of pre-collisional arc-type environment. The geochemical signature of the investigated gabbros indicates partial melting of mantle wedge in a volcanic-arc setting, being followed by fractional crystallization and crustal contamination. Fractional crystallization processes played a vital role during emplacement of the Shahira intrusion and evolution of its mafic and intermediate rock units. The initial magma was evolved through crystallization of hornblende which was caused by slight increasing of H2O in the magma after crystallization of liquidus olivine, pyroxene and Ca-rich plagioclase. The gabbroic rocks crystallized at pressures between 4.5 and 6.9kbar (~15–20km depth). Whereas, the diorites yielded the lowest crystallization pressure between 1.0 to 4.4Kbar (<10km depth). Temperature was estimated by several geothermometers, which yielded crystallization temperatures ranging from 835

  3. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  4. Floor-fractured craters on the Moon: an evidence of past intrusive magmatic activity

    Science.gov (United States)

    Thorey, C.; Michaut, C.

    2012-12-01

    Floor-fractured lunar craters (FFC's) are a class of craters modified by post impact mechanisms. They are defined by distinctive shallow, often plate-like or convex floors, wide floor moats and radial, concentric and polygonal floor-fractures, suggesting an endogenous process of modification. Two main mechanisms have been proposed to account for such observations : 1) viscous relaxation and 2) spreading of magmatic intrusions at depth below the crater. Here, we propose to test the case of magmatic intrusions. We develop a model for the dynamics of magma spreading below an elastic crust with a crater-like topography and above a rigid horizontal surface. Results show first that the lithostatic pressure increase at the crater rim prevents the intrusion from spreading horizontally giving rise to intrusion thickening and to an uplift of the crater floor. Second, the deformation of the overlying crust exerts a strong control on the intrusion shape, and hence, on the nature of the crater floor uplift. As the deformation can only occur over a minimum flexural wavelength noted Λ, the intrusion shape shows a bell-shaped geometry for crater radius smaller than 3Λ, or a flat top with smooth edges for crater radius larger than 3Λ. For given crustal elastic properties, the crust flexural wavelength increases with the intrusion depth. Therefore, for a large intrusion depth or small crater size, we observe a convex uplift of the crater floor. On the contrary, for a small intrusion depth or large crater size, the crater floor undergoes a piston-like uplift and a circular moat forms just before the rim. The depth of the moat is controlled by the thickening of the crust at the crater rim. On the contrary to viscous relaxation models, our model is thus able to reproduce most of the features of FFC's, including small-scale features. Spreading of a magmatic intrusion at depth can thus be considered as the main endogenous mechanism at the origin of the deformations observed at FFC

  5. Influence of crystallised igneous intrusions on fault nucleation and reactivation during continental extension

    Science.gov (United States)

    Magee, Craig; McDermott, Kenneth G.; Stevenson, Carl T. E.; Jackson, Christopher A.-L.

    2014-05-01

    Continental rifting is commonly accommodated by the nucleation of normal faults, slip on pre-existing fault surfaces and/or magmatic intrusion. Because crystallised igneous intrusions are pervasive in many rift basins and are commonly more competent (i.e. higher shear strengths and Young's moduli) than the host rock, it is theoretically plausible that they locally intersect and modify the mechanical properties of pre-existing normal faults. We illustrate the influence that crystallised igneous intrusions may have on fault reactivation using a conceptual model and observations from field and subsurface datasets. Our results show that igneous rocks may initially resist failure, and promote the preferential reactivation of favourably-oriented, pre-existing faults that are not spatially-associated with solidified intrusions. Fault segments situated along strike from laterally restricted fault-intrusion intersections may similarly be reactivated. This spatial and temporal control on strain distribution may generate: (1) supra-intrusion folds in the hanging wall; (2) new dip-slip faults adjacent to the igneous body; or (3) sub-vertical, oblique-slip faults oriented parallel to the extension direction. Importantly, stress accumulation within igneous intrusions may eventually initiate failure and further localise strain. The results of our study have important implications for the structural of sedimentary basins and the subsurface migration of hydrocarbons and mineral-bearing fluids.

  6. Time, space, and composition relations among northern Nevada intrusive rocks and their metallogenic implications

    Science.gov (United States)

    duBray, E.A.

    2007-01-01

    Northern Nevada contains ∼360 igneous intrusions subequally distributed among three age groups: middle Tertiary, Cretaceous, and Jurassic. These intrusions are dominantly granodiorite and monzogranite, although some are more mafic. Major-oxide and trace-element compositions of intrusion age groups are remarkably similar, forming compositional arrays that are continuous, overlapping, and essentially indistinguishable. Within each age group, compositional diversity is controlled by a combination of fractional crystallization and two-component mixing. Mafic intrusions represent mixing of mantle-derived magma and assimilated continental crust, whereas intermediate to felsic intrusions evolved by fractional crystallization. Several petrologic parameters suggest that the northern Nevada intrusion age groups formed in a variety of subduction-related, magmatic arc settings: Jurassic intrusions were likely formed during backarc, slab-window magmatism related to breakoff of the Mezcalera plate; Cretaceous magmatism was related to rapid, shallow subduction of the Farallon plate and consequent inboard migration of arc magmatism; and Tertiary magmatism initially swept southward into northern Nevada in response to foundering of the Farallon plate and was followed by voluminous Miocene bimodal magmatism associated with backarc continental rifting.

  7. Intrusive fathering, children's self-regulation and social skills: a mediation analysis.

    Science.gov (United States)

    Stevenson, M; Crnic, K

    2013-06-01

    Fathers have unique influences on children's development, and particularly in the development of social skills. Although father-child relationship influences on children's social competence have received increased attention in general, research on fathering in families of children with developmental delays (DD) is scant. This study examined the pathway of influence among paternal intrusive behaviour, child social skills and child self-regulatory ability, testing a model whereby child regulatory behaviour mediates relations between fathering and child social skills. Participants were 97 families of children with early identified DD enrolled in an extensive longitudinal study. Father and mother child-directed intrusiveness was coded live in naturalistic home observations at child age 4.5, child behaviour dysregulation was coded from a video-taped laboratory problem-solving task at child age 5, and child social skills were measured using independent teacher reports at child age 6. Analyses tested for mediation of the relationship between fathers' intrusiveness and child social skills by child behaviour dysregulation. Fathers' intrusiveness, controlling for mothers' intrusiveness and child behaviour problems, was related to later child decreased social skills and this relationship was mediated by child behaviour dysregulation. Intrusive fathering appears to carry unique risk for the development of social skills in children with DD. Findings are discussed as they related to theories of fatherhood and parenting in children with DD, as well as implications for intervention and future research. © 2012 The Authors. Journal of Intellectual Disability Research © 2012 John Wiley & Sons Ltd, MENCAP & IASSID.

  8. Family cohesion and posttraumatic intrusion and avoidance among war veterans: a 20-year longitudinal study.

    Science.gov (United States)

    Zerach, Gadi; Solomon, Zahava; Horesh, Danny; Ein-Dor, Tsachi

    2013-02-01

    The bi-directional relationships between combat-induced posttraumatic symptoms and family relations are yet to be understood. The present study assesses the longitudinal interrelationship of posttraumatic intrusion and avoidance and family cohesion among 208 Israeli combat veterans from the 1982 Lebanon War. Two groups of veterans were assessed with self-report questionnaires 1, 3 and 20 years after the war: a combat stress reaction (CSR) group and a matched non-CSR control group. Latent Trajectories Modeling showed that veterans of the CSR group reported higher intrusion and avoidance than non-CSR veterans at all three points of time. With time, there was a decline in these symptoms in both groups, but the decline was more salient among the CSR group. The latter also reported lower levels of family cohesion. Furthermore, an incline in family cohesion levels was found in both groups over the years. Most importantly, Autoregressive Cross-Lagged Modeling among CSR and non-CSR veterans revealed that CSR veterans' posttraumatic symptoms in 1983 predicted lower family cohesion in 1985, and lower family cohesion, in turn, predicted posttraumatic symptoms in 2002. The findings suggest that psychological breakdown on the battlefield is a marker for future family cohesion difficulties. Our results lend further support for the bi-directional mutual effects of posttraumatic symptoms and family cohesion over time.

  9. Circuit design techniques for non-crystalline semiconductors

    CERN Document Server

    Sambandan, Sanjiv

    2012-01-01

    Despite significant progress in materials and fabrication technologies related to non-crystalline semiconductors, fundamental drawbacks continue to limit real-world application of these devices in electronic circuits. To help readers deal with problems such as low mobility and intrinsic time variant behavior, Circuit Design Techniques for Non-Crystalline Semiconductors outlines a systematic design approach, including circuit theory, enabling users to synthesize circuits without worrying about the details of device physics. This book: Offers examples of how self-assembly can be used as a powerf

  10. Evaluation of the veracity of one work by the artist Di Cavalcanti through non-destructive techniques: XRF, imaging and brush stroke analysis

    International Nuclear Information System (INIS)

    Kajiya, E.A.M.; Campos, P.H.O.V.; Rizzutto, M.A.; Appoloni, C.R.; Lopes, F.

    2014-01-01

    This paper presents systematic studies and analysis that contributed to the identification of the forgery of a work by the artist Emiliano Augusto Cavalcanti de Albuquerque e Melo, known as Di Cavalcanti. The use of several areas of expertise such as brush stroke analysis (“pinacologia”), applied physics, and art history resulted in an accurate diagnosis for ascertaining the authenticity of the work entitled “Violeiro” (1950). For this work we used non-destructive methods such as techniques of infrared, ultraviolet, visible and tangential light imaging combined with chemical analysis of the pigments by portable X-Ray Fluorescence (XRF) and graphic gesture analysis. Each applied method of analysis produced specific information that made possible the identification of materials and techniques employed and we concluded that this work is not consistent with patterns characteristic of the artist Di Cavalcanti. - Highlights: • Identification of the forgery of an easel painting of Di Cavalcanti. • Diagnosis for ascertaining the authenticity of the work entitled “Violeiro” (1950). • X-Ray fluorescence spectroscopy and image analysis. • Image analyses allow some identification as hidden underlying lines. • Materials and techniques not characteristic of the artist

  11. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  12. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  13. Evaluation of of μ-controller PIR Intrusion Detector | Eludire | West ...

    African Journals Online (AJOL)

    When there is intrusion, a piezo speaker beeps and also a visual indicator with light emitting diode blinks to indicate intrusion. For security, cost effectiveness and access control to certain areas of homes, offices and industries this system is a better replacement to human surveillance needed around our valuable goods and ...

  14. Intrusive thoughts in obsessive-compulsive disorder and eating disorder patients: a differential analysis.

    Science.gov (United States)

    García-Soriano, Gemma; Roncero, Maria; Perpiñá, Conxa; Belloch, Amparo

    2014-05-01

    The present study aims to compare the unwanted intrusions experienced by obsessive-compulsive (OCD) and eating disorder (ED) patients, their appraisals, and their control strategies and analyse which variables predict the intrusions' disruption and emotional disturbance in each group. Seventy-nine OCD and 177 ED patients completed two equivalent self-reports designed to assess OCD-related and ED-related intrusions, their dysfunctional appraisals, and associated control strategies. OCD and ED patients experienced intrusions with comparable frequency and emotional disturbance, but OCD patients experienced greater disruption. Differences appeared between groups on some appraisals and control strategies. Intolerance to uncertainty (OCD group) and thought importance (ED group) predicted their respective emotional disturbance and disruption. Additionally, control importance (OCD group) and thought-action fusion moral (OCD and ED groups) predicted their emotional disturbance. OCD and ED share the presence of intrusions; however, different variables explain why they are disruptive and emotionally disturbing. Cognitive intrusions require further investigation as a transdiagnostic variable. Copyright © 2014 John Wiley & Sons, Ltd and Eating Disorders Association.

  15. Effect of winds and waves on salt intrusion in the Pearl River estuary

    Science.gov (United States)

    Gong, Wenping; Lin, Zhongyuan; Chen, Yunzhen; Chen, Zhaoyun; Zhang, Heng

    2018-02-01

    Salt intrusion in the Pearl River estuary (PRE) is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST) modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  16. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  17. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  18. Diagnosis of animal diseases using nuclear and related techniques: Developments and trends

    International Nuclear Information System (INIS)

    Anderson, J.; McKay, J.A.

    1991-01-01

    Nuclear techniques such as radioimmune precipitation, radioimmunoassay, DNA cloning and amino acid sequencing have led to a greater understanding of protein structure and function, antigenic variation and the immune response to infection. Knowledge gained from the use of this technology has led to the development of improved diagnostic assays. Although radioimmunoassay has been used for animal disease diagnosis for many years, more recently it has been replaced by the enzyme linked immunosorbent assay (ELISA). The ELISA offers advantages in speed of reading and longer reagent shelf life and obviates the use of radiochemicals. This is particularly important in developing countries, which may have no facilities for storage, handling and disposal of radioactive materials. In the case of rinderpest diagnosis, taken as an example, the virus neutralization test was replaced by a simple indirect ELISA for seromonitoring throughout the Pan-African Rinderpest Campaign. In the near future, this will be replaced by a competitive ELISA using a rinderpest specific monoclonal antibody, which will offer significant advantages in sensitivity and specificity. In the future it may be possible to replace the rinderpest antigen with vector expressed proteins or synthetic polypeptides. More recent developments such as the 'amplified' ELISA and the use of fluorogenic and bioluminescent substrates may further improve disease diagnosis. The knowledge gained from the use of modern technology is essential to the development of improved diagnostic assays which in turn will lead to improved disease diagnosis and control. (author). 9 refs

  19. Identifying seawater intrusion in coastal areas by means of 1D and quasi-2D joint inversion of TDEM and VES data

    Science.gov (United States)

    Martínez-Moreno, F. J.; Monteiro-Santos, F. A.; Bernardo, I.; Farzamian, M.; Nascimento, C.; Fernandes, J.; Casal, B.; Ribeiro, J. A.

    2017-09-01

    Seawater intrusion is an increasingly widespread problem in coastal aquifers caused by climate changes -sea-level rise, extreme phenomena like flooding and droughts- and groundwater depletion near to the coastline. To evaluate and mitigate the environmental risks of this phenomenon it is necessary to characterize the coastal aquifer and the salt intrusion. Geophysical methods are the most appropriate tool to address these researches. Among all geophysical techniques, electrical methods are able to detect seawater intrusions due to the high resistivity contrast between saltwater, freshwater and geological layers. The combination of two or more geophysical methods is recommended and they are more efficient when both data are inverted jointly because the final model encompasses the physical properties measured for each methods. In this investigation, joint inversion of vertical electric and time domain soundings has been performed to examine seawater intrusion in an area within the Ferragudo-Albufeira aquifer system (Algarve, South of Portugal). For this purpose two profiles combining electrical resistivity tomography (ERT) and time domain electromagnetic (TDEM) methods were measured and the results were compared with the information obtained from exploration drilling. Three different inversions have been carried out: single inversion of the ERT and TDEM data, 1D joint inversion and quasi-2D joint inversion. Single inversion results identify seawater intrusion, although the sedimentary layers detected in exploration drilling were not well differentiated. The models obtained with 1D joint inversion improve the previous inversion due to better detection of sedimentary layer and the seawater intrusion appear to be better defined. Finally, the quasi-2D joint inversion reveals a more realistic shape of the seawater intrusion and it is able to distinguish more sedimentary layers recognised in the exploration drilling. This study demonstrates that the quasi-2D joint

  20. Non-invasive diagnosis of sweat gland dysplasia using optical coherence tomography and reflectance confocal microscopy in a family with anhidrotic ectodermal dysplasia (Christ-Siemens-Touraine syndrome).

    Science.gov (United States)

    Reinholz, M; Gauglitz, G G; Giehl, K; Braun-Falco, M; Schwaiger, H; Schauber, J; Ruzicka, T; Berneburg, M; von Braunmühl, T

    2016-04-01

    Anhidrotic ectodermal dysplasia (AED) is an inherited syndrome, which originates mainly from genetic alteration of the ectodysplasin A (EDA) gene. It regularly affects the adnexa of the skin which results in a characteristic phenotype of the patients including hypo- or anhidrosis leading to severe disturbances in the regulation of body temperature. To prevent the development of the symptoms in early childhood promising therapeutic approaches are currently under clinical investigation. In this context, timely diagnosis of this genetic syndrome is crucial. The purpose of our study was the investigation of modern non-invasive imaging methods such as optical coherence tomography (OCT) and reflectance confocal microscopy (RCM) in the immediate diagnosis of AED. We examined a 3-year-old boy with the suspicion for an AED syndrome and his family members with RCM and OCT to document presence and characteristic features of sweat glands in comparison to non-affected individuals. The patient and the affected brother showed significantly reduced sweat glands in the imaging compared to the controls. The genetic analysis revealed a mutation of the EDA gene for hemizygosity previously associated with AED and the mother was revealed as the conductor of the genetic alteration. With the help of non-invasive imaging, we were able to detect sweat gland dysplasia in the affected family members without performing a biopsy which led us to the diagnosis of an AED. The application of modern dermatological imaging techniques might serve as valuable supplementary tools in the immediate, non-invasive diagnosis of genetic syndromes especially in newborns when early therapeutic approaches are planned. © 2015 European Academy of Dermatology and Venereology.

  1. Effects of heat-flow and hydrothermal fluids from volcanic intrusions on authigenic mineralization in sandstone formations

    Directory of Open Access Journals (Sweden)

    Wolela Ahmed

    2002-06-01

    Full Text Available Volcanic intrusions and hydrothermal activity have modified the diagenetic minerals. In the Ulster Basin, UK, most of the authigenic mineralization in the Permo-Triassic sandstones pre-dated tertiary volcanic intrusions. The hydrothermal fluids and heat-flow from the volcanic intrusions did not affect quartz and feldspar overgrowths. However, clay mineral-transformation, illite-smectite to illite and chlorite was documented near the volcanic intrusions. Abundant actinolite, illite, chlorite, albite and laumontite cementation of the sand grains were also documented near the volcanic intrusions. The abundance of these cementing minerals decreases away from the volcanic intrusions.In the Hartford Basin, USA, the emplacement of the volcanic intrusions took place simultaneous with sedimentation. The heat-flow from the volcanic intrusions and hydrothermal activity related to the volcanics modified the texture of authigenic minerals. Microcrystalline mosaic albite and quartz developed rather than overgrowths and crystals near the intrusions. Chlorite clumps and masses were also documented with microcrystalline mosaic albite and quartz. These features are localized near the basaltic intrusions. Laumontite is also documented near the volcanic intrusions. The reservoir characteristics of the studied sandstone formations are highly affected by the volcanic and hydrothermal fluids in the Hartford and the Ulster Basin. The porosity dropped from 27.4 to zero percent and permeability from 1350 mD to 1 mD.

  2. Non-intrusive appliance load monitoring system based on a modern kWh-meter

    Energy Technology Data Exchange (ETDEWEB)

    Pihala, H. [VTT Energy, Espoo (Finland). Energy Systems

    1998-12-01

    Non-intrusive appliance load monitoring (NIALM) is a fairly new method to estimate load profiles of individual electric appliances in a small building, like a household, by monitoring the whole load at a single point with one recording device without sub-meters. Appliances have special electrical characteristics, the positive and negative active and reactive power changes during the time they are switched on or off. These changes are called events and are detected with a monitoring device called an event recorder. Different NIALM-concepts developed in Europe and in the United States are generally discussed. The NIALM-concept developed in this study is based on a 3-phase, power quality monitoring kWh-meter and unique load identification algorithms. This modern kWh-meter with a serial data bus to a laptop personal computer is used as die event recorder. The NIALM-concept of this presentation shows for the first time how a kWh-meter can be used at the same time for billing, power quality and appliance end-use monitoring. An essential part of the developed NIALM-system prototype is the software of load identification algorithms which runs in an off-line personal computer. These algorithms are able to identify, with a certain accuracy, both two-state and multi-state appliances. This prototype requires manual-setup in which the naming of appliances is performed. The results of the prototype NIALMS were verified in a large, single family detached house and they were compared to the results of other prototypes in France and the United States, although this comparison is difficult because of different supply systems, appliance stock and number of tested sites. Different applications of NIALM are discussed. Gathering of load research data, verification of DSM-programs, home automation, failure analysis of appliances and security surveillance of buildings are interesting areas of NIALM. Both utilities and customers can benefit from these applications. It is possible to

  3. Pukala intrusion, its age and connection to hydrothermal alteration in Orivesi, southwestern Finland

    Directory of Open Access Journals (Sweden)

    Matti Talikka

    2005-01-01

    Full Text Available The Pukala intrusion is situated in the Paleoproterozoic Svecofennian domain of the Fennoscandian Shield in the contact region between the Central Finland Granitoid Complex and the Tampere Belt. The acid subvolcanic intrusion, which is in contact or close to severalaltered domains, mainly consists of porphyritic granodiorite and trondhjemite. The Pukala intrusion was emplaced into volcanic sequence in an island-arc or fore-arc setting before or during the early stages of the main regional deformation phase of the Svecofennian orogeny. On the basis of the geochemical data, the Pukala intrusion is a peraluminous volcanic-arc granitoid. After crystallisation at 1896±3 Ma, multiphase deformation and metamorphismcaused alteration, recrystallisation, and orientation of the minerals, and tilted the intrusion steeply towards south. The 1851±5 Ma U-Pb age for titanite is connected to the late stages of the Svecofennian tectonometamorphic evolution of the region. Several hydrothermally altered domains are located in the felsic and intermediate metavolcanic rocks of the Tampere Belt within less than one kilometre south of the Pukala intrusion. Alteration is divided into three basic types: partial silica alteration, chlorite-sericite±silica alteration, and sericite alteration in shear zones. The first two types probably formed during the emplacement and crystallisation of the Pukala intrusion, and the third is linked to late shearing. Intense sericitisation and comb quartz bands in the contact of theintrusion and the altered domain at Kutemajärvi suggest that the hydrothermal system was driven by the Pukala intrusion.

  4. Cellular Neural Network-Based Methods for Distributed Network Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Kang Xie

    2015-01-01

    Full Text Available According to the problems of current distributed architecture intrusion detection systems (DIDS, a new online distributed intrusion detection model based on cellular neural network (CNN was proposed, in which discrete-time CNN (DTCNN was used as weak classifier in each local node and state-controlled CNN (SCCNN was used as global detection method, respectively. We further proposed a new method for design template parameters of SCCNN via solving Linear Matrix Inequality. Experimental results based on KDD CUP 99 dataset show its feasibility and effectiveness. Emerging evidence has indicated that this new approach is affordable to parallelism and analog very large scale integration (VLSI implementation which allows the distributed intrusion detection to be performed better.

  5. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  6. Measuring Functional Creativity: Non-Expert Raters and the Creative Solution Diagnosis Scale

    Science.gov (United States)

    Cropley, David H.; Kaufman, James C.

    2012-01-01

    The Creative Solution Diagnosis Scale (CSDS) is a 30-item scale based on a core of four criteria: Relevance & Effectiveness, Novelty, Elegance, and Genesis. The CSDS offers potential for the consensual assessment of functional product creativity. This article describes an empirical study in which non-expert judges rated a series of mousetrap…

  7. assessment of Seawater Intrusion in Concrete by Measuring Chlorine Concentration

    International Nuclear Information System (INIS)

    Abdel-Monem, A.M.; Kansouh, W.A.; Osman, A.M.; Bashter, I.I.

    2011-01-01

    The object of this work is to measure water intrusion in concrete using a new methodology based on neutron activation technique. The applied method depends on measuring the activated gamma energy lines emitted from 38 Cl using a gamma spectrometer with Ge(Li) and HPGe detectors. Concrete samples with different percentages of silica fume (SF), up to 20 % submerged in seawater for different period of time were used to perform the investigation. Samples of concrete taken from different positions along the direction of water intrusion in concrete block were irradiated by thermal neutrons using the irradiation cell of 252 Cf neutron source and one of the vertical channels of search reactor at Delft University. The measured 38 Cl concentrations of the irradiated samples were used to plot groups of water profiles distribution in concrete samples with different SF % and submerged in seawater for different periods. These profiles were compared with the others which use here measured by neutron back emitted method where a satisfactory agreement was observed between the two. Further, the displayed measured results; show that the diffusivity for all water contents decreases with increasing the silica fume percentage up to 15 %. However, for concrete samples with silica fume 20 % the observed phenomenon is reversed due to the deterioration of concrete physical and mechanical properties

  8. Improving Intrusion Detection System Based on Snort Rules for Network Probe Attacks Detection with Association Rules Technique of Data Mining

    Directory of Open Access Journals (Sweden)

    Nattawat Khamphakdee

    2015-07-01

    Full Text Available The intrusion detection system (IDS is an important network security tool for securing computer and network systems. It is able to detect and monitor network traffic data. Snort IDS is an open-source network security tool. It can search and match rules with network traffic data in order to detect attacks, and generate an alert. However, the Snort IDS  can detect only known attacks. Therefore, we have proposed a procedure for improving Snort IDS rules, based on the association rules data mining technique for detection of network probe attacks.  We employed the MIT-DARPA 1999 data set for the experimental evaluation. Since behavior pattern traffic data are both normal and abnormal, the abnormal behavior data is detected by way of the Snort IDS. The experimental results showed that the proposed Snort IDS rules, based on data mining detection of network probe attacks, proved more efficient than the original Snort IDS rules, as well as icmp.rules and icmp-info.rules of Snort IDS.  The suitable parameters for the proposed Snort IDS rules are defined as follows: Min_sup set to 10%, and Min_conf set to 100%, and through the application of eight variable attributes. As more suitable parameters are applied, higher accuracy is achieved.

  9. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  10. Quantitative evaluation of myocardial perfusion and heart function using a non-invasive double isotope technique

    Energy Technology Data Exchange (ETDEWEB)

    Knapp, W H; Doll, J; Georgi, P [Deutsches Krebsforschungszentrum, Heidelberg (Germany, F.R.). Inst. fuer Nuklearmedizin; Tillmanns, H [Heidelberg Univ. (Germany, F.R.). Innere Medizin 3

    1976-11-01

    This paper describes a non-invasive double nuclide technique for the simultaneous measurement of minimal cardiac transit times (MTT) and regional 'myocardial appearance times' (MAT) using gamma camera and computer. MAT is defined as the time lag between the appearance of an indicator with myocardial affinity in the aortic root and its extraction in the myocardial cells. The extraction can be identified as an increase of the ratio between the count rates of the two nuclides e.g. /sup 201/Tl-chloride and sup(113m)In DTPA. The clinical evaluation of this method allows the following conclusions: 1) MAT, determined over several circumscript myocardial regions permits the qualitative diagnosis of a coronary artery disease with high confidence. 2) Indices of nutritive myocardial blood flow (INF), derived by MAT using several representative areas of myocardium, show a definite correlation to the degree of coronary artery disease. In addition to the localization of infarction and the determination of infarct size, the technique described promises a quantitative evaluation of the regional myocardial perfusion. Simultaneously measured MTT help to assess segmental cardiac performance.

  11. Sexually intrusive behaviour following brain injury: approaches to assessment and rehabilitation.

    Science.gov (United States)

    Bezeau, Scott C; Bogod, Nicholas M; Mateer, Catherine A

    2004-03-01

    Sexually intrusive behaviour, which may range from inappropriate commentary to rape, is often observed following a traumatic brain injury. It may represent novel behaviour patterns or an exacerbation of pre-injury personality traits, attitudes, and tendencies. Sexually intrusive behaviour poses a risk to staff and residents of residential facilities and to the community at large, and the development of a sound assessment and treatment plan for sexually intrusive behaviour is therefore very important. A comprehensive evaluation is best served by drawing on the fields of neuropsychology, forensic psychology, and cognitive rehabilitation. The paper discusses the types of brain damage that commonly lead to sexually intrusive behaviour, provides guidance for its assessment, and presents a three-stage treatment model. The importance of a multidisciplinary approach to both assessment and treatment is emphasized. Finally, a case example is provided to illustrate the problem and the possibilities for successful management.

  12. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  13. Numerical modeling of seawater intrusion in Zhoushuizi district of Dalian City, China

    Science.gov (United States)

    Zhao, J.; Lin, J.; Wu, J.

    2013-12-01

    A three-dimensional heterogeneous density-dependent numerical model was constructed to simulate the seawater intrusion process in coastal aquifers in Zhoushuizi Region, Dalian City. Model calibration was achieved through a prediction-correction method by adjusting the zonation and values of hydrogeologic parameters until the calculated heads and concentrations matched the observed values. Model validation results also showed that it was reasonable under current data conditions. Then the calibrated and validated model was applied to predict the dynamics and trend of seawater intrusion according to the current groundwater abstraction conditions in this study area 30 years after 2010. Prediction results showed that overall seawater intrusion in the future would be even more severe. Actually, with the growing of the population and development of the economy, the demand for ground water will be increasing continuously so that the problem of seawater intrusion may be more serious than that predicted by the modelin this study. Better strategies for reasonably governing exploitation of groundwater in the study area can be further developed by using this three-dimensional seawater intrusion model.

  14. Accuracy of Four Imaging Techniques for Diagnosis of Posterior Pelvic Floor Disorders.

    Science.gov (United States)

    van Gruting, Isabelle M A; Stankiewicz, Aleksandra; Kluivers, Kirsten; De Bin, Riccardo; Blake, Helena; Sultan, Abdul H; Thakar, Ranee

    2017-11-01

    To establish the diagnostic test accuracy of evacuation proctography, magnetic resonance imaging (MRI), transperineal ultrasonography, and endovaginal ultrasonography for detecting posterior pelvic floor disorders (rectocele, enterocele, intussusception, and anismus) in women with obstructed defecation syndrome and secondarily to identify the most patient-friendly imaging technique. In this prospective cohort study, 131 women with symptoms of obstructed defecation syndrome underwent evacuation proctogram, MRI, and transperineal and endovaginal ultrasonography. Images were analyzed by two blinded observers. In the absence of a reference standard, latent class analysis was used to assess diagnostic test accuracy of multiple tests with area under the curve (AUC) as the primary outcome measure. Secondary outcome measures were interobserver agreement calculated as Cohen's κ and patient acceptability using a visual analog scale. No significant differences in diagnostic accuracy were found among the imaging techniques for all the target conditions. Estimates of diagnostic test accuracy were highest for rectocele using MRI (AUC 0.79) or transperineal ultrasonography (AUC 0.85), for enterocele using transperineal (AUC 0.73) or endovaginal ultrasonography (AUC 0.87), for intussusception using evacuation proctography (AUC 0.76) or endovaginal ultrasonography (AUC 0.77), and for anismus using endovaginal (AUC 0.95) or transperineal ultrasonography (AUC 0.78). Interobserver agreement for the diagnosis of rectocele (κ 0.53-0.72), enterocele (κ 0.54-0.94) and anismus (κ 0.43-0.81) was moderate to excellent, but poor to fair for intussusception (κ -0.03 to 0.37) with all techniques. Patient acceptability was better for transperineal and endovaginal ultrasonography as compared with MRI and evacuation proctography (P<.001). Evacuation proctography, MRI, and transperineal and endovaginal ultrasonography were shown to have similar diagnostic test accuracy. Evacuation proctography

  15. The assessment of human intrusion into underground repositories for radioactive waste Volume 2: Appendices

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Ashton, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  16. New approaches to poliovirus diagnosis using laboratory techniques: memorandum from a WHO meeting.

    OpenAIRE

    1992-01-01

    Laboratory diagnosis of poliomyelitis is an important part of the WHO initiative for global eradication of poliomyelitis. During the last year, new methods have been developed for the detection of poliovirus in clinical specimens, for intratypic differentiation, for the analysis of poliovirus neurovirulence, and for the detection of poliovirus antibodies. Progress in laboratory techniques for detection of poliovirus antibodies and for characterization of poliovirus isolates has suggested seve...

  17. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    International Nuclear Information System (INIS)

    Bernot, P.

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  18. Comparative cost assessment of the Kato-Katz and FLOTAC techniques for soil-transmitted helminth diagnosis in epidemiological surveys

    Directory of Open Access Journals (Sweden)

    Speich Benjamin

    2010-08-01

    Full Text Available Abstract Background The Kato-Katz technique is widely used for the diagnosis of soil-transmitted helminthiasis in epidemiological surveys and is believed to be an inexpensive method. The FLOTAC technique shows a higher sensitivity for the diagnosis of light-intensity soil-transmitted helminth infections but is reported to be more complex and expensive. We assessed the costs related to the collection, processing and microscopic examination of stool samples using the Kato-Katz and FLOTAC techniques in an epidemiological survey carried out in Zanzibar, Tanzania. Methods We measured the time for the collection of a single stool specimen in the field, transfer to a laboratory, preparation and microscopic examination using standard protocols for the Kato-Katz and FLOTAC techniques. Salaries of health workers, life expectancy and asset costs of materials, and infrastructure costs were determined. The average cost for a single or duplicate Kato-Katz thick smears and the FLOTAC dual or double technique were calculated. Results The average time needed to collect a stool specimen and perform a single or duplicate Kato-Katz thick smears or the FLOTAC dual or double technique was 20 min and 34 sec (20:34 min, 27:21 min, 28:14 min and 36:44 min, respectively. The total costs for a single and duplicate Kato-Katz thick smears were US$ 1.73 and US$ 2.06, respectively, and for the FLOTAC double and dual technique US$ 2.35 and US$ 2.83, respectively. Salaries impacted most on the total costs of either method. Conclusions The time and cost for soil-transmitted helminth diagnosis using either the Kato-Katz or FLOTAC method in epidemiological surveys are considerable. Our results can help to guide healthcare decision makers and scientists in budget planning and funding for epidemiological surveys, anthelminthic drug efficacy trials and monitoring of control interventions.

  19. Diagnosis of Diabetes Using Computer Methods: Soft Computing Methods for Diabetes Detection Using Iris

    OpenAIRE

    Piyush Samant; Ravinder Agarwal

    2017-01-01

    Complementary and Alternative Medicine (CAM) techniques are quite popular and effective for chronic diseases. Iridology is more than 150 years old CAM technique which analyzes the patterns, tissue weakness, color, shape, structure, etc. for disease diagnosis. The objective of this paper is to validate the use of iridology for the diagnosis of the diabetes. The suggested model was applied in a systemic disease with ocular effects. 200 subject data of 100 each diabetic and non-diabetic were eva...

  20. Effect of winds and waves on salt intrusion in the Pearl River estuary

    Directory of Open Access Journals (Sweden)

    W. Gong

    2018-02-01

    Full Text Available Salt intrusion in the Pearl River estuary (PRE is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  1. Presymptomatic diagnosis using a deletion of a single codon in families with hereditary non-polyposis colorectal cancer

    DEFF Research Database (Denmark)

    Ripa, Rasmus S.; Katballe, Niels; Wikman, Friedrik P.

    2005-01-01

    The diagnosis of hereditary non-polyposis colorectal cancer (HNPCC) is often confirmed by a mutation in one of several mismatch-repair genes, in particular MLH1, MSH2 and MSH6. Presymptomatic diagnosis requires the identification of a mutation causing the disease. Three different deletions...

  2. Prevention and analysis of hacker's intrusion

    International Nuclear Information System (INIS)

    Liu Baoxu; An Dehai; Xu Rongsheng

    2000-01-01

    The author analyzes the behavior characteristics and relevant technologies about the hacker's intrusion, and gives some corresponding solutions pertinently. To the recent events about hackers, the author gives detailed introduction and puts forward the relevant advice and valuable consideration

  3. Evaluating the effects of consolidation on intrusion and retraction using temporary anchorage devices—a FEM study

    Directory of Open Access Journals (Sweden)

    Monica Namburi

    2017-01-01

    Full Text Available Abstract Background Extraction of premolars and retracting the anterior teeth using mini-implants and anterior retraction hooks became advent now a day. In such treatments, consolidation of arches is not done in regular practice. So, the present study is concentrated on effects of consolidation in two implant and three implant combinations of retraction and intrusion. Methods A three-dimensional FEM model of maxillary teeth and periodontal ligament housed in the alveolar bone with the first premolars extracted is generated with appropriate number of elements and nodes. The models were broadly divided into two groups according to the no. of implants. Mini-implants were placed bilaterally between the second premolar and molar at varying heights (7, 10, 13 mm in group I, and along with bilateral implants, an additional mid-implant is placed between the central incisors as group II. Brackets with 0.022 slot were placed on the teeth, 19 × 25 SS wire is placed in the brackets, an anterior retraction hook was placed at 9 mm height, and analysis was done to evaluate the stresses and displacement patterns in consolidation and non-consolidation models. Results The results showed that consolidation of the anterior teeth during intrusion and retraction shows various advantages such as less stresses on the bone, PDL, implant, teeth, and no labial flaring of the anterior teeth and three implant system, i.e., two bilateral implant at 10 mm and a mid-implant at 12 mm between the centrals has shown to be better than other models as bodily movement is observed. Conclusion Consolidation is better than non consolidation during enmasse retraction and intrusion.

  4. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  5. Renal Ultrasound in the Diagnosis of the Non-functioning Kidney

    International Nuclear Information System (INIS)

    Kang, Ik Won; Suh, Jeong Soo

    1982-01-01

    Renal ultrasound is independent of renal function and capable of renal imaging in impaired or dysplastic renal diseases. Authors reviewed renal ultrasonographic findings of 36 cases which showed non-visualization in intravenous pyelography from Feb. 1979 to Sep. 1982 at Seoul National university Hospital. The results are as follows: 1. Causes of non-visualization of the kidney in IVP were unilateral hydronephrosis(18 cases), renal tuberculosis(7), renal failure(6), renal agenesis(3), tumor(1),and pyonephrosis(1) 2. The sonographic findings were diagnostic in all the cases of unilateral hydronephrosis, renal agenesis and renal tumor. 3. The sonographic findings were not diagnostic but suggestive in more than half cases of renal tuberculosis. 4. Renal ultrasound was not helpful in the diagnosis of renal failure, but useful in delineation of renal size and shape

  6. Capability for intrusion detection at nuclear fuel sites

    International Nuclear Information System (INIS)

    1978-03-01

    A safeguards vulnerability assessment was conducted at three separate licensed nuclear processing facilities. Emphasis was placed on: (1) performance of the total intrusion detection system, and (2) vulnerability of the system to compromise by insiders. The security guards were interviewed to evaluate their effectiveness in executing their duties in accordance with the plant's security plan and to assess their knowledge regarding the operation of the security equipment. A review of the training schedule showed that the guards, along with the other plant employees, are required to periodically attend in-plant training sessions. The vulnerability assessments continued with interviews of the personnel responsible for maintaining the security equipment, with discussions of detector false alarm and maintenance problems. The second part of the vulnerability assessments was to evaluate the effectiveness of the intrusion detection systems including the interior and the perimeter sensors, CCTV surveillance devices and the exterior lighting. Two types of perimeter detectors are used at the sites, a fence disturbance sensor and an infrared barrier type detector. Infrared barrier type detectors have a higher probability of detection, especially in conjunction with dedicated CCTV cameras. The exterior lights satisfy the 0.2 footcandle illumination requirement. The interior intrusion detection systems included ultrasonic motion detectors, microwave motion detectors,balanced magnetic switches, and CCTV cameras. Entrance doors to the materials access areas and vital areas are protected with balanced magnetic switches. The interior intrusion detection systems at the three nuclear processing sites are considered satisfactory with the exception of the areas protected with ultrasonic motion detectors

  7. Role of New Functional MRI Techniques in the Diagnosis, Staging, and Followup of Gynecological Cancer: Comparison with PET-CT

    Directory of Open Access Journals (Sweden)

    Elena Alvarez Moreno

    2012-01-01

    Full Text Available Recent developments in diagnostic imaging techniques have magnified the role and potential of both MRI and PET-CT in female pelvic imaging. This article reviews the techniques and clinical applications of new functional MRI (fMRI including diffusion-weighted MRI (DWI, dynamic contrast-enhanced (DCE-MRI, comparing with PET-CT. These new emerging provide not only anatomic but also functional imaging, allowing detection of small volumes of active tumor at diagnosis and early disease relapse, which may not result in detectable morphological changes at conventional imaging. This information is useful in distinguishing between recurrent/residual tumor and post-treatment changes and assessing treatment response, with a clear impact on patient management. Both PET-CT and now fMRI have proved to be very valuable tools for evaluation of gynecologic tumors. Most papers try to compare these techniques, but in our experience both are complementary in management of these patients. Meanwhile PET-CT is superior in diagnosis of ganglionar disease; fMRI presents higher accuracy in local preoperative staging. Both techniques can be used as biomarkers of tumor response and present high accuracy in diagnosis of local recurrence and peritoneal dissemination, with complementary roles depending on histological type, anatomic location and tumoral volume.

  8. Magmatic sill intrusions beneath El Hierro Island following the 2011-2012 submarine eruption

    Science.gov (United States)

    Benito-Saz, María Á.; Sigmundsson, Freysteinn; Parks, Michelle M.; García-Cañada, Laura; Domínguez Cerdeña, Itahiza

    2016-04-01

    El Hierro, the most southwestern island of Canary Islands, Spain, is a volcano rising from around 3600 m above the ocean floor and up to of 1500 m above sea level. A submarine eruption occurred off the coast of El Hierro in 2011-2012, which was the only confirmed eruption in the last ~ 600 years. Activity continued after the end of the eruption with six magmatic intrusions occurring between 2012-2014. Each of these intrusions was characterized by hundreds of earthquakes and 3-19 centimeters of observed ground deformation. Ground displacements at ten continuous GPS sites were initially inverted to determine the optimal source parameters (location, geometry, volume/pressure change) that best define these intrusions from a geodetic point of view. Each intrusive period appears to be associated with the formation of a separate sill, with inferred volumes between 0.02 - 0.3 km3. SAR images from the Canadian RADARSAT-2 satellite and the Italian Space Agency COSMO-SkyMed constellation have been used to produce high-resolution detailed maps of line-of-sight displacements for each of these intrusions. These data have been combined with the continuous GPS observations and a joint inversion undertaken to gain further constraints on the optimal source parameters for each of these separate intrusive events. The recorded activity helps to understand how an oceanic intraplate volcanic island grows through repeated sill intrusions; well documented by seismic, GPS and InSAR observations in the case of the El Hierro activity.

  9. Work Zone Intrusion Report Interface Design

    Science.gov (United States)

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  10. Hardness prediction of HAZ in temper bead welding by non-consistent layer technique

    International Nuclear Information System (INIS)

    Yu, Lina; Saida, Kazuyoshi; Mochizuki, Masahito; Kameyama, Masashi; Chigusa, Naoki; Nishimoto, Kazutoshi

    2014-01-01

    Based on the experimentally obtained hardness database, the neural network-based hardness prediction system of heat affect zone (HAZ) in temper bead welding by Consistent Layer (CSL) technique has been constructed by the authors. However in practical operation, CSL technique is sometimes difficult to perform because of difficulty of the precise heat input controlling, and in such case non-CSL techniques are mainly used in the actual repair process. Therefore in the present study, the neural network-based hardness prediction system of HAZ in temper bead welding by non-CSL techniques has been constructed through thermal cycle simplification, from the view of engineering. The hardness distribution in HAZ with non-CSL techniques was calculated based on the thermal cycles numerically obtained by finite element method. The experimental result has shown that the predicted hardness is in good accordance with the measured ones. It follows that the currently proposed method is effective for estimating the tempering effect during temper bead welding by non-CSL techniques. (author)

  11. Value of five noninvasive diagnostic techniques and their combinations in diagnosis of liver fibrosis in patients with chronic hepatitis B

    Directory of Open Access Journals (Sweden)

    ZHANG Xu

    2016-10-01

    Full Text Available Objective To investigate the correlation of aspartate aminotransferase to platelet ratio index (APRI, FIB-4, Forns index, S index, and FibroScan with the degree of liver fibrosis, the diagnostic value of these techniques used alone or in combination, and the clinical value of these noninvasive techniques in the assessment of the degree of liver fibrosis in patients with chronic hepatitis B (CHB. Methods A retrospective analysis was performed for the clinical data of 91 patients with pathologically confirmed CHB who visited General Hospital of Ningxia Medical University and underwent liver biopsy from January 2009 to April 2015. According to the Scheuer pathological stage and liver fibrosis stage (S, the patients were divided into non-liver fibrosis group (a liver fibrosis stage of S0, 32 patients, mild liver fibrosis group (a liver fibrosis stage of <S2, 30 patients, and marked liver fibrosis group (a liver fibrosis stage of ≥S2, 29 patients. The APRI, FIB-4, Forns index, and S index were calculated, and liver stiffness was measured by FibroScan. An analysis of variance was used for the comparison of normally distributed continuous data between three groups, and the Dunnett t-test was used for further comparison between any two groups. The Spearman correlation analysis was also performed. Sensitivity, specificity, and area under the receiver operating characteristic curve (AUC were used to evaluate the value of these noninvasive techniques in the diagnosis of liver fibrosis. Results There were significant differences in age, albumin, aspartate aminotransferase, alanine aminotransferase, and platelet count between the three groups (F=3.552, 4.035, 4.374, and 5.992, all P<0.05, and there were significant differences in these parameters between the non-liver fibrosis group and the mild and marked liver fibrosis groups (P<0.05. There were significant differences in APRI, FIB-4, Forns index, S index, and FibroScan between the three groups (F

  12. Non-intrusive identification of residential customers

    Energy Technology Data Exchange (ETDEWEB)

    Mielczarski, W.; Lech, M.; Michalik, G. [Monash Univ., Electrical and Computer Systems Engineering Dept., Clayton, VIC (Australia)

    1997-11-01

    We present a new approach which identifies the number of customers within particular categories living in a chosen area of energy supply. This identification is made from total energy consumption measured at distribution feeders by applying characteristic patterns of energy use and nonlinear programming techniques. Customers were segmented into four main categories with six sub-groups in each category. A total pattern of energy use was obtained by summing for each sub-group the energy consumption which is based on the characteristic patterns of energy use for that sub-group and the number of customers in that sub-group. Simulations were carried out to verify different optimization procedures. Results show that a variable matrix optimization procedure can identify customers most accurately by minimizing the assumed objective function to a negligible value after 100 iterations. (author)

  13. 'I Can't Concentrate': A Feasibility Study with Young Refugees in Sweden on Developing Science-Driven Interventions for Intrusive Memories Related to Trauma.

    Science.gov (United States)

    Holmes, Emily A; Ghaderi, Ata; Eriksson, Ellinor; Lauri, Klara Olofsdotter; Kukacka, Olivia M; Mamish, Maya; James, Ella L; Visser, Renée M

    2017-03-01

    The number of refugees is the highest ever worldwide. Many have experienced trauma in home countries or on their escape which has mental health sequelae. Intrusive memories comprise distressing scenes of trauma which spring to mind unbidden. Development of novel scalable psychological interventions is needed urgently. We propose that brief cognitive science-driven interventions should be developed which pinpoint a focal symptom alongside a means to monitor it using behavioural techniques. The aim of the current study was to assess the feasibility and acceptability of the methodology required to develop such an intervention. In this study we recruited 22 refugees (16-25 years), predominantly from Syria and residing in Sweden. Participants were asked to monitor the frequency of intrusive memories of trauma using a daily diary; rate intrusions and concentration; and complete a 1-session behavioural intervention involving Tetris game-play via smartphone. Frequency of intrusive memories was high, and associated with high levels of distress and impaired concentration. Levels of engagement with study procedures were highly promising. The current work opens the way for developing novel cognitive behavioural approaches for traumatized refugees that are mechanistically derived, freely available and internationally scalable.

  14. Preliminary evaluation of solution-mining intrusion into a salt-dome repository

    International Nuclear Information System (INIS)

    1981-06-01

    This report is the product of the work of an ONWI task force to evaluate inadvertant human intrusion into a salt dome repository by solution mining. It summarizes the work in the following areas: a general review of the levels of defense that could reduce both the likelihood and potential consequences of human intrusion into a salt dome repository; evaluation of a hypothetical intrusion scenario and its consequences; recommendation for further studies. The conclusions of this task force report can be summarized as follows: (1) it is not possible at present to establish with certainty that solution mining is credible as a human-intrusion event. The likelihood of such an intrusion will depend on the effectiveness of the preventive measures; (2) an example analysis based on the realistic approach is presented in this report; it concluded that the radiological consequences are strongly dependent upon the mode of radionuclide release from the waste form, time after emplacement, package design, impurities in the host salt, the amount of a repository intercepted, the solution mining cavity form, the length of time over which solution mining occurs, the proportion of contaminated salt source for human consumption compared to other sources, and the method of salt purification for culinary purposes; (3) worst case scenarios done by other studies suggest considerable potential for exposures to man while preliminary evaluations of more realistic cases suggest significantly reduced potential consequences. Mathematical model applications to process systems, guided by more advanced assumptions about human intrusion into geomedia, will shed more light on the potential for concerns and the degree to which mitigative measures will be required

  15. A study on the intrusion model by physical modeling

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jung Yul; Kim, Yoo Sung; Hyun, Hye Ja [Korea Inst. of Geology Mining and Materials, Taejon (Korea, Republic of)

    1995-12-01

    In physical modeling, the actual phenomena of seismic wave propagation are directly measured like field survey and furthermore the structure and physical properties of subsurface can be known. So the measured datasets from physical modeling can be very desirable as input data to test the efficiency of various inversion algorithms. An underground structure formed by intrusion, which can be often seen in seismic section for oil exploration, is investigated by physical modeling. The model is characterized by various types of layer boundaries with steep dip angle. Therefore, this physical modeling data are very available not only to interpret seismic sections for oil exploration as a case history, but also to develop data processing techniques and estimate the capability of software such as migration, full waveform inversion. (author). 5 refs., 18 figs.

  16. Computer Game Play Reduces Intrusive Memories of Experimental Trauma via Reconsolidation-Update Mechanisms.

    Science.gov (United States)

    James, Ella L; Bonsall, Michael B; Hoppitt, Laura; Tunbridge, Elizabeth M; Geddes, John R; Milton, Amy L; Holmes, Emily A

    2015-08-01

    Memory of a traumatic event becomes consolidated within hours. Intrusive memories can then flash back repeatedly into the mind's eye and cause distress. We investigated whether reconsolidation-the process during which memories become malleable when recalled-can be blocked using a cognitive task and whether such an approach can reduce these unbidden intrusions. We predicted that reconsolidation of a reactivated visual memory of experimental trauma could be disrupted by engaging in a visuospatial task that would compete for visual working memory resources. We showed that intrusive memories were virtually abolished by playing the computer game Tetris following a memory-reactivation task 24 hr after initial exposure to experimental trauma. Furthermore, both memory reactivation and playing Tetris were required to reduce subsequent intrusions (Experiment 2), consistent with reconsolidation-update mechanisms. A simple, noninvasive cognitive-task procedure administered after emotional memory has already consolidated (i.e., > 24 hours after exposure to experimental trauma) may prevent the recurrence of intrusive memories of those emotional events. © The Author(s) 2015.

  17. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  18. Magmatic Diversity of the Wehrlitic Intrusions in the Oceanic Lower Crust of the Northern Oman Ophiolite

    Science.gov (United States)

    Kaneko, R.; Adachi, Y.; Miyashita, S.

    2014-12-01

    The Oman ophiolite extends along the east coast of Oman, and is the world's largest and best-preserved slice of obducted oceanic lithosphere. The magmatic history of this ophiolite is complex and is generally regarded as having occurred in three stages (MOR magmatism, subduction magmatism and intraplate magmatism). Wehrlitic intrusions constitute an important element of oceanic lower crust of the ophiolite, and numerous intrusions cut gabbro units in the northern Salahi block of this ophiolite. In this study area, we identified two different types of wehrlitic intrusions. One type of the intrusions mainly consists of dunite, plagioclase (Pl) wehrlite and mela-olivine (Ol) gabbro, in which the crystallization sequence is Ol followed by the contemporaneous crystallization of Pl and clinopyroxene (Cpx). This type is called "ordinary" wehrlitic intrusions and has similar mineral compositions to host gabbros (Adachi and Miyashita 2003; Kaneko et al. 2014). Another type of the intrusions is a single intrusion that crops out in an area 250 m × 150 m along Wadi Salahi. This intrusion consists of Pl-free "true" wehrlite, in which the crystallization sequence is Ol and then Cpx. The forsterite contents (Fo%) of Ol from the "ordinary" wehrlitic intrusions and "true" wehrlitic intrusions have ranges of 90.8-87.0 (NiO = 0.36-0.13 wt%) and 84.7 (NiO = 0.31 wt%), respectively. Cr numbers (Cr#) of Cr-spinel from the "true" wehrlitic intrusions show higher Cr# value of 0.85 than those of the "ordinary" wehrlitic intrusions (0.48-0.64). But the former is characterized by very high Fe3+ values (YFe3+ = 0.49-0.68). Kaneko et al. (2014) showed that the "ordinary" ubiquitous type has similar features to MOR magmatism and the depleted type in the Fizh block (Adachi and Miyashita 2003) links to subduction magmatism. These types are distinguished by their mineral chemistries (TiO2 and Na2O contents of Cpx). The TiO2 and Na2O contents of Cpx from the "true" wehrlitic intrusions have 0

  19. Environmental data processor of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Rogers, M.S.

    1977-06-01

    A data acquisition system oriented specifically toward collection and processing of various meteorological and environmental parameters has been designed around a National Semiconductor IMP-16 microprocessor, This system, called the Environmental Data Processor (EDP), was developed specifically for use with the Adaptive Intrusion Data System (AIDS) in a perimeter intrusion alarm evaluation, although its design is sufficiently general to permit use elsewhere. This report describes in general detail the design of the EDP and its interaction with other AIDS components

  20. Cultural syndromes and age moderate the emotional impact of illness intrusiveness in rheumatoid arthritis.

    Science.gov (United States)

    Devins, Gerald M; Gupta, Anita; Cameron, Jill; Woodend, Kirsten; Mah, Kenneth; Gladman, Dafna

    2009-02-01

    The authors investigated cultural syndromes (multidimensional vectors comprising culturally based attitudes, values, and beliefs) and age as moderators of the emotional impact of illness intrusiveness--illness-induced lifestyle disruptions--in rheumatoid arthritis (RA) and examined illness intrusiveness effects in total and separately for three life domains (relationships and personal development, intimacy, and instrumental). People with RA (n = 105) completed the Illness Intrusiveness Ratings, Individualism-Collectivism, and Center for Epidemiologic Studies--Depression scales in a one-on-one interview. Controlling for disease and background characteristics, the association between illness intrusiveness (total score and the Relationships and Personal Development subscale) and distress was inverse when young adults with RA endorsed high horizontal individualism. Illness intrusiveness into intimacy was associated with increased distress, and this intensified when respondents endorsed high vertical individualism, horizontal collectivism, vertical collectivism, or low horizontal individualism. The negative emotional impact of illness intrusiveness into intimacy diminished with increasing age. Given an aging and increasingly pluralistic society, diversity can no longer be ignored in addressing the psychosocial impact of chronic, disabling disease.

  1. Expert judgement on inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Hora, S.C.; von Winterfeldt, D.; Trauth, K.M.

    1991-12-01

    Four expert-judgment teams have developed analyses delineating possible future societies in the next 10,000 years in the vicinity of the Waste Isolation Pilot Plant (WIPP). Expert-judgment analysis was used to address the question of future societies because neither experimentation, observation, nor modeling can resolve such uncertainties. Each of the four, four-member teams, comprised of individuals with expertise in the physical, social, or political sciences, developed detailed qualitative assessments of possible future societies. These assessments include detailed discussions of the underlying physical and societal factors that would influence society and the likely modes of human-intrusion at the WIPP, as well as the probabilities of intrusion. Technological development, population growth, economic development, conservation of information, persistence of government control, and mitigation of danger from nuclear waste were the factors the teams believed to be most important. Likely modes of human-intrusion were categorized as excavation, disposal/storage, tunneling, drilling, and offsite activities. Each team also developed quantitative assessments by providing probabilities of various alternative futures, of inadvertent human intrusion, and in some cases, of particular modes of intrusion. The information created throughout this study will be used in conjunction with other types of information, including experimental data, calculations from physical principles and computer models, and perhaps other judgments, as input to ''performance assessment.'' The more qualitative results of this study will be used as input to another expert panel considering markers to deter inadvertent human intrusion at the WIPP

  2. Acoustic monitoring techniques for corrosion degradation in cemented waste canisters

    International Nuclear Information System (INIS)

    Naish, C.C.; Buttle, D.; Wallace-Sims, R.; O'Brien, T.M.

    1991-01-01

    This report describes work to investigate acoustic emission as a non-intrusive monitor of corrosion and degradation of cemented wasteforms where the waste is a potentially reactive metal. The acoustic data collected shows good correlation with the corrosion rate as measured by hydrogen gas evolution rates and the electrochemically measured corrosion rates post cement hardening. The technique has been shown to be sensitive in detecting stress caused by expansive corrosion product within the cemented wasteform. The attenuation of the acoustic signal by the wasteform reduced the signal received by the monitoring equipment by a factor of 10 over a distance of approximately 150-400 mm, dependent on the water level in the cement. Full size packages were successfully monitored. It is concluded that the technique offers good potential for monitoring cemented containers of the more reactive metals, for example Magnox and aluminium. (author)

  3. Bronchoscopic techniques in the management of patients with tuberculosis

    Directory of Open Access Journals (Sweden)

    Michele Mondoni

    2017-11-01

    Full Text Available Tuberculosis (TB is one of the leading causes of morbidity and mortality worldwide. Early diagnosis and treatment are key to prevent Mycobacterium tuberculosis transmission. Bronchoscopy can play a primary role in pulmonary TB diagnosis, particularly for suspected patients with scarce sputum or sputum smear negativity, and with endobronchial disease. Bronchoscopic needle aspiration techniques are accurate and safe means adopted to investigate hilar and mediastinal lymph nodes in cases of suspected TB lymphadenopathy. Tracheobronchial stenosis represents the worst complication of endobronchial tuberculosis. Bronchoscopic procedures are less invasive therapeutic strategies than conventional surgery to be adopted in the management of TB-related stenosis.We conducted a non-systematic review aimed at describing the scientific literature on the role of bronchoscopic techniques in the diagnosis and therapy of patients with TB.We focused on three main areas of interventions: bronchoscopic diagnosis of smear negative/sputum scarce TB patients, endobronchial TB diagnosis and treatment and needle aspiration techniques for intrathoracic TB lymphadenopathy. We described experiences on bronchoalveolar lavage, bronchial washing, and biopsy techniques for the diagnosis of patients with tracheobronchial and pulmonary TB; furthermore, we described the role played by conventional and ultrasound-guided transbronchial needle aspiration in the diagnosis of suspected hilar and mediastinal TB adenopathy. Finally, we assessed the role of the bronchoscopic therapy in the treatment of endobronchial TB and its complications, focusing on dilation techniques (such as balloon dilation and airway stenting and ablative procedures (both heat and cold therapies. Keywords: Bronchoscopy, Tuberculosis, Endoscopic ultrasound-guided fine needle aspiration, Tracheobronchial stenosis

  4. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    Sulfide intrusion in seagrasses represents a global threat to seagrasses and thereby an important parameter in resilience of seagrass ecosystems. In contrast seegrasses colonize and grow in hostile sediments, where they are constantly exposed to invasion of toxic gaseous sulfide. Remarkably little...... strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis, tracing sulfur compounds combined with ecosystem parameters we found different spatial, intraspecific and interspecific strategies to cope with sulfidic sediments. 1...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  5. Radiological risks due to intrusion into a deep bedrock repository

    International Nuclear Information System (INIS)

    Nordlinder, S.; Bergstroem, U.; Edlund, O.

    1999-01-01

    The Swedish concept for disposal of high-level waste is a deep (500 m) bedrock repository (SFL) protected by multiple barriers that isolate the waste from the environment for such a long time that the physical decay will cause a substantial reduction of the radioactivity. The aim of concentration and isolation of high-level waste is to reduce the radiation risk. Intrusion in the repository may introduce a small residual risk to individuals. A risk analysis was performed comprising dose assessment and probabilities of occurrence. Intrusions may be considered to take place either due to conscious actions or by actions without any knowledge about the repository. For conscious intrusion it may be assumed that there will be enough knowledge to manage the radiation situation in a professional manner. Several reasons for making inadvertent intrusion are possible. Independently of the purpose, the most probable initial way of coming into contact with the radioactive material is by deep drilling. Examples of causes for drilling could be general scientific purposes or exploitation of geothermal energy. Dose assessments were made for intrusion due to inclined drilling directly into a canister, and drilling near an initially malfunctioning canister from which radionuclides have leaked into the groundwater. For the former case, external pathways were considered due to exposure from a core of the canister with fuel and contaminated bore dust. The most common drilling method is with water flushing for removal of bore dust, which will not cause any substantial transfer of radionuclides to air. For the second case, it was assumed that there was a well in the vicinity. The only pathway considered was therefore consumption of water because it dominates the exposure. The highest dose rates to man were, as expected, obtained by drilling into the canister. Dose rates decrease with time after closure. During the first time the relatively short-lived radionuclides Cs-137 and Sr-90 give

  6. Strategies and techniques of communication and public relations applied to non-profit sector

    Directory of Open Access Journals (Sweden)

    Ioana – Julieta Josan

    2010-05-01

    Full Text Available The aim of this paper is to summarize the strategies and techniques of communication and public relations applied to non-profit sector.The approach of the paper is to identify the most appropriate strategies and techniques that non-profit sector can use to accomplish its objectives, to highlight specific differences between the strategies and techniques of the profit and non-profit sectors and to identify potential communication and public relations actions in order to increase visibility among target audience, create brand awareness and to change into positive brand sentiment the target perception about the non-profit sector.

  7. Development of a novel fusion imaging technique in the diagnosis of hepatobiliary-pancreatic lesions

    International Nuclear Information System (INIS)

    Soga, Koichi; Ochiai, Jun; Miyajima, Takashi; Kassai, Kyoichi; Itani, Kenji; Yagi, Nobuaki; Naito, Yuji

    2013-01-01

    Multi-row detector computed tomography (MDCT) and magnetic resonance cholangiopancreatography (MRCP) play an important role in the imaging diagnosis of hepatobiliary-pancreatic lesions. Here we investigated whether unifying the MDCT and MRCP images onto the same screen using fusion imaging could overcome the limitations of each technique, while still maintaining their benefits. Moreover, because reports of fusion imaging using MDCT and MRCP are rare, we assessed the benefits and limitations of this method for its potential application in a clinical setting. The patient group included 9 men and 11 women. Among the 20 patients, the final diagnoses were as follows: 10 intraductal papillary mucinous neoplasms, 5 biliary system carcinomas, 1 pancreatic adenocarcinoma and 5 non-neoplastic lesions. After transmitting the Digital Imaging and Communication in Medicine data of the MDCT and MRCP images to a workstation, we performed a 3-D organisation of both sets of images using volume rendering for the image fusion. Fusion imaging enabled clear identification of the spatial relationship between a hepatobiliary-pancreatic lesion and the solid viscera and/or vessels. Further, this method facilitated the determination of the relationship between the anatomical position of the lesion and its surroundings more easily than either MDCT or MRCP alone. Fusion imaging is an easy technique to perform and may be a useful tool for planning treatment strategies and for examining pathological changes in hepatobiliary-pancreatic lesions. Additionally, the ease of obtaining the 3-D images suggests the possibility of using these images to plan intervention strategies.

  8. The connectivity of pore space in mudstones: insights from high-pressure Wood's metal injection, BIB-SEM imaging, and mercury intrusion porosimetry

    NARCIS (Netherlands)

    Klaver, J.; Hemes, S.; Houben, M.; Desbois, G.; Radi, Z.; Urai, J.L.

    2015-01-01

    Study of the pore space in mudstones by mercury intrusion porosimetry is a common but indirect technique and it is not clear which part of the pore space is actually filled with mercury. We studied samples from the Opalinus Clay, Boom Clay, Haynesville Shale, and Bossier Shale Formations using

  9. Sill intrusion in volcanic calderas: implications for vent opening probability

    Science.gov (United States)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    Calderas show peculiar behaviors with remarkable dynamic processes, which do not often culminate in eruptions. Observations and studies conducted in recent decades have shown that the most common cause of unrest in the calderas is due to magma intrusion; in particular, the intrusion of sills at shallow depths. Monogenic cones, with large areal dispersion, are quite common in the calderas, suggesting that the susceptibility analysis based on geological features, is not strictly suitable for estimating the vent opening probability in calderas. In general, the opening of a new eruptive vent can be regarded as a rock failure process. The stress field in the rocks that surrounds and tops the magmatic reservoirs plays an important role in causing the rock failure and creating the path that magma can follow towards the surface. In this conceptual framework, we approach the problem of getting clues about the probability of vent opening in volcanic calderas through the study of the stress field produced by the intrusion of magma, in particular, by the intrusion of a sill. We simulate the intrusion of a sill free to expand radially, with shape and dimensions which vary with time. The intrusion process is controlled by the elastic response of the rock plate above the sill, which bends because of the intrusion, and by gravity, that drives the magma towards the zones where the thickness of the sill is smaller. We calculated the stress field in the plate rock above the sill. We found that at the bottom of the rock plate above the sill the maximum intensity of tensile stress is concentrated at the front of the sill and spreads radially with it, over time. For this reason, we think that the front of the spreading sill is prone to open for eruptive vents. Even in the central area of the sill the intensity of stress is relatively high, but at the base of the rock plate stress is compressive. Under isothermal conditions, the stress soon reaches its maximum value (time interval

  10. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  11. Oxygen isotope mapping and evaluation of paleo-hydrothermal systems associated with synvolcanic intrusion and VMS deposits

    International Nuclear Information System (INIS)

    Taylor, B.E

    2001-01-01

    Whole-rock oxygen isotope mapping provides a useful method for the delineation and quantitative evaluation of paleo-hydrothermal systems associated with syn-volcanic intrusions and volcanic-associated massive sulfide (VMS) deposits. During the course of a four-year study of regional alteration systems associated with VMS Deposits, four syn-volcanic intrusive complexes in Canada were mapped using stable isotope techniques. The complexes included Noranda, Quebec; Clifford-Ben Nevis, Ontario; Snow Lake, Manitoba, and Sturgeon Lake, Ontario. This study was regional in extent, involving large areas and large numbers of whole-rock samples: Noranda (625 km 2 ;≥600 samples, plus others (total = 1198); Sturgeon Lake (525 km 2 ; 452 samples); Clifford-Ben Nevis (160 km 2 ; 251 samples); and Snow Lake (84 km 2 ; 575 samples). Isotopic data on whole-rock carbonates and hydrous minerals were also collected. The regional isotopic studies were carried out in concert with other studies on mineral assemblages and mineral composition, and on associated intrusive and extrusive rocks. The Clifford-Ben Nevis area was selected as a control area, in as much as it contains no known VMS deposits; all other areas are well-known, productive VMS districts. Oxygen isotope maps are, in a sense, thermal maps, illustrating the paleo-distribution of heat and fluids, and offering a potential aid to exploration. The isotopic data may be contoured to reveal zones of 18 O depletion and enrichment, relative to unaltered rocks. Zones of δ 18 O≤60% comprise rocks that have reacted with seawater at high (e.g., 300+ o C) temperatures. The volume of foot-wall rocks isotopically-depleted by water/rock interaction during the life of one or more episodes of submarine hydrothermal activity is proportional to the amount of heat available from the syn-volcanic intrusive center. These altered rocks comprise the reaction zone often inferred to have supplied metals and other constituents for the VMS deposits

  12. Facebook intrusion, fear of missing out, narcissism, and life satisfaction: A cross-sectional study.

    Science.gov (United States)

    Błachnio, Agata; Przepiórka, Aneta

    2018-01-01

    Facebook is one of the most popular social networking sites. The present paper examines the relations between fear of missing out, narcissism, Facebook intrusion, and life satisfaction. We hypothesized that the fear of missing out and narcissism would play a significant role in Facebook intrusion. The participants in the study were 360 Polish users of Facebook. We administered the Facebook Intrusion Scale, the Fear of Missing Out Scale, the Narcissistic Personality Inventory, and the Satisfaction with Life Scale. The results showed that a high level of fear of missing out and high narcissism are predictors of Facebook intrusion, while a low level of fear of missing out and high narcissism are related to satisfaction with life. Our findings provide a more comprehensive picture of the predictors of Facebook intrusion and reveal interesting patterns. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  14. Guidelines for the diagnosis and treatment of acute non-variceal upper gastrointestinal bleeding (2015, Nanchang, China).

    Science.gov (United States)

    Bai, Yu; Li, Zhao Shen

    2016-02-01

    Acute non-variceal upper gastrointestinal bleeding (ANVUGIB) is one of the most common medical emergencies in China and worldwide. In 2009, we published the "Guidelines for the diagnosis and treatment of acute non-variceal upper gastrointestinal bleeding" for the patients in China; however, during the past years numerous studies on the diagnosis and treatment of ANVUGIB have been conducted, and the management of ANVUGIB needs to be updated. The guidelines were updated after the databases including PubMed, Embase and CNKI were searched to retrieve the clinical trials on the management of ANVUGIB. The clinical trials were evaluated for high-quality evidence, and the advances in definitions, diagnosis, etiology, severity evaluation, treatment and prognosis of ANVUGIB were carefully reviewed, the recommendations were then proposed. After several rounds of discussions and revisions among the national experts of digestive endoscopy, gastroenterology, radiology and intensive care, the 2015 version of "Guidelines for the diagnosis and treatment of acute non-variceal upper gastrointestinal bleeding" was successfully developed by the Chinese Journal of Internal Medicine, National Medical Journal of China, Chinese Journal of Digestion and Chinese Journal of Digestive Endoscopy. It shall be noted that although much progress has been made, the clinical management of ANVUGIB still needs further improvement and refinement, and high-quality randomized trials are required in the future. © 2016 Chinese Medical Association Shanghai Branch, Chinese Society of Gastroenterology, Renji Hospital Affiliated to Shanghai Jiaotong University School of Medicine and John Wiley & Sons Australia, Ltd.

  15. An armored-cable-based fiber Bragg grating sensor array for perimeter fence intrusion detection

    Science.gov (United States)

    Hao, Jianzhong; Dong, Bo; Varghese, Paulose; Phua, Jiliang; Foo, Siang Fook

    2012-01-01

    In this paper, an armored-cable-based optical fiber Bragg grating (FBG) sensor array, for perimeter fence intrusion detection, is demonstrated and some of the field trial results are reported. The field trial was conducted at a critical local installation in Singapore in December 2010. The sensor array was put through a series of both simulated and live intrusion scenarios to test the stability and suitability of operation in the local environmental conditions and to determine its capabilities in detecting and reporting these intrusions accurately to the control station. Such a sensor array can provide perimeter intrusion detection with fine granularity and preset pin-pointing accuracy. The various types of intrusions included aided or unaided climbs, tampering and cutting of the fence, etc. The unique sensor packaging structure provides high sensitivity, crush resistance and protection against rodents. It is also capable of resolving nuisance events such as rain, birds sitting on the fence or seismic vibrations. These sensors are extremely sensitive with a response time of a few seconds. They can be customized for a desired spatial resolution and pre-determined sensitivity. Furthermore, it is easy to cascade a series of such sensors to monitor and detect intrusion events over a long stretch of fence line. Such sensors can be applied to real-time intrusion detection for perimeter security, pipeline security and communications link security.

  16. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments....

  17. Working group 4B - human intrusion: Design/performance requirements

    International Nuclear Information System (INIS)

    Channell, J.

    1993-01-01

    There is no summary of the progress made by working group 4B (Human Intrusion: Design/performance Requirements) during the Electric Power Research Institute's EPRI Workshop on the technical basis of EPA HLW Disposal Criteria, March 1993. This group was to discuss the waste disposal standard, 40 CFR Part 191, in terms of the design and performance requirements of human intrusion. Instead, because there were so few members, they combined with working group 4A and studied the three-tier approach to evaluating postclosure performance

  18. Impact of advanced MRI techniques for the diagnosis of dementia: comparison with PET

    DEFF Research Database (Denmark)

    Steffensen, Elena; Prakash, Vineet; Vestergård, Karsten

    Introduction: The use of high magnetic fields in combination with fast algorithms for computer-based postprocessing has moved advanced MRI techniques into clinical practice. MRI provides in analogy with PET physiological information in addition to more traditional morphological images. Evaluation...... with suspected Alzheimer's disease (AD); 4 with suspected frontotemporal dementia (FTD), and 2 were found normal. Mean FA and ADC values in cingulum and in CC for the patient group compared with controls are presented in Table 1. ADC values in CC were higher comparing with controls and higher for patients...... with suspected FTD than for patients with suspected AD. Conclusion: CBF measurements and characteristics obtained by advanced MRI techniques have a potential to facilitate early diagnosis and understanding of dementia....

  19. Data mining approach to web application intrusions detection

    Science.gov (United States)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  20. AdaBoost-based algorithm for network intrusion detection.

    Science.gov (United States)

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  1. Mental Imagery and Posttraumatic Stress Disorder: a neuroimaging and experimental psychopathology approach to intrusive memories of trauma

    Directory of Open Access Journals (Sweden)

    Ian A Clark

    2015-07-01

    Full Text Available This hypothesis and theory paper presents a pragmatic framework to help bridge the clinical presentation and neuroscience of intrusive memories following psychological trauma. Intrusive memories are a hallmark symptom of Posttraumatic Stress Disorder. However, key questions, including those involving aetiology remain. In particular, we know little about the brain mechanisms involved in why only some moments of the trauma return as intrusive memories while others do not. We first present an overview of the patient experience of intrusive memories and the neuroimaging studies that have investigated intrusive memories in PTSD patients. Next, one mechanism of how to model intrusive memories in the laboratory, the trauma film paradigm, is examined. In particular, we focus on studies combining the trauma film paradigm with neuroimaging. Stemming from the clinical presentation and our current understanding of the processes involved in intrusive memories, we propose a framework in which an intrusive memory comprises five component parts; autobiographical (trauma memory, involuntary recall, negative emotions, attention hijacking and mental imagery. Each component part is considered in turn, both behaviourally and from a brain imaging perspective. A mapping of these five components onto our understanding of the brain is described. Unanswered questions that exist in our understanding of intrusive memories are considered using the proposed framework. Overall, we suggest that mental imagery is key to bridging the experience, memory and intrusive recollection of the traumatic event. Further, we suggest that by considering the brain mechanisms involved in the component parts of an intrusive memory, in particular mental imagery, we may be able to aid the development of a firmer bridge between patients’ experiences of intrusive memories and the clinical neuroscience behind them.

  2. A 5-year follow-up case of multiple intrusive luxative injuries

    Directory of Open Access Journals (Sweden)

    Seema Thakur

    2012-01-01

    Full Text Available Introduction: Traumatic intrusive luxation is one of the most severe forms of dental injuries, usually affecting the maxillary incisors. The consequence of such an occurrence is a high risk of healing complications such as pulp necrosis, external inflammatory resorption, and external replacement resorption (ankylosis. Case Report: This report presents a case of severe intrusive luxation of multiple anterior teeth in an 11-year-old girl. The teeth were repositioned successfully by endodontic and orthodontic management. The case was monitored for 5 years. Discussion: Depending on the severity of the injury, different clinical approaches for treatment of intrusive luxation may be used. Despite the variety of treatment modalities, rehabilitation of intruded teeth is always a challenge and a multidisciplinary approach is important to achieve a successful result. In this case, intruded teeth were endodontically treated with multiple calcium hydroxide dressings and repositioned orthodontically. The follow-up of such cases is very important as the repair process after intrusion is complex. After 5 years, no clinical or radiographic pathology was detected.

  3. A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing

    DEFF Research Database (Denmark)

    Wang, Yu; Xie, Lin; Li, Wenjuan

    2017-01-01

    Nowadays, cyber threats (e.g., intrusions) are distributed across various networks with the dispersed networking resources. Intrusion detection systems (IDSs) have already become an essential solution to defend against a large amount of attacks. With the development of cloud computing, a modern IDS...

  4. Geochemical characteristics and tectonic setting of the Tuerkubantao mafic-ultramafic intrusion in West Junggar, Xinjiang, China

    Directory of Open Access Journals (Sweden)

    Yufeng Deng

    2015-03-01

    Full Text Available Mineral chemistry, whole-rock major oxide, and trace element compositions have been determined for the Tuerkubantao mafic-ultramafic intrusion, in order to understand the early Paleozoic tectonic evolution of the West Junggar orogenic belt at the southern margin of the Central Asian orogenic belt. The Tuerkubantao mafic-ultramafic intrusion is a well-differentiated complex comprising peridotite, olivine pyroxenite, gabbro, and diorite. The ultramafic rocks are mostly seen in the central part of the intrusion and surrounded by mafic rocks. The Tuerkubantao intrusive rocks are characterized by enrichment of large ion lithophile elements and depleted high field strength elements relative to N-MORB. In addition, the Tuerkubantao intrusion displays relatively low Th/U and Nb/U (1.13–2.98 and 2.53–7.02, respectively and high La/Nb and Ba/Nb (1.15–4.19 and 37.7–79.82, respectively. These features indicate that the primary magma of the intrusion was derived from partial melting of a previously metasomatized mantle source in a subduction setting. The trace element patterns of peridotites, gabbros, and diorite in the Tuerkubantao intrusion have sub-parallel trends, suggesting that the different rock types are related to each other by differentiation of the same primary magma. The intrusive contact between peridotite and gabbro clearly suggest that the Tuerkubantao is not a fragment of an ophiolite. However, the Tuerkubantao intrusion displays many similarities with Alaskan-type mafic-ultramafic intrusions along major sutures of Phanerozoic orogenic belts. Common features include their geodynamic setting, internal lithological zoning, and geochemistry. The striking similarities indicate that the middle Devonian Tuerkubantao intrusion likely formed in a subduction-related setting similar to that of the Alaskan-type intrusions. In combination with the Devonian magmatism and porphyry mineralization, we propose that subduction of the oceanic slab has

  5. The assessment of human intrusion into underground repositories for radioactive waste Volume 1: Main report

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Asthon, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  6. Visualization by discharge illumination technique and modification by plasma actuator of rarefied Mach 2 airflow around a cylinder

    International Nuclear Information System (INIS)

    Leger, L; Depussay, E; Sellam, M; Barbosa, E

    2013-01-01

    The use of plasma actuators for flow control has received considerable attention in recent years. This kind of device seems to be an appropriate means of raising abilities in flow control thanks to total electric control, no moving parts and a fast response time. The experimental work presented here shows, firstly, the non-intrusive character of the visualization of the density field of an airflow around a cylinder obtained using a plasma luminescence technique. Experiments are made in a continuous supersonic wind tunnel. The static pressure in the flow is 8 Pa, the mean free path is about 0.3 mm and the airflow velocity is 510 m s −1 . Pressure measurements obtained by means of glass Pitot tube without the visualization discharge are proposed. Measured and simulated pressure profiles are in good agreement in the region near the cylinder. There is good correlation between numerical simulations of the supersonic flow field, analytical model predictions and experimental flow visualizations obtained by a plasma luminescence technique. Consequently, we show that the plasma luminescence technique is non-intrusive. Secondly, the effect of a dc discharge on a supersonic rarefied air flow around a cylinder is studied. An electrode is flush mounted on the cylinder. Stagnation pressure profiles are examined for different electrode positions on the cylinder. A shock wave modification depending on the electrode location is observed. The discharge placed at the upstream stagnation point induces an upstream shift of the bow shock, whereas a modification of the shock wave shape is observed when it is placed at 45° or 90°. (paper)

  7. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  8. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.

    Science.gov (United States)

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  9. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  10. Diagnosis of deep endometriosis: clinical examination, ultrasonography, magnetic resonance imaging, and other techniques.

    Science.gov (United States)

    Bazot, Marc; Daraï, Emile

    2017-12-01

    The aim of the present review was to evaluate the contribution of clinical examination and imaging techniques, mainly transvaginal sonography and magnetic resonance imaging (MRI) to diagnose deep infiltrating (DE) locations using prisma statement recommendations. Clinical examination has a relative low sensitivity and specificity to diagnose DE. Independently of DE locations, for all transvaginal sonography techniques a pooled sensitivity and specificity of 79% and 94% are observed approaching criteria for a triage test. Whatever the protocol and MRI devices, the pooled sensitivity and specificity for pelvic endometriosis diagnosis were 94% and 77%, respectively. For rectosigmoid endometriosis, pooled sensitivity and specificity of MRI were 92% and 96%, respectively fulfilling criteria of replacement test. In conclusion, advances in imaging techniques offer high sensitivity and specificity to diagnose DE with at least triage value and for rectosigmoid endometriosis replacement value imposing a revision of the concept of laparoscopy as the gold standard. Copyright © 2017 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  11. Illness intrusiveness among survivors of autologous blood and marrow transplantation.

    Science.gov (United States)

    Schimmer, A D; Elliott, M E; Abbey, S E; Raiz, L; Keating, A; Beanlands, H J; McCay, E; Messner, H A; Lipton, J H; Devins, G M

    2001-12-15

    Illness-induced disruptions to lifestyles, activities, and interests (i.e., illness intrusiveness) compromise subjective well-being. The authors measured illness intrusiveness in autologous blood and bone marrow transplantation (ABMT) survivors and compared the results with survivors of solid organ transplants. Forty-four of 64 consecutive ABMT survivors referred to the University of Toronto ABMT long-term follow-up clinic completed the Illness Intrusiveness Ratings Scale (IIRS), the Affect Balance Scale (ABS), the Atkinson Life Happiness Rating (ATKLH), the Beck Hopelessness Scale (BHS), and the Center for Epidemiologic Studies Depression (CES-D) Scale. Mean time from ABMT to evaluation was 4.6 +/- 2.8 years. All patients were in remission or had stable disease at the time of evaluation. Autologous blood and bone marrow transplantation patients' IIRS scores were compared with scores reported by recipients of kidney (n = 357), liver (n = 150), lung (n = 77), and heart (n = 60) transplants. Mean IIRS score for the 44 ABMT patients was 37.2 +/- 17 (maximum possible score, 91; minimum possible score, 13). Higher IIRS scores correlated with lower scores on the ABS (r = -0.54; P work, financial situation, and active recreation. Despite achieving a remission after ABMT, patients continue to experience illness intrusiveness compromising subjective well-being. Copyright 2001 American Cancer Society.

  12. The Optical Flow Technique on the Research of Solar Non-potentiality

    Science.gov (United States)

    Liu, Ji-hong; Zhang, Hong-qi

    2010-06-01

    Several optical flow techniques, which have being applied to the researches of solar magnetic non-potentiality recently, have been summarized here. And a few new non-potential parameters which can be derived from them have been discussed, too. The main components of the work are presented as follows: (1) The optical flow techniques refers to a series of new image analyzing techniques arisen recently on the researches of solar magnetic non-potentiality. They mainly include LCT (local correlation tracking), ILCT (inductive equation combining with LCT), MEF (minimum energy effect), DAVE (differential affine velocity estimator) and NAVE (nonlinear affine velocity estimator). Their calculating and applying conditions, merits and deficiencies, all have been discussed detailedly in this work. (2) Benefit from the optical flow techniques, the transverse velocity fields of the magnetic features on the solar surface may be determined by a time sequence of high-quality images currently produced by high-resolution observations either from the ground or in space. Consequently, several new non-potential parameters may be acquired, such as the magnetic helicity flux, the induced electric field in the photosphere, the non-potential magnetic stress (whose area integration is the Lorentz force), etc. Then we can determine the energy flux across the photosphere, and subsequently evaluate the energy budget. Former works on them by small or special samples have shown that they are probably related closely to the erupting events, such as flare, filament eruptions and coronal mass ejections.

  13. Strontium isotopic geochemistry of intrusive rocks, Puerto Rico, Greater Antilles

    International Nuclear Information System (INIS)

    Jones, L.M.; Kesler, S.E.

    1980-01-01

    The strontium isotope geochemistry is given for three Puerto Rican intrusive rocks: the granodioritic Morovis and San Lorenzo plutons and the Rio Blanco stock of quartz dioritic composition. The average calculated initial 87 Sr/ 86 Sr ratios are 0.70370, 0.70355 and 0.70408, respectively. In addition, the San Lorenzo data establish a whole-rock isochron of 71 +- 2 m.y., which agrees with the previously reported K-Ar age of 73 m.y. Similarity of most of the intrusive rocks in the Greater Antilles with respect to their strontium isotopic geochemistry regardless of their major element composition indicates that intrusive magmas with a wide range of composition can be derived from a single source material. The most likely source material, in view of the available isotopic data, is the mantle wedge overlying the subduction zone. (orig.)

  14. Isotopes in medical diagnosis. New techniques reviewed at Vienna symposium

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1959-04-15

    The medical uses of radioisotopes cover diagnosis and therapy as well as clinical research. There is specialized equipment not only detects the radiations from a radioactive substance inside the body, but also produces a two-dimensional visual image of the size and functional condition of tissue that absorbs this substance. This is known as medical radioisotope scanning, aimed at determining the distribution of a radioisotope within an organ which specifically concentrates a radioisotope. Methods of scanning are exceedingly complex, and although a variety of equipment is now available for the automatic determination of the distribution of a radioisotope in an organ, experience of their use is still limited. To facilitate an adequate exchange of views and a pooling of experience in this field, the International Atomic Energy Agency and the World Health Organization recently arranged a seminar to discuss the techniques and results of scanning. Topics discussed included problems of collimation, sensitivity patterns of various collimating systems, optimum isotope concentrations, essential requirements for obtaining satisfactory visualization by a scanner, basic principles of scintillation counting, a the scintillation camera, isotope scanning for studies on liver disorders and liver tumours, radiogold used for liver scanning, scanning the liver and pancreas with the help of positron-emitting isotopes, measuring the distribution of radioisotopes in deep lying tissues by detection of 'bremsstrahlen', 'profile counting', brain tumour scanning with the usage of radioarsenic or radioiodine-labelled albumen, different aspects of thyroid scanning, value and methods of scanning in thyroid cancer as well as scanning procedures in non-cancerous thyroid disease. During the discussions Dr. Keroe (IAEA) demonstrated a new electronic device, the use of which results in a substantial increase of contrast and resolution of the recordings of a scanning machine, and which is the first

  15. Lower crustal intrusions beneath the southern Baikal Rift Zone

    DEFF Research Database (Denmark)

    Nielsen, Christoffer; Thybo, Hans

    2009-01-01

    centre. The BEST (Baikal Explosion Seismic Transect) project acquired a 360-km long, deep seismic, refraction/wide-angle reflection profile in 2002 across southern Lake Baikal. The data from this project is used for identification of large-scale crustal structures and modelling of the seismic velocities....../s and 7.9 km/s. We interpret this feature as resulting from mafic to ultra-mafic intrusions in the form of sills. Petrological interpretation of the velocity values suggests that the intrusions are sorted by fractional crystallization into plagioclase-rich low-velocity layers and pyroxene- and olivine...

  16. Individual differences in spatial configuration learning predict the occurrence of intrusive memories.

    Science.gov (United States)

    Meyer, Thomas; Smeets, Tom; Giesbrecht, Timo; Quaedflieg, Conny W E M; Girardelli, Marta M; Mackay, Georgina R N; Merckelbach, Harald

    2013-03-01

    The dual-representation model of posttraumatic stress disorder (PTSD; Brewin, Gregory, Lipton, & Burgess, Psychological Review, 117, 210-232 2010) argues that intrusions occur when people fail to construct context-based representations during adverse experiences. The present study tested a specific prediction flowing from this model. In particular, we investigated whether the efficiency of temporal-lobe-based spatial configuration learning would account for individual differences in intrusive experiences and physiological reactivity in the laboratory. Participants (N = 82) completed the contextual cuing paradigm, which assesses spatial configuration learning that is believed to depend on associative encoding in the parahippocampus. They were then shown a trauma film. Afterward, startle responses were quantified during presentation of trauma reminder pictures versus unrelated neutral and emotional pictures. PTSD symptoms were recorded in the week following participation. Better configuration learning performance was associated with fewer perceptual intrusions, r = -.33, p .46) and had no direct effect on intrusion-related distress and overall PTSD symptoms, rs > -.12, ps > .29. However, configuration learning performance tended to be associated with reduced physiological responses to unrelated negative images, r = -.20, p = .07. Thus, while spatial configuration learning appears to be unrelated to affective responding to trauma reminders, our overall findings support the idea that the context-based memory system helps to reduce intrusions.

  17. Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

    OpenAIRE

    Jingyu Wang; xuefeng Zheng; Dengliang Luo

    2011-01-01

    Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources and reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. In order to address the problem of intrusion tolerance of cloud computing platform and sensitive data in...

  18. Formation of thick stratiform Fe-Ti oxide layers in layered intrusion and frequent replenishment of fractionated mafic magma: Evidence from the Panzhihua intrusion, SW China

    Science.gov (United States)

    Song, Xie-Yan; Qi, Hua-Wen; Hu, Rui-Zhong; Chen, Lie-Meng; Yu, Song-Yue; Zhang, Jia-Fei

    2013-03-01

    Panzhihua intrusion is one of the largest layered intrusions that hosts huge stratiform Fe-Ti oxide layers in the central part of the Emeishan large igneous province, SW China. Up to 60 m thick stratiform massive Fe-Ti oxide layers containing 85 modal% of magnetite and ilmenite and overlying magnetite gabbro compose cyclic units of the Lower Zone of the intrusion. The cyclic units of the Middle Zone consist of magnetite gabbro and overlying gabbro. In these cyclic units, contents of Fe2O3(t), TiO2 and Cr and Fe3+/Ti4+ ratio of the rocks decrease upward, Cr content of magnetite and forsterite percentage of olivine decrease as well. The Upper Zone consists of apatite gabbro characterized by enrichment of incompatible elements (e.g., 12-18 ppm La, 20-28 ppm Y) and increasing of Fe3+/Ti4+ ratio (from 1.3 to 2.3) upward. These features indicate that the Panzhihua intrusion was repeatedly recharged by more primitive magma and evolved magmas had been extracted. Calculations using MELTS indicate that extensive fractionation of olivine and clinopyroxene in deep level resulted in increasing Fe and Ti contents in the magma. When these Fe-Ti-enriched magmas were emplaced along the base of the Panzhihua intrusion, Fe-Ti oxides became an early crystallization phase, leading to a residual magma of lower density. We propose that the unusually thick stratiform Fe-Ti oxide layers resulted from coupling of gravity settling and sorting of the crystallized Fe-Ti oxides from Fe-Ti-enriched magmas and frequent magma replenishment along the floor of the magma chamber.

  19. Intrusive Images in Psychological Disorders

    Science.gov (United States)

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  20. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    International Nuclear Information System (INIS)

    P. Bernot

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and