WorldWideScience

Sample records for potential saltwater intrusion

  1. Potential for saltwater intrusion into the lower Tamiami aquifer near Bonita Springs, southwestern Florida

    Science.gov (United States)

    Shoemaker, W. Barclay; Edwards, K. Michelle

    2003-01-01

    A study was conducted to examine the potential for saltwater intrusion into the lower Tamiami aquifer beneath Bonita Springs in southwestern Florida. Field data were collected, and constant- and variable-density ground-water flow simulations were performed that: (1) spatially quantified modern and seasonal stresses, (2) identified potential mechanisms of saltwater intrusion, and (3) estimated the potential extent of saltwater intrusion for the area of concern. MODFLOW and the inverse modeling routine UCODE were used to spatially quantify modern and seasonal stresses by calibrating a constant-density ground-water flow model to field data collected in 1996. The model was calibrated by assuming hydraulic conductivity parameters were accurate and by estimating unmonitored ground-water pumpage and potential evapotranspiration with UCODE. Uncertainty in these estimated parameters was quantified with 95-percent confidence intervals. These confidence intervals indicate more uncertainty (or less reliability) in the estimates of unmonitored ground-water pumpage than estimates of pan-evaporation multipliers, because of the nature and distribution of observations used during calibration. Comparison of simulated water levels, streamflows, and net recharge with field data suggests the model is a good representation of field conditions. Potential mechanisms of saltwater intrusion into the lower Tamiami aquifer include: (1) lateral inland movement of the freshwater-saltwater interface from the southwestern coast of Florida; (2) upward leakage from deeper saline water-bearing zones through natural upwelling and upconing, both of which could occur as diffuse upward flow through semiconfining layers, conduit flow through karst features, or pipe flow through leaky artesian wells; (3) downward leakage of saltwater from surface-water channels; and (4) movement of unflushed pockets of relict seawater. Of the many potential mechanisms of saltwater intrusion, field data and variable

  2. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  3. Analysis of potential saltwater intrusion at NEP I and II power station

    Energy Technology Data Exchange (ETDEWEB)

    Lee, D.W.

    1980-06-01

    The potential of adverse environmental impacts to groundwater availability and groundwater quality from construction dewatering of the coastal aquifer at a proposed New England Power site was examined with an analytical model. The drawdown zone and the extent of saltwater intrusion were predicted with and without the use of a slurry-wall barrier. The use of a slurry wall to mitigate any adverse impacts is feasible but the limited understanding of the coastal aquifer demands that monitoring requirements be included in the construction plan.

  4. Analysis of potential saltwater intrusion at NEP I and II power station

    International Nuclear Information System (INIS)

    Lee, D.W.

    1980-06-01

    The potential of adverse environmental impacts to groundwater availability and groundwater quality from construction dewatering of the coastal aquifer at a proposed New England Power site was examined with an analytical model. The drawdown zone and the extent of saltwater intrusion were predicted with and without the use of a slurry-wall barrier. The use of a slurry wall to mitigate any adverse impacts is feasible but the limited understanding of the coastal aquifer demands that monitoring requirements be included in the construction plan

  5. Potential effects of deepening the St. Johns River navigation channel on saltwater intrusion in the surficial aquifer system, Jacksonville, Florida

    Science.gov (United States)

    Bellino, Jason C.; Spechler, Rick M.

    2013-01-01

    The U.S. Army Corps of Engineers (USACE) has proposed dredging a 13-mile reach of the St. Johns River navigation channel in Jacksonville, Florida, deepening it to depths between 50 and 54 feet below North American Vertical Datum of 1988. The dredging operation will remove about 10 feet of sediments from the surficial aquifer system, including limestone in some locations. The limestone unit, which is in the lowermost part of the surficial aquifer system, supplies water to domestic wells in the Jacksonville area. Because of density-driven hydrodynamics of the St. Johns River, saline water from the Atlantic Ocean travels upstream as a saltwater “wedge” along the bottom of the channel, where the limestone is most likely to be exposed by the proposed dredging. A study was conducted to determine the potential effects of navigation channel deepening in the St. Johns River on salinity in the adjacent surficial aquifer system. Simulations were performed with each of four cross-sectional, variable-density groundwater-flow models, developed using SEAWAT, to simulate hypothetical changes in salinity in the surficial aquifer system as a result of dredging. The cross-sectional models were designed to incorporate a range of hydrogeologic conceptualizations to estimate the effect of uncertainty in hydrogeologic properties. The cross-sectional models developed in this study do not necessarily simulate actual projected conditions; instead, the models were used to examine the potential effects of deepening the navigation channel on saltwater intrusion in the surficial aquifer system under a range of plausible hypothetical conditions. Simulated results for modeled conditions indicate that dredging will have little to no effect on salinity variations in areas upstream of currently proposed dredging activities. Results also indicate little to no effect in any part of the surficial aquifer system along the cross section near River Mile 11 or in the water-table unit along the cross

  6. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  7. Climate Change and Saltwater Intrusion along the Eastern ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Eastern Mediterranean is highly vulnerable to saltwater intrusion into the freshwater aquifers along its coasts. The degradation of these aquifers would result in serious socioeconomic consequence to people living there. This project will investigate how climate change is affecting the salinity of coastal aquifers at several ...

  8. Saltwater Intrusion Appraisal of Shallow Aquifer in Burutu Area of ...

    African Journals Online (AJOL)

    ADOWIE PERE

    is not caused by saltwater intrusion rather by iron which cannot be separately distinguished from groundwater by ... The sand and gravels forms the aquifer in the. Formation and are .... K.S; Soulios, G; Pliakas, F; Tsokas, G ( 2016). Seawater ...

  9. Mapping saltwater intrusion in the Biscayne Aquifer, Miami-Dade County, Florida using transient electromagnetic sounding

    Science.gov (United States)

    Fitterman, David V.

    2014-01-01

    Saltwater intrusion in southern Florida poses a potential threat to the public drinking-water supply that is typically monitored using water samples and electromagnetic induction logs collected from a network of wells. Transient electromagnetic (TEM) soundings are a complementary addition to the monitoring program because of their ease of use, low cost, and ability to fill in data gaps between wells. TEM soundings have been used to map saltwater intrusion in the Biscayne aquifer over a large part of south Florida including eastern Miami-Dade County and the Everglades. These two areas are very different with one being urban and the other undeveloped. Each poses different conditions that affect data collection and data quality. In the developed areas, finding sites large enough to make soundings is difficult. The presence of underground pipes further restricts useable locations. Electromagnetic noise, which reduces data quality, is also an issue. In the Everglades, access to field sites is difficult and working in water-covered terrain is challenging. Nonetheless, TEM soundings are an effective tool for mapping saltwater intrusion. Direct estimates of water quality can be obtained from the inverted TEM data using a formation factor determined for the Biscayne aquifer. This formation factor is remarkably constant over Miami-Dade County owing to the uniformity of the aquifer and the absence of clay. Thirty-six TEM soundings were collected in the Model Land area of southeast Miami-Dade County to aid in calibration of a helicopter electromagnetic (HEM) survey. The soundings and HEM survey revealed an area of saltwater intrusion aligned with canals and drainage ditches along U.S. Highway 1 and the Card Sound Road. These canals and ditches likely reduced freshwater levels through unregulated drainage and provided pathways for seawater to flow at least 12.4 km inland.

  10. Effects of climate change on saltwater intrusion at Hilton Head Island, SC. U.S.A.

    Science.gov (United States)

    Payne, Dorothy F.

    2010-01-01

    Sea‐level rise and changes in precipitation patterns may contribute to the occurrence and affect the rate of saltwater contamination in the Hilton Head Island, South Carolina area. To address the effects of climate change on saltwater intrusion, a threedimensional, finite‐element, variable‐density, solute‐transport model was developed to simulate different rates of sea‐level rise and variation in onshore freshwater recharge. Model simulation showed that the greatest effect on the existing saltwater plume occurred from reducing recharge, suggesting recharge may be a more important consideration in saltwater intrusion management than estimated rates of sea‐level rise. Saltwater intrusion management would benefit from improved constraints on recharge rates by using model‐independent, local precipitation and evapotranspiration data, and improving estimates of confining unit hydraulic properties.

  11. Stratigraphic controls on saltwater intrusion in the Dominguez Gap area of coastal Los Angeles

    Science.gov (United States)

    Edwards, B.D.; Ehman, K.D.; Ponti, D.J.; Reichard, E.G.; Tinsley, J.C.; Rosenbauer, R.J.; Land, M.

    2009-01-01

    a broad anticlinal fold that occurs parallel to, but ??2 km north of, the axis of the Pliocene Wilmington anticline. The Dominguez sequence breaches the crest of the young anticline, cuts through the upper Pleistocene Mesa and Pacific sequences, and into the middle Pleistocene Harbor sequence. Saltwater migrates along channels within the Dominguez sequence and into the underlying sequences (composed mostly of shallow marine and tidal sands, silts, and clays) that contain the classically defined Gage and Lynwood aquifers. The newly recognized Pacific Coast Highway fault cuts through the core of this young fold and is downthrown on the northern side, thereby creating accommodation space for a thick succession of middle Pleistocene sediments that constitute the Upper Wilmington sequence. North of the Pacific Coast Highway fault, the Upper Wilmington sequence contains the classic Silverado aquifer (composed of fluviodeltaic deposits); the Silverado is the primary freshwater aquifer for the West Coast and Central Los Angeles Groundwater Basins. Pore fluid and electric log analyses show the upper part of this aquifer to be saline-intruded near the crest of the young fold. This relationship implies that some saltwater is migrating into deeper aquifers from above, across the regional unconformity that marks the base of the Harbor sequence (ca. 240-270 ka). This sequence-stratigraphic model provides new insight into the potential flow paths for saltwater intrusion, and as such, should allow improved characterization of fluidflow that will aid in transport model studies and in managing groundwater resources. ?? 2009 Geological Society of America.

  12. Conjunctive Management of Multi-Aquifer System for Saltwater Intrusion Mitigation

    Science.gov (United States)

    Tsai, F. T. C.; Pham, H. V.

    2015-12-01

    Due to excessive groundwater withdrawals, many water wells in Baton Rouge, Louisiana experience undesirable chloride concentration because of saltwater intrusion. The study goal is to develop a conjunctive management framework that takes advantage of the Baton Rouge multi-aquifer system to mitigate saltwater intrusion. The conjunctive management framework utilizes several hydraulic control techniques to mitigate saltwater encroachment. These hydraulic control approaches include pumping well relocation, freshwater injection, saltwater scavenging, and their combinations. Specific objectives of the study are: (1) constructing scientific geologic architectures of the "800-foot" sand, the "1,000-foot" sand, the "1,200-foot" sand, the "1,500-foot" sand, the "1,700-foot" sand, and the "2,000-foot" sand, (2) developing scientific saltwater intrusion models for these sands. (3) using connector wells to draw native groundwater from one sand and inject to another sand to create hydraulic barriers to halt saltwater intrusion, (4) using scavenger wells or well couples to impede saltwater intrusion progress and reduce chloride concentration in pumping wells, and (5) reducing cones of depression by relocating and dispersing pumping wells to different sands. The study utilizes optimization techniques and newest LSU high performance computing (HPC) facilities to derive solutions. The conjunctive management framework serves as a scientific tool to assist policy makers to solve the urgent saltwater encroachment issue in the Baton Rouge area. The research results will help water companies as well as industries in East Baton Rouge Parish and neighboring parishes by reducing their saltwater intrusion threats, which in turn would sustain Capital Area economic development.

  13. Effective use of surface-water management to control saltwater intrusion

    Science.gov (United States)

    Hughes, J. D.; White, J.

    2012-12-01

    The Biscayne aquifer in southeast Florida is susceptible to saltwater intrusion and inundation from rising sea-level as a result of high groundwater withdrawal rates and low topographic relief. Groundwater levels in the Biscayne aquifer are managed by an extensive canal system that is designed to control flooding, supply recharge to municipal well fields, and control saltwater intrusion. We present results from an integrated surface-water/groundwater model of a portion of the Biscayne aquifer to evaluate the ability of the existing managed surface-water control network to control saltwater intrusion. Surface-water stage and flow are simulated using a hydrodynamic model that solves the diffusive-wave approximation of the depth-integrated shallow surface-water equations. Variable-density groundwater flow and fluid density are solved using the Oberbeck--Boussinesq approximation of the three-dimensional variable-density groundwater flow equation and a sharp interface approximation, respectively. The surface-water and variable-density groundwater domains are implicitly coupled during each Picard iteration. The Biscayne aquifer is discretized into a multi-layer model having a 500-m square horizontal grid spacing. All primary and secondary surface-water features in the active model domain are discretized into segments using the 500-m square horizontal grid. A 15-year period of time is simulated and the model includes 66 operable surface-water control structures, 127 municipal production wells, and spatially-distributed daily internal and external hydrologic stresses. Numerical results indicate that the existing surface-water system can be effectively used in many locations to control saltwater intrusion in the Biscayne aquifer resulting from increases in groundwater withdrawals or sea-level rise expected to occur over the next 25 years. In other locations, numerical results indicate surface-water control structures and/or operations may need to be modified to control

  14. Application of Time-Domain Electromagnetic Method in Investigating Saltwater Intrusion of Santiago Island (Cape Verde)

    Science.gov (United States)

    Gonçalves, Rui; Farzamian, Mohammad; Monteiro Santos, Fernando A.; Represas, Patrícia; Mota Gomes, A.; Lobo de Pina, A. F.; Almeida, Eugénio P.

    2017-11-01

    Santiago Island, the biggest and most populated island of the Cape Verde Republic, is characterised by limited surface waters and strong dependence on groundwater sources as the primary source of natural water supply for extensive agricultural activity and human use. However, as a consequence of the scarce precipitation and high evaporation as well as the intense overexploitation of the groundwater resources, the freshwater management is also in a delicate balance with saltwater at coastal areas. The time-domain electromagnetic (TDEM) method is used to locate the extent of saltwater intrusion in four important agricultural regions in Santiago Island; São Domingos, Santa Cruz, São Miguel, and Tarrafal. The application of this method in Santiago Island proves it to be a successful tool in imaging the fresh/saltwater interface location. Depths to the saline zones and extensions of saline water are mapped along eight TDEM profiles.

  15. Effects of climate variability on saltwater intrusions in coastal aquifers in Southern Denmark

    Science.gov (United States)

    Meyer, Rena; Sonnenborg, Torben; Engesgaard, Peter; Høyer, Anne-Sophie; Jørgensen, Flemming; Hisnby, Klaus; Hansen, Birgitte; Jensen, Jørn Bo; Piotrowski, Jan A.

    2016-04-01

    As in many other regions of the world fresh water supply in Denmark is based on groundwater resources. Aquifers in the low-lying areas in the south-west of Jutland are particularly vulnerable to saltwater intrusions which are likely to intensify due to relative sea level rise. To understand the dynamics and development of this complex flow system, the initial hydrodynamic conditions imposed by the last Scandinavian Ice Sheet (SIS) must be taken into account. The whole region has undergone changes in climatic and hydraulic conditions within the last 15000 years that may show influence on the present flow conditions. It is likely that the groundwater-flow dynamics, driven by the postglacial hydraulic head drop and the relative sea level rise are not yet equilibrated. Enhanced by the potential future sea level rise due to climate change, contamination of fresh-water aquifers will continue. The 2800-km2 - large coast-to-coast study area located in the southern part of Jutland was partly overridden by the Weichselian ice sheet. Geophysical and geological mapping shows salt water intrusions up to 20 km inland from the present coast. Based on a geological voxel model spanning Miocene through Quaternary deposits a large-scale 3D numerical groundwater flow and salt water transport model has been developed. It includes density-driven flow and simulates the distribution of the current saltwater intrusions and their evolution during the last 15000 years. Particle tracking and direct age simulations are performed to identify recharge areas and constrain groundwater ages. The simulated ages are compared to ages derived from isotope analysis of groundwater samples both from Miocene and Quaternary aquifers. The origin of the groundwater is determined based on isotopic and chemical composition. Additionally, heavy noble gas analysis is carried out to estimate recharge temperatures and mechanisms at locations where groundwater recharge during the last glaciation is indicated. This

  16. Using state-of-the-art technology to evaluate saltwater intrusion in the Biscayne aquifer of Miami-Dade County, Florida

    Science.gov (United States)

    Prinos, Scott T.

    2014-01-01

    The fresh groundwater supplies of many communities have been adversely affected or limited by saltwater intrusion. An insufficient understanding of the origin of intruded saltwater may lead to inefficient or ineffective water-resource management. A 2008–2012 cooperative U.S. Geological Survey (USGS) and Miami-Dade County study of saltwater intrusion describes state-of-the art technology used to evaluate the origin and distribution of this saltwater.

  17. Notes on saltwater intrusion and trace element distribution in Metro Manila groundwaters

    International Nuclear Information System (INIS)

    Santos, G. Jr.; Ramos, A.F.; Fernandez, L.G.; Almoneda, R.V.; Garcia, T.Y.; Cruz, C.C.; Petrache, C.A.; Andal, T.T.; Alcantara, E.

    1989-01-01

    Preliminary analyses of waters for uranium and other trace elements from deepwells operated by the Metropolitan Waterworks and Sewerage System (MWSS) in Metro Manila were performed. Uranium, which ranged from 0.2 ppb to 6 ppb, was correlated with saltwater intrusion. Values >=0.8 ppb for uranium were considered indicative of saline water intrusion in the aquifers. Saline water intrusions in Malabon, Navotas, Paranaque, Las Pinas, Bacoor, Imus, Kawit, Pasig, Antipolo, San Mateo, Taguig, Cainta, Taytay, Alabang and Muntinlupa were noted. Most of these areas were also identified by MWSS as being affected by saltwater intrusion. Tritium values ranged from 0 (below detection limits) to 44 tritium units. Except for one well in Muntinlupa, all the values obtained were below the lower limit of detection of 30.83 T.U. Mercury contents in six well locations had values above the maximum limit set by the National Standards for Drinking Water. Four wells exceeded the permissible level for manganese while two wells had iron concentrations greater than the National Standards. Other trace element concentrations such as Cr, Pb, Zn, Co and Ni either did not exceed their permissible levels or were not included in the National Standards. (Auth.). 6 refs.; 1 tab.; 3 figs

  18. Synergy of climate change and local pressures on saltwater intrusion in heterogeneous coastal aquifers

    Science.gov (United States)

    Abou Najm, M.; Safi, A.; El-Fadel, M.; Doummar, J.; Alameddine, I.

    2016-12-01

    The relative importance of climate change induced sea level rise on the salinization of a highly urbanized karstified coastal aquifers were compared with non-sustainable pumping. A 3D variable-density groundwater flow and solute transport model was used to predict the displacement of the saltwater-freshwater interface in a pilot aquifer located along the Eastern Mediterranean. The results showed that the influence of sea level rise was marginal when compared with the encroachment of salinity associated with anthropogenic abstraction. Model predictions of salinity mass and volumetric displacement of the interface corresponding to a long-term monthly transient model showed that the saltwater intrusion dynamic is highly sensitive to change in the abstraction rates which were estimated based on combinations of water consumption rates and population growth rates. Salinity encroachment, however, appeared to be more sensitive to water consumption rates in comparison to population growth rates, where a 50% increase in the rate of former led to four times more intrusion as compared to an equivalent increase in population growth rate over 20 years. Coupling both increase in population growth and increased consumption rates had a synergistic effect that aggravated the intrusion beyond the sum of the individual impacts. Adaptation strategies targeting a decrease in groundwater exploitation proved to be effective in retarding the intrusion.

  19. Impact of the bottom drag coefficient on saltwater intrusion in the extremely shallow estuary

    Science.gov (United States)

    Lyu, Hanghang; Zhu, Jianrong

    2018-02-01

    The interactions between the extremely shallow, funnel-shaped topography and dynamic processes in the North Branch (NB) of the Changjiang Estuary produce a particular type of saltwater intrusion, saltwater spillover (SSO), from the NB into the South Branch (SB). This dominant type of saltwater intrusion threatens the winter water supplies of reservoirs located in the estuary. Simulated SSO was weaker than actual SSO in previous studies, and this problem has not been solved until now. The improved ECOM-si model with the advection scheme HSIMT-TVD was applied in this study. Logarithmic and Chézy-Manning formulas of the bottom drag coefficient (BDC) were established in the model to investigate the associated effect on saltwater intrusion in the NB. Modeled data and data collected at eight measurement stations located in the NB from February 19 to March 1, 2017, were compared, and three skill assessment indicators, the correlation coefficient (CC), root-mean-square error (RMSE), and skill score (SS), of water velocity and salinity were used to quantitatively validate the model. The results indicated that the water velocities modeled using the Chézy-Manning formula of BDC were slightly more accurate than those based on the logarithmic BDC formula, but the salinities produced by the latter formula were more accurate than those of the former. The results showed that the BDC increases when water depth decreases during ebb tide, and the results based on the Chézy-Manning formula were smaller than those based on the logarithmic formula. Additionally, the landward net water flux in the upper reaches of the NB during spring tide increases based on the Chézy-Manning formula, and saltwater intrusion in the NB was enhanced, especially in the upper reaches of the NB. At a transect in the upper reaches of the NB, the net transect water flux (NTWF) is upstream in spring tide and downstream in neap tide, and the values produced by the Chézy-Manning formula are much larger than

  20. Effects of sea-level rise and pumpage elimination on saltwater intrusion in the Hilton Head Island area, South Carolina, 2004-2104

    Science.gov (United States)

    Payne, Dorothy F.

    2010-01-01

    Saltwater intrusion of the Upper Floridan aquifer has been observed in the Hilton Head area, South Carolina since the late 1970s and currently affects freshwater supply. Rising sea level in the Hilton Head Island area may contribute to the occurrence of and affect the rate of saltwater intrusion into the Upper Floridan aquifer by increasing the hydraulic gradient and by inundating an increasing area with saltwater, which may then migrate downward into geologic units that presently contain freshwater. Rising sea level may offset any beneficial results from reductions in groundwater pumpage, and thus needs to be considered in groundwater-management decisions. A variable-density groundwater flow and transport model was modified from a previously existing model to simulate the effects of sea-level rise in the Hilton Head Island area. Specifically, the model was used to (1) simulate trends of saltwater intrusion from predevelopment to the present day (1885-2004) and evaluate the conceptual model, (2) project these trends from the present day into the future based on different potential rates of sea-level change, and (3) evaluate the relative influences of pumpage and sea-level rise on saltwater intrusion. Four scenarios were simulated for 2004-2104: (1) continuation of the estimated sea-level rise rate over the last century, (2) a doubling of the sea-level rise, (3) a cessation of sea-level rise, and (4) continuation of the rate over the last century coupled with an elimination of all pumpage. Results show that, if present-day (year 2004) pumping conditions are maintained, the extent of saltwater in the Upper Floridan aquifer will increase, whether or not sea level continues to rise. Furthermore, if all pumpage is eliminated and sea level continues to rise, the simulated saltwater extent in the Upper Floridan aquifer is reduced. These results indicate that pumpage is a strong driving force for simulated saltwater intrusion, more so than sea-level rise at current rates

  1. Geophysical characterization of saltwater intrusion in a coastal aquifer: The case of Martil-Alila plain (North Morocco)

    Science.gov (United States)

    Himi, Mahjoub; Tapias, Josefiina; Benabdelouahab, Sara; Salhi, Adil; Rivero, Luis; Elgettafi, Mohamed; El Mandour, Abdenabi; Stitou, Jamal; Casas, Albert

    2017-02-01

    Several factors can affect the quantity and the quality of groundwater resources, but in coastal aquifers seawater intrusion is often the most significant issue regarding freshwater supply. Further, saltwater intrusion is a worldwide issue because about seventy percent of the world's population lives in coastal regions. Generally, fresh groundwater not affected by saltwater intrusion is characterized by low salinity and therefore low electrical conductivity (EC) values. Consequently, high values of EC in groundwater along the coastline are usually associated to seawater intrusion. This effect is amplified if the coastal aquifer is overexploited with a subsequent gradual displacement of the freshwater-saltwater interface towards the continent. Delineation of marine intrusion in coastal aquifers has traditionally relied upon observation wells and collection of water samples. This approach may miss important hydrologic features related to saltwater intrusion in areas where access is difficult and where wells are widely spaced. Consequently, the scarcity of sampling points and sometimes their total absence makes the number of data available limited and most of the time not representative for mapping the spatial and temporal variability of groundwater salinity. In this study, we use a series of geophysical methods for characterizing the aquifer geometry and the extension of saltwater intrusion in the Martil-Alila coastal region (Morocco) as a complement to geological and hydrogeochemical data. For this reason, we carried out three geophysical surveys: Gravity, Electrical Resistivity and Frequency Domain Electromagnetic. The geometry of the basin has been determined from the interpretation of a detailed gravity survey. Electrical resistivity models derived from vertical electrical soundings allowed to characterize the vertical and the lateral extensions of aquifer formations. Finally, frequency domain electromagnetic methods allowed delineating the extension of the

  2. Origins and delineation of saltwater intrusion in the Biscayne aquifer and changes in the distribution of saltwater in Miami-Dade County, Florida

    Science.gov (United States)

    Prinos, Scott T.; Wacker, Michael A.; Cunningham, Kevin J.; Fitterman, David V.

    2014-01-01

    Intrusion of saltwater into parts of the shallow karst Biscayne aquifer is a major concern for the 2.5 million residents of Miami-Dade County that rely on this aquifer as their primary drinking water supply. Saltwater intrusion of this aquifer began when the Everglades were drained to provide dry land for urban development and agriculture. The reduction in water levels caused by this drainage, combined with periodic droughts, allowed saltwater to flow inland along the base of the aquifer and to seep directly into the aquifer from the canals. The approximate inland extent of saltwater was last mapped in 1995. An examination of the inland extent of saltwater and the sources of saltwater in the aquifer was completed during 2008–2011 by using (1) all available salinity information, (2) time-series electromagnetic induction log datasets from 35 wells, (3) time-domain electromagnetic soundings collected at 79 locations, (4) a helicopter electromagnetic survey done during 2001 that was processed, calibrated, and published during the study, (5) cores and geophysical logs collected from 8 sites for stratigraphic analysis, (6) 8 new water-quality monitoring wells, and (7) analyses of 69 geochemical samples. The results of the study indicate that as of 2011 approximately 1,200 square kilometers (km2) of the mainland part of the Biscayne aquifer were intruded by saltwater. The saltwater front was mapped farther inland than it was in 1995 in eight areas totaling about 24.1 km2. In many of these areas, analyses indicated that saltwater had encroached along the base of the aquifer. The saltwater front was mapped closer to the coast than it was in 1995 in four areas totaling approximately 6.2 km2. The changes in the mapped extent of saltwater resulted from improved spatial information, actual movement of the saltwater front, or a combination of both. Salinity monitoring in some of the canals in Miami-Dade County between 1988 and 2010 indicated influxes of saltwater, with maximum

  3. A modeling study of saltwater intrusion in the Andarax delta area using multiple data sources

    DEFF Research Database (Denmark)

    Antonsson, Arni Valur; Engesgaard, Peter Knudegaard; Jorreto, Sara

    context. The validity of a conceptual model is determined by different factors, where both data quantity and quality is of crucial importance. Often, when dealing with saltwater intrusion, data is limited. Therefore, using different sources (and types) of data can be beneficial and increase......In groundwater model development, construction of the conceptual model is one of the (initial and) critical aspects that determines the model reliability and applicability in terms of e.g. system (hydrogeological) understanding, groundwater quality predictions, and general use in water resources...

  4. Managing saltwater intrusion in coastal arid regions and its societal implications for agriculture

    Directory of Open Access Journals (Sweden)

    J. Grundmann

    2016-05-01

    Full Text Available Coastal aquifers in arid and semiarid regions are particularly at risk due to intrusion of salty marine water. Since groundwater is predominantly used in irrigated agriculture, its excessive pumping – above the natural rate of replenishment – strengthen the intrusion process. Using this increasingly saline water for irrigation, leads to a destruction of valuable agricultural resources and the economic basis of farmers and their communities. The limitation of resources (water and soil in these regions requires a societal adaptation and change in behaviour as well as the development of appropriate management strategies for a transition towards stable and sustainable future hydrosystem states. Besides a description of the system dynamics and the spatial consequences of adaptation on the resources availability, the contribution combines results of an empirical survey with stakeholders and physically based modelling of the groundwater-agriculture hydrosystem interactions. This includes an analysis of stakeholders' (farmers and decision makers behaviour and opinions regarding several management interventions aiming on water demand and water resources management as well as the thinking of decision makers how farmers will behave. In this context, the technical counter measures to manage the saltwater intrusion by simulating different groundwater pumping strategies and scenarios are evaluated from the economic and social point of view and if the spatial variability of the aquifer's hydrogeology is taken into consideration. The study is exemplarily investigated for the south Batinah region in the Sultanate of Oman, which is affected by saltwater intrusion into a coastal aquifer system due to excessive groundwater withdrawal for irrigated agriculture.

  5. Groundwater Modeling in Coastal Arid Regions Under the Influence of Marine Saltwater Intrusion

    Science.gov (United States)

    Walther, Marc; Kolditz, Olaf; Grundmann, Jens; Liedl, Rudolf

    2010-05-01

    The optimization of an aquifer's "safe yield", especially within agriculturally used regions, is one of the fundamental tasks for nowaday's groundwater management. Due to the limited water ressources in arid regions, conflict of interests arise that need to be evaluated using scenario analysis and multicriterial optimization approaches. In the context of the government-financed research project "International Water Research Alliance Saxony" (IWAS), the groundwater quality for near-coastal, agriculturally used areas is investigated under the influence of marine saltwater intrusion. Within the near-coastal areas of the study region, i.e. the Batinah plains of Northern Oman, an increasing agricultural development could be observed during the recent decades. Simultaneously, a constant lowering of the groundwater table was registered, which is primarily due to the uncontrolled and unsupervised mining of the aquifers for the local agricultural irrigation. Intensively decreased groundwater levels, however, cause an inversion of the hydraulic gradient which is naturally aligned towards the coast. This, in turn,leads to an intrusion of marine saltwater flowing inland, endangering the productivity of farms near the coast. Utilizing the modeling software package OpenGeoSys, which has been developed and constantly enhanced by the Department of Environmental Informatics at the Helmholtz Centre for Environmental Research Leipzig (UFZ; Kolditz et al., 2008), a three-dimensional, density-dependent model including groundwater flow and mass transport is currently being built up. The model, comprehending three selected coastal wadis of interest, shall be used to investigate different management scenarios. The main focus of the groundwater modelling are the optimization of well positions and pumping schemes as well as the coupling with a surface runoff model, which is also used for the determination of the groundwater recharge due to wadi runoff downstream of retention dams. Based on

  6. Consequences and mitigation of saltwater intrusion induced by short-circuiting during aquifer storage and recovery in a coastal subsurface

    Science.gov (United States)

    Gerardus Zuurbier, Koen; Stuyfzand, Pieter Jan

    2017-02-01

    Coastal aquifers and the deeper subsurface are increasingly exploited. The accompanying perforation of the subsurface for those purposes has increased the risk of short-circuiting of originally separated aquifers. This study shows how this short-circuiting negatively impacts the freshwater recovery efficiency (RE) during aquifer storage and recovery (ASR) in coastal aquifers. ASR was applied in a shallow saltwater aquifer overlying a deeper, confined saltwater aquifer, which was targeted for seasonal aquifer thermal energy storage (ATES). Although both aquifers were considered properly separated (i.e., a continuous clay layer prevented rapid groundwater flow between both aquifers), intrusion of deeper saltwater into the shallower aquifer quickly terminated the freshwater recovery. The presumable pathway was a nearby ATES borehole. This finding was supported by field measurements, hydrochemical analyses, and variable-density solute transport modeling (SEAWAT version 4; Langevin et al., 2007). The potentially rapid short-circuiting during storage and recovery can reduce the RE of ASR to null. When limited mixing with ambient groundwater is allowed, a linear RE decrease by short-circuiting with increasing distance from the ASR well within the radius of the injected ASR bubble was observed. Interception of deep short-circuiting water can mitigate the observed RE decrease, although complete compensation of the RE decrease will generally be unattainable. Brackish water upconing from the underlying aquitard towards the shallow recovery wells of the ASR system with multiple partially penetrating wells (MPPW-ASR) was observed. This leakage may lead to a lower recovery efficiency than based on current ASR performance estimations.

  7. Saltwater intrusion in the surficial aquifer system of the Big Cypress Basin, southwest Florida, and a proposed plan for improved salinity monitoring

    Science.gov (United States)

    Prinos, Scott T.

    2013-01-01

    The installation of drainage canals, poorly cased wells, and water-supply withdrawals have led to saltwater intrusion in the primary water-use aquifers in southwest Florida. Increasing population and water use have exacerbated this problem. Installation of water-control structures, well-plugging projects, and regulation of water use have slowed saltwater intrusion, but the chloride concentration of samples from some of the monitoring wells in this area indicates that saltwater intrusion continues to occur. In addition, rising sea level could increase the rate and extent of saltwater intrusion. The existing saltwater intrusion monitoring network was examined and found to lack the necessary organization, spatial distribution, and design to properly evaluate saltwater intrusion. The most recent hydrogeologic framework of southwest Florida indicates that some wells may be open to multiple aquifers or have an incorrect aquifer designation. Some of the sampling methods being used could result in poor-quality data. Some older wells are badly corroded, obstructed, or damaged and may not yield useable samples. Saltwater in some of the canals is in close proximity to coastal well fields. In some instances, saltwater occasionally occurs upstream from coastal salinity control structures. These factors lead to an incomplete understanding of the extent and threat of saltwater intrusion in southwest Florida. A proposed plan to improve the saltwater intrusion monitoring network in the South Florida Water Management District’s Big Cypress Basin describes improvements in (1) network management, (2) quality assurance, (3) documentation, (4) training, and (5) data accessibility. The plan describes improvements to hydrostratigraphic and geospatial network coverage that can be accomplished using additional monitoring, surface geophysical surveys, and borehole geophysical logging. Sampling methods and improvements to monitoring well design are described in detail. Geochemical analyses

  8. Application and evaluation of electromagnetic methods for imaging saltwater intrusion in coastal aquifers: Seaside Groundwater Basin, California

    Science.gov (United States)

    Nenna, Vanessa; Herckenrather, Daan; Knight, Rosemary; Odlum, Nick; McPhee, Darcy

    2013-01-01

    Developing effective resource management strategies to limit or prevent saltwater intrusion as a result of increasing demands on coastal groundwater resources requires reliable information about the geologic structure and hydrologic state of an aquifer system. A common strategy for acquiring such information is to drill sentinel wells near the coast to monitor changes in water salinity with time. However, installation and operation of sentinel wells is costly and provides limited spatial coverage. We studied the use of noninvasive electromagnetic (EM) geophysical methods as an alternative to installation of monitoring wells for characterizing coastal aquifers. We tested the feasibility of using EM methods at a field site in northern California to identify the potential for and/or presence of hydraulic communication between an unconfined saline aquifer and a confined freshwater aquifer. One-dimensional soundings were acquired using the time-domain electromagnetic (TDEM) and audiomagnetotelluric (AMT) methods. We compared inverted resistivity models of TDEM and AMT data obtained from several inversion algorithms. We found that multiple interpretations of inverted models can be supported by the same data set, but that there were consistencies between all data sets and inversion algorithms. Results from all collected data sets suggested that EM methods are capable of reliably identifying a saltwater-saturated zone in the unconfined aquifer. Geophysical data indicated that the impermeable clay between aquifers may be more continuous than is supported by current models.

  9. The Henry-Saltwater Intrusion Benchmark – Alternatives in Multiphysics Formulations and Solution Strategies

    Directory of Open Access Journals (Sweden)

    E Holzbecher

    2016-03-01

    Full Text Available In a classical paper Henry set up a conceptual model for simulating saltwater intrusion into coastal aquifers. Up to now the problem has been taken up by software developers and modellers as a benchmark for codes simulating coupled flow and transport in porous media. The Henry test case has been treated using different numerical methods based on various formulations of differential equations. We compare several of these approaches using multiphysics software. We model the problem using Finite Elements, utilizing the primitive variables and the streamfunction approach, both with and without using the Oberbeck-Boussinesq assumption. We compare directly coupled solvers with segregated solver strategies. Changing finite element orders and mesh refinement, we find that models based on the streamfunction converge 2-4 times faster than runs based on primitive variables. Concerning the solution strategy, we find an advantage of Picard iterations compared to monolithic Newton iterations.

  10. Imaging Saltwater Intrusion Along the Coast of Monterey Bay Using Long-Offset Electrical Resistivity Tomography

    Science.gov (United States)

    Goebel, M.; Knight, R. J.; Pidlisecky, A.

    2016-12-01

    Coastal regions represent a complex dynamic interface where saltwater intrusion moves seawater landward and groundwater discharge moves freshwater seaward. These processes can have a dramatic impact on water quality, affecting both humans and coastal ecosystems. The ability to map the subsurface distribution of fresh and salt water is a critical step in predicting and managing water quality in coastal regions. This is commonly accomplished using wells, which are expensive and provide point information, which may fail to capture the spatial complexity in subsurface conditions. We present an alternate method for acquiring data, long-offset Electrical Resistivity Tomography (ERT), which is non-invasive, cost effective, and can address the problem of poor spatial sampling. This geophysical method can produce continuous profiles of subsurface electrical resistivity to a depth of 300 m, with spatial resolution on the order of tens of meters. Our research focuses on the Monterey Bay region, where sustained groundwater extraction over the past century has led to significant saltwater intrusion. ERT was acquired along 40 kilometers of the coast using the roll along method, allowing for continuous overlap in data acquisition. Electrodes were spaced every 22.2 m, with a total of 81 electrodes along the 1.8 km active cable length. The data show a complex distribution of fresh and salt water, influenced by geology, groundwater pumping, recharge, and land-use. While the inverted ERT resistivity profiles correspond well with existing data sets and geologic interpretations in the region, the spatial complexity revealed through the ERT data goes beyond what is known from traditional data sources alone. This leads us to conclude that this form of data can be extremely useful in informing and calibrating groundwater flow models, making targeted management decisions, and monitoring changes in subsurface salinities over time.

  11. Monitoring and Assessment of Saltwater Intrusion using Geographic Information Systems (GIS), Remote Sensing and Geophysical measurements of Guimaras Island, Philippines

    Science.gov (United States)

    Hernandez, B. C. B.

    2015-12-01

    Degrading groundwater quality due to saltwater intrusion is one of the key challenges affecting many island aquifers. These islands hold limited capacity for groundwater storage and highly dependent on recharge due to precipitation. But its ease of use, natural storage and accessibility make it more vulnerable to exploitation and more susceptible to encroachment from its surrounding oceanic waters. Estimating the extent of saltwater intrusion and the state of groundwater resources are important in predicting and managing water supply options for the community. In Guimaras island, central Philippines, increasing settlements, agriculture and tourism are causing stresses on its groundwater resource. Indications of saltwater intrusion have already been found at various coastal areas in the island. A Geographic Information Systems (GIS)-based approach using the GALDIT index was carried out. This includes six parameters assessing the seawater intrusion vulnerability of each hydrogeologic setting: Groundwater occurrence, Aquifer hydraulic conductivity, Groundwater Level above sea, Distance to shore, Impact of existing intrusion and Thickness of Aquifer. To further determine the extent of intrusion, Landsat images of various thematic layers were stacked and processed for unsupervised classification and electrical resistivity tomography using a 28-electrode system with array lengths of 150 and 300 meters was conducted. The GIS index showed where the vulnerable areas are located, while the geophysical measurements and images revealed extent of seawater encroachment along the monitoring wells. These results are further confirmed by the measurements collected from the monitoring wells. This study presents baseline information on the state of groundwater resources and increase understanding of saltwater intrusion dynamics in island ecosystems by providing a guideline for better water resource management in the Philippines.

  12. Influence of the Three Gorges Project on saltwater intrusion in the Yangtze River Estuary

    Science.gov (United States)

    An, Qiang; Wu, Yanqing; Taylor, Shauna; Zhao, Bin

    2009-02-01

    The Three Gorges Project (TGP) is a transcentury project that has aroused world attention. It is expected that the flow velocity and runoff of the Yangtze River will be changed after the project has been accomplished. Consequently, however, the ecological environment in the Yangtze River Basin, particularly in the estuary region, will be affected. Salinity intrusion into the Yangtze River estuary, in general, is mostly affected by the Yangtze River discharge and its external tidal level. This paper focuses on examining the influence of changes in runoff on salinity value. The question, to which should be paid attention is: how is the interaction between changes in runoff of the Yangtze River and salinity distribution in the Yangtze River estuary, China? In this research, a three-dimensional model has been used to identify the effects of runoff change on salinity distribution. The drawn conclusion is that the change of salinity is influenced by discharge variation. Positive and negative impacts of TGP would both turn up but in different period. In sum, TGP is in favor of restraining saltwater intrusion. Nevertheless a suitable method should be found to resolve its negative influences.

  13. Simulation of saltwater intrusion in a poorly karstified coastal aquifer in Lebanon (Eastern Mediterranean)

    Science.gov (United States)

    Khadra, Wisam M.; Stuyfzand, Pieter J.

    2018-03-01

    To date, there has been no agreement on the best way to simulate saltwater intrusion (SWI) in karst aquifers. An equivalent porous medium (EPM) is usually assumed without justification of its applicability. In this paper, SWI in a poorly karstified aquifer in Lebanon is simulated in various ways and compared to measurements. Time series analysis of rainfall and aquifer response is recommended to decide whether quickflow through conduits can be safely ignored. This aids in justifying the selection of the exemplified EPM model. To examine the improvement of SWI representation when discrete features (DFs) are embedded in the model domain, the results of a coupled discrete-continuum (CDC) approach (a hybrid EPM-DF approach) are compared to the EPM model. The two approaches yielded reasonable patterns of hydraulic head and groundwater salinity, which seem trustworthy enough for management purposes. The CDC model also reproduced some local anomalous chloride patterns, being more adaptable with respect to the measurements. It improved the overall accuracy of salinity predictions at wells and better represented the fresh-brackish water interface. Therefore, the CDC approach can be beneficial in modeling SWI in poorly karstified aquifers, and should be compared with the results of the EPM method to decide whether the differences in the outcome at local scale warrant its (more complicated) application. The simulation utilized the SEAWAT code since it is density dependent and public domain, and it enjoys widespread application. Including DFs necessitated manual handling because the selected code has no built-in option for such features.

  14. Hydrogeology, water quality, and saltwater intrusion in the Upper Floridan Aquifer in the offshore area near Hilton Head Island, South Carolina, and Tybee Island, Georgia, 1999-2002

    Science.gov (United States)

    Falls, W. Fred; Ransom, Camille; Landmeyer, James E.; Reuber, Eric J.; Edwards, Lucy E.

    2005-01-01

    To assess the hydrogeology, water quality, and the potential for saltwater intrusion in the offshore Upper Floridan aquifer, a scientific investigation was conducted near Tybee Island, Georgia, and Hilton Head Island, South Carolina. Four temporary wells were drilled at 7, 8, 10, and 15 miles to the northeast of Tybee Island, and one temporary well was drilled in Calibogue Sound west of Hilton Head Island. The Upper Floridan aquifer at the offshore and Calibogue sites includes the unconsolidated calcareous quartz sand, calcareous quartz sandstone, and sandy limestone of the Oligocene Lazaretto Creek and Tiger Leap Formations, and the limestone of the late Eocene Ocala Limestone and middle Avon Park Formation. At the 7-, 10-, and 15-mile sites, the upper confining unit between the Upper Floridan and surficial aquifers correlates to the Miocene Marks Head Formation. Paleochannel incisions have completely removed the upper confining unit at the Calibogue site and all but a 0.8-foot-thick interval of the confining unit at the 8-mile site, raising concern about the potential for saltwater intrusion through the paleochannel-fill sediments at these two sites. The paleochannel incisions at the Calibogue and 8-mile sites are filled with fine- and coarse-grained sediments, respectively. The hydrogeologic setting and the vertical hydraulic gradients at the 7- and 10-mile sites favored the absence of saltwater intrusion during predevelopment. After decades of onshore water use in Georgia and South Carolina, the 0-foot contour in the regional cone of depression of the Upper Floridan aquifer is estimated to have been at the general location of the 7- and 10-mile sites by the mid-1950s and at or past the 15-mile site by the 1980s. The upward vertical hydraulic gradient reversed, but the presence of more than 17 feet of upper confining unit impeded the downward movement of saltwater from the surficial aquifer to the Upper Floridan aquifer at the 7- and 10-mile sites. At the 10

  15. Evaluation of the effects of sea-level change and coastal canal management on saltwater intrusion in the Biscayne aquifer of south Florida, USA

    Science.gov (United States)

    Hughes, J. D.; Sifuentes, D. F.; White, J.

    2015-12-01

    Sea-level increases are expected to have an effect on the position of the freshwater-saltwater interface in the Biscayne aquifer in south Florida as a result of the low topographic relief of the area and high rates of groundwater withdrawal from the aquifer. To study the effects that future sea-level increases will have on saltwater intrusion in the Biscayne aquifer in Broward County, Florida, a three-dimensional, variable-density, groundwater-flow and transport model was developed. The model was calibrated to observed groundwater heads and chloride concentrations for a 62-year period that includes historic increases in sea level, development of a surface-water management system to control flooding, and increases in groundwater withdrawals as the area transitioned from agricultural to urban land uses. Sensitivity analyses indicate that downward leakage of saltwater from coastal canals and creeks was the primary source of saltwater to the Biscayne aquifer during the last 62-years in areas where the surface-water system is not actively managed and is tidally influenced. In areas removed from the coastal canals and creeks or under active surface-water management, historic groundwater withdrawals were the primary cause of saltwater intrusion into the aquifer. Simulation of future conditions suggests that possible increases in sea level will result in additional saltwater intrusion. Model scenarios suggest that additional saltwater intrusion will be greatest in areas where coastal canals and creeks were historically the primary source of seawater. Future saltwater intrusion in those areas, however, may be reduced by relocation of salinity-control structures.

  16. Linking river, floodplain, and vadose zone hydrology to improve restoration of a coastal river affected by saltwater intrusion.

    Science.gov (United States)

    Kaplan, D; Muñoz-Carpena, R; Wan, Y; Hedgepeth, M; Zheng, F; Roberts, R; Rossmanith, R

    2010-01-01

    Floodplain forests provide unique ecological structure and function, which are often degraded or lost when watershed hydrology is modified. Restoration of damaged ecosystems requires an understanding of surface water, groundwater, and vadose (unsaturated) zone hydrology in the floodplain. Soil moisture and porewater salinity are of particular importance for seed germination and seedling survival in systems affected by saltwater intrusion but are difficult to monitor and often overlooked. This study contributes to the understanding of floodplain hydrology in one of the last bald cypress [Taxodium distichum (L.) Rich.] floodplain swamps in southeast Florida. We investigated soil moisture and porewater salinity dynamics in the floodplain of the Loxahatchee River, where reduced freshwater flow has led to saltwater intrusion and a transition to salt-tolerant, mangrove-dominated communities. Twenty-four dielectric probes measuring soil moisture and porewater salinity every 30 min were installed along two transects-one in an upstream, freshwater location and one in a downstream tidal area. Complemented by surface water, groundwater, and meteorological data, these unique 4-yr datasets quantified the spatial variability and temporal dynamics of vadose zone hydrology. Results showed that soil moisture can be closely predicted based on river stage and topographic elevation (overall Nash-Sutcliffe coefficient of efficiency = 0.83). Porewater salinity rarely exceeded tolerance thresholds (0.3125 S m(-1)) for bald cypress upstream but did so in some downstream areas. This provided an explanation for observed vegetation changes that both surface water and groundwater salinity failed to explain. The results offer a methodological and analytical framework for floodplain monitoring in locations where restoration success depends on vadose zone hydrology and provide relationships for evaluating proposed restoration and management scenarios for the Loxahatchee River.

  17. Computational benefits using artificial intelligent methodologies for the solution of an environmental design problem: saltwater intrusion.

    Science.gov (United States)

    Papadopoulou, Maria P; Nikolos, Ioannis K; Karatzas, George P

    2010-01-01

    Artificial Neural Networks (ANNs) comprise a powerful tool to approximate the complicated behavior and response of physical systems allowing considerable reduction in computation time during time-consuming optimization runs. In this work, a Radial Basis Function Artificial Neural Network (RBFN) is combined with a Differential Evolution (DE) algorithm to solve a water resources management problem, using an optimization procedure. The objective of the optimization scheme is to cover the daily water demand on the coastal aquifer east of the city of Heraklion, Crete, without reducing the subsurface water quality due to seawater intrusion. The RBFN is utilized as an on-line surrogate model to approximate the behavior of the aquifer and to replace some of the costly evaluations of an accurate numerical simulation model which solves the subsurface water flow differential equations. The RBFN is used as a local approximation model in such a way as to maintain the robustness of the DE algorithm. The results of this procedure are compared to the corresponding results obtained by using the Simplex method and by using the DE procedure without the surrogate model. As it is demonstrated, the use of the surrogate model accelerates the convergence of the DE optimization procedure and additionally provides a better solution at the same number of exact evaluations, compared to the original DE algorithm.

  18. Modeling the Effects of Storm Surge from Hurricane Jeanne on Saltwater Intrusion into the Surficial Aquifer, East-Central Florida (USA)

    Science.gov (United States)

    Xiao, H.; Wang, D.; Hagen, S. C.; Medeiros, S. C.; Hall, C. R.

    2017-12-01

    Saltwater intrusion (SWI) that has been widely recognized as a detrimental issue causing the deterioration of coastal aquifer water quality and degradation of coastal ecosystems. While it is widely recognized that SWI is exacerbated worldwide due to global sea-level rise, we show that increased SWI from tropical cyclones under climate change is also a concern. In the Cape Canaveral Barrier Island Complex (CCBIC) located in east-central Florida, the salinity level of the surficial aquifer is of great importance to maintain a bio-diverse ecosystem and to support the survival of various vegetation species. Climate change induced SWI into the surficial aquifer can lead to reduction of freshwater storage and alteration of the distribution and productivity of vegetation communities. In this study, a three-dimensional variable-density SEAWAT model is developed and calibrated to investigate the spatial and temporal variation of salinity level in the surficial aquifer of CCBIC. We link the SEAWAT model to surge model data to examine the effects of storm surge from Hurricane Jeanne. Simulation results indicate that the surficial aquifer salinity level increases significantly right after the occurrence of storm surge because of high aquifer permeability and rapid infiltration and diffusion of the overtopping saltwater, while the surficial aquifer salinity level begins to decrease after the fresh groundwater recharge from the storm's rainfall. The tropical storm precipitation generates an effective hydraulic barrier further impeding SWI and providing seaward freshwater discharge for saltwater dilution and flushing. To counteract the catastrophic effects of storm surge, this natural remediation process may take at least 15-20 years or even several decades. These simulation results contribute to ongoing research focusing on forecasting regional vegetation community responses to climate change, and are expected to provide a useful reference for climate change adaptation planning

  19. A Comprehensive evaluation of groundwater vulnerability to saltwater up-coning and sea water intrusion in a coastal aquifer (case study: Ghaemshahr-juybar aquifer)

    Science.gov (United States)

    Motevalli, Alireza; Moradi, Hamid Reza; Javadi, Saman

    2018-02-01

    Aquifer salinization has recently increased significantly due to human activity and has caused irreparable environmental and economic effects. In this research, a new method is proposed for modeling the vulnerability to salinity for the Ghaemshahr-juybar aquifer. Specifically, the GALDIT (Sea water intrusion) and TAWLBIC (Saltwater up-coning) indices were combined to produce a map of vulnerability (Comprehensive Salinity Index or CSI) to seawater intrusion of a region near the coast and saltwater up-coning away from the coast, respectively. Single parameter and removal layer sensitivity analysis were performed in order to identify the sensitive parameters and achieve optimal weights (through the single-parameter method) of contributing factors in all three methods. The three optimized methods produced were GALDIT-Opt, TAWLBIC-Opt and CSI-Opt. To assess the accuracy of the original maps and optimal ones, the Pearson correlation was used. Results indicated that the Pearson correlation of the optimized GALDIT, TAWLBIC and CSI model was better than GALDIT, TAWLBIC and CSI. The results show that the increase in correlation between EC (Electrical Conductivity), TDS (Total Dissolved Solids) and SAR (Sodium Adsorption Ratio) from the GALDIT model to the CSI-Opt model from values of 0.64, 0.56 and 0.68 has improved to values of 0.81, 0.88 and 0.91, respectively. The highest concentration of EC, with a value of 7050 μs/cm, is sampled in the areas of the east and northwest of the Ghaemshahr-juybar aquifer, which are classified in the CSI-Opt model as high and very high vulnerability levels. The highest concentration of TDS and SAR has been found in the east, northwest and northeast of the Ghaemshahr-juybar aquifer with a value of 4724 ppm for TDS and 14 mg/l for SAR that have been modeled in the CSI-Opt index as highly vulnerable areas. Eventually, CSI mapping can be used as an efficient tool in prioritizing in terms of the vulnerability to aquifer salinity, carrying out

  20. The role of dunes in contrasting saltwater intrusion in coastal areas; a case study in the southern Po Plain Adriatic coast (Ravenna, Northern Italy)

    Science.gov (United States)

    Marconi, V.; Antonellini, M.; Balugani, E.; Minchio, A.; Gabbianelli, G.

    2009-04-01

    Due to climate changes and to anthropogenic interventions, saltwater intrusion is affecting the aquifers and the surface water of the Po plain along the Adriatic coast. During the last decade, we recognized in this area a pattern of climate change: precipitations are less frequent and the yearly amount of rain is concentrated in a few strong storm events. This pattern results in an increase of gales strength during the winter, which causes shoreline retreat and an erosion of the coastal dunes. The coastal part of the Po plain consists of a low-lying and mechanically-drained farmland further from the sea and of a narrow belt of dunes and pine forests in the backshore area. The wide sandy beaches are now retreating and the dune system (only a few meters in height) is almoust destroyed, because of tourism development and of disaggregated rivers and shorelines management. A still active dune system is preserved in our study area, a coastal plain included between the Fiumi Uniti and Bevano rivers near the city of Ravenna. As a result of an intensive exploitation of coastal aquifers for agricultural, industrial, and civil uses, both the phreatic aquifer and the surface waters have been contaminated by seawater. Despite its value for the natural ecosystem and the agricultural soil, the phreatic aquifer is not considered of interest by the regional authorities responsible for water management. A detailed hydrogeological survey was performed by our research group during the Summer 2008 within the framework of the CIRCLE-ERANET project WATERKNOW on the effects of climate change on the mediterranean catchments. In this survey 29 auger holes with an average spacing of 350 m where drilled with the objective of determining the top groundwater quality in the coastal aquifer. At the same time, we measured the chemical and physical parameters of the surface waters. The data collected in the field show that a fresh groundwater lens is still present in the aquifer of the backshore

  1. Assessing sea-level rise impact on saltwater intrusion into the root zone of a geo-typical area in coastal east-central Florida.

    Science.gov (United States)

    Xiao, Han; Wang, Dingbao; Medeiros, Stephen C; Hagen, Scott C; Hall, Carlton R

    2018-07-15

    Saltwater intrusion (SWI) into root zone in low-lying coastal areas can affect the survival and spatial distribution of various vegetation species by altering plant communities and the wildlife habitats they support. In this study, a baseline model was developed based on FEMWATER to simulate the monthly variation of root zone salinity of a geo-typical area located at the Cape Canaveral Barrier Island Complex (CCBIC) of coastal east-central Florida (USA) in 2010. Based on the developed and calibrated baseline model, three diagnostic FEMWATER models were developed to predict the extent of SWI into root zone by modifying the boundary values representing the rising sea level based on various sea-level rise (SLR) scenarios projected for 2080. The simulation results indicated that the extent of SWI would be insignificant if SLR is either low (23.4cm) or intermediate (59.0cm), but would be significant if SLR is high (119.5cm) in that infiltration/diffusion of overtopping seawater in coastal low-lying areas can greatly increase root zone salinity level, since the sand dunes may fail to prevent the landward migration of seawater because the waves of the rising sea level can reach and pass over the crest under high (119.5cm) SLR scenario. Copyright © 2018 Elsevier B.V. All rights reserved.

  2. A synthetic study on constaining a 2D density-dependent saltwater intrusion model using electrical imaging data

    DEFF Research Database (Denmark)

    Antonsson, Arni Valur; Nguyen, Frederic; Engesgaard, Peter Knudegaard

    of the synthetic model, basically a salinity distribution in the coastal aquifer, was converted to resistivity distribution by assuming a certain petrophysical relation between water salinity and electrical conductivity. The obtained resistivity distribution was then used when electrical data acquisition...... was simulated. By applying an advanced inversion approach, electrical images of resistivity were obtained and based on the assumed petrophysical model the salinity distribution was derived. A number of different intrusion simulations were conducted with the aim of assessing the applicability of the method under....... Compared to conventional methods, which only give (few) point information, electrical images can give data over large spatial distances but that can be of great value for groundwater modeling purposes. The aim of this study is to investigate in a synthetic way, the applicability of using electrical images...

  3. Characteristics of Phytoplankton Biomass, Primary Production and Community Structure in the Modaomen Channel, Pearl River Estuary, with Special Reference to the Influence of Saltwater Intrusion during Neap and Spring Tides.

    Science.gov (United States)

    Zhou, Weihua; Gao, Jie; Liao, Jianzu; Shi, Ronggui; Li, Tao; Guo, Yajuan; Long, Aimin

    2016-01-01

    In recent decades, increasing frequency and intensity of saltwater intrusion in the Modaomen Channel has threatened the freshwater supply in the surrounding cities of the Pearl River Estuary, and ulteriorly changed the environmental conditions of the estuarine waters. Phytoplankton biomass, primary production (PP) and species composition, as well as hydrological and chemical parameters were examined along a downstream transect in the Modaomen Channel during neap tide (NT) and spring tide (ST), when a strong saltwater intrusion event occurred in late September, 2011. A total of 46 species phytoplankton were identified, including Bacillariophyta (25 species), Dinoflagellate (14 species), Chlorophyta (4 species), Cyanophyta (2 species) and Euglenozoa (1 species). The dominant species were shifted from freshwater diatoms (e.g., Melosira granulata and Melosira granulata var. angustissima) in the upper reaches to saline water diatoms (e.g., Skeletonema costatum and Coscinodiscus sp.) in the river mouth. Generally, phytoplankton density, biomass (chl-a) and PP decreased from the upper to lower reaches along the channel, and were significantly higher in NT than those of ST. There was a shift from large-sized phytoplankton (>20 μm) in the upper reaches to relative small-sized cells (5-20 μm) in the lower reaches. Compared to NT, low discharge and flow velocity, coupled with strong easterly winds during ST specially aggravated saltwater intrusion further to the upstream (~50 km from the estuary). The intruded saltwater diluted nutrients, N/P ratios, chl-a, and phytoplankton abundances, and thereby led to a decline in PP during ST.

  4. Economic impacts of urban flooding in South Florida: Potential consequences of managing groundwater to prevent salt water intrusion.

    Science.gov (United States)

    Czajkowski, Jeffrey; Engel, Vic; Martinez, Chris; Mirchi, Ali; Watkins, David; Sukop, Michael C; Hughes, Joseph D

    2018-04-15

    High-value urban zones in coastal South Florida are considered particularly vulnerable to salt water intrusion into the groundwater-based, public water supplies caused by sea level rise (SLR) in combination with the low topography, existing high water table, and permeable karst substrate. Managers in the region closely regulate water depths in the extensive South Florida canal network to control closely coupled groundwater levels and thereby reduce the risk of saltwater intrusion into the karst aquifer. Potential SLR adaptation strategies developed by local managers suggest canal and groundwater levels may have to be increased over time to prevent the increased salt water intrusion risk to groundwater resources. However, higher canal and groundwater levels cause the loss of unsaturated zone storage and lead to an increased risk of inland flooding when the recharge from rainfall exceeds the capacity of the unsaturated zone to absorb it and the water table reaches the surface. Consequently, higher canal and groundwater levels are also associated with increased risk of economic losses, especially during the annual wet seasons. To help water managers and urban planners in this region better understand this trade-off, this study models the relationships between flood insurance claims and groundwater levels in Miami-Dade County. Via regression analyses, we relate the incurred number of monthly flood claims in 16 Miami-Dade County watersheds to monthly groundwater levels over the period from 1996 to 2010. We utilize these estimated statistical relationships to further illustrate various monthly flood loss scenarios that could plausibly result, thereby providing an economic quantification of a "too much water" trade-off. Importantly, this understanding is the first of its kind in South Florida and is exceedingly useful for regional-scale hydro-economic optimization models analyzing trade-offs associated with high water levels. Copyright © 2017 Elsevier B.V. All rights

  5. Expression Profiles of Branchial FXYD Proteins in the Brackish Medaka Oryzias dancena: A Potential Saltwater Fish Model for Studies of Osmoregulation

    Science.gov (United States)

    Yang, Wen-Kai; Kang, Chao-Kai; Chang, Chia-Hao; Hsu, An-Di; Lee, Tsung-Han; Hwang, Pung-Pung

    2013-01-01

    FXYD proteins are novel regulators of Na+-K+-ATPase (NKA). In fish subjected to salinity challenges, NKA activity in osmoregulatory organs (e.g., gills) is a primary driving force for the many ion transport systems that act in concert to maintain a stable internal environment. Although teleostean FXYD proteins have been identified and investigated, previous studies focused on only a limited group of species. The purposes of the present study were to establish the brackish medaka (Oryzias dancena) as a potential saltwater fish model for osmoregulatory studies and to investigate the diversity of teleostean FXYD expression profiles by comparing two closely related euryhaline model teleosts, brackish medaka and Japanese medaka (O. latipes), upon exposure to salinity changes. Seven members of the FXYD protein family were identified in each medaka species, and the expression of most branchial fxyd genes was salinity-dependent. Among the cloned genes, fxyd11 was expressed specifically in the gills and at a significantly higher level than the other fxyd genes. In the brackish medaka, branchial fxyd11 expression was localized to the NKA-immunoreactive cells in gill epithelia. Furthermore, the FXYD11 protein interacted with the NKA α-subunit and was expressed at a higher level in freshwater-acclimated individuals relative to fish in other salinity groups. The protein sequences and tissue distributions of the FXYD proteins were very similar between the two medaka species, but different expression profiles were observed upon salinity challenge for most branchial fxyd genes. Salinity changes produced different effects on the FXYD11 and NKA α-subunit expression patterns in the gills of the brackish medaka. To our knowledge, this report is the first to focus on FXYD expression in the gills of closely related euryhaline teleosts. Given the advantages conferred by the well-developed Japanese medaka system, we propose the brackish medaka as a saltwater fish model for

  6. Simulation of saltwater movement in the Floridan aquifer system, Hilton Head Island, South Carolina

    Science.gov (United States)

    Bush, Peter W.

    1988-01-01

    Freshwater to supply Hilton Head Island, S.C., is obtained from the upper permeable zone of the Upper Floridan aquifer. Long-term pumping at Savannah, Ga., and the steadily increasing pumping on Hilton Head Island, have lowered Upper Floridan heads near the center of the island from about 10 feet above sea level to about 6 to 7 feet below sea level. The seaward hydraulic gradient that existed before pumping began has been reversed, thus increasing the potential for saltwater intrusion. Simulations of predevelopment, recent, and future ground-water flow in the Floridan aquifer system beneath the north end of Hilton Head Island and Port Royal Sound are presented. A finite-element model for fluid-density-dependent ground-water flow and solute transport was used in cross section. The general configuration of the simulated predevelopment flowfield is typical of a coastal aquifer having a seaward gradient in the freshwater. The freshwater flows toward Port Royal Sound over an intruding wedge of saltwater. The simulated flowfield at the end of 1983 shows that ground water in the Floridan aquifer system beneath most of Hilton Head Island has reversed its predevelopment direction and is moving toward Savannah. The distribution of chloride concentrations, based on simulation at the end of 1983, is about the same as the predevelopment distribution of chloride concentrations obtained from simulation. Results of two 50-year simulations from 1983 to 2034 suggest that there will be no significant threat of saltwater intrusion into the upper permeable zone of the Upper Floridan aquifer if heads on Hilton Head Island remain at current levels for the next 45 to 50 years. However, if head decline continues at the historical rate, any flow that presently occurs from the north end of the island toward Port Royal Sound will cease, allowing lateral intrusion of saltwater to proceed. Even under these conditions, chloride concentrations in the upper permeable zone of the Upper Floridan

  7. A conceptual framework and monitoring strategy for movement of saltwater in the coastal plain aquifer system of Virginia

    Science.gov (United States)

    Mcfarland, E. Randolph

    2015-09-04

    A conceptual framework synthesizes previous studies to provide an understanding of conditions, processes, and relations of saltwater to groundwater withdrawal in the Virginia Coastal Plain aquifer system. A strategy for monitoring saltwater movement is based on spatial relations between the saltwater-transition zone and 612 groundwater-production wells that were regulated during 2013 by the Virginia Department of Environmental Quality. The vertical position and lateral distance and direction of the bottom of each production well’s screened interval was calculated relative to previously published groundwater chloride iso-concentration surfaces. Spatial analysis identified 81 production wells completed in the Yorktown-Eastover and Potomac aquifers that are positioned in closest proximity to the 250-milligrams-per-liter chloride surface, and from which chloride concentrations are most likely to increase above the U.S. Environmental Protection Agency’s 250-milligrams-per-liter secondary maximum-contaminant level. Observation wells are specified to distinguish vertical upconing from lateral intrusion among individual production wells. To monitor upconing, an observation well is to be collocated with each production well and completed at about the altitude of the 250-milligrams-per-liter chloride iso-concentration surface. To monitor lateral intrusion, a potential location of an observation well is projected from the bottom of each production well’s screened interval, in the lateral direction to the underlying chloride surface to a distance of 1 mile.

  8. Criticality Potential of Waste Packages Containing DOE SNF Affected by Igneous Intrusion

    International Nuclear Information System (INIS)

    D.S. Kimball; C.E. Sanders

    2006-01-01

    The Department of Energy (DOE) is currently preparing an application to submit to the U.S. Nuclear Regulatory Commission for a construction authorization for a monitored geologic repository. The repository will contain spent nuclear fuel (SNF) and defense high-level waste (DHLW) in waste packages placed in underground tunnels, or drifts. The primary objective of this paper is to perform a criticality analysis for waste packages containing DOE SNF affected by a disruptive igneous intrusion event in the emplacement drifts. The waste packages feature one DOE SNF canister placed in the center and surrounded by five High-Level Waste (HLW) glass canisters. The effective neutron multiplication factor (k eff ) is determined for potential configurations of the waste package during and after an intrusive igneous event. Due to the complexity of the potential scenarios following an igneous intrusion, finding conservative and bounding configurations with respect to criticality requires some additional considerations. In particular, the geometry of a slumped and damaged waste package must be examined, drift conditions must be modeled over a range of parameters, and the chemical degradation of DOE SNF and waste package materials must be considered for the expected high temperatures. The secondary intent of this calculation is to present a method for selecting conservative and bounding configurations for a wide range of end conditions

  9. Predicting Seawater Intrusion in Coastal Groundwater Boreholes Using Self-Potential Data

    Science.gov (United States)

    Graham, M.; MacAllister, D. J.; Jackson, M.; Vinogradov, J.; Butler, A. P.

    2017-12-01

    Many coastal groundwater abstraction wells are under threat from seawater intrusion: this is exacerbated in summer by low water tables and increased abstraction. Existing hydrochemistry or geophysical techniques often fail to predict the timing of intrusion events. We investigate whether the presence and transport of seawater can influence self-potentials (SPs) measured within groundwater boreholes, with the aim of using SP monitoring to provide early warning of saline intrusion. SP data collection: SP data were collected from a coastal groundwater borehole and an inland borehole (> 60 km from the coast) in the Seaford Chalk of southern England. The SP gradient in the inland borehole was approximately 0.05 mV/m, while that in the coastal borehole varied from 0.16-0.26 mV/m throughout the monitoring period. Spectral analysis showed that semi-diurnal fluctuations in the SP gradient were several orders of magnitude higher at the coast than inland, indicating a strong influence from oceanic tides. A characteristic decrease in the gradient, or precursor, was observed in the coastal borehole several days prior to seawater intrusion. Modelling results: Hydrodynamic transport and geoelectric modelling suggest that observed pressure changes (associated with the streaming potential) are insufficient to explain either the magnitude of the coastal SP gradient or the semi-diurnal SP fluctuations. By contrast, a model of the exclusion-diffusion potential closely matches these observations and produces a precursor similar to that observed in the field. Sensitivity analysis suggests that both a sharp saline front and spatial variations in the exclusion efficiency arising from aquifer heterogeneities are necessary to explain the SP gradient observed in the coastal borehole. The presence of the precursor in the model depends also on the presence and depth of fractures near the base of the borehole. Conclusions: Our results indicate that SP monitoring, combined with hydrodynamic

  10. Protecting coastal abstraction boreholes from seawater intrusion using self-potential data

    Science.gov (United States)

    Graham, Malcolm; Butler, Adrian; MacAllister, Donald John; Vinogradov, Jan; Ijioma, Amadi; Jackson, Matthew

    2016-04-01

    We investigate whether the presence and transport of seawater can influence self-potentials (SPs) measured within coastal groundwater boreholes, with a view to using SP monitoring as part of an early warning system for saline intrusion. SP data were collected over a period of 18 months from a coastal groundwater borehole in the fractured Chalk of England. Spectral analysis of the results shows semi-diurnal fluctuations that are several orders of magnitude higher than those observed from monitoring of the Chalk more than 60 km inland, indicating a strong influence from oceanic tides. Hydrodynamic and geoelectric modelling of the coastal aquifer suggests that observed pressure changes (giving rise to the streaming potential) are not sufficient to explain the magnitude of the observed SP fluctuations. Simulation of the exclusion-diffusion potential, produced by changes in concentration across the saline front, is required to match the SP data from the borehole, despite the front being located some distance away. In late summer of 2013 and 2014, seawater intrusion occurred in the coastal monitoring borehole. When referenced to the shallowest borehole electrode, there was a characteristic increase in SP within the array, several days before any measurable increase in salinity. The size of this precursor increased steadily with depth, typically reaching values close to 0.3 mV in the deepest electrode. Numerical modelling suggests that the exclusion-diffusion potential can explain the magnitude of the precursor, but that the polarity of the change in SP cannot be replicated assuming a homogeneous aquifer. Small-scale models of idealised Chalk blocks were used to simulate the effects of discrete fractures on the distribution of SP. Initial results suggest that comparatively large reductions in voltage can develop in the matrix ahead of the front, in conjunction with a reduced or absent precursor in the vicinity of a fracture. Geophysical logging indicates the presence of a

  11. Phytoforensics: Trees as bioindicators of potential indoor exposure via vapor intrusion.

    Directory of Open Access Journals (Sweden)

    Jordan L Wilson

    Full Text Available Human exposure to volatile organic compounds (VOCs via vapor intrusion (VI is an emerging public health concern with notable detrimental impacts on public health. Phytoforensics, plant sampling to semi-quantitatively delineate subsurface contamination, provides a potential non-invasive screening approach to detect VI potential, and plant sampling is effective and also time- and cost-efficient. Existing VI assessment methods are time- and resource-intensive, invasive, and require access into residential and commercial buildings to drill holes through basement slabs to install sampling ports or require substantial equipment to install groundwater or soil vapor sampling outside the home. Tree-core samples collected in 2 days at the PCE Southeast Contamination Site in York, Nebraska were analyzed for tetrachloroethene (PCE and results demonstrated positive correlations with groundwater, soil, soil-gas, sub-slab, and indoor-air samples collected over a 2-year period. Because tree-core samples were not collocated with other samples, interpolated surfaces of PCE concentrations were estimated so that comparisons could be made between pairs of data. Results indicate moderate to high correlation with average indoor-air and sub-slab PCE concentrations over long periods of time (months to years to an interpolated tree-core PCE concentration surface, with Spearman's correlation coefficients (ρ ranging from 0.31 to 0.53 that are comparable to the pairwise correlation between sub-slab and indoor-air PCE concentrations (ρ = 0.55, n = 89. Strong correlations between soil-gas, sub-slab, and indoor-air PCE concentrations and an interpolated tree-core PCE concentration surface indicate that trees are valid indicators of potential VI and human exposure to subsurface environment pollutants. The rapid and non-invasive nature of tree sampling are notable advantages: even with less than 60 trees in the vicinity of the source area, roughly 12 hours of tree

  12. Phytoforensics: Trees as bioindicators of potential indoor exposure via vapor intrusion.

    Science.gov (United States)

    Wilson, Jordan L; Samaranayake, V A; Limmer, Matt A; Burken, Joel G

    2018-01-01

    Human exposure to volatile organic compounds (VOCs) via vapor intrusion (VI) is an emerging public health concern with notable detrimental impacts on public health. Phytoforensics, plant sampling to semi-quantitatively delineate subsurface contamination, provides a potential non-invasive screening approach to detect VI potential, and plant sampling is effective and also time- and cost-efficient. Existing VI assessment methods are time- and resource-intensive, invasive, and require access into residential and commercial buildings to drill holes through basement slabs to install sampling ports or require substantial equipment to install groundwater or soil vapor sampling outside the home. Tree-core samples collected in 2 days at the PCE Southeast Contamination Site in York, Nebraska were analyzed for tetrachloroethene (PCE) and results demonstrated positive correlations with groundwater, soil, soil-gas, sub-slab, and indoor-air samples collected over a 2-year period. Because tree-core samples were not collocated with other samples, interpolated surfaces of PCE concentrations were estimated so that comparisons could be made between pairs of data. Results indicate moderate to high correlation with average indoor-air and sub-slab PCE concentrations over long periods of time (months to years) to an interpolated tree-core PCE concentration surface, with Spearman's correlation coefficients (ρ) ranging from 0.31 to 0.53 that are comparable to the pairwise correlation between sub-slab and indoor-air PCE concentrations (ρ = 0.55, n = 89). Strong correlations between soil-gas, sub-slab, and indoor-air PCE concentrations and an interpolated tree-core PCE concentration surface indicate that trees are valid indicators of potential VI and human exposure to subsurface environment pollutants. The rapid and non-invasive nature of tree sampling are notable advantages: even with less than 60 trees in the vicinity of the source area, roughly 12 hours of tree-core sampling with minimal

  13. Phytoforensics: Trees as bioindicators of potential indoor exposure via vapor intrusion

    Science.gov (United States)

    Wilson, Jordan L.; Samaranayake, V.A.; Limmer, Matthew A.; Burken, Joel G.

    2018-01-01

    Human exposure to volatile organic compounds (VOCs) via vapor intrusion (VI) is an emerging public health concern with notable detrimental impacts on public health. Phytoforensics, plant sampling to semi-quantitatively delineate subsurface contamination, provides a potential non-invasive screening approach to detect VI potential, and plant sampling is effective and also time- and cost-efficient. Existing VI assessment methods are time- and resource-intensive, invasive, and require access into residential and commercial buildings to drill holes through basement slabs to install sampling ports or require substantial equipment to install groundwater or soil vapor sampling outside the home. Tree-core samples collected in 2 days at the PCE Southeast Contamination Site in York, Nebraska were analyzed for tetrachloroethene (PCE) and results demonstrated positive correlations with groundwater, soil, soil-gas, sub-slab, and indoor-air samples collected over a 2-year period. Because tree-core samples were not collocated with other samples, interpolated surfaces of PCE concentrations were estimated so that comparisons could be made between pairs of data. Results indicate moderate to high correlation with average indoor-air and sub-slab PCE concentrations over long periods of time (months to years) to an interpolated tree-core PCE concentration surface, with Spearman’s correlation coefficients (ρ) ranging from 0.31 to 0.53 that are comparable to the pairwise correlation between sub-slab and indoor-air PCE concentrations (ρ = 0.55, n = 89). Strong correlations between soil-gas, sub-slab, and indoor-air PCE concentrations and an interpolated tree-core PCE concentration surface indicate that trees are valid indicators of potential VI and human exposure to subsurface environment pollutants. The rapid and non-invasive nature of tree sampling are notable advantages: even with less than 60 trees in the vicinity of the source area, roughly 12 hours of tree-core sampling with

  14. The Electrical Self-Potential Method as a Non-Intrusive Snow-Hydrological Sensor

    Science.gov (United States)

    Kulessa, B.; Thompson, S. S.; Luethi, M. P.; Essery, R.

    2015-12-01

    Building on growing momentum in the application of geophysical techniques to snow problems and, specifically, on new theory and an electrical geophysical snow hydrological model published recently; we demonstrate for the first time that the electrical self-potential geophysical technique can sense in-situ bulk meltwater fluxes. This has broad and immediate implications for snow measurement practice, modelling and operational snow forecasting. Our ability to measure, quantify and assimilate hydrological properties and processes of snow in operational models is disproportionally poor compared to the significance of seasonal snowmelt as a global water resource and major risk factor in flood and avalanche forecasting. Encouraged by recent theoretical, modelling and laboratory work, we show here that the diurnal evolution of aerially-distributed self-potential magnitudes closely track those of bulk meltwater fluxes in melting in-situ snowpacks at Rhone and Jungfraujoch glaciers, Switzerland. Numerical modelling infers temporally-evolving liquid water contents in the snowpacks on successive days in close agreement with snow-pit measurements. Muting previous concerns, the governing physical and chemical properties of snow and meltwater became temporally invariant for modelling purposes. Because measurement procedure is straightforward and readily automated for continuous monitoring over significant spatial scales, we conclude that the self-potential geophysical method is a highly-promising non-intrusive snow-hydrological sensor for measurement practice, modelling and operational snow forecasting.

  15. Oklahoma’s recent earthquakes and saltwater disposal

    Science.gov (United States)

    Walsh, F. Rall; Zoback, Mark D.

    2015-01-01

    Over the past 5 years, parts of Oklahoma have experienced marked increases in the number of small- to moderate-sized earthquakes. In three study areas that encompass the vast majority of the recent seismicity, we show that the increases in seismicity follow 5- to 10-fold increases in the rates of saltwater disposal. Adjacent areas where there has been relatively little saltwater disposal have had comparatively few recent earthquakes. In the areas of seismic activity, the saltwater disposal principally comes from “produced” water, saline pore water that is coproduced with oil and then injected into deeper sedimentary formations. These formations appear to be in hydraulic communication with potentially active faults in crystalline basement, where nearly all the earthquakes are occurring. Although most of the recent earthquakes have posed little danger to the public, the possibility of triggering damaging earthquakes on potentially active basement faults cannot be discounted. PMID:26601200

  16. The electrical self-potential method is a non-intrusive snow-hydrological sensor

    Science.gov (United States)

    Thompson, S. S.; Kulessa, B.; Essery, R. L. H.; Lüthi, M. P.

    2015-08-01

    Our ability to measure, quantify and assimilate hydrological properties and processes of snow in operational models is disproportionally poor compared to the significance of seasonal snowmelt as a global water resource and major risk factor in flood and avalanche forecasting. Encouraged by recent theoretical, modelling and laboratory work, we show here that the diurnal evolution of aerially-distributed self-potential magnitudes closely track those of bulk meltwater fluxes in melting in-situ snowpacks at Rhone and Jungfraujoch glaciers, Switzerland. Numerical modelling infers temporally-evolving liquid water contents in the snowpacks on successive days in close agreement with snow-pit measurements. Muting previous concerns, the governing physical and chemical properties of snow and meltwater became temporally invariant for modelling purposes. Because measurement procedure is straightforward and readily automated for continuous monitoring over significant spatial scales, we conclude that the self-potential geophysical method is a highly-promising non-intrusive snow-hydrological sensor for measurement practice, modelling and operational snow forecasting.

  17. The potential for health risks from intrusion of contaminants into the distribution system from pressure transients.

    Science.gov (United States)

    LeChevallier, Mark W; Gullick, Richard W; Karim, Mohammad R; Friedman, Melinda; Funk, James E

    2003-03-01

    The potential for public health risks associated with intrusion of contaminants into water supply distribution systems resulting from transient low or negative pressures is assessed. It is shown that transient pressure events occur in distribution systems; that during these negative pressure events pipeline leaks provide a potential portal for entry of groundwater into treated drinking water; and that faecal indicators and culturable human viruses are present in the soil and water exterior to the distribution system. To date, all observed negative pressure events have been related to power outages or other pump shutdowns. Although there are insufficient data to indicate whether pressure transients are a substantial source of risk to water quality in the distribution system, mitigation techniques can be implemented, principally the maintenance of an effective disinfectant residual throughout the distribution system, leak control, redesign of air relief venting, and more rigorous application of existing engineering standards. Use of high-speed pressure data loggers and surge modelling may have some merit, but more research is needed.

  18. Human intrusion into geologic repositories for high-level radioactive waste: potential and prevention

    Energy Technology Data Exchange (ETDEWEB)

    Cameron, F X [Nuclear Regulatory Commission, Washington, DC (USA). Office of Nuclear Regulatory Research

    1981-12-01

    Isolation of high-level radioactive waste over long periods of time requires protection not only from natural events and processes, but also from the deliberate or inadvertent activities of future societies. This paper evaluates the likelihood of inadvertent human intrusion due to the loss of societal memory of the repository site. In addition measures to prevent inadvertent intrusion, and to guide future societies in any decision to deliberately intrude into the repository are suggested.

  19. Assessment of indoor air quality related to potential vapor intrusion: Issues for former manufactured gas plants

    International Nuclear Information System (INIS)

    Rames, Antoine; Guillossou, Gaelle; Ronga-Pezeret, Sylvaine; Hulot, Corinne

    2012-01-01

    The indoor air quality of buildings on sites with soil or groundwater contaminated with volatile or semi-volatile compounds can be degraded by potential vapor intrusion (VI) from these environmental media. For sites of former manufactured gas plants (MGP), the compounds that must be considered are BTEX (benzene, toluene, ethylbenzene, and xylenes), 8 of the 16 polycyclic aromatic hydrocarbons (PAHs) generally studied, and, to a lesser degree, phenol and hydrogen cyanide. Given the plausibility of VI and in accordance with current recommendations of the French Ministry of the Environment, measurements of indoor air quality (and outdoor air, for additional analyses) were conducted on two occasions during the winter and summer of 2010. These measurements simultaneously used multiple air sampling devices (Summa canisters, Gore modules, air pumps coupled to various matrices; such as XAD2, silica gel, etc.). Phenol and hydrogen cyanide have not previously been quantified (limit of quantification between 0.12 and 2.00 μg/m 3 ). BTEX and PAHs were found ubiquitously at concentrations on the order of 1 to 10 μg/m 3 for BTEX and naphthalene and one to ten ng/m 3 for PAHs other than naphthalene) at all 14 MGP and both control sites, regardless of where onsite the air was sampled (office, basement or crawl space, or outdoors). These levels (the maximum considered) do not allow us to conclude that the indoor air is degraded according to the official French guidelines for managing potentially contaminated sites and soils. Thus, no excess health risk is expected for residents of these sites because of exposure to possible VI, which cannot be ruled out in view of the ubiquity of some compounds. (authors)

  20. Interspecific and intraspecific variation in selenium:mercury molar ratios in saltwater fish from the Aleutians: Potential protection on mercury toxicity by selenium

    Science.gov (United States)

    Burger, Joanna; Gochfeld, Michael; Jeitner, Christian; Donio, Mark; Pittfield, Taryn

    2014-01-01

    A number of factors affect the consumption risk from mercury in fish, including mercury levels, seasonal patterns of mercury concentrations, human consumption patterns, and sensitive populations (e.g. pregnant women, fetuses, young children, and yet unknown genetic factors). Recently the protective effects of selenium on methylmercury toxicity have been publicized, particularly for saltwater fish. We examine levels of mercury and selenium in several species of fish and seabirds from the Aleutians (Alaska), determine selenium:mercury molar ratios, and examine species-specific and individual variation in the ratios as a means of exploring the use of the ratio in risk assessment and risk management. Variation among species was similar for mercury and selenium. There was significant inter-specific and intraspecific variation in selenium:mercury molar ratios for fish, and for birds. The mean selenium:mercury molar ratios for all fish and bird species were above 1, meaning there was an excess of selenium relative to mercury. It has been suggested that an excess of selenium confers some protective advantage for salt water fish, although the degree of excess necessary is unclear. The selenium:mercury molar ratio was significantly correlated negatively with total length for most fish species, but not for dolly varden. Some individuals of Pacific cod, yellow irish lord, rock greenling, Pacific halibut, dolly varden, and to a lesser extent, flathead sole, had selenium:mercury ratios below 1. No bird muscle had an excess of mercury (ratio below 1), and only glaucous-winged gull and pigeon guillemot had ratios between 1 and 5. There was a great deal of variation in selenium:mercury molar ratios within fish species, and within bird species, making it difficult and impractical to use these ratios in risk assessment or management, for fish advisories, or for consumers, particularly given the difficulty of interpreting the ratios. PMID:22664537

  1. 76 FR 5370 - Potential Addition of Vapor Intrusion Component to the Hazard Ranking System

    Science.gov (United States)

    2011-01-31

    ... Estimated Costs to Remediate Existing Sites Exceed Current Funding Levels, and More Sites are Expected to Be.... Methods for incorporating vapor intrusion into the HRS while, to the extent possible, maintaining the... will also be able to sign up for a mailing list that will be used to distribute logistical information...

  2. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  3. Electrical Resistivity Imaging of Seawater Intrusion into the Monterey Bay Aquifer System.

    Science.gov (United States)

    Pidlisecky, A; Moran, T; Hansen, B; Knight, R

    2016-03-01

    We use electrical resistivity tomography to obtain a 6.8-km electrical resistivity image to a depth of approximately 150 m.b.s.l. along the coast of Monterey Bay. The resulting image is used to determine the subsurface distribution of saltwater- and freshwater-saturated sediments and the geologic controls on fluid distributions in the region. Data acquisition took place over two field seasons in 2011 and 2012. To maximize our ability to image both vertical and horizontal variations in the subsurface, a combination of dipole-dipole, Wenner, Wenner-gamma, and gradient measurements were made, resulting in a large final dataset of approximately 139,000 data points. The resulting resistivity section extends to a depth of 150 m.b.s.l., and is used, in conjunction with the gamma logs from four coastal monitoring wells to identify four dominant lithologic units. From these data, we are able to infer the existence of a contiguous clay layer in the southern portion of our transect, which prevents downward migration of the saltwater observed in the upper 25 m of the subsurface to the underlying freshwater aquifer. The saltwater and brackish water in the northern portion of the transect introduce the potential for seawater intrusion into the hydraulically connected freshwater aquifer to the south, not just from the ocean, but also laterally from north to south. © 2015, National Ground Water Association.

  4. Cathode Composition in a Saltwater Metal-Air Battery

    Directory of Open Access Journals (Sweden)

    William Shen

    2017-01-01

    Full Text Available Metal-air batteries consist of a solid metal anode and an oxygen cathode of ambient air, typically separated by an aqueous electrolyte. Here, simple saltwater-based models of aluminum-air and zinc-air cells are used to determine the differences between theoretical cell electric potentials and experimental electric potentials. A substantial difference is observed. It is also found that the metal cathode material is crucial to cell electric potential, despite the cathode not participating in the net reaction. Finally, the material composition of the cathode appears to have a more significant impact on cell potential than the submerged surface area of the cathode.

  5. Wellbore enlargement investigation: Potential analogs to the Waste Isolation Pilot Plant during inadvertent intrusion of the repository

    International Nuclear Information System (INIS)

    Boak, D.M.; Dotson, L.; Aguilar, R.

    1997-01-01

    This study involved the evaluation and documentation of cases in which petroleum wellbores were enlarged beyond the nominal hole diameter as a consequence of erosion during exploratory drilling, particularly as a function of gas flow into the wellbore during blowout conditions. A primary objective was to identify analogs to potential wellbore enlargement at the Waste Isolation Pilot Plant (WIPP) during inadvertent human intrusion. Secondary objectives were to identify drilling scenarios associated with enlargement, determine the physical extent of enlargement, and establish the physical properties of the formation in which the enlargement occurred. No analogs of sufficient quality to establish quantitative limits on wellbore enlargement at the WIPP disposal system were identified. However, some information was obtained regarding the frequency of petroleum well blowouts and the likelihood that such blowouts would bridge downhole, self-limiting the surface release of disposal-system material. Further work would be necessary, however, to determine the conditions under which bridging could occur and the extent to which the bridging might be applicable to WIPP. In addition, data on casing sizes of petroleum boreholes in the WIPP vicinity support the use of a 12-1/4 inch borehole size in WIPP performance assessment calculations. Finally, although data are limited, there was no evidence of significant wellbore enlargement in any of three blowouts that occur-red in wellbores in the Delaware Basin (South Culebra Bluff Unit No. 1, Energy Research and Development Administration (ERDA) 6, and WIPP 12)

  6. Geoelectric imaging for saline water intrusion in Geopark zone of Ciletuh Bay, Indonesia

    Science.gov (United States)

    Ardi, N. D.; Iryanti, M.; Asmoro, C. P.; Yusuf, A.; Sundana, A. N. A.; Safura, H. Y.; Fitri, M.; Anggraeni, M.; Kurniawan, R.; Afrianti, R.; Sumarni

    2018-05-01

    Saline water intrusion in estuary is an urgent ecological encounter across the world. The Ciletuh Bay, located in the southern Sukabumi district, is an area with high cultivated potential becoming one of the most important geology tourism zones in Indonesia. However, salt water intrusion along the creek is a natural spectacle that disturbs the economic growth of the whole region. This research was intended at plotting the subsurface level of saltwater interventions into aquifers at the northern part of Ciletuh creek, Indonesia. The study implemented geoelectric imaging methods. 37 imaging datum were acquired using Wenner array configuration. The saline water were identified across the study area. The result of two dimensional cross-sectional resistivity shows that there is an indication of sea content in our measured soil, i.e. the smallest resistivity value is 0.579 Ωm found at a depth of 12.4 m to 19.8 m at a track length of 35 m to 60 m is categorized in the clayey which shows low groundwater quality. However, when compared with the results of direct observation of groundwater from the wells of residents, the water obtained is brackish water. A water chemistry test is conducted to ascertain the initial results of this method so that a potential sea intrusion potential map can be interpreted more clearly. This can consequently help as an extrapolative model to define depth to saline water at any site within the saline water zone in the study area.

  7. Coastal ground water at risk - Saltwater contamination at Brunswick, Georgia and Hilton Head Island, South Carolina

    Science.gov (United States)

    Krause, Richard E.; Clarke, John S.

    2001-01-01

    IntroductionSaltwater contamination is restricting the development of ground-water supply in coastal Georgia and adjacent parts of South Carolina and Florida. The principal source of water in the coastal area is the Upper Floridan aquifer—an extremely permeable and high-yielding aquifer—which was first developed in the late 1800s. Pumping from the aquifer has resulted in substantial ground-water-level decline and subsequent saltwater intrusion of the aquifer from underlying strata containing highly saline water at Brunswick, Georgia, and with encroachment of sea-water into the aquifer at the northern end of Hilton Head Island, South Carolina. The saltwater contamination at these locations has constrained further development of the Upper Floridan aquifer in the coastal area and has created competing demands for the limited supply of freshwater. The Georgia Department of Natural Resources, Georgia Environmental Protection Division (GaEPD) has restricted permitted withdrawal of water from the Upper Floridan aquifer in parts of the coastal area (including the Savannah and Brunswick areas) to 1997 rates, and also has restricted additional permitted pumpage in all 24 coastal area counties to 36 million gallons per day above 1997 rates. These actions have prompted interest in alternative management of the aquifer and in the development of supplemental sources of water supply including those from the shallower surficial and upper and lower Brunswick aquifers and from the deeper Lower Floridan aquifer.

  8. Using widely spaced observations of land use, forest attributes, and intrusions to map resource potential and human impact probability

    Science.gov (United States)

    Victor A. Rudis

    2000-01-01

    Scant information exists about the spatial extent of human impact on forest resource supplies, i.e., depreciative and nonforest uses. I used observations of ground-sampled land use and intrusions on forest land to map the probability of resource use and human impact for broad areas. Data came from a seven State survey region (Alabama, Arkansas, Louisiana, Mississippi,...

  9. Using widely spaced observations of land use, forest attributes, and intrusions to map resource potential and human impact probability

    Science.gov (United States)

    Victor A. Rudis

    2000-01-01

    Scant information exists about the spatial extent of human impact on forest resource supplies, i.e., depreciative and nonforest uses. I used observations of ground-sampled land use and intrusions on forest land to map the probability of resource use and human impact for broad areas. Data came from a seven-state survey region (Alabama, Arkansas, Louisiana, Mississippi,...

  10. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  11. Supplemental Performance Analyses for Igneous Activity and Human Intrusion at the Potential High-Level Nuclear Waste Repository at Yucca Mountain

    International Nuclear Information System (INIS)

    Swift, P.; Gaither, K.; Freeze, G.; McCord, J.; Kalinich, D.; Saulnier, G.; Statham, W.

    2002-01-01

    The U.S. Department of Energy (DOE) is considering the possible recommendation of a site at Yucca Mountain, Nevada, for the potential development of a geologic repository for the disposal of high-level radioactive waste and spent nuclear fuel. Consequences of hypothetical disruption of the Yucca Mountain site by igneous activity or human intrusion have been evaluated in the Yucca Mountain Science and Engineering Report (S and ER) (1), which presents technical information supporting the consideration of the possible site recommendation. Since completion of the S and ER, supplemental analyses have examined possible impacts of new information and alternative assumptions on the estimates of the consequences of these events. Specifically, analyses of the consequences of igneous disruption address uncertainty regarding: (1) the impacts of changes in the repository footprint and waste package spacing on the probability of disruption; (2) impacts of alternative assumptions about the appropriate distribution of future wind speeds to use in the analysis; (3) effects of alternative assumptions about waste particle sizes; and (4) alternative assumptions about the number of waste packages damaged by igneous intrusion; and (5) alternative assumptions about the exposure pathways and the biosphere dose conversion factors used in the analysis. Additional supplemental analyses, supporting the Final Environmental Impact Statement (FEIS), have examined the results for both igneous disruption and human intrusion, recalculated for a receptor group located 18 kilometers (km) from the repository (the location specified in 40 CFR 197), rather than at the 20 km distance used in the S and ER analyses

  12. Delineation of Salt Water Intrusion through Use of Electromagnetic-Induction Logging: A Case Study in Southern Manhattan Island, New York

    Directory of Open Access Journals (Sweden)

    Frederick Stumm

    2017-08-01

    Full Text Available Groundwater with chloride concentrations up to 15,000 mg/L has intruded the freshwater aquifer underlying southern Manhattan Island, New York. Historical (1940–1950 chloride concentration data of glacial aquifer wells in the study area indicate the presence of four wedges of saltwater intrusion that may have been caused by industrial pumpage. The limited recharge capability of the aquifer, due to impervious surfaces and the 22.7 million liters per day (mld of reported industrial pumpage early in the 20th Century was probably the cause for the saltwater intrusion and the persistence of the historical saltwater intrusion wedges over time. Recent drilling of wells provided new information on the hydrogeology and extent of saltwater intrusion of the glacial aquifer overlying bedrock. The new observation wells provided ground-water level, chloride concentration, hydraulic conductivity, and borehole geophysical data of the glacial aquifer. The glacial sediments range in thickness from less than 0.3 m to more than 76.2 m within the study area. A linear relation between Electromagnetic-induction (EM conductivity log response and measured chloride concentration was determined. Using this relation, chloride concentration was estimated in parts of the glacial aquifer where sampling was not possible. EM logging is an effective tool to monitor changes in saltwater intrusion wedges.

  13. The use of data-mining techniques for developing effective decisionsupport systems: A case study of simulating the effects ofclimate change on coastal salinity intrusion

    Science.gov (United States)

    Conrads, Paul; Edwin Roehl, Jr.

    2017-01-01

    Natural-resource managers and stakeholders face difficult challenges when managing interactions between natural and societal systems. Potential changes in climate could alter interactions between environmental and societal systems and adversely affect the availability of water resources in many coastal communities. The availability of freshwater in coastal streams can be threatened by saltwater intrusion. Even though the collective interests and computer skills of the community of managers, scientists and other stakeholders are quite varied, there is an overarching need for equal access by all to the scientific knowledge needed to make the best possible decisions. This paper describes a decision support system, PRISM-2, developed to evaluate salinity intrusion due to potential climate change along the South Carolina coast in southeastern USA. The decision support system is disseminated as a spreadsheet application and integrates the output of global circulation models, watershed models and salinity intrusion models with real-time databases for simulation, graphical user interfaces, and streaming displays of results. The results from PRISM-2 showed that a 31-cm and 62-cm increase in sea level reduced the daily availability of freshwater supply to a coastal municipal intake by 4% and 12% of the time, respectively. Future climate change projections by a global circulation model showed a seasonal change in salinity intrusion events from the summer to the fall for the majority of events.

  14. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  15. Summary of Natural Resources that Potentially Influence Human Intrusion at the Area 5 Radioactive Waste Management Site, Nevada Test Site, Nye County, Nevada

    International Nuclear Information System (INIS)

    NSTec Environmental Management

    2007-01-01

    In 1993, Raytheon Services Nevada completed a review of natural resource literature and other sources to identify potentially exploitable resources and potential future land uses near the Area 5 Radioactive Waste Management Site (RWMS) of the Nevada Test Site (NTS), Nye County, Nevada, that could lead to future inadvertent human intrusion and subsequent release of radionuclides to the accessible environment. National Security Technologies, LLC, revised the original limited-distribution document to conform to current editorial standards and U.S. Department of Energy requirements for public release. The researchers examined the potential for future development of sand, gravel, mineral, petroleum, water resources, and rural land uses, such as agriculture, grazing, and hunting. The study was part of the performance assessment for Greater Confinement Disposal boreholes. Sand and gravel are not considered exploitable site resources because the materials are common throughout the area and the quality at the Area 5 RWMS is not ideal for typical commercial uses. Site information also indicates a very low mineral potential for the area. None of the 23 mining districts in southern Nye County report occurrences of economic mineral deposits in unconsolidated alluvium. The potential for oil and natural gas is low for southern Nye County. No occurrences of coal, tar sand, or oil shale on the NTS are reported in available literature. Several potential future uses of water were considered. Agricultural irrigation is impractical due to poor soils and existing water supply regulations. Use of water for geothermal energy development is unlikely because temperatures are too low for typical commercial applications using current technology. Human consumption of water has the most potential for cause of intrusion. The economics of future water needs may create a demand for the development of deep carbonate aquifers in the region. However, the Area 5 RWMS is not an optimal location for

  16. Study of Ground water Groundwater Potentiality and Sea Water Intrusion Along along the Coastal Plain, Wadi Thuwal, KSA- A Case Study Based on DC Resistivity

    Directory of Open Access Journals (Sweden)

    Mansour A. Al-Garni

    2010-12-01

    Full Text Available The present study mainly aims to outline zones that have groundwater potentiality with good quality and those which are affected by sea water intrusion. The electrical resistivity data were acquired over an area of about 170 km2 of a coastal plain, Wadi Thuwal, which is bounded by the Red Sea in the west and the volcanic hills in the east.  In such an area, resistivity measurements, using n-layering model, reveal generally reveal a wide range of resistivity values which do not reflect the reality. Hence, the statistical analysis has to be involved to overcome this problem and to make the final interpretation reliable.  In our case, the n-layer models were modified to another statistical geoelectric models (SLM, consisting of  a number of layers equivalent to the stratigraphic layering beneath each VES site. The modified models were used to outline the depth to the bed rock, groundwater accumulation zones and  water table as well as to define the effect of sea water intrusion through the study area. Check alignment above

  17. AFSC/REFM: Alaska Saltwater Sport Fishing Charter Business Survey

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project was to collect cost, earning, and employment information from the Alaska saltwater sport fishing charter business sector during the...

  18. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  19. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  20. Human intrusion: New ideas?

    International Nuclear Information System (INIS)

    Cooper, J.R.

    2002-01-01

    Inadvertent human intrusion has been an issue for the disposal of solid radioactive waste for many years. This paper discusses proposals for an approach for evaluating the radiological significance of human intrusion as put forward by ICRP with contribution from work at IAEA. The approach focuses on the consequences of the intrusion. Protective actions could, however, include steps to reduce the probability of human intrusion as well as the consequences. (author)

  1. Human intrusion: issues concerning its assessment

    International Nuclear Information System (INIS)

    Grimwood, P.D.; Smith, G.M.

    1989-01-01

    The potential significance of human intrusion in the performance assessment of radioactive waste repositories has been increasingly recognized in recent years. It is however an area of assessment in which subjective judgments dominate. This paper identifies some of the issues involved. These include regulatory criteria, scenario development, probability assignment, consequence assessment and measures to mitigate human intrusion

  2. The Development of Sustainable Saltwater-Based Food Production Systems: A Review of Established and Novel Concepts

    Directory of Open Access Journals (Sweden)

    Daryl Gunning

    2016-12-01

    Full Text Available The demand for seafood products on the global market is rising, particularly in Asia, as affluence and appreciation of the health benefits of seafood increase. This is coupled with a capture fishery that, at best, is set for stagnation and, at worst, significant collapse. Global aquaculture is the fastest growing sector of the food industry and currently accounts for approximately 45.6% of the world’s fish consumption. However, the rapid development of extensive and semi-extensive systems, particularly intensive marine-fed aquaculture, has resulted in worldwide concern about the potential environmental, economic, and social impacts of such systems. In recent years, there has been a significant amount of research conducted on the development of sustainable saltwater-based food production systems through mechanical (e.g., recirculatory aquaculture (RAS systems methods and ecosystem-based approaches (e.g., integrated multi-trophic aquaculture (IMTA. This review article will examine the potential negative impacts of monocultural saltwater aquaculture operations and review established (RAS and novel (IMTA; constructed wetlands; saltwater aquaponics saltwater-based food production systems and discuss their (potential contribution to the development of sustainable and environmentally-friendly systems.

  3. Predictive uncertainty analysis of a saltwater intrusion model using null-space Monte Carlo

    DEFF Research Database (Denmark)

    Herckenrath, Daan; Langevin, Christian D.; Doherty, John

    2011-01-01

    variability did not make a noticeable difference to the uncertainty of the prediction. With this higher level of heterogeneity, however, the computational burden of generating calibration-constrained parameter fields approximately doubled. Predictive uncertainty variance computed through the NSMC method...

  4. Saltwater intrusion and water management in the unconfined coastal aquifer of Ravenna (Italy): a numerical model

    NARCIS (Netherlands)

    Giambastiani, Beatrice Maria Sole; Antonellini, Marco; Oude Essink, Gualbert; Stuurman, Roelof J.

    2007-01-01

    The Ravenna pine forests represent an historical landmark in the Po River Plain. They have great environmental, historical and tourist value. The San Vitale pine for- est is located 10 km north of the town. It is surrounded by an urban area, the city indus- trial infrastructure and the waterworks of

  5. Carbon dynamics in a Late Quaternary-age coastal limestone aquifer system undergoing saltwater intrusion.

    Science.gov (United States)

    Bryan, Eliza; Meredith, Karina T; Baker, Andy; Andersen, Martin S; Post, Vincent E A

    2017-12-31

    This study investigates the inorganic and organic aspects of the carbon cycle in groundwaters throughout the freshwater lens and transition zone of a carbonate island aquifer and identifies the transformation of carbon throughout the system. We determined 14 C and 13 C carbon isotope values for both DIC and DOC in groundwaters, and investigated the composition of DOC throughout the aquifer. In combination with hydrochemical and 3 H measurements, the chemical evolution of groundwaters was then traced from the unsaturated zone to the deeper saline zone. The data revealed three distinct water types: Fresh (F), Transition zone 1 (T1) and Transition zone 2 (T2) groundwaters. The 3 H values in F and T1 samples indicate that these groundwaters are mostly modern. 14 C DOC values are higher than 14 C DIC values and are well correlated with 3 H values. F and T1 groundwater geochemistry is dominated by carbonate mineral recrystallisation reactions that add dead carbon to the groundwater. T2 groundwaters are deeper, saline and characterised by an absence of 3 H, lower 14 C DOC values and a different DOC composition, namely a higher proportion of Humic Substances relative to total DOC. The T2 groundwaters are suggested to result from either the slow circulation of water within the seawater wedge, or from old remnant seawater caused by past sea level highstands. While further investigations are required to identify the origin of the T2 groundwaters, this study has identified their occurrence and shown that they did not evolve along the same pathway as fresh groundwaters. This study has also shown that a combined approach using 14 C and 13 C carbon isotope values for both DIC and DOC and the composition of DOC, as well as hydrochemical and 3 H measurements, can provide invaluable information regarding the transformation of carbon in a groundwater system and the evolution of fresh groundwater recharge. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. Geophysical detection of marine intrusions in Black Sea coastal areas (Romania) using VES and ERT data

    OpenAIRE

    CHITEA, Florina; GEORGESCU, Paul; IOANE, Dumitru

    2011-01-01

    Abstract. Communities living in coastal areas depend in a great extent on the fresh water resources exploited from aquifers which are usually in a natural hydrodynamic equilibrium with the sea water. The contamination of fresh water with marine saltwater determines a significant increase in the aquifers electric conductivity, allowing an efficient application of resistivity methods in detecting and monitoring the marine intrusions. We present case studies from Romania (Costinesti and Vama Vec...

  7. Intrusive trauma memory: A review and functional analysis

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.; Holmes, E.A.

    2009-01-01

    Our contribution to this special issue focuses on the phenomenon of intrusive trauma memory. While intrusive trauma memories can undoubtedly cause impairment, we argue that they may exist for a potentially adaptive reason. Theory and experimental research on intrusion development are reviewed and

  8. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  9. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  10. Options for human intrusion

    International Nuclear Information System (INIS)

    Bauser, M.; Williams, R.

    1993-01-01

    This paper addresses options for dealing with human intrusion in terms of performance requirements and repository siting and design requirements. Options are presented, along with the advantages and disadvantages of certain approaches. At the conclusion, a conceptual approach is offered emphasizing both the minimization of subjective judgements concerning future human activity, and specification of repository requirements to minimize the likelihood of human intrusion and any resulting, harmful effects should intrusion occur

  11. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  12. Acid-neutralizing potential of minerals in intrusive rocks of the Boulder batholith in northern Jefferson County, Montana

    Science.gov (United States)

    Desborough, George A.; Briggs, Paul H.; Mazza, Nilah; Driscoll, Rhonda

    1998-01-01

    Experimental studies show that fresh granitic rocks of the Boulder batholith in the Boulder River headwaters near Basin, Montana have significant acid-neutralizing potential and are capable of neutralizing acidic water derived from metal-mining related wastes or mine workings. Laboratory studies show that in addition to the acidneutralizing potential (ANP) of minor amounts of calcite in these rocks, biotite, tremolite, and feldspars will contribute significantly to long-term ANP. We produced 0.45 micrometer-filtered acidic (pH = 2.95) leachate for use in these ANP experiments by exposing metal-mining related wastes to deionized water in a waste:leachate ratio of 1:20. We then exposed these leachates to finely-ground and sized fractions of batholith rocks, and some of their mineral fractions for extended and repeated periods, for which results are reported here. The intent was to understand what reactions of metal-rich acidic water and fresh igneous rocks would produce. The reactions between the acidic leachates and the bulk rocks and mineral fractions are complex. Factors such as precipitation of phases like Fe-hydroxides and Alhydroxides and the balance between dissolved cations and anions that are sulfate dominated complicate analysis of the results. Research by others of acid neutralization by biotite and tremolite attributed a rise in pH to proton (H+) adsorption in sites vacated by K, Mg, and Ca. Destruction of the silicate framework and liberation of associated structural hydroxyl ions may contribute to ANP. Studies by others have indicated that the conversion of biotite to a vermiculite-type structure by removal of K at a pH of 4 consumes about six protons for every mole of biotite, but at a pH of 3 there is pronounced dissolution of the tetrahedral lattice. The ANP of fresh granitic rocks is much higher than anticipated. The three bulk Boulder igneous rock samples studied have minimum ANP equivalent to about 10-14 weight percent calcite. This ANP is in

  13. Fatigue crack retardation of high strength steel in saltwater

    International Nuclear Information System (INIS)

    Tokaji, K.; Ando, Z.; Imai, T.; Kojima, T.

    1983-01-01

    A high strength steel was studied in 3 percent saltwater to investigate the effects of a corrosive environment and sheer thickness on fatigue crack propagation behavior following the application of a single tensile overload. Experiments were carried out under sinusoidally varying loads at a load ratio of 0 and frequency of 10 H /SUB z/ . A single tensile overload was found to cause delayed retardation, and the crack propagation rate at first increased, followed by fairly rapid decrease to a minimum value and then increased gradually to its steady-state value, just as it did in air. The overload affected zone size and the retardation cycles increased with decreasing sheet thickness, just as they did in air. However, the zone size and the cycles were larger in 3 percent saltwater than in air. Since the crack propagation rates through the overload affected zone were not affected by the test environment, the longer retardation cycles in 3 percent saltwater were attributed to an enlargement of the overload affected zone size. The crack propagation behavior following the application of a single tensile overload in 3 percent saltwater was well explained by the crack closure concept

  14. Water-supply potential of major streams and the Upper Floridan Aquifer in the vicinity of Savannah, Georgia

    Science.gov (United States)

    Garza, Reggina; Krause, Richard E.

    1997-01-01

    Surface- and ground-water resources in the Savannah, Georgia, area were evaluated for potential water-supply development. Stream-discharge and water-quality data were analyzed for two major streams considered to be viable water-supply sources. A ground-water flow model was developed to be used in conjunction with other previously calibrated models to simulate the effects of additional pumpage on water levels near areas of saltwater intrusion at Brunswick and seawater encroachment at Hilton Head Island. Hypothetical scenarios also were simulated involving redistributions and small increases, and decreases in pumpage.

  15. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  16. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    International Conference on Computational Intelligence and Natural Computing, volume 2, pages 413–416, June 2009. • Rung Ching Chen, Kai -Fan Cheng, and...Chia-Fen Hsieh . “Using rough set and support vector machine for network intrusion detection.” International Journal of Network Security & Its...intrusion detection using FP tree rules.” Journal Of Advanced Networking and Applications, 1(1):30–39, 2009. • Ming-Yang Su, Gwo-Jong Yu , and Chun-Yuen

  17. Identification of Human Intrusion Types into Radwaste Disposal Facility

    International Nuclear Information System (INIS)

    Budi Setiawan

    2007-01-01

    Human intrusion has long been recognized as a potentially important post-closure safety issue for rad waste disposal facility. It is due to the difficulties in predicting future human activities. For the preliminary study of human intrusion, identification of human intrusion types need to be recognized and investigated also the approaching of problem solving must be known to predict the prevention act and accepted risk. (author)

  18. Application of a Density-Dependent Numerical Model (MODHMS) to Assess Salinity Intrusion in the Biscayne Aquifer, North Miami-Dade County, Florida

    Science.gov (United States)

    Guha, H.; Panday, S.

    2005-05-01

    Miami-Dade County is located at the Southeastern part of the State of Florida adjoining the Atlantic coast. The sole drinking water source is the Biscayne Aquifer, which is an unconfined freshwater aquifer, composed of marine limestone with intermediate sand lenses. The aquifer is highly conductive with hydraulic conductivity values ranging from 1,000 ft/day to over 100,000 ft/day in some areas. Saltwater intrusion from the coast is an immediate threat to the freshwater resources of the County. Therefore, a multilayer density-dependent transient groundwater model was developed to evaluate the saltwater intrusion characteristics of the system. The model was developed using MODHMS, a finite difference, fully coupled groundwater and surface water flow and transport model. The buoyancy term is included in the equation for unconfined flow and the flow and transport equations are coupled using an iterative scheme. The transport equation was solved using an adaptive implicit total variation diminishing (TVD) scheme and anisotropy of dispersivity was included for longitudinal, transverse, vertical transverse, and vertical longitudinal directions. The model eastern boundaries extended approximately 3.5 miles into the Atlantic Ocean while the western boundary extended approximately 27 miles inland from the coast. The northern and southern boundaries extend 6 miles into Broward County and up to the C-100 canal in Miami-Dade County respectively. Close to 2 million active nodes were simulated, with horizontal discretization of 500 feet. A total of nine different statistical analyses were conducted with observed and simulated hydraulic heads. The analysis indicates that the model simulated hydraulic heads matched closely with the observed heads across the model domain. In general, the model reasonably simulated the inland extent of saltwater intrusion within the aquifer, and matched relatively well with limited observed chloride data from monitoring wells along the coast

  19. An alternating voltage battery with two salt-water oscillators

    Science.gov (United States)

    Cervellati, Rinaldo; Soldà, Roberto

    2001-05-01

    We built a simple alternating voltage battery that periodically reverses value and sign of its electromotive force (emf). This battery consists of two coupled concentration salt-water oscillators that are phase shifted by initially extracting some drops of salt solution from one of the two oscillators. Although the actual frequency (period: ˜30 s) and emf (˜±55 mV) is low, our battery is suitable to demonstrate a practical application of oscillating systems in the physical, chemical, or biological laboratory for undergraduates. Interpretation of the phenomenon is given.

  20. Contaminant Gradients in Trees: Directional Tree Coring Reveals Boundaries of Soil and Soil-Gas Contamination with Potential Applications in Vapor Intrusion Assessment.

    Science.gov (United States)

    Wilson, Jordan L; Samaranayake, V A; Limmer, Matthew A; Schumacher, John G; Burken, Joel G

    2017-12-19

    Contaminated sites pose ecological and human-health risks through exposure to contaminated soil and groundwater. Whereas we can readily locate, monitor, and track contaminants in groundwater, it is harder to perform these tasks in the vadose zone. In this study, tree-core samples were collected at a Superfund site to determine if the sample-collection location around a particular tree could reveal the subsurface location, or direction, of soil and soil-gas contaminant plumes. Contaminant-centroid vectors were calculated from tree-core data to reveal contaminant distributions in directional tree samples at a higher resolution, and vectors were correlated with soil-gas characterization collected using conventional methods. Results clearly demonstrated that directional tree coring around tree trunks can indicate gradients in soil and soil-gas contaminant plumes, and the strength of the correlations were directly proportionate to the magnitude of tree-core concentration gradients (spearman's coefficient of -0.61 and -0.55 in soil and tree-core gradients, respectively). Linear regression indicates agreement between the concentration-centroid vectors is significantly affected by in planta and soil concentration gradients and when concentration centroids in soil are closer to trees. Given the existing link between soil-gas and vapor intrusion, this study also indicates that directional tree coring might be applicable in vapor intrusion assessment.

  1. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  2. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  3. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  4. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  5. Tree Sampling as a Method to Assess Vapor Intrusion Potential at a Site Characterized by VOC-Contaminated Groundwater and Soil.

    Science.gov (United States)

    Wilson, Jordan L; Limmer, Matthew A; Samaranayake, V A; Schumacher, John G; Burken, Joel G

    2017-09-19

    Vapor intrusion (VI) by volatile organic compounds (VOCs) in the built environment presents a threat to human health. Traditional VI assessments are often time-, cost-, and labor-intensive; whereas traditional subsurface methods sample a relatively small volume in the subsurface and are difficult to collect within and near structures. Trees could provide a similar subsurface sample where roots act as the "sampler' and are already onsite. Regression models were developed to assess the relation between PCE concentrations in over 500 tree-core samples with PCE concentrations in over 50 groundwater and 1000 soil samples collected from a tetrachloroethylene- (PCE-) contaminated Superfund site and analyzed using gas chromatography. Results indicate that in planta concentrations are significantly and positively related to PCE concentrations in groundwater samples collected at depths less than 20 m (adjusted R 2 values greater than 0.80) and in soil samples (adjusted R 2 values greater than 0.90). Results indicate that a 30 cm diameter tree characterizes soil concentrations at depths less than 6 m over an area of 700-1600 m 2 , the volume of a typical basement. These findings indicate that tree sampling may be an appropriate method to detect contamination at shallow depths at sites with VI.

  6. Tree sampling as a method to assess vapor intrusion potential at a site characterized by VOC-contaminated groundwater and soil

    Science.gov (United States)

    Wilson, Jordan L.; Limmer, Matthew A.; Samaranayake, V. A.; Schumacher, John G.; Burken, Joel G.

    2017-01-01

    Vapor intrusion (VI) by volatile organic compounds (VOCs) in the built environment presents a threat to human health. Traditional VI assessments are often time-, cost-, and labor-intensive; whereas traditional subsurface methods sample a relatively small volume in the subsurface and are difficult to collect within and near structures. Trees could provide a similar subsurface sample where roots act as the “sampler’ and are already onsite. Regression models were developed to assess the relation between PCE concentrations in over 500 tree-core samples with PCE concentrations in over 50 groundwater and 1000 soil samples collected from a tetrachloroethylene- (PCE-) contaminated Superfund site and analyzed using gas chromatography. Results indicate that in planta concentrations are significantly and positively related to PCE concentrations in groundwater samples collected at depths less than 20 m (adjusted R2 values greater than 0.80) and in soil samples (adjusted R2 values greater than 0.90). Results indicate that a 30 cm diameter tree characterizes soil concentrations at depths less than 6 m over an area of 700–1600 m2, the volume of a typical basement. These findings indicate that tree sampling may be an appropriate method to detect contamination at shallow depths at sites with VI.

  7. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  8. Acoustic emission intrusion detector

    International Nuclear Information System (INIS)

    Carver, D.W.; Whittaker, J.W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal

  9. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  10. Human-crocodile conflict and conservation implications of Saltwater Crocodiles Crocodylus porosus (Reptilia: Crocodylia: Crocodylidae in Sri Lanka

    Directory of Open Access Journals (Sweden)

    A.A. Thasun Amarasinghe

    2015-04-01

    Full Text Available Human-wildlife conflict occurs when human requirements encroach on those of wildlife populations, with potential costs to both humans and wild animals.  As top predators in most inland waters, crocodilians are involved in human-wildlife conflicts in many countries.  Here we present findings of a 5-year survey on human-crocodile conflict on the island of Sri Lanka and relate the results to improving management practices. We aimed to quantify and understand the causes of human-crocodile conflict in Sri Lanka, and propose solutions to mitigate it.  Visual encounter surveys were carried out to estimate the population size of Saltwater Crocodiles. We recorded 778 sightings of Saltwater Crocodiles at 262 of 400 locations surveyed, and estimate the total population to comprise more than 2000 non-hatchlings and to have increased at an average rate of 5% p.a. since 1978. We propose four crocodile vigilance zones within the wet zone and one crocodile vigilance zone within the dry zone of the country. Specific threats to Saltwater Crocodiles identified in crocodile vigilance zones were: habitat destruction and loss; illegal killing and harvesting (17 killings out of fear, ~200 incidents of killing for meat and skins, ~800 eggs annually for consumption; unplanned translocations; and, interaction with urbanization (10 incidents of crocodiles being run over by trains/vehicles and electrocution. Additionally, 33 cases of crocodile attacks on humans were recorded [8 fatal, 25 non-fatal (minor to grievous injuries] and more than 50 incidents of attacks on farm and pet animals. 

  11. Potential effects of alterations to the hydrologic system on the distribution of salinity in the Biscayne aquifer in Broward County, Florida

    Science.gov (United States)

    Hughes, Joseph D.; Sifuentes, Dorothy F.; White, Jeremy T.

    2016-03-15

    To address concerns about the effects of water-resource management practices and rising sea level on saltwater intrusion, the U.S. Geological Survey in cooperation with the Broward County Environmental Planning and Community Resilience Division, initiated a study to examine causes of saltwater intrusion and predict the effects of future alterations to the hydrologic system on salinity distribution in eastern Broward County, Florida. A three-dimensional, variable-density solute-transport model was calibrated to conditions from 1970 to 2012, the period for which data are most complete and reliable, and was used to simulate historical conditions from 1950 to 2012. These types of models are typically difficult to calibrate by matching to observed groundwater salinities because of spatial variability in aquifer properties that are unknown, and natural and anthropogenic processes that are complex and unknown; therefore, the primary goal was to reproduce major trends and locally generalized distributions of salinity in the Biscayne aquifer. The methods used in this study are relatively new, and results will provide transferable techniques for protecting groundwater resources and maximizing groundwater availability in coastal areas. The model was used to (1) evaluate the sensitivity of the salinity distribution in groundwater to sea-level rise and groundwater pumping, and (2) simulate the potential effects of increases in pumping, variable rates of sea-level rise, movement of a salinity control structure, and use of drainage recharge wells on the future distribution of salinity in the aquifer.

  12. Nuclear waste disposal facility intrusion: an archeologist's perspective

    International Nuclear Information System (INIS)

    Virginia, C.; Christie, L.

    1981-01-01

    A scenario is presented for the intrusion of a shallow land burial site by archeologists from a future generation. A description is given for the potential widespread exposure and contamination of populations by recovered artifacts

  13. A genetic linkage map for the saltwater crocodile (Crocodylus porosus

    Directory of Open Access Journals (Sweden)

    Lance Stacey L

    2009-07-01

    Full Text Available Abstract Background Genome elucidation is now in high gear for many organisms, and whilst genetic maps have been developed for a broad array of species, surprisingly, no such maps exist for a crocodilian, or indeed any other non-avian member of the Class Reptilia. Genetic linkage maps are essential tools for the mapping and dissection of complex quantitative trait loci (QTL, and in order to permit systematic genome scans for the identification of genes affecting economically important traits in farmed crocodilians, a comprehensive genetic linage map will be necessary. Results A first-generation genetic linkage map for the saltwater crocodile (Crocodylus porosus was constructed using 203 microsatellite markers amplified across a two-generation pedigree comprising ten full-sib families from a commercial population at Darwin Crocodile Farm, Northern Territory, Australia. Linkage analyses identified fourteen linkage groups comprising a total of 180 loci, with 23 loci remaining unlinked. Markers were ordered within linkage groups employing a heuristic approach using CRIMAP v3.0 software. The estimated female and male recombination map lengths were 1824.1 and 319.0 centimorgans (cM respectively, revealing an uncommonly large disparity in recombination map lengths between sexes (ratio of 5.7:1. Conclusion We have generated the first genetic linkage map for a crocodilian, or indeed any other non-avian reptile. The uncommonly large disparity in recombination map lengths confirms previous preliminary evidence of major differences in sex-specific recombination rates in a species that exhibits temperature-dependent sex determination (TSD. However, at this point the reason for this disparity in saltwater crocodiles remains unclear. This map will be a valuable resource for crocodilian researchers, facilitating the systematic genome scans necessary for identifying genes affecting complex traits of economic importance in the crocodile industry. In addition

  14. Network Intrusion Forensic Analysis Using Intrusion Detection System

    OpenAIRE

    Manish Kumar; Dr. M. Hanumanthappa; Dr. T.V. Suresh Kumar

    2011-01-01

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investi...

  15. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  16. Comparative genome analyses reveal distinct structure in the saltwater crocodile MHC.

    Directory of Open Access Journals (Sweden)

    Weerachai Jaratlerdsiri

    Full Text Available The major histocompatibility complex (MHC is a dynamic genome region with an essential role in the adaptive immunity of vertebrates, especially antigen presentation. The MHC is generally divided into subregions (classes I, II and III containing genes of similar function across species, but with different gene number and organisation. Crocodylia (crocodilians are widely distributed and represent an evolutionary distinct group among higher vertebrates, but the genomic organisation of MHC within this lineage has been largely unexplored. Here, we studied the MHC region of the saltwater crocodile (Crocodylus porosus and compared it with that of other taxa. We characterised genomic clusters encompassing MHC class I and class II genes in the saltwater crocodile based on sequencing of bacterial artificial chromosomes. Six gene clusters spanning ∼452 kb were identified to contain nine MHC class I genes, six MHC class II genes, three TAP genes, and a TRIM gene. These MHC class I and class II genes were in separate scaffold regions and were greater in length (2-6 times longer than their counterparts in well-studied fowl B loci, suggesting that the compaction of avian MHC occurred after the crocodilian-avian split. Comparative analyses between the saltwater crocodile MHC and that from the alligator and gharial showed large syntenic areas (>80% identity with similar gene order. Comparisons with other vertebrates showed that the saltwater crocodile had MHC class I genes located along with TAP, consistent with birds studied. Linkage between MHC class I and TRIM39 observed in the saltwater crocodile resembled MHC in eutherians compared, but absent in avian MHC, suggesting that the saltwater crocodile MHC appears to have gene organisation intermediate between these two lineages. These observations suggest that the structure of the saltwater crocodile MHC, and other crocodilians, can help determine the MHC that was present in the ancestors of archosaurs.

  17. Trace element concentrations of wild saltwater crocodile eggs

    International Nuclear Information System (INIS)

    Manolis, S.C.; Webb, G.J.; Britton, A.R.; Jeffree, R.A.; Markich, S.J.

    2002-01-01

    Saltwater crocodiles (Crocodylus porosus) accumulate trace elements from the environment into their flesh and bones (Jeffree et al., 2001a). Elevated levels of metals (e.g. Hg, Zn, Pb), organochlorines (e.g. DDT) and radionuclides (e.g. radiocesium) have been recorded in blood, tissues and eggs of several crocodilian species (Manolis et al., this volume). In this study the concentrations of various elements (including metals) were measured in the yolk of C. porosus eggs collected from the Finniss River and two other distant nesting sites (Melacca Swamp, a spring-fed freshwater swamp; Adelaide River, a tidal river) during the 2000- 01 nesting season. Infertile eggs from 30 clutches (Adelaide 12, Melacca 8, Finniss 10) were opened and the yolk contents removed (after Webb et al., 1987) and frozen. Samples of yolk were then oven-dried, digested in nitric acid and hydrogen peroxide. The digest solutions were then analysed for 20 elements (see Table 1) using inductively coupled plasma mass spectroscopy. Similarities between the elemental composition of eggs from the three areas suggests that downstream contamination from Rum Jungle Mine is not apparent in C. porosus nesting in the Finniss River. These nesting areas are some 60 km downstream of the mine site, and contaminants are probably greatly diluted during the wet season. C. porosus were also intensively hunted in the Finniss River area during the 1950s and 1960s, until their protection in 1971 (Webb et al. 1984). Some females would have been recruited into the population after the period of mining. Long-term effects of the mine may be apparent in areas with Australian freshwater crocodiles (C. johnstoni), mainly upstream of C. porosus nesting areas and up to the mine. Examination of tissues and eggs of C. johnstoni may provide more information on the historical effects of the mine

  18. Analysis of impact of temperature and saltwater on Nannochloropsis salina bio-oil production by ultra high resolution APCI FT-ICR MS

    KAUST Repository

    Sanguineti, Michael Mario

    2015-05-01

    Concentrated Nannochloropsis salina paste was reconstituted in distilled water and synthetic saltwater and processed at 250°C and 300°C via hydrothermal liquefaction. The resulting bio-oils yielded a diverse distribution of product classes, as analyzed by ultra high resolution APCI FT-ICR MS. The organic fractions were analyzed and both higher temperatures and distilled water significantly increase the number of total compounds present and the number of product classes. Major bio-oil products consisted of N1O1, hydrocarbon, and O2 classes, while O1, O4, S1, N1O2, and N2O2 classes represented the more significant minor classes. Both chlorine and sulfur containing compounds were detected in both distilled and saltwater reactions, while fewer numbers of chlorine and sulfur containing products were present in the organic fraction of the saltwater reactions. Further refinement to remove the chlorine and sulfur contents appears necessary with marine microalgal bio-oils produced via hydrothermal liquefaction. The higher heating value (MJ/kg) as calculated by the Boie equation of classes of interest in the bio-oil reveals a significant potential of algal hydrothermal liquefaction products as a sustainable and renewable fuel feedstock. © 2015.

  19. Application of the top specified boundary layer (TSBL) approximation to initial characterization of an inland aquifer mineralization 1. Direct contact between fresh and saltwater

    Science.gov (United States)

    Rubin, H.; Buddemeier, R.W.

    1998-01-01

    This paper presents a basic study in generalized terms that originates from two needs: (1) to understand the major mechanisms involved in the mineralization of groundwater of the Great Bend Prairie aquifer of Kansas by saltwater originating from a deeper Permian bedrock formation, and (2) to develop simple, robust tools that can readily be used for local assessment and management activities in the salt-affected region. A simplified basic conceptual model is adopted, incorporating two horizontal layers of porous medium which come into contact at a specific location within the model domain. The top layer is saturated with freshwater, and the bottom layer is saturated with saltwater. The paper considers various stages of approximation which can be useful for simplified simulation of the build-up of the transition zone (TZ) between the freshwater and the saltwater. The hierarchy of approximate approaches leads to the development of the top specified boundary layer (TSBL) method, which is the major tool used in this study for initial characterization of the development of the TZ. It is shown that the thickness of the TZ is mainly determined by the characteristic dispersivity. The build-up of the TZ is completed after a time period equal to the time needed to advect a fluid particle along the whole extent of the TZ. Potential applications and the effects of natural recharge and pumpage on salinity transport in the domain are discussed and evaluated in the context of demonstrating the practicality of the TSBL approach.

  20. Graphite Based Electrode for ECG Monitoring: Evaluation under Freshwater and Saltwater Conditions

    Directory of Open Access Journals (Sweden)

    Tharoeun Thap

    2016-04-01

    Full Text Available We proposed new electrodes that are applicable for electrocardiogram (ECG monitoring under freshwater- and saltwater-immersion conditions. Our proposed electrodes are made of graphite pencil lead (GPL, a general-purpose writing pencil. We have fabricated two types of electrode: a pencil lead solid type (PLS electrode and a pencil lead powder type (PLP electrode. In order to assess the qualities of the PLS and PLP electrodes, we compared their performance with that of a commercial Ag/AgCl electrode, under a total of seven different conditions: dry, freshwater immersion with/without movement, post-freshwater wet condition, saltwater immersion with/without movement, and post-saltwater wet condition. In both dry and post-freshwater wet conditions, all ECG-recorded PQRST waves were clearly discernible, with all types of electrodes, Ag/AgCl, PLS, and PLP. On the other hand, under the freshwater- and saltwater-immersion conditions with/without movement, as well as post-saltwater wet conditions, we found that the proposed PLS and PLP electrodes provided better ECG waveform quality, with significant statistical differences compared with the quality provided by Ag/AgCl electrodes.

  1. Heart rate, startle response, and intrusive trauma memories

    Science.gov (United States)

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  2. Modeling Approach for Estimating Co-Produced Water Volumes and Saltwater Disposal Volumes in Oklahoma

    Science.gov (United States)

    Murray, K. E.

    2016-12-01

    Management of produced fluids has become an important issue in Oklahoma because large volumes of saltwater are co-produced with oil and gas, and disposed into saltwater disposal wells at high rates. Petroleum production increased from 2009-2015, especially in central and north-central Oklahoma where the Mississippian and Hunton zones were redeveloped using horizontal wells and dewatering techniques that have led to a disproportional increase in produced water volumes. Improved management of co-produced water, including desalination for beneficial reuse and decreased saltwater disposal volumes, is only possible if spatial and temporal trends can be defined and related to the producing zones. It is challenging to quantify the volumes of co-produced water by region or production zone because co-produced water volumes are generally not reported. Therefore, the goal of this research is to estimate co-produced water volumes for 2008-present with an approach that can be replicated as petroleum production shifts to other regions. Oil and gas production rates from subsurface zones were multiplied by ratios of H2O:oil and H2O:gas for the respective zones. Initial H2O:oil and H2O:gas ratios were adjusted/calibrated, by zone, to maximize correlation of county-scale produced H2O estimates versus saltwater disposal volumes from 2013-2015. These calibrated ratios were then used to compute saltwater disposal volumes from 2008-2012 because of apparent data gaps in reported saltwater disposal volumes during that timeframe. This research can be used to identify regions that have the greatest need for produced water treatment systems. The next step in management of produced fluids is to explore optimal energy-efficient strategies that reduce deleterious effects.

  3. Hysteretic behavior in seawater intrusion in response to discontinuous drought periods

    Science.gov (United States)

    Salandin, P.; Darvini, G.

    2017-12-01

    The seawater intrusion (SWI) represents a relevant problem for communities living in many coastal regions and in small islands, where the amount of fresh water available for human consumption or irrigation purposes depends on the equilibrium between the natural groundwater recharge from precipitations and the surrounding sea. This issue is exacerbated by climate changes, and, as a consequence, the reduction of natural groundwater recharge and the decrease the seaward flows of fresh water rather than sea level rise, as recently demonstrated by Ketabchi et al. (2016), leads to magnify the seawater intrusion into coastal aquifers. The temporal fluctuation of the fresh water table level are a natural consequence of the interaction of the aquifer with a water body or due to the seasonal replenishment of the water table. The severe and prolonged drought phenomena as that observed in last years in some areas of the Mediterranean, as over the central western Mediterranean basin, Italy and Spain, where a decreasing trend in total precipitation was detected (Alpert et al., 2002) in addition to the rise in temperature, enlarges the variation of the freshwater flux and can magnify the progression of the saline wedge. In the present study we demonstrate that the presence of varying boundary constraints or forcing factors may lead to hysteretic behavior in saltwater intrusion, showing dependence of the saline wedge on historic conditions. Therefore, the dynamic behavior of SWI may depend on both the present and past forcing conditions. To this aim different transient simulations supported by evidences deduced from a physical model are carried out to assess the presence of the hysteretic effects in the SWI phenomenon and to evaluate its influence in the management of the coastal aquifers for both the rational exploitation and the corrected management of water resources. About 70% of the world's population dwells in coastal zones. Therefore the optimal exploitation of fresh

  4. From intrusive to oscillating thoughts.

    Science.gov (United States)

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  5. Distinction between saltwater drowning and freshwater drowning by assessment of sinus fluid on post-mortem computed tomography

    International Nuclear Information System (INIS)

    Kawasumi, Yusuke; Sato, Yuki; Sato, Yumi; Ishibashi, Tadashi; Usui, Akihito; Daigaku, Nami; Hosokai, Yoshiyuki; Hayashizaki, Yoshie; Funayama, Masato

    2016-01-01

    To evaluate the difference in sinus fluid volume and density between saltwater and freshwater drowning and diagnose saltwater drowning in distinction from freshwater drowning. Ninety-three drowning cases (22 saltwater and 71 freshwater) were retrospectively investigated; all had undergone post-mortem CT and forensic autopsy. Sinus fluid volume and density were calculated using a 3D-DICOM workstation, and differences were evaluated. Diagnostic performance of these indicators for saltwater drowning was evaluated using a cut-off value calculated by receiver operating characteristic (ROC) analysis. The median sinus fluid volume was 5.68 mL in cases of saltwater drowning (range 0.08 to 37.55) and 5.46 mL in cases of freshwater drowning (0.02 to 27.68), and the average densities were 47.28 (14.26 to 75.98) HU and 32.56 (-14.38 to 77.43) HU, respectively. While sinus volume did not differ significantly (p = 0.6000), sinus density was significantly higher in saltwater than freshwater drowning cases (p = 0.0002). ROC analysis for diagnosis of saltwater drowning determined the cut-off value as 37.77 HU, with a sensitivity of 77 %, specificity of 72 %, PPV of 46 % and NPV of 91 %. The average density of sinus fluid in cases of saltwater drowning was significantly higher than in freshwater drowning cases; there was no significant difference in the sinus fluid volume. (orig.)

  6. Distinction between saltwater drowning and freshwater drowning by assessment of sinus fluid on post-mortem computed tomography

    Energy Technology Data Exchange (ETDEWEB)

    Kawasumi, Yusuke; Sato, Yuki; Sato, Yumi; Ishibashi, Tadashi [Tohoku University Graduate School of Medicine, Department of Clinical Imaging, Sendai, Miyagi (Japan); Usui, Akihito; Daigaku, Nami; Hosokai, Yoshiyuki [Tohoku University Graduate School of Medicine, Department of Diagnostic Image Analysis, Sendai, Miyagi (Japan); Hayashizaki, Yoshie; Funayama, Masato [Tohoku University Graduate School of Medicine, Department of Forensic Medicine, Sendai, Miyagi (Japan)

    2016-04-15

    To evaluate the difference in sinus fluid volume and density between saltwater and freshwater drowning and diagnose saltwater drowning in distinction from freshwater drowning. Ninety-three drowning cases (22 saltwater and 71 freshwater) were retrospectively investigated; all had undergone post-mortem CT and forensic autopsy. Sinus fluid volume and density were calculated using a 3D-DICOM workstation, and differences were evaluated. Diagnostic performance of these indicators for saltwater drowning was evaluated using a cut-off value calculated by receiver operating characteristic (ROC) analysis. The median sinus fluid volume was 5.68 mL in cases of saltwater drowning (range 0.08 to 37.55) and 5.46 mL in cases of freshwater drowning (0.02 to 27.68), and the average densities were 47.28 (14.26 to 75.98) HU and 32.56 (-14.38 to 77.43) HU, respectively. While sinus volume did not differ significantly (p = 0.6000), sinus density was significantly higher in saltwater than freshwater drowning cases (p = 0.0002). ROC analysis for diagnosis of saltwater drowning determined the cut-off value as 37.77 HU, with a sensitivity of 77 %, specificity of 72 %, PPV of 46 % and NPV of 91 %. The average density of sinus fluid in cases of saltwater drowning was significantly higher than in freshwater drowning cases; there was no significant difference in the sinus fluid volume. (orig.)

  7. Review on assessment methodology for human intrusion into a repository for radioactive waste

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-09-15

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility.

  8. Review on assessment methodology for human intrusion into a repository for radioactive waste

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility

  9. Spatiotemporal variability in salinity and hydraulic relationship with salt intrusion in the tidal reaches of the Minjiang River, Fujian Province, China.

    Science.gov (United States)

    Xie, Rongrong; Pang, Yong; Luo, Bingrong; Li, Jiabing; Wu, Chunshan; Zheng, Yuyi; Sun, Qiyuan; Zhang, Peng; Wang, Feifeng

    2017-04-01

    Salinity is one of the most important factors for tidal-affected water bodies including estuaries and tidal river reaches. However, due to the limitations of simultaneous manual monitoring in long-distance areas, studies of estuaries are preferred to tidal reaches. Hence, in this study, we investigated the tidal reach of the Minjiang River and five sets of field observations were used to determine the influence of saltwater intrusion in different seasons. During the dry and wet season with low discharge, the longitudinal salinity profiles showed that a station located about 45 km from the river mouth still suffered from saltwater intrusion especially when the upstream discharge was under 754 m 3  s -1 , where the periodical fluctuation in the salinity remained the same with the water level, but there was a time lag of approximately 4 h compared with the discharge process. However, during the wet season in April and May 2016, the monitored salinity was approximately at the detectable limit of 0.02-0.04 ppt at the station close to the river mouth, which indicated that there was no saltwater exchange into the river, although dual flow directions were observed in the survey periods. The major differences among five survey periods were mainly related to upstream discharge rather than the seasons, the tidal range, and tidal excursion. The conclusions of this study have strategic importance for protecting water sources by guiding the government to assess the optimal freshwater release time and discharge rate to prevent saltwater entering the important tidal-affected river reaches.

  10. Assessment of Heavy Metal in Self-caught Saltwater Fish from Port Dickson Coastal Water (Malaysia)

    International Nuclear Information System (INIS)

    Praveena, S.M.; Lin, C.L.S.

    2015-01-01

    Freshwater fish has been studied and reported numerously. However, little attention has been made and limited studies available on local marine fish in Malaysia. Thus, in this study, concentrations of heavy metals (Cd, Cr, Pb and Cu) were studied in four major local marine fish Megalaspis cordyla (hardtail scad), Rastrelliger kanagurta (Indian mackerel), Selaroides leptolepis (yellow stripe scad) and Sardinella fimbriata (fringescale sardinella). The study was also intended to estimate potential health risk assessment from these heavy metals to the consumption of fish and assess maximum allowable fish consumption rate. The range of heavy metal concentrations were 0.053-0.096 mg/ kg for Cd, 1.16-2.34 mg/ kg for Cr, 8.34-12.44 mg/ kg for Pb and 1.40-3.21 mg/ kg for Cu in four major self-caught saltwater fish. Heavy metal levels of Cd and Cu in the local marine fish from Port Dickson are below the limit enforced by Food Regulations (1985) while the levels of Cr and Pb have exceeded the limit. Potential health risks associated with Cd, Cr, Cu and Pb were assessed based on target hazard quotients. HQ values calculated for Cd, Cr and Cu were less than 1, thus indicate that no adverse effects while HQ values for Pb exceeded 1 for all the fish species assessed with the exception of Megalaspis spp and Sardinella sppa. Cr was the highest while Pb concentrations were the lowest in all the studied fish samples for maximum allowable fish consumption rate. A long term monitoring program is crucial to be done in coastal areas with high consumption of local marine fish along Port Dickson to obtain real consumption rates and other cofounders factors in local population. (author)

  11. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and...

  12. Potential for post-closure radionuclide redistribution due to biotic intrusion: aboveground biomass, litter production rates, and the distribution of root mass with depth at material disposal area G, Los Alamos National Laboratory

    International Nuclear Information System (INIS)

    French, Sean B.; Christensen, Candace; Jennings, Terry L.; Jaros, Christopher L.; Wykoff, David S.; Crowell, Kelly J.; Shuman, Rob

    2008-01-01

    Low-level radioactive waste (LLW) generated at the Los Alamos National Laboratories (LANL) is disposed of at LANL's Technical Area (T A) 54, Material Disposal Area (MDA) G. The ability of MDA G to safely contain radioactive waste during current and post-closure operations is evaluated as part of the facility's ongoing performance assessment (PA) and composite analysis (CA). Due to the potential for uptake and incorporation of radio nuclides into aboveground plant material, the PA and CA project that plant roots penetrating into buried waste may lead to releases of radionuclides into the accessible environment. The potential amount ofcontamination deposited on the ground surface due to plant intrusion into buried waste is a function of the quantity of litter generated by plants, as well as radionuclide concentrations within the litter. Radionuclide concentrations in plant litter is dependent on the distribution of root mass with depth and the efficiency with which radionuclides are extracted from contaminated soils by the plant's roots. In order to reduce uncertainties associated with the PA and CA for MDA G, surveys are being conducted to assess aboveground biomass, plant litter production rates, and root mass with depth for the four prominent vegetation types (grasses, forbs, shrubs and trees). The collection of aboveground biomass for grasses and forbs began in 2007. Additional sampling was conducted in October 2008 to measure root mass with depth and to collect additional aboveground biomass data for the types of grasses, forbs, shrubs, and trees that may become established at MDA G after the facility undergoes final closure, Biomass data will be used to estimate the future potential mass of contaminated plant litter fall, which could act as a latent conduit for radionuclide transport from the closed disposal area. Data collected are expected to reduce uncertainties associated with the PA and CA for MDA G and ultimately aid in the assessment and subsequent

  13. Identification of marine intrusion in the plain of Collo, northeastern Algeria

    Directory of Open Access Journals (Sweden)

    Saaidia Bachir

    2017-12-01

    Full Text Available The population increase, urbanization and intensification of agriculture and demands for water supply in the coastal plain of Collo led to excessive pumping of the unconfined aquifer with limited dimensions. This study aimed to characterize the effect of the overexploitation of the groundwater from the only unconfined aquifer in the region, what resulted in the inversion of the groundwater flow and the rise the possible seawater pollution that is shown in the water table map. The causes and effects of the saltwater intrusion were discussed. The interpretation of the electrical conductivity measurements, chloride and sodium maps have shown clearly the areas where values were the highest with tighter curves towards the sea, the wadis Guebli and Cherka. These values distribution indicated a marine source of salinity in wells and boreholes close to the sea and wadis.

  14. Halotolerant ability and α-amylase activity of some saltwater fungal isolates

    NARCIS (Netherlands)

    Niknejad, F.; Moshfegh, M.; Najafzadeh, M.J.; Houbraken, J.; Rezaei, S.; Zarrini, G.; Faramarzi, M.A.; Nafissi-Varcheh, N.

    2013-01-01

    Four halotolerant fungal isolates originating from the saltwater Lake Urmia in Iran were selected during a screening program for salt resistance and α-amylase activity. The isolates were identified based on sequencing the ITS region and a part of the β-tubulin gene, as Penicillium chrysogenum

  15. 78 FR 24069 - Safety Zone; 12th Annual Saltwater Classic; Port Canaveral Harbor; Port Canaveral, FL

    Science.gov (United States)

    2013-04-24

    ... under Executive Order 13045, Protection of Children from Environmental Health Risks and Safety Risks. This rule is not an economically significant rule and does not create an environmental risk to health...-AA00 Safety Zone; 12th Annual Saltwater Classic; Port Canaveral Harbor; Port Canaveral, FL AGENCY...

  16. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  17. Data Mining for Intrusion Detection

    Science.gov (United States)

    Singhal, Anoop; Jajodia, Sushil

    Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This chapter discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested.

  18. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor .... and after amplification is finally read by a digital multimeter (Fluke make: 179 true ... To study the response of the present FO refractometer, propylene glycol has been ... values of all the samples were initially measured by Abbe's refractometer.

  19. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  20. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  1. Biological intrusion barriers for large-volume waste-disposal sites

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Cline, J.F.; Rickard, W.H.

    1982-01-01

    intrusion of plants and animals into shallow land burial sites with subsequent mobilization of toxic and radiotoxic materials has occured. Based on recent pathway modeling studies, such intrusions can contribute to the dose received by man. This paper describes past work on developing biological intrusion barrier systems for application to large volume waste site stabilization. State-of-the-art concepts employing rock and chemical barriers are discussed relative to long term serviceability and cost of application. The interaction of bio-intrusion barrier systems with other processes affecting trench cover stability are discussed to ensure that trench cover designs minimize the potential dose to man. 3 figures, 6 tables

  2. Integral Analysis of Field Work and Laboratory Electrical Resistivity Imaging for Saline Water Intrusion Prediction in Groundwater

    Science.gov (United States)

    Zawawi, M. H.; Zahar, M. F.; Hashim, M. M. M.; Hazreek, Z. A. M.; Zahari, N. M.; Kamaruddin, M. A.

    2018-04-01

    Saline water intrusion is a serious threat to the groundwater as many part of the world utilize groundwater as their main source of fresh water supply. The usage of high salinity level of water as drinking water can lead to a very serious health hazard towards human. Saline water intrusion is a process by which induced flow of seawater into freshwater aquifer along the coastal area. It might happen due to human action and/or by natural event. The climate change and rise up of sea level may speed up the saline water intrusion process. The conventional method for distinguishing and checking saltwater interference to groundwater along the coast aquifers is to gather and test the groundwater from series of observation wells (borehole) with an end goal to give the important information about the hydrochemistry data to conclude whether the water in the well are safe to consume or not. An integrated approach of field and laboratory electrical resistivity investigation is proposed for indicating the contact region between saline and fresh groundwater. It was found that correlation for both soilbox produced almost identical curvilinear trends for 2% increment of seawater tested using sand sample. This project contributes towards predicting the saline water intrusion to the groundwater by non-destructive test that can replaced the conventional method of groundwater monitoring using series of boreholes in the coastal area

  3. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  4. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  5. Intrusive Images in Psychological Disorders

    OpenAIRE

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in th...

  6. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...... the intersection of IDSs and blockchains. In particular, we introduce the background of intrusion detection and blockchain, discuss the applicability of blockchain to intrusion detection, and identify open challenges in this direction....

  7. [Influence of saltwater irrigation on the yield and quality of Cynodon dactylon under desert conditions].

    Science.gov (United States)

    Zhou, Ruilian; Dov, Paternak; Zhao, Halin

    2002-08-01

    Responses of six varieties (Suwannee, Coast cross, Tifton44, Tifton68, Tifton78 and Tifton85) of Cynodon dactylon to irrigation-water salinity were investigated in field by means of a double line source experimental design. The digestibility of the grass by goat was analyzed using the rumen gastric justice digestion method. The results showed that the six varieties grew well, and had a high yield of fresh grass when eletro-conductivity (Eci) Cynodon dactylon were not effected by saltwater irrigation.

  8. Wetting and evaporation of salt-water nanodroplets: A molecular dynamics investigation.

    Science.gov (United States)

    Zhang, Jun; Borg, Matthew K; Sefiane, Khellil; Reese, Jason M

    2015-11-01

    We employ molecular dynamics simulations to study the wetting and evaporation of salt-water nanodroplets on platinum surfaces. Our results show that the contact angle of the droplets increases with the salt concentration. To verify this, a second simulation system of a thin salt-water film on a platinum surface is used to calculate the various surface tensions. We find that both the solid-liquid and liquid-vapor surface tensions increase with salt concentration and as a result these cause an increase in the contact angle. However, the evaporation rate of salt-water droplets decreases as the salt concentration increases, due to the hydration of salt ions. When the water molecules have all evaporated from the droplet, two forms of salt crystals are deposited, clump and ringlike, depending on the solid-liquid interaction strength and the evaporation rate. To form salt crystals in a ring, it is crucial that there is a pinned stage in the evaporation process, during which salt ions can move from the center to the rim of the droplets. With a stronger solid-liquid interaction strength, a slower evaporation rate, and a higher salt concentration, a complete salt crystal ring can be deposited on the surface.

  9. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  10. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  11. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  12. An international perspective on Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  13. The use of protective barriers to deter inadvertent human intrusion into a mined geologic facility for the disposal of radioactive waste: A review of previous investigations and potential concepts

    International Nuclear Information System (INIS)

    Tolan, T.L.

    1993-06-01

    Sandia National Laboratories is evaluating the feasibility of developing protective barrier system for the Waste Isolation Pilot Plant (WIPP) to thwart inadvertent human intrusion into this radioactive-waste disposal system for a period of 9,900 years after assumed loss of active institutional controls. The protective barrier system would be part of a series of enduring passive institutional controls whose long-term function will be to reduce the likelihood of inadvertent human activities (e.g., exploratory drilling for resources) that could disrupt the WIPP disposal system

  14. Intrusive Images in Psychological Disorders

    Science.gov (United States)

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  15. Time to face it! Facebook intrusion and the implications for romantic jealousy and relationship satisfaction.

    Science.gov (United States)

    Elphinston, Rachel A; Noller, Patricia

    2011-11-01

    Young people's exposure to social network sites such as Facebook is increasing, along with the potential for such use to complicate romantic relationships. Yet, little is known about the overlaps between the online and offline worlds. We extended previous research by investigating the links between Facebook intrusion, jealousy in romantic relationships, and relationship outcomes in a sample of undergraduates currently in a romantic relationship. A Facebook Intrusion Questionnaire was developed based on key features of technological (behavioral) addictions. An eight-item Facebook Intrusion Questionnaire with a single-factor structure was supported; internal consistency was high. Facebook intrusion was linked to relationship dissatisfaction, via jealous cognitions and surveillance behaviors. The results highlight the possibility of high levels of Facebook intrusion spilling over into romantic relationships, resulting in problems such as jealousy and dissatisfaction. The results have implications for romantic relationships and for Facebook users in general.

  16. A Generalized Semi-Analytical Solution for the Dispersive Henry Problem: Effect of Stratification and Anisotropy on Seawater Intrusion

    Directory of Open Access Journals (Sweden)

    Marwan Fahs

    2018-02-01

    Full Text Available The Henry problem (HP continues to play a useful role in theoretical and practical studies related to seawater intrusion (SWI into coastal aquifers. The popularity of this problem is attributed to its simplicity and precision to the existence of semi-analytical (SA solutions. The first SA solution has been developed for a high uniform diffusion coefficient. Several further studies have contributed more realistic solutions with lower diffusion coefficients or velocity-dependent dispersion. All the existing SA solutions are limited to homogenous and isotropic domains. This work attempts to improve the realism of the SA solution of the dispersive HP by extending it to heterogeneous and anisotropic coastal aquifers. The solution is obtained using the Fourier series method. A special hydraulic conductivity–depth model describing stratified heterogeneity is used for mathematical convenience. An efficient technique is developed to solve the flow and transport equations in the spectral space. With this technique, we show that the HP can be solved in the spectral space with the salt concentration as primary unknown. Several examples are generated, and the SA solutions are compared against an in-house finite element code. The results provide high-quality data assessed by quantitative indicators that can be effectively used for code verification in realistic configurations of heterogeneity and anisotropy. The SA solution is used to explain contradictory results stated in the previous works about the effect of anisotropy on the saltwater wedge. It is also used to investigate the combined influence of stratification and anisotropy on relevant metrics characterizing SWI. At a constant gravity number, anisotropy leads to landward migration of the saltwater wedge, more intense saltwater flux, a wider mixing zone and shallower groundwater discharge zone to the sea. The influence of stratified heterogeneity is more pronounced in highly anisotropic aquifers. The

  17. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  18. Identifying seawater intrusion in coastal areas by means of 1D and quasi-2D joint inversion of TDEM and VES data

    Science.gov (United States)

    Martínez-Moreno, F. J.; Monteiro-Santos, F. A.; Bernardo, I.; Farzamian, M.; Nascimento, C.; Fernandes, J.; Casal, B.; Ribeiro, J. A.

    2017-09-01

    Seawater intrusion is an increasingly widespread problem in coastal aquifers caused by climate changes -sea-level rise, extreme phenomena like flooding and droughts- and groundwater depletion near to the coastline. To evaluate and mitigate the environmental risks of this phenomenon it is necessary to characterize the coastal aquifer and the salt intrusion. Geophysical methods are the most appropriate tool to address these researches. Among all geophysical techniques, electrical methods are able to detect seawater intrusions due to the high resistivity contrast between saltwater, freshwater and geological layers. The combination of two or more geophysical methods is recommended and they are more efficient when both data are inverted jointly because the final model encompasses the physical properties measured for each methods. In this investigation, joint inversion of vertical electric and time domain soundings has been performed to examine seawater intrusion in an area within the Ferragudo-Albufeira aquifer system (Algarve, South of Portugal). For this purpose two profiles combining electrical resistivity tomography (ERT) and time domain electromagnetic (TDEM) methods were measured and the results were compared with the information obtained from exploration drilling. Three different inversions have been carried out: single inversion of the ERT and TDEM data, 1D joint inversion and quasi-2D joint inversion. Single inversion results identify seawater intrusion, although the sedimentary layers detected in exploration drilling were not well differentiated. The models obtained with 1D joint inversion improve the previous inversion due to better detection of sedimentary layer and the seawater intrusion appear to be better defined. Finally, the quasi-2D joint inversion reveals a more realistic shape of the seawater intrusion and it is able to distinguish more sedimentary layers recognised in the exploration drilling. This study demonstrates that the quasi-2D joint

  19. The Role of Subtropical Intrusion in the Development of Typhoon Usagi (5W) 2007

    National Research Council Canada - National Science Library

    DeLeon, Raymund P

    2008-01-01

    ... of a decaying baroclinic system in the WNP. This analysis of the formation of Usagi points to sub-tropical intrusion of a strong lower-tropospheric baroclinic system undergoing decay as potential seedlings for typhoon formation in areas...

  20. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  1. Evaluation of the Impact of Groundwater Pumping on Freshwater-Saltwater Interface Fluctuations in a Coastal Aquifer of South Korea

    Science.gov (United States)

    Yoon, H.; Kim, Y.; Lee, S. H.; Ha, K.

    2017-12-01

    It is necessary to monitor the variation of freshwater-saltwater interface for the sustainable use of groundwater resources in coastal areas. In the present study, we developed a device to measure the location of the freshwater-saltwater interface based on the concept of the neutral buoyancy and installed it in a coastal aquifer of the western sea, South Korea. To evaluate the impact of pumping on the groundwater and saltwater-freshwater interface level, we designed nine different pumping scenarios and monitored the groundwater and saltwater-freshwater interface levels of pumping well and two observation wells. The result of monitoring groundwater level shows that the response of observation wells to the pumping is relatively fast and high, however, the response of freshwater-saltwater interface occurred when the pumping rate and duration are over 25m3/day and 48hours, respectively. For the prediction and simulation of the groundwater level fluctuation under groundwater pumping events, we designed a artificial neural network based time series model considering rainfall, tide, and pumping rate as input components. The result of the prediction shows that the correlation coefficient between observed and estimated groundwater levels is as high as 0.7. It is expected that the result of this research can provide useful information for the effective management of groundwater resources in the study area.

  2. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  3. Electrolytes imbalance in saltwater near-drowning victims in the Gulf of Thailand.

    Science.gov (United States)

    Yongsiri, Somchai; Dinchuthai, Pakapan; Thammakumpee, Jiranuch; Prongnamchai, Suriya; Chueansuwan, Rachaneeporn; Tangjaturonrasme, Siriporn; Chaivanit, Pechngam

    2013-10-01

    Near-drowning victims in saltwater are expected to have multiple electrolytes imbalance that affected treatment outcome. There are limited data about these parameters in Thailand to guide the treatment plan. To study the characteristic of electrolytes imbalance in saltwater near-drowning victims in the Gulf of Thailand. Retrospective analytic study of 39 medical records of near-drowning patients admitted to Burapha University Hospital between 2000 and 2010. Characteristics of the patients and serum electrolytes were analyzed by SPSS version 19 for windows. The study included 23 male, 16 female patients. Average age was 14.46 +/- 11.15 years and 19/39 (48.72%) patients were aged 10 or less. The following electrolytes imbalance were identified, hypokalemia 8/39 (20.51%), hypernatremia 12/39 (30.77%), hyperchloremia 15/39 (38.46%), high anion gap 23/39 (58.97%), and hypobicarbonatemia 28/39 (71.79%). Seven out of eight patients in the hypokalemia group were in the high anion gap group. Mean SpO2 in the patients who had high anion gap was significantly lower than those who had normal anion gap (87.06 +/- 17.68% vs. 95.8 +/- 5.94% p = 0.031) without difference in systolic blood pressure (112.59 +/- 14.63 vs. 105.67 +/- 13.98 p = 0.159). Those who were hypotensive significantly had lower bicarbonate (17.00 +/- 3.51 vs. 20.59 +/- 3.81 p = 0.038) and higher anion gap (19.29 +/- 1.799 vs. 16.25 +/- 6.25 p = 0.025) than normotensive patients. Hypobicarbonatemia, high anion gap, hypernatremia, and hypokalemia were common in saltwater near-drowning patients in the Gulf of Thailand. The cause of high anion gap was probably due to hypoxia and hypotension.

  4. Thermal History and Crystallinity of Sheet Intrusions

    Science.gov (United States)

    Whittington, A. G.; Nabelek, P. I.; Hofmeister, A.

    2011-12-01

    Magma emplaced in a sheet intrusion has two potential fates: to crystallize, or quench to glass. Rapidly chilled sheet margins are typically glassy or microcrystalline, while interiors are coarser-grained. The actual textures result from a combination of thermal history and crystallization kinetics, which are related by various feedback mechanisms. The thermal history of cooling sheet intrusions is often approximated using the analytical solution for a semi-infinite half-space, which uses constant thermal properties such as heat capacity (CP), thermal diffusivity (D) and thermal conductivity (k = DρCP), where ρ is density. In reality, both CP and D are strongly T-dependent for glasses and crystals, and melts have higher CP and lower D than crystals or glasses. Another first-order feature ignored in the analytical solution is latent heat of crystallization (ΔHxt), which can be implemented numerically as extra heat capacity over the crystallization interval. For rhyolite melts, D is ~0.5 mm2s-1 and k is ~1.5 Wm-1K-1, which are similar to those of major crustal rock types and granitic protoliths at magmatic temperatures, suggesting that changes in thermal properties accompanying partial melting of the crust should be relatively minor. Numerical models of hot (~920°C liquidus for 0.5 wt.% H2O) shallow rhyolite intrusions indicate that the key difference in thermal history between bodies that quench to obsidian, and those that crystallize, results from the release of latent heat of crystallization, which enables bodies that crystallize to remain at high temperatures for much longer times. The time to solidification is similar in both cases, however, because solidification requires cooling through the glass transition (Tg ~620°C) in the first case, and cooling only to the solidus (~770°C) in the second. For basaltic melts, D is ~0.3 mm2s-1 and k is ~1.0 Wm-1K-1, compared to ~0.6 mm2s-1 and 2.5 Wm-1K-1 for crystalline basalt or peridotite at magmatic temperatures

  5. Theory and application of an approximate model of saltwater upconing in aquifers

    Science.gov (United States)

    McElwee, C.; Kemblowski, M.

    1990-01-01

    Motion and mixing of salt water and fresh water are vitally important for water-resource development throughout the world. An approximate model of saltwater upconing in aquifers is developed, which results in three non-linear coupled equations for the freshwater zone, the saltwater zone, and the transition zone. The description of the transition zone uses the concept of a boundary layer. This model invokes some assumptions to give a reasonably tractable model, considerably better than the sharp interface approximation but considerably simpler than a fully three-dimensional model with variable density. We assume the validity of the Dupuit-Forchheimer approximation of horizontal flow in each layer. Vertical hydrodynamic dispersion into the base of the transition zone is assumed and concentration of the saltwater zone is assumed constant. Solute in the transition zone is assumed to be moved by advection only. Velocity and concentration are allowed to vary vertically in the transition zone by using shape functions. Several numerical techniques can be used to solve the model equations, and simple analytical solutions can be useful in validating the numerical solution procedures. We find that the model equations can be solved with adequate accuracy using the procedures presented. The approximate model is applied to the Smoky Hill River valley in central Kansas. This model can reproduce earlier sharp interface results as well as evaluate the importance of hydrodynamic dispersion for feeding salt water to the river. We use a wide range of dispersivity values and find that unstable upconing always occurs. Therefore, in this case, hydrodynamic dispersion is not the only mechanism feeding salt water to the river. Calculations imply that unstable upconing and hydrodynamic dispersion could be equally important in transporting salt water. For example, if groundwater flux to the Smoky Hill River were only about 40% of its expected value, stable upconing could exist where

  6. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    International Nuclear Information System (INIS)

    P. Bernot

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  7. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  8. Assessment of permeation quality of concrete through mercury intrusion porosimetry

    International Nuclear Information System (INIS)

    Kumar, Rakesh; Bhattacharjee, B.

    2004-01-01

    Permeation quality of laboratory cast concrete beams was determined through initial surface absorption test (ISAT). The pore system characteristics of the same concrete beam specimens were determined through mercury intrusion porosimetry (MIP). Data so obtained on the measured initial surface absorption rate of water by concrete and characteristics of pore system of concrete estimated from porosimetry results were used to develop correlations between them. Through these correlations, potential of MIP in assessing the durability quality of concrete in actual structure is demonstrated

  9. Map of the approximate inland extent of saltwater at the base of the Biscayne aquifer in the Model Land Area of Miami-Dade County, Florida, 2016

    Science.gov (United States)

    Prinos, Scott T.

    2017-07-11

    The inland extent of saltwater at the base of the Biscayne aquifer in the Model Land Area of Miami-Dade County, Florida, was mapped in 2011. Since that time, the saltwater interface has continued to move inland. The interface is near several active well fields; therefore, an updated approximation of the inland extent of saltwater and an improved understanding of the rate of movement of the saltwater interface are necessary. A geographic information system was used to create a map using the data collected by the organizations that monitor water salinity in this area. An average rate of saltwater interface movement of 140 meters per year was estimated by dividing the distance between two monitoring wells (TPGW-7L and Sec34-MW-02-FS) by the travel time. The travel time was determined by estimating the dates of arrival of the saltwater interface at the wells and computing the difference. This estimate assumes that the interface is traveling east to west between the two monitoring wells. Although monitoring is spatially limited in this area and some of the wells are not ideally designed for salinity monitoring, the monitoring network in this area is improving in spatial distribution and most of the new wells are well designed for salinity monitoring. The approximation of the inland extent of the saltwater interface and the estimated rate of movement of the interface are dependent on existing data. Improved estimates could be obtained by installing uniformly designed monitoring wells in systematic transects extending landward of the advancing saltwater interface.

  10. Alpha intrusion on ovenight polysomnogram

    Directory of Open Access Journals (Sweden)

    Nahapetian R

    2014-06-01

    Full Text Available No abstract available. Article truncated after 150 words. A 30 year-old Army veteran with a past medical history significant for chronic lumbar back pain stemming from a fall-from-height injury sustained in 2006 was referred to the sleep laboratory for evaluation of chronic fatigue and excessive daytime hypersomnolence. His Epworth sleepiness scale score was 16. He denied a history of snoring and witnessed apnea. Body Mass Index (BMI was 25.7 kg/m2. His main sleep related complaints were frequent nocturnal arousals, poor sleep quality, un-refreshing sleep, prolonged latency to sleep onset, and nightmares. An In-lab attended diagnostic polysomnogram was performed. Sleep efficiency was reduced (73% and overall arousal index was not significantly elevated (3.2 events/hour. The sleep study showed rapid eye movement (REM related sleep disordered breathing that did not meet diagnostic criteria for sleep apnea. There was no evidence for period limb movement disorder. However, the study was significant for alpha wave intrusion in stage N2 non-REM and stage ...

  11. Simulation of saltwater movement in the Upper Floridan aquifer in the Savannah, Georgia-Hilton Head Island, South Carolina, area, predevelopment-2004, and projected movement for 2000 pumping conditions

    Science.gov (United States)

    Provost, Alden M.; Payne, Dorothy F.; Voss, Clifford I.

    2006-01-01

    A digital model was developed to simulate ground-water flow and solute transport for the Upper Floridan aquifer in the Savannah, Georgia-Hilton Head Island, South Carolina, area. The model was used to (1) simulate trends of saltwater intrusion from predevelopment to the present day (1885-2004), (2) project these trends from the present day into the future, and (3) evaluate the relative influence of different assumptions regarding initial and boundary conditions and physical properties. The model is based on a regional, single-density ground-water flow model of coastal Georgia and adjacent parts of South Carolina and Florida. Variable-density ground-water flow and solute transport were simulated using the U.S. Geological Survey finite-element, variable-density solute-transport simulator SUTRA, 1885-2004. The model comprises seven layers: the surficial aquifer system, the Brunswick aquifer system, the Upper Floridan aquifer, the Lower Floridan aquifer, and the intervening confining units. The model was calibrated to September 1998 water levels, for single-density freshwater conditions, then refined using variable density and chloride concentration to give a reasonable match to the trend in the chloride distribution in the Upper Floridan aquifer inferred from field measurements of specific conductance made during 2000, 2002, 2003, and 2004. The model was modified to simulate solute transport by allowing saltwater to enter the system through localized areas near the northern end of Hilton Head Island, at Pinckney Island, and near the Colleton River, and was calibrated to match chloride concentrations inferred from field measurements of specific conductance. This simulation is called the 'Base Case.'

  12. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  13. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  14. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  15. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    Part of the stakeholder consultation addressed strategies that media audiences are developing to cope with pressures and intrusions in a changing media environment, characterised by digitalisation and interactive possibilities. We interviewed ten stakeholders representing interests such as content...... production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...... no consensual motivation, nor any clear avenue for action. Therefore, we have analysed different discursive positions that prevent acknowledging or taking action upon the pressures and intrusions that we presented to these stakeholders. The discursive positions are outlined below....

  16. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  17. Prevention and analysis of hacker's intrusion

    International Nuclear Information System (INIS)

    Liu Baoxu; An Dehai; Xu Rongsheng

    2000-01-01

    The author analyzes the behavior characteristics and relevant technologies about the hacker's intrusion, and gives some corresponding solutions pertinently. To the recent events about hackers, the author gives detailed introduction and puts forward the relevant advice and valuable consideration

  18. Biological intrusion of low-level-waste trench covers

    Science.gov (United States)

    Hakonson, T. E.; Gladney, E. S.

    The long-term integrity of low-level waste shallow land burialsites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. The need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatment is demonstrated. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and sil overburden depth.

  19. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  20. Use of behavioral biometrics in intrusion detection and online gaming

    Science.gov (United States)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2006-04-01

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

  1. Intrusion problematic during water supply systems’ operation

    OpenAIRE

    Jesus Mora-Rodriguez, P. Amparo López-Jimenez, Helena M. Ramos

    2011-01-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuse...

  2. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  3. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    International Nuclear Information System (INIS)

    Bernot, P.

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  4. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei

    2010-01-01

    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  5. Saltwater Upconing and Decay Beneath a Well Pumping Above an Interface Zone

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Quanlin; Bear, Jacob; Bensabat, Jacob

    2004-04-20

    Saltwater, or brine, underlies fresh water in many aquifers, with a transition zone separating them. Pumping fresh water by wells located above the transition zone produces upconing of the latter, eventually salinizing the pumped water, forcing shut-off. The salinity of the pumped water depends on the pumping rate, on the location of the well's screen, on the fresh water flow regime, and on the difference in density between fresh and salt water, expressed as a dimensionless factor called density difference factor (DDF). Following the well's shut-off, the upconed saltwater mound undergoes decay, tending to return to the pre-pumping regime. In this paper, the upconing-decay processes in an axially symmetrical system are investigated to discover how they are affected by the DDF and by the dispersivities. The code FEAS-Brine, developed for the simulation of coupled density-dependent flow and salt transport, is used. In this code, the flow equation is solved by the Galer:wqkin finite element method (FEM), while the advective-dispersive salt transport equation is solved in the Eulerian-Lagrangian framework. This code does not suffer from the instability constraint on the Peclet number in the vicinity of the pumping well, where advection dominates the salt transport. Simulation results show that upconing is very sensitive to the DDF, which, in our work, is in the range from 0 (for ideal tracer) to 0.2 (for brine). It is shown that for the DDF of 0.025 (for seawater), local upconing occurs only for low iso-salinity surfaces, while those of high salt concentration, practically, do not shift toward the pumping well. For an ideal tracer, all iso-salinity surfaces rise toward the pumping well. For brine, however, only iso-salinity surfaces of very low salinity upcone towards the pumping well. The decay process is lengthy; it takes a long time for the upconed saltwater to migrate back to the original horizontal transition zone prior to pumping. However, the wider

  6. Deep saltwater in Chalk of North-West Europe: origin, interface characteristics and development over geological time

    DEFF Research Database (Denmark)

    Bonnesen, Ellen Prip; Larsen, F.; Sonnenborg, T.O.

    2009-01-01

    High-concentration saltwaters occur in many places in the regional Chalk aquifers of North-West Europe; to investigate deep occurrences, profiles of interstitial porewater chemistry have been studied from three 250-450m deep cores drilled in the eastern parts of Zealand, Denmark. At the studied...

  7. Methods for culturing saltwater rotifers (Brachionus plicatilis) for rearing larval zebrafish.

    Science.gov (United States)

    Lawrence, Christian; Sanders, Erik; Henry, Eric

    2012-09-01

    The saltwater rotifer, Brachionus plicatilis, is widely used in the aquaculture industry as a prey item for first-feeding fishes due to its ease of culture, small size, rapid reproductive rate, and amenability to enrichment with nutrients. Despite the distinct advantages of this approach, rotifers have only been sporadically utilized for rearing larval zebrafish, primarily because of the common misconception that maintaining cultures of rotifers is difficult and excessively time-consuming. Here we present simple methods for maintaining continuous cultures of rotifers capable of supporting even the very largest zebrafish aquaculture facility, with minimal investments in materials, time, labor, and space. Examples of the methods' application in one large, existing facility is provided, and troubleshooting of common problems is discussed.

  8. Standard Test Method for Saltwater Pressure Immersion and Temperature Testing of Photovoltaic Modules for Marine Environments

    CERN Document Server

    American Society for Testing and Materials. Philadelphia

    2010-01-01

    1.1 This test method provides a procedure for determining the ability of photovoltaic modules to withstand repeated immersion or splash exposure by seawater as might be encountered when installed in a marine environment, such as a floating aid-to-navigation. A combined environmental cycling exposure with modules repeatedly submerged in simulated saltwater at varying temperatures and under repetitive pressurization provides an accelerated basis for evaluation of aging effects of a marine environment on module materials and construction. 1.2 This test method defines photovoltaic module test specimens and requirements for positioning modules for test, references suitable methods for determining changes in electrical performance and characteristics, and specifies parameters which must be recorded and reported. 1.3 This test method does not establish pass or fail levels. The determination of acceptable or unacceptable results is beyond the scope of this test method. 1.4 The values stated in SI units are to be ...

  9. Geochemical and sedimentological signature of catastrophic saltwater inundations (tsunami), New Zealand

    International Nuclear Information System (INIS)

    Chague-Goff, C.; Goff, J.R.

    1999-01-01

    Three tidal marshes in Able Tasman National Par, New Zealand, were studied using geochemical, sedimentological and radiometric dating techniques. Charcoal and plant material samples were taken from one core in each inlet for 14 C analysis. radiocarbon ages were converted to dendrocalibrated years . All samples produced a terrestrial 13 C signal. Near surface samples were date d by measuring 137 Cs. A 1700 year record of catastrophic saltwater inundations (CSI) events (Tsunami) was produced. Up to four such events were identified, with ruptures of one or more of the Wellington, Wairarapa and Alpine Faults being the most likely tsunamigenic source. CSI signatures include: peaks in Fe and/or S, a peak in fines and contemporaneous or delayed peaks in organic content and/or loss on ignition (LOI). Geochemical data in association with grain size analyses proved to be a valuable tool in the interpretation of these events

  10. Cationic surfactants for control of fresh- and saltwater mollusks in nuclear cooling systems

    International Nuclear Information System (INIS)

    Post, R.M.; Mallen, E.; Lehmann, F.

    1991-01-01

    One result of the release of the US Nuclear Regulatory Commission's Generic Letter 89-13, Service Water Problems Affecting Safety-Related Equipment, was the heightened awareness of the nuclear industry to the problems of macrofouling in heat exchange systems. The principal mollusk species that contribute to freshwater macrofouling problems are Asiatic Clam (southern United States) and Zebra Mussel (Great Lakes). The predominant saltwater fouling mollusks are the Blue Mussel (Pacific, northern Atlantic), Ribbed Mussel (southern Atlantic, Gulf Coast), and American Oyster (Atlantic, Gulf Coast). The nuclear community's awareness of macrofouling problems and the ineffectiveness of intermittent chlorination programs have led to the development of several chemical control technologies for eliminating macrofouling organism infestation. One technology that has proven effective for the control of macrofouling organisms is the periodic addition of a combination of two cationic charged surfactants, specifically, alkyldimethylbenzylammonium chloride (QUAT) and dodecyl guanidine hydrochloride (DGH). Experience with the cationic surfactants at several nuclear power plants is reported

  11. Treatment of Intrusive Suicidal Imagery Using Eye Movements

    Directory of Open Access Journals (Sweden)

    Jaël S. van Bentum

    2017-06-01

    Full Text Available Suicide and suicidal behavior are major public health concerns, and affect 3–9% of the population worldwide. Despite increased efforts for national suicide prevention strategies, there are still few effective interventions available for reducing suicide risk. In this article, we describe various theoretical approaches for suicide ideation and behavior, and propose to examine the possible effectiveness of a new and innovative preventive strategy. A model of suicidal intrusion (mental imagery related to suicide, also referred to as suicidal flash-forwards is presented describing one of the assumed mechanisms in the etiology of suicide and the mechanism of therapeutic change. We provide a brief rationale for an Eye Movement Dual Task (EMDT treatment for suicidal intrusions, describing techniques that can be used to target these suicidal mental images and thoughts to reduce overall behavior. Based on the available empirical evidence for the mechanisms of suicidal intrusions, this approach appears to be a promising new treatment to prevent suicidal behavior as it potentially targets one of the linking pins between suicidal ideation and suicidal actions.

  12. Biological intrusion of low-level-waste trench covers

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Gladney, E.S.

    1981-01-01

    The long-term integrity of low-level waste shallow land burial sites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. Past research on low-level waste shallow land burial methods has emphasized physical (i.e., water infiltration, soil erosion) and chemical (radionuclide leaching) processes that can cause waste site failure and subsequent radionuclide transport. The purpose of this paper is to demonstrate the need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatments. Plants and animals not only can transport radionuclides to the ground surface via root systems and soil excavated from the cover profile by animal burrowing activities, but they modify physical and chemical processes within the cover profile by changing the water infiltration rates, soil erosion rates and chemical composition of the soil. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and soil overburden depth. The rate of biological intrusion through the various barrier materials is being evaluated through the use of activatable stable tracers

  13. Modification of saltwater stress response in Cyprinus carpio (Linnaeus, 1758) pre-exposed to pesticide indoxacarb.

    Science.gov (United States)

    Ghelichpour, Melika; Taheri Mirghaed, Ali; Mirzargar, Seyed Saeed; Joshaghani, Hamidreza; Ebrahimzadeh Mousavi, Hoseinali

    2018-01-01

    To evaluate the effects of indoxacarb on saltwater stress response in Cyprinus carpio, the fish were pre-exposed to indoxacarb (0, 0.75, 1.5 and 3mg/L denoted as CP, 0.75IT, 1.5IT and 3IT, respectively) for 21 days and then released to saltwater. A negative control (CN) group was included (the fish were held in indoxacarb-free water for the entire experiment). The fish were sampled immediately (0h) and 24, 48 and 72h after the salinity exposure for the analysis of plasma cortisol, glucose and sodium, chloride, potassium and calcium levels. All fish pre-exposed to 3mg/L indoxacarb, died after the first day of salinity challenge. CP showed typical cortisol response after the salinity challenge, but, cortisol response of the fish pre-exposed to indoxacarb (0.75IT and 1.5IT) was blocked. Plasma glucose increased significantly in all groups compared to the CN; however, this elevation had no consistent trend in 0.75IT and 1.5IT which indicated interference in glucose response due to indoxacarb exposure. Plasma sodium increased (compared to CN) in all groups after the salinity challenge. However, elevation in plasma chloride and potassium was significantly different among the groups and the indoxacarb-treated fish showed slightly sooner ionic disturbance. The results clearly indicate that indoxacarb impairs stress response of C. carpio and the fish may not be able to respond normally to additional stressors, which threatens their survival. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. Count out your intrusions: Effects of verbal encoding on intrusive memories

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.

    2009-01-01

    Peri-traumatic information processing is thought to affect the development of intrusive trauma memories. This study aimed to replicate and improve the study by Holmes, Brewin, and Hennessy (2004, Exp. 3) on the role of peri-traumatic verbal processing in analogue traumatic intrusion development.

  15. Heat exchange modeling in a multilayered karst aquifer affected by seawater intrusion

    Directory of Open Access Journals (Sweden)

    Luca Vettorello

    2015-11-01

    Full Text Available A Feflow thermohaline model has been implemented in order to study borehole heat exchangers (BHEs activity in a coastal aquifer in the South of Italy (Province of Lecce, Puglia Region. The modeled closed-loop system consists of two double u-pipe heat exchangers, installed in 200 meters deep boreholes. The main purpose of numerical modeling was to forecast thermal plume extension in groundwater after a long period of heat exchange, calculating temperature trends in observation points during a 10 years transport simulation. The complex geological structure, including calcarenites, fractured limestones and a deep karst aquifer, has been translated into a multilayered model, with a depth-related parameter distribution, assigning different values of hydraulic, thermal and chemical properties to each layer. In particular saltwater concentration has been taken into account, considering the influence of seawater intrusion on the heat transport density-dependent model. Parameters assignment was based on experimental datasets collected during initial field investigations, including thermal characterization of soil samples and GRTs, together with historical hydrogeological and hydrochemical measures and previous groundwater surveys. After model structure configuration and aquifers parameterization, a sensitivity analysis on porosity and heat dispersivity has been conducted, to evaluate their influence on thermal transport phenomena with a multiple scenarios approach, considering in particular the uncertainty related to secondary porosity in karst systems. Feflow simulation represented the first step in environmental compatibility evaluation for the BHE plant, waiting for the necessary model calibration with groundwater temperature monitoring trends.

  16. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  17. Evidential reasoning research on intrusion detection

    Science.gov (United States)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  18. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  19. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  20. Magmatic intrusions in the lunar crust

    Science.gov (United States)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  1. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  2. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  3. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  4. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  5. Ensemble Kalman Filter Assimilation of ERT Data for Numerical Modeling of Seawater Intrusion in a Laboratory Experiment

    Directory of Open Access Journals (Sweden)

    Véronique Bouzaglou

    2018-03-01

    Full Text Available Seawater intrusion in coastal aquifers is a worldwide problem exacerbated by aquifer overexploitation and climate changes. To limit the deterioration of water quality caused by saline intrusion, research studies are needed to identify and assess the performance of possible countermeasures, e.g., underground barriers. Within this context, numerical models are fundamental to fully understand the process and for evaluating the effectiveness of the proposed solutions to contain the saltwater wedge; on the other hand, they are typically affected by uncertainty on hydrogeological parameters, as well as initial and boundary conditions. Data assimilation methods such as the ensemble Kalman filter (EnKF represent promising tools that can reduce such uncertainties. Here, we present an application of the EnKF to the numerical modeling of a laboratory experiment where seawater intrusion was reproduced in a specifically designed sandbox and continuously monitored with electrical resistivity tomography (ERT. Combining EnKF and the SUTRA model for the simulation of density-dependent flow and transport in porous media, we assimilated the collected ERT data by means of joint and sequential assimilation approaches. In the joint approach, raw ERT data (electrical resistances are assimilated to update both salt concentration and soil parameters, without the need for an electrical inversion. In the sequential approach, we assimilated electrical conductivities computed from a previously performed electrical inversion. Within both approaches, we suggest dual-step update strategies to minimize the effects of spurious correlations in parameter estimation. The results show that, in both cases, ERT data assimilation can reduce the uncertainty not only on the system state in terms of salt concentration, but also on the most relevant soil parameters, i.e., saturated hydraulic conductivity and longitudinal dispersivity. However, the sequential approach is more prone to

  6. Fracturing of doleritic intrusions and associated contact zones: Implications for fluid flow in volcanic basins

    Science.gov (United States)

    Senger, Kim; Buckley, Simon J.; Chevallier, Luc; Fagereng, Åke; Galland, Olivier; Kurz, Tobias H.; Ogata, Kei; Planke, Sverre; Tveranger, Jan

    2015-02-01

    Igneous intrusions act as both carriers and barriers to subsurface fluid flow and are therefore expected to significantly influence the distribution and migration of groundwater and hydrocarbons in volcanic basins. Given the low matrix permeability of igneous rocks, the effective permeability in- and around intrusions is intimately linked to the characteristics of their associated fracture networks. Natural fracturing is caused by numerous processes including magma cooling, thermal contraction, magma emplacement and mechanical disturbance of the host rock. Fracturing may be locally enhanced along intrusion-host rock interfaces, at dyke-sill junctions, or at the base of curving sills, thereby potentially enhancing permeability associated with these features. In order to improve our understanding of fractures associated with intrusive bodies emplaced in sedimentary host rocks, we have investigated a series of outcrops from the Karoo Basin of the Eastern Cape province of South Africa, where the siliciclastic Burgersdorp Formation has been intruded by various intrusions (thin dykes, mid-sized sheet intrusions and thick sills) belonging to the Karoo dolerite. We present a quantified analysis of fracturing in- and around these igneous intrusions based on five outcrops at three individual study sites, utilizing a combination of field data, high-resolution lidar virtual outcrop models and image processing. Our results show a significant difference between the three sites in terms of fracture orientation. The observed differences can be attributed to contrasting intrusion geometries, outcrop geometry (for lidar data) and tectonic setting. Two main fracture sets were identified in the dolerite at two of the sites, oriented parallel and perpendicular to the contact respectively. Fracture spacing was consistent between the three sites, and exhibits a higher degree of variation in the dolerites compared to the host rock. At one of the study sites, fracture frequency in the

  7. Analysis of impact of temperature and saltwater on Nannochloropsis salina bio-oil production by ultra high resolution APCI FT-ICR MS

    KAUST Repository

    Sanguineti, Michael Mario; Hourani, Nadim; Witt, Matthí as; Sarathy, Mani; Thomsen, Laurenz A.; Kuhnert, Nikolai

    2015-01-01

    Concentrated Nannochloropsis salina paste was reconstituted in distilled water and synthetic saltwater and processed at 250°C and 300°C via hydrothermal liquefaction. The resulting bio-oils yielded a diverse distribution of product classes

  8. Wave Induced Saline Intrusion in Sea Outfalls

    DEFF Research Database (Denmark)

    Larsen, Torben; Burrows, Richard

    1989-01-01

    Experimental and numerical studies have shown that the influence of wave increases the tendency of saline intrusion in multi-riser sea outfalls. The flow field in the diffusor under such unsteady and inhomogeneous circumstances is in general very complex, but when sufficient wave energy is dissip...

  9. Work Zone Intrusion Report Interface Design

    Science.gov (United States)

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  10. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  11. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  12. Root resorption after orthodontic intrusion and extrusion:.

    NARCIS (Netherlands)

    Han, G.; Huang, S.; Hoff, J.W. Von den; Zeng, X.; Kuijpers-Jagtman, A.M.

    2005-01-01

    The aim of this investigation was to compare root resorption in the same individual after application of continuous intrusive and extrusive forces. In nine patients (mean age 15.3 years), the maxillary first premolars were randomly intruded or extruded with a continuous force of 100 cN for eight

  13. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  14. Petrology of the Sutherland commanage melilite intrusives

    International Nuclear Information System (INIS)

    Viljoen, K.S.

    1990-01-01

    The petrology of the Sutherland Commonage olivine melilitite intrusives have been investigated using petrographic and chemical methods. The results of the geochemical study suggest that the Commonage melilites were derived by the melting of a recently metasomatised region of the asthenosphere, probably under the influence of an ocean-island-type hotspot situated in the lower mantle

  15. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    Seawater intrusion; coastal aquifers; density-dependent flow and ... The seawater intrusion mechanism in coastal aquifers generally causes the occurrence of ... (4) The dynamic viscosity of the fluid does not change with respect to salinity and.

  16. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  17. Development and evaluation of a regression-based model to predict cesium-137 concentration ratios for saltwater fish

    International Nuclear Information System (INIS)

    Pinder, John E.; Rowan, David J.; Smith, Jim T.

    2016-01-01

    Data from published studies and World Wide Web sources were combined to develop a regression model to predict "1"3"7Cs concentration ratios for saltwater fish. Predictions were developed from 1) numeric trophic levels computed primarily from random resampling of known food items and 2) K concentrations in the saltwater for 65 samplings from 41 different species from both the Atlantic and Pacific Oceans. A number of different models were initially developed and evaluated for accuracy which was assessed as the ratios of independently measured concentration ratios to those predicted by the model. In contrast to freshwater systems, were K concentrations are highly variable and are an important factor in affecting fish concentration ratios, the less variable K concentrations in saltwater were relatively unimportant in affecting concentration ratios. As a result, the simplest model, which used only trophic level as a predictor, had comparable accuracies to more complex models that also included K concentrations. A test of model accuracy involving comparisons of 56 published concentration ratios from 51 species of marine fish to those predicted by the model indicated that 52 of the predicted concentration ratios were within a factor of 2 of the observed concentration ratios. - Highlights: • We developed a model to predict concentration ratios (C_r) for saltwater fish. • The model requires only a single input variable to predict C_r. • That variable is a mean numeric trophic level available at (fishbase.org). • The K concentrations in seawater were not an important predictor variable. • The median-to observed ratio for 56 independently measured C_r was 0.83.

  18. Engineering evaluation of intrusion prevention strategies for single-shell tanks

    International Nuclear Information System (INIS)

    Jenkins, C.E.

    1994-01-01

    In this study, previously implemented actions to prevent liquid intrusion into out-of-service single-shell tanks (SSTs), i.e., interim isolation or partial interim isolation, are investigated and expanded to identify additional cost-effective intrusion prevention techniques that could be reasonably taken until SSTs are ready for waste retrieval. Possible precipitation, groundwater, and condensation pathways and internal tank connections that could provide possible pathways for liquids are examined. Techniques to block identified potential pathways are developed and costed to determine the potential benefit to costed trade-offs for implementing the techniques. (Note: Surveillance data show increased waste surface levels for several SSTs that indicate possible liquid intrusion despite interim isolation activities.)

  19. Integrating Desalination and Energy Storage using a Saltwater-based Hybrid Sodium-ion Supercapacitor.

    Science.gov (United States)

    Guo, Zhaowei; Ma, Yuanyuan; Dong, Xiaoli; Hou, Mengyan; Wang, Yonggang; Xia, Yongyao

    2018-06-11

    Ever-increasing freshwater scarcity and energy crisis problems require efficient seawater desalination and energy storage technologies; however, each target is generally considered separately. Herein, a hybrid sodium-ion supercapacitor, involving a carbon-coated nano-NaTi 2 (PO 4 ) 3 -based battery anode and an activated-carbon-based capacitive cathode, is developed to combine desalination and energy storage in one device. On charge, the supercapacitor removes salt in a flowing saltwater electrolyte through Cl - electrochemical adsorption at the cathode and Na + intercalation at the anode. Discharge delivers useful electric energy and regenerates the electrodes. This supercapacitor can be used not only for energy storage with promising electrochemical performance (i.e., high power, high efficiency, and long cycle life), but also as a desalination device with desalination capacity of 146.8 mg g -1 , much higher than most reported capacitive and battery desalination devices. Finally, we demonstrate renewables to usable electric energy and desalted water through combining commercial photovoltaics and this hybrid supercapacitor. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  20. A direct biocombinatorial strategy toward next generation, mussel-glue inspired saltwater adhesives.

    Science.gov (United States)

    Wilke, Patrick; Helfricht, Nicolas; Mark, Andreas; Papastavrou, Georg; Faivre, Damien; Börner, Hans G

    2014-09-10

    Biological materials exhibit remarkable, purpose-adapted properties that provide a source of inspiration for designing new materials to meet the requirements of future applications. For instance, marine mussels are able to attach to a broad spectrum of hard surfaces under hostile conditions. Controlling wet-adhesion of synthetic macromolecules by analogue processes promises to strongly impact materials sciences by offering advanced coatings, adhesives, and glues. The de novo design of macromolecules to mimic complex aspects of mussel adhesion still constitutes a challenge. Phage display allows material scientists to design specifically interacting molecules with tailored affinity to material surfaces. Here, we report on the integration of enzymatic processing steps into phage display biopanning to expand the biocombinatorial procedure and enable the direct selection of enzymatically activable peptide adhesion domains. Adsorption isotherms and single molecule force spectroscopy show that those de novo peptides mimic complex aspects of bioadhesion, such as enzymatic activation (by tyrosinase), the switchability from weak to strong binders, and adsorption under hostile saltwater conditions. Furthermore, peptide-poly(ethylene oxide) conjugates are synthesized to generate protective coatings, which possess anti-fouling properties and suppress irreversible interactions with blood-plasma protein cocktails. The extended phage display procedure provides a generic way to non-natural peptide adhesion domains, which not only mimic nature but also improve biological sequence sections extractable from mussel-glue proteins. The de novo peptides manage to combine several tasks in a minimal 12-mer sequence and thus pave the way to overcome major challenges of technical wet glues.

  1. Forecasting Induced Seismicity Using Saltwater Disposal Data and a Hydromechanical Earthquake Nucleation Model

    Science.gov (United States)

    Norbeck, J. H.; Rubinstein, J. L.

    2017-12-01

    The earthquake activity in Oklahoma and Kansas that began in 2008 reflects the most widespread instance of induced seismicity observed to date. In this work, we demonstrate that the basement fault stressing conditions that drive seismicity rate evolution are related directly to the operational history of 958 saltwater disposal wells completed in the Arbuckle aquifer. We developed a fluid pressurization model based on the assumption that pressure changes are dominated by reservoir compressibility effects. Using injection well data, we established a detailed description of the temporal and spatial variability in stressing conditions over the 21.5-year period from January 1995 through June 2017. With this stressing history, we applied a numerical model based on rate-and-state friction theory to generate seismicity rate forecasts across a broad range of spatial scales. The model replicated the onset of seismicity, the timing of the peak seismicity rate, and the reduction in seismicity following decreased disposal activity. The behavior of the induced earthquake sequence was consistent with the prediction from rate-and-state theory that the system evolves toward a steady seismicity rate depending on the ratio between the current and background stressing rates. Seismicity rate transients occurred over characteristic timescales inversely proportional to stressing rate. We found that our hydromechanical earthquake rate model outperformed observational and empirical forecast models for one-year forecast durations over the period 2008 through 2016.

  2. Biogeochemical cycling of carbon, nitrogen, and phosphorus in saltwater marshes of Lavaca Bay, Texas. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Armstrong, N.E.; Hinson, M.O. Jr.; Collins, J.H.; Fruh, E.G.

    1975-01-24

    Both laboratory and field tests were conducted. Special sediment slurry uptake studies were performed for the purpose of developing Freundlich-like isotherms relating sediment concentrations of C, N, P to the equilibrium concentrations in water and to show the effects of sediment composition, salinity, and temperature on uptake. The flux of N and P into and out of sediment were studied in fixed-bed systems by continuously adding various amounts of N and P to these systems and following uptake in the sediments until equilibrium conditions were established, then stopping the additions and following the release of nutrients from the sediments. Mass balances were made for C, N, and P added in spiked and non-spiked Bay water, and productivity measurements were taken to determine the stimulatory effects of these nutrient additions. The field studies involved the collection of hydraulic and nutrient data at several stations in a bayou off Swan Lake in Lavaca Bay to determine net nutrient transport and exchange from and in the saltwater marshes. Mathematical models describing the sediment uptake of C, N, and P as a function of the mass transfer coefficient and the difference between equilibrium and ambient nutrient concentrations were developed.

  3. Quantitative analysis of production traits in saltwater crocodiles (Crocodylus porosus): II. age at slaughter.

    Science.gov (United States)

    Isberg, S R; Thomson, P C; Nicholas, F W; Barker, S G; Moran, C

    2005-12-01

    Crocodile morphometric (head, snout-vent and total length) measurements were recorded at three stages during the production chain: hatching, inventory [average age (+/-SE) is 265.1 +/- 0.4 days] and slaughter (average age is 1037.8 +/- 0.4 days). Crocodile skins are used for the manufacture of exclusive leather products, with the most common-sized skin sold having 35-45 cm in belly width. One of the breeding objectives for inclusion into a multitrait genetic improvement programme for saltwater crocodiles is the time taken for a juvenile to reach this size or age at slaughter. A multivariate restricted maximum likelihood analysis provided (co)variance components for estimating the first published genetic parameter estimates for these traits. Heritability (+/-SE) estimates for the traits hatchling snout-vent length, inventory head length and age at slaughter were 0.60 (0.15), 0.59 (0.12) and 0.40 (0.10) respectively. There were strong negative genetic (-0.81 +/- 0.08) and phenotypic (-0.82 +/- 0.02) correlations between age at slaughter and inventory head length.

  4. Preliminary evaluation of solution-mining intrusion into a salt-dome repository

    International Nuclear Information System (INIS)

    1981-06-01

    This report is the product of the work of an ONWI task force to evaluate inadvertant human intrusion into a salt dome repository by solution mining. It summarizes the work in the following areas: a general review of the levels of defense that could reduce both the likelihood and potential consequences of human intrusion into a salt dome repository; evaluation of a hypothetical intrusion scenario and its consequences; recommendation for further studies. The conclusions of this task force report can be summarized as follows: (1) it is not possible at present to establish with certainty that solution mining is credible as a human-intrusion event. The likelihood of such an intrusion will depend on the effectiveness of the preventive measures; (2) an example analysis based on the realistic approach is presented in this report; it concluded that the radiological consequences are strongly dependent upon the mode of radionuclide release from the waste form, time after emplacement, package design, impurities in the host salt, the amount of a repository intercepted, the solution mining cavity form, the length of time over which solution mining occurs, the proportion of contaminated salt source for human consumption compared to other sources, and the method of salt purification for culinary purposes; (3) worst case scenarios done by other studies suggest considerable potential for exposures to man while preliminary evaluations of more realistic cases suggest significantly reduced potential consequences. Mathematical model applications to process systems, guided by more advanced assumptions about human intrusion into geomedia, will shed more light on the potential for concerns and the degree to which mitigative measures will be required

  5. Doses resulting from intrusion into uranium tailings areas

    International Nuclear Information System (INIS)

    Walsh, M.L.

    1986-02-01

    In the future, it is conceivable that institutional controls of uranium tailings areas may cease to exist and individuals may intrude into these areas unaware of the potential radiation hazards. The objective of this study was to estimate the potential doses to the intruders for a comprehensive set of intrusion scenarios. Reference tailings areas in the Elliot Lake region of northern Ontario and in northern Saskatchewan were developed to the extent required to calculate radiation exposures. The intrusion scenarios for which dose calculations were performed, were categorized into the following classes: habitation of the tailings, agricultural activities, construction activities, and recreational activities. Realistic exposure conditions were specified and annual doses were calculated by applying standard dose conversion factors. The exposure estimates demonstrated that the annual doses resulting from recreational activities and from construction activities would be generally small, less than twenty millisieverts, while the habitational and agricultural activities could hypothetically result in doses of several hundred millisieverts. However, the probability of occurrence of these latter classes of scenarios is considered to be much lower than scenarios involving either construction or recreational activities

  6. Relationship between vapor intrusion and human exposure to trichloroethylene.

    Science.gov (United States)

    Archer, Natalie P; Bradford, Carrie M; Villanacci, John F; Crain, Neil E; Corsi, Richard L; Chambers, David M; Burk, Tonia; Blount, Benjamin C

    2015-01-01

    Trichloroethylene (TCE) in groundwater has the potential to volatilize through soil into indoor air where it can be inhaled. The purpose of this study was to determine whether individuals living above TCE-contaminated groundwater are exposed to TCE through vapor intrusion. We examined associations between TCE concentrations in various environmental media and TCE concentrations in residents. For this assessment, indoor air, outdoor air, soil gas, and tap water samples were collected in and around 36 randomly selected homes; blood samples were collected from 63 residents of these homes. Additionally, a completed exposure survey was collected from each participant. Environmental and blood samples were analyzed for TCE. Mixed model multiple linear regression analyses were performed to determine associations between TCE in residents' blood and TCE in indoor air, outdoor air, and soil gas. Blood TCE concentrations were above the limit of quantitation (LOQ; ≥ 0.012 µg L(-1)) in 17.5% of the blood samples. Of the 36 homes, 54.3%, 47.2%, and >84% had detectable concentrations of TCE in indoor air, outdoor air, and soil gas, respectively. Both indoor air and soil gas concentrations were statistically significantly positively associated with participants' blood concentrations (P = 0.0002 and P = 0.04, respectively). Geometric mean blood concentrations of residents from homes with indoor air concentrations of >1.6 µg m(-3) were approximately 50 times higher than geometric mean blood TCE concentrations in participants from homes with no detectable TCE in indoor air (P < .0001; 95% CI 10.4-236.4). This study confirms the occurrence of vapor intrusion and demonstrates the magnitude of exposure from vapor intrusion of TCE in a residential setting.

  7. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  8. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  9. Acceptance- and imagery-based strategies can reduce chocolate cravings: A test of the elaborated-intrusion theory of desire.

    Science.gov (United States)

    Schumacher, Sophie; Kemps, Eva; Tiggemann, Marika

    2017-06-01

    The elaborated-intrusion theory of desire proposes that craving is a two-stage process whereby initial intrusions about a desired target are subsequently elaborated with mental imagery. The present study tested whether the craving reduction strategies of cognitive defusion and guided imagery could differentially target the intrusion and elaboration stages, respectively, and thus differentially impact the craving process. Participants were randomly assigned to a cognitive defusion, a guided imagery or a mind-wandering control condition. Pre- and post-intervention chocolate-related thoughts, intrusiveness of thoughts, vividness of imagery, craving intensity, and chocolate consumption were compared. Experiment 1 recruited a general sample of young women (n = 94), whereas Experiment 2 recruited a sample of chocolate cravers who wanted to reduce their chocolate consumption (n = 97). Across both experiments, cognitive defusion lowered intrusiveness of thoughts, vividness of imagery and craving intensity. Guided imagery reduced chocolate-related thoughts, intrusiveness, vividness and craving intensity for chocolate cravers (Experiment 2), but not for the general sample (Experiment 1). There were no group differences in chocolate consumption in either experiment. Results add to existing evidence supporting the elaborated-intrusion theory of desire in the food domain, and suggest that acceptance- and imagery-based techniques have potential for use in combatting problematic cravings. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. Multilayer Statistical Intrusion Detection in Wireless Networks

    Science.gov (United States)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  11. Distributed fiber optic moisture intrusion sensing system

    Science.gov (United States)

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  12. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  13. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    Sulfide intrusion in seagrasses represents a global threat to seagrasses and thereby an important parameter in resilience of seagrass ecosystems. In contrast seegrasses colonize and grow in hostile sediments, where they are constantly exposed to invasion of toxic gaseous sulfide. Remarkably little...... strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis, tracing sulfur compounds combined with ecosystem parameters we found different spatial, intraspecific and interspecific strategies to cope with sulfidic sediments. 1...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  14. Internet use, Facebook intrusion, and depression: Results of a cross-sectional study.

    Science.gov (United States)

    Błachnio, A; Przepiórka, A; Pantic, I

    2015-09-01

    Facebook has become a very popular social networking platform today, particularly among adolescents and young adults, profoundly changing the way they communicate and interact. However, some reports have indicated that excessive Facebook use might have detrimental effects on mental health and be associated with certain psychological problems. Because previous findings on the relationship between Facebook addiction and depression were not unambiguous, further investigation was required. The main objective of our study was to examine the potential associations between Internet use, depression, and Facebook intrusion. A total of 672 Facebook users took part in the cross-sectional study. The Facebook Intrusion Questionnaire and the Center for Epidemiologic Studies Depression Scale were used. For collecting the data, the snowball sampling procedure was used. We showed that depression can be a predictor of Facebook intrusion. Our results provides additional evidence that daily Internet use time in minutes, gender, and age are also predictors of Facebook intrusion: that Facebook intrusion can be predicted by being male, young age, and an extensive number of minutes spent online. On the basis of this study, it is possible to conclude that there are certain demographic - variables, such as age, gender, or time spent online - that may help in outlining the profile of a user who may be in danger of becoming addicted to Facebook. This piece of knowledge may serve for prevention purposes. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  15. WIPP performance assessment: impacts of human intrusion

    International Nuclear Information System (INIS)

    Anderson, D.R.; Hunter, R.L.; Bertram-Howery, S.G.; Lappin, A.R.

    1989-01-01

    The Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico is a research and development facility that may become the USA's first and only mined geologic repository for transuranic waste. Human intrusion into the WIPP repository after closure has been shown by preliminary sensitivity analyses and calculations of consequences to be an important, and perhaps the most important, factor in long-term repository performance

  16. AMDIS Case Conference: Intrusive Medication Safety Alerts.

    Science.gov (United States)

    Graham, J; Levick, D; Schreiber, R

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center's dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  17. AMDIS Case Conference: Intrusive Medication Safety Alerts

    OpenAIRE

    Graham, J.; Levick, D.; Schreiber, R.

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center’s dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  18. INTRUSIVE MARKETING METHODS A CONTEMPORARY CONSUMER PERSPECTIVE

    OpenAIRE

    Owais, Faizan

    2008-01-01

    Is marketing practice destroying the faith of consumers? It may be argued that marketing practice over recent years has taken a more direct approach that appears intrusive and manipulative to consumers. The marketing activities we see today are a desperate attempt to grab consumer attention in any way possible and it is all spelling out bad news for marketing. Marketers have been faced with many challenges, with markets at saturation point, competitiveness is on the rise and marketers are...

  19. Stochastic Tools for Network Intrusion Detection

    OpenAIRE

    Yu, Lu; Brooks, Richard R.

    2017-01-01

    With the rapid development of Internet and the sharp increase of network crime, network security has become very important and received a lot of attention. We model security issues as stochastic systems. This allows us to find weaknesses in existing security systems and propose new solutions. Exploring the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantages of the system weaknesses. We propose a hybrid network security scheme including intrusion detecti...

  20. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  1. Estimation of long-term probabilities for inadvertent intrusion into radioactive waste management areas

    International Nuclear Information System (INIS)

    Eedy, W.; Hart, D.

    1988-05-01

    The risk to human health from radioactive waste management sites can be calculated as the product of the probability of accidental exposure (intrusion) times the probability of a health effect from such exposure. This report reviews the literature and evaluates methods used to predict the probabilities for unintentional intrusion into radioactive waste management areas in Canada over a 10,000-year period. Methods to predict such probabilities are available. They generally assume a long-term stability in terms of existing resource uses and society in the management area. The major potential for errors results from the unlikeliness of these assumptions holding true over such lengthy periods of prediction

  2. Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation

    Directory of Open Access Journals (Sweden)

    Basant Subba

    2016-06-01

    Full Text Available Present Intrusion Detection Systems (IDSs for MANETs require continuous monitoring which leads to rapid depletion of a node's battery life. To address this issue, we propose a new IDS scheme comprising a novel cluster leader election process and a hybrid IDS. The cluster leader election process uses the Vickrey–Clarke–Groves mechanism to elect the cluster leader which provides the intrusion detection service. The hybrid IDS comprises a threshold based lightweight module and a powerful anomaly based heavyweight module. Initially, only the lightweight module is activated. The decision to activate the heavyweight module is taken by modeling the intrusion detection process as an incomplete information non-cooperative game between the elected leader node and the potential malicious node. Simulation results show that the proposed scheme significantly reduces the IDS traffic and overall power consumption in addition to maintaining a high detection rate and accuracy.

  3. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  4. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  5. Corrosion Fatigue Crack Propagation Rate Characteristics for Weldable Ship and Offshore Steels with Regard to the Influence of Loading Frequency and Saltwater Temperature

    Directory of Open Access Journals (Sweden)

    Jakubowski Marek

    2017-03-01

    Full Text Available After Vosikovsky (1975, the corrosion fatigue crack growth rate (CFCGR characteristics have been divided into three regions. The region-III rates are very close to mechanical fatigue crack growth rates. CFCGR formulae, including the long-crack length effect (in region I only, the loading frequency effect (in region II only, and the saltwater temperature effect, have been proposed. It has been assumed that CFCGR is proportional to f-k, where f is the loading frequency and k is a constant. The averaged k-value for all steels of yield stress (YS below 500 MPa, usually with ferrite-pearlite microstructures, is higher than that for YS > 500 MPa, usually with quenched and tempered microstructures. The temperature effect does not appear in region I below room temperature. In the remaining cases, that is, in region I for elevated temperatures and in region II for both low and elevated temperatures, the CFCGR increases with increasing temperature. Under a potential of -0.8 V, a long-crack-length effect, qualitatively similar to analogous effect for free corrosion conditions, appears.

  6. Saltwater contamination in the managed low-lying farmland of the Venice coast, Italy: An assessment of vulnerability

    Energy Technology Data Exchange (ETDEWEB)

    Da Lio, Cristina, E-mail: cristina.dalio@ve.ismar.cnr.it [Institute of Marine Sciences, National Research Council, Arsenale — Tesa 104, Castello 2737/F, 30122 Venezia (Italy); Carol, Eleonora, E-mail: eleocarol@fcnym.unlp.edu.ar [Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET), Cátedra de Hidrología General, Facultad de Ciencias Naturales y Museo, Universidad Nacional de La Plata 64 n" o3 La Plata (Argentina); Kruse, Eduardo, E-mail: kruse@fcnym.unlp.edu.ar [Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET), Cátedra de Hidrología General, Facultad de Ciencias Naturales y Museo, Universidad Nacional de La Plata 64 n" o3 La Plata (Argentina); Teatini, Pietro, E-mail: pietro.teatini@unipd.it [Institute of Marine Sciences, National Research Council, Arsenale — Tesa 104, Castello 2737/F, 30122 Venezia (Italy); Dept. of Civil, Architectural and Environmental Engineering, University of Padova, Via Trieste 63, 35121 Padova (Italy); Tosi, Luigi, E-mail: luigi.tosi@ismar.cnr.it [Institute of Marine Sciences, National Research Council, Arsenale — Tesa 104, Castello 2737/F, 30122 Venezia (Italy)

    2015-11-15

    The original morphology and hydrogeology of many low-lying coastlands worldwide have been significantly modified over the last century through river diversion, embankment built-up, and large-scale land reclamation projects. This led to a progressive shifting of the groundwater–surficial water exchanges from naturally to anthropogenically driven. In this human-influenced hydrologic landscape, the saltwater contamination usually jeopardizes the soil productivity. In the coastland south of Venice (Italy), several well log measurements, chemical and isotope analyses have been performed over the last decade to characterize the occurrence of the salt contamination. The processing of this huge dataset highlights a permanent variously-shaped saline contamination up to 20 km inland, with different conditions in relation with the various geomorphological features of the area. The results point out the important role of the land reclamation in shaping the present-day salt contamination and reveal the contribution of precipitation, river discharge, lagoon and sea water to the shallow groundwater in the various coastal sectors. Moreover, an original vulnerability map to salt contamination in relation to the farmland productivity has been developed taking into account the electrical conductivity of the upper aquifer in the worst condition, the ground elevation, and the distance from salt and fresh surface water sources. Finally, the study allows highlighting the limit of traditional investigations in monitoring saltwater contamination at the regional scale in managed Holocene coastal environments. Possible improvements are outlined. - Highlights: • Land reclamation shapes the present saltwater contamination in the Venice coastland. • Natural and anthropogenic forcings drive the seawater flow in shallow aquifers. • Hydro-geophysical–geochemical investigations highlight the groundwater origin. • The vulnerability of the farmland to salt contamination extents up to 20

  7. Saltwater contamination in the managed low-lying farmland of the Venice coast, Italy: An assessment of vulnerability

    International Nuclear Information System (INIS)

    Da Lio, Cristina; o3 La Plata (Argentina))" data-affiliation=" (Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET), Cátedra de Hidrología General, Facultad de Ciencias Naturales y Museo, Universidad Nacional de La Plata 64 no3 La Plata (Argentina))" >Carol, Eleonora; o3 La Plata (Argentina))" data-affiliation=" (Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET), Cátedra de Hidrología General, Facultad de Ciencias Naturales y Museo, Universidad Nacional de La Plata 64 no3 La Plata (Argentina))" >Kruse, Eduardo; Teatini, Pietro; Tosi, Luigi

    2015-01-01

    The original morphology and hydrogeology of many low-lying coastlands worldwide have been significantly modified over the last century through river diversion, embankment built-up, and large-scale land reclamation projects. This led to a progressive shifting of the groundwater–surficial water exchanges from naturally to anthropogenically driven. In this human-influenced hydrologic landscape, the saltwater contamination usually jeopardizes the soil productivity. In the coastland south of Venice (Italy), several well log measurements, chemical and isotope analyses have been performed over the last decade to characterize the occurrence of the salt contamination. The processing of this huge dataset highlights a permanent variously-shaped saline contamination up to 20 km inland, with different conditions in relation with the various geomorphological features of the area. The results point out the important role of the land reclamation in shaping the present-day salt contamination and reveal the contribution of precipitation, river discharge, lagoon and sea water to the shallow groundwater in the various coastal sectors. Moreover, an original vulnerability map to salt contamination in relation to the farmland productivity has been developed taking into account the electrical conductivity of the upper aquifer in the worst condition, the ground elevation, and the distance from salt and fresh surface water sources. Finally, the study allows highlighting the limit of traditional investigations in monitoring saltwater contamination at the regional scale in managed Holocene coastal environments. Possible improvements are outlined. - Highlights: • Land reclamation shapes the present saltwater contamination in the Venice coastland. • Natural and anthropogenic forcings drive the seawater flow in shallow aquifers. • Hydro-geophysical–geochemical investigations highlight the groundwater origin. • The vulnerability of the farmland to salt contamination extents up to 20

  8. Artificial Intelligence-Based Models for the Optimal and Sustainable Use of Groundwater in Coastal Aquifers

    Science.gov (United States)

    Sreekanth, J.; Datta, Bithin

    2011-07-01

    Overexploitation of the coastal aquifers results in saltwater intrusion. Once saltwater intrusion occurs, it involves huge cost and long-term remediation measures to remediate these contaminated aquifers. Hence, it is important to have strategies for the sustainable use of coastal aquifers. This study develops a methodology for the optimal management of saltwater intrusion prone aquifers. A linked simulation-optimization-based management strategy is developed. The methodology uses genetic-programming-based models for simulating the aquifer processes, which is then linked to a multi-objective genetic algorithm to obtain optimal management strategies in terms of groundwater extraction from potential well locations in the aquifer.

  9. Electrochemical behavior of Q235 steel in saltwater saturated with carbon dioxide based on new imidazoline derivative inhibitor

    International Nuclear Information System (INIS)

    Liu, F.G.; Du, M.; Zhang, J.; Qiu, M.

    2009-01-01

    The electrochemical behavior of carbon steel in saltwater saturated with CO 2 with/without an new synthesized imidazoline inhibitor was studied using polarization and electrochemical impedance spectrum (EIS), and the inhibitive ability of the inhibitor was evaluated by weight-loss method in 298-328 K temperature range. Results showed that the inhibition efficiency is up to above 80%, and imidazoline is a kind of mixed-type inhibitor. It was seen that the adsorption of imidazoline on Q235 steel can be fitted to Frumkin isotherm equation. Quantum chemistry calculation results show that the imidazoline ring and heteroatoms are the active sites of the inhibitors

  10. Continuous Infraclavicular Block for Forearm Amputation After Being Bitten by a Saltwater Crocodile (Crocodylus Porosus: A Case Report

    Directory of Open Access Journals (Sweden)

    Chin-Hsi Chiu

    2009-08-01

    Full Text Available Two important issues after a complete right forearm amputation are replantation and ongoing pain management. There are no reports of successful forearm replantation as a consequence of a crocodile bite. Here, we discuss our pain management in a case of complete forearm amputation after a bite from a saltwater crocodile (Crocodylus porosus, which necessitated six further operations to achieve successful replantation. Continuous infraclavicular brachial plexus block was effective for acute pain control in this case. We strongly recommend performing the block with an indwelling catheter under ultrasound guidance for higher accuracy and safety.

  11. Seawater intrusion in karstic, coastal aquifers: Current challenges and future scenarios in the Taranto area (southern Italy).

    Science.gov (United States)

    De Filippis, Giovanna; Foglia, Laura; Giudici, Mauro; Mehl, Steffen; Margiotta, Stefano; Negri, Sergio Luigi

    2016-12-15

    Mediterranean areas are characterized by complex hydrogeological systems, where management of freshwater resources, mostly stored in karstic, coastal aquifers, is necessary and requires the application of numerical tools to detect and prevent deterioration of groundwater, mostly caused by overexploitation. In the Taranto area (southern Italy), the deep, karstic aquifer is the only source of freshwater and satisfies the main human activities. Preserving quantity and quality of this system through management policies is so necessary and such task can be addressed through modeling tools which take into account human impacts and the effects of climate changes. A variable-density flow model was developed with SEAWAT to depict the "current" status of the saltwater intrusion, namely the status simulated over an average hydrogeological year. Considering the goals of this analysis and the scale at which the model was built, the equivalent porous medium approach was adopted to represent the deep aquifer. The effects that different flow boundary conditions along the coast have on the transport model were assessed. Furthermore, salinity stratification occurs within a strip spreading between 4km and 7km from the coast in the deep aquifer. The model predicts a similar phenomenon for some submarine freshwater springs and modeling outcomes were positively compared with measurements found in the literature. Two scenarios were simulated to assess the effects of decreased rainfall and increased pumping on saline intrusion. Major differences in the concentration field with respect to the "current" status were found where the hydraulic conductivity of the deep aquifer is higher and such differences are higher when Dirichlet flow boundary conditions are assigned. Furthermore, the Dirichlet boundary condition along the coast for transport modeling influences the concentration field in different scenarios at shallow depths; as such, concentration values simulated under stressed conditions

  12. Assessment of seawater intrusion and nitrate contamination on the groundwater quality in the Korba coastal plain of Cap-Bon (North-east of Tunisia)

    Science.gov (United States)

    Zghibi, Adel; Tarhouni, Jamila; Zouhri, Lahcen

    2013-11-01

    In recent years, seawater intrusion and nitrate contamination of groundwater have become a growing concern for people in rural areas in Tunisia where groundwater is always used as drinking water. The coastal plain of Korba (north-east of Tunisia) is a typical area where the contamination of the aquifer in the form of saltwater intrusion and high nitrate concentrations is very developed and represents the major consequence of human activities. The objective of this study is to evaluate groundwater resource level, to determine groundwater quality and to assess the risk of NO3- pollution in groundwater using hydrogeochemical tools. Groundwater were sampled and analyzed for physic-chemical parameters: Ca2+, Mg2+, Na+, K+, Cl-, SO42-, HCO3-, NO3-, Total Dissolved Solid and of the physical parameters (pH, electrical conductivity and the temperature). The interpretation of the analytical results is shown numerically and graphically through the ionic deviations, Piper Diagram, seawater fractions and binary diagrams. Moreover, electrical conductivity investigations have been used to identify the location of the major intrusion plumes in this coastal area and to obtain new information on the spatial scales and dynamics of the fresh water-seawater interface. Those processes can be used as indicators of seawater intrusion progression. First, the hydrogeochemical investigation of this aquifer reveals the major sources of contamination, represented by seawater intrusion. Thus, the intensive extraction of groundwater from aquifer reduces freshwater outflow to the sea, creates several drawdown cones and lowering of the water table to as much as 12 m below mean sea level in the center part of the study area especially between Diarr El Hojjej and Tafelloun villages, causing seawater migration inland and rising toward the wells. Moreover, the results of this study revealed the presence of direct cation exchange linked to seawater intrusion and dissolution processes associated with

  13. Geophysical characterization from Itu intrusive suite

    International Nuclear Information System (INIS)

    Pascholati, M.E.

    1989-01-01

    The integrated use of geophysical, geological, geochemical, petrographical and remote sensing data resulted in a substantial increase in the knowledge of the Itu Intrusive Suite. The main geophysical method was gamma-ray spectrometry together with fluorimetry and autoradiography. Three methods were used for calculation of laboratory gamma-ray spectrometry data. For U, the regression method was the best one. For K and Th, equations system and absolute calibration presented the best results. Surface gamma-ray spectrometry allowed comparison with laboratory data and permitted important contribution to the study of environmental radiation. (author)

  14. Unconventional applications of conventional intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.; Matter, J.C.

    1983-01-01

    A number of conventional intrusion detection sensors exists for the detection of persons entering buildings, moving within a given volume, and crossing a perimeter isolation zone. Unconventional applications of some of these sensors have recently been investigated. Some of the applications which are discussed include detection on the edges and tops of buildings, detection in storm sewers, detection on steam and other types of large pipes, and detection of unauthorized movement within secure enclosures. The enclosures can be used around complicated control valves, electrical control panels, emergency generators, etc

  15. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  16. Introduction to gravity currents and intrusions

    CERN Document Server

    Ungarish, Marius

    2009-01-01

    The whole book is well written in a clear and pedagogical general style. … the author has, in my opinion, produced the first comprehensive book entirely devoted to the modeling of gravity currents and intrusions. This book will be particularly useful to graduate and PhD students, as well as to academics and research engineers working in this field. It may be used as a self-consistent document to get a detailed idea of the state of knowledge about a given problem or a guide toward more specialized papers. It is rich with ideas regarding the direction in which further research is warranted. This

  17. Arsenic mobilization and attenuation by mineral–water interactions: implications for managed aquifer recharge

    Science.gov (United States)

    Managed aquifer recharge (MAR) has a potential for addressing deficits in water supplies worldwide. It is also widely used for preventing saltwater intrusion, maintaining the groundwater table, and augmenting ecological stream flows among many beneficial environmental application...

  18. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    OpenAIRE

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumben...

  19. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  20. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    Science.gov (United States)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    We will present a detailed microstructural and geochemical study of reactive liquid flow in Unit 9 of the Rum Eastern Layered Intrusion. In the study region, Unit 9 comprises an underlying lens-like body of peridotite overlain by a sequence of troctolite and gabbro (termed allivalite), with some local and minor anorthosite. The troctolite is separated from the overlying gabbro by a distinct, sub-horizontal, undulose horizon (the major wavy horizon). Higher in the stratigraphy is another, similar, horizon (the minor wavy horizon) that separates relatively clinopyroxene-poor gabbro from an overlying gabbro. To the north of the peridotite lens, both troctolite and gabbro grade into poikilitic gabbro. Clinopyroxene habit in the allivalite varies from thin rims around olivine in troctolite, to equigranular crystals in gabbro, to oikocrysts in the poikilitic gabbro. The poikilitic gabbros contain multiple generations of clinopyroxene, with Cr-rich (~1.1 wt.% Cr2O3), anhedral cores with moderate REE concentrations (core1) overgrown by an anhedral REE-depleted second generation with moderate Cr (~0.7 wt.% Cr2O3) (core2). These composite cores are rimmed by Cr-poor (~0.2 wt.% Cr2O3) and REE-poor to moderate clinopyroxene. We interpret these microstructures as a consequence of two separate episodes of partial melting triggered by the intrusion of hot olivine-phyric picrite to form the discontinuous lenses that comprise the Unit 9 peridotite. Loss of clinopyroxene-saturated partial melt from the lower part of the allivalite immediately following the early stages of sill intrusion resulted in the formation of clinopyroxene-poor gabbro. The spatial extent of clinopyroxene loss is marked by the minor wavy horizon. A further partial melting event stripped out almost all clinopyroxene from the lowest allivalite, to form a troctolite, with the major wavy horizon marking the extent of melting during this second episode. The poikilitic gabbro formed from clinopyroxene-saturated melt

  1. A new intrusion prevention model using planning knowledge graph

    Science.gov (United States)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  2. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  3. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  4. Multi-User Low Intrusive Occupancy Detection

    Directory of Open Access Journals (Sweden)

    Azkario Rizky Pratama

    2018-03-01

    Full Text Available Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS of BLE (Bluetooth Low Energy nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach.

  5. Saltwater contamination in the managed low-lying farmland of the Venice coast, Italy: An assessment of vulnerability.

    Science.gov (United States)

    Da Lio, Cristina; Carol, Eleonora; Kruse, Eduardo; Teatini, Pietro; Tosi, Luigi

    2015-11-15

    The original morphology and hydrogeology of many low-lying coastlands worldwide have been significantly modified over the last century through river diversion, embankment built-up, and large-scale land reclamation projects. This led to a progressive shifting of the groundwater-surficial water exchanges from naturally to anthropogenically driven. In this human-influenced hydrologic landscape, the saltwater contamination usually jeopardizes the soil productivity. In the coastland south of Venice (Italy), several well log measurements, chemical and isotope analyses have been performed over the last decade to characterize the occurrence of the salt contamination. The processing of this huge dataset highlights a permanent variously-shaped saline contamination up to 20km inland, with different conditions in relation with the various geomorphological features of the area. The results point out the important role of the land reclamation in shaping the present-day salt contamination and reveal the contribution of precipitation, river discharge, lagoon and sea water to the shallow groundwater in the various coastal sectors. Moreover, an original vulnerability map to salt contamination in relation to the farmland productivity has been developed taking into account the electrical conductivity of the upper aquifer in the worst condition, the ground elevation, and the distance from salt and fresh surface water sources. Finally, the study allows highlighting the limit of traditional investigations in monitoring saltwater contamination at the regional scale in managed Holocene coastal environments. Possible improvements are outlined. Copyright © 2015 Elsevier B.V. All rights reserved.

  6. Salt Intrusion in the Tweed Estuary

    Science.gov (United States)

    Uncles, R. J.; Stephens, J. A.

    1996-09-01

    Results are presented from a 2-week field programme in the Tweed Estuary, U.K. Maximum values of the empirically based Estuarine Richardson Number, Ri E, occurred during neap tides, and minimum values occurred during spring tides. Estimated values of Ri Evaried between 0·3 and 2·3, suggesting the occurrence of partially mixed to stratified conditions, depending on tidal state and freshwater inflow. These relatively large values of Ri Ewere consistent with both observed strong salinity stratification and large salt fluxes due to vertical shear transport. Low values (0·5) values in the halocline. A velocity maximum occurred within the halocline during the early flood. Wave-like spatial oscillations of the halocline occurred on the ebb. The oscillation troughs were situated above deep holes located just down-estuary of the rail and old road bridges. There was an indication that the constricted flow between the bridges' arches resulted in enhanced mixing of near-surface waters and a thickening of the halocline. It is also possible that these wave-like structures were stationary, near-critical internal lee waves, triggered by the deep holes. Trapping of high-salinity waters occurred on the ebb. Saline pools were isolated within a deep hole or deeper section of bed by the falling halocline. When the salt wedge moved further down-estuary, the ' trapped ' waters were subjected to strongly ebbing, overlying freshwater, and were subsequently entrained and flushed. The salinity intrusion was a strong function of spring-neap tidal state and a weaker function of freshwater inflow. The estimated salinity intrusion varied from about 4·7 to 7·6 km during the fieldwork period. The strong dependence on tidal range followed from the comparable lengths of the tidal excursion and salinity intrusion. Long excursion lengths were also partly responsible for the short residence (or flushing) times and their strong dependence on spring-neap tidal state. For typical summer freshwater

  7. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring.

    Science.gov (United States)

    Alcalá, José M; Ureña, Jesús; Hernández, Álvaro; Gualda, David

    2017-02-11

    The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN) are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs), which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN) prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM), is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people' demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented.

  8. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring

    Directory of Open Access Journals (Sweden)

    José M. Alcalá

    2017-02-01

    Full Text Available The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs, which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM, is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people’ demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented.

  9. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  10. An ontology-based intrusion patterns classification system | Shonubi ...

    African Journals Online (AJOL)

    Studies have shown that computer intrusions have been on the increase in recent times. Many techniques and patterns are being used by intruders to gain access to data on host computer networks. In this work, intrusion patterns were identified and classified and inherent knowledge were represented using an ontology of ...

  11. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  12. An evaluation of classification algorithms for intrusion detection ...

    African Journals Online (AJOL)

    An evaluation of classification algorithms for intrusion detection. ... Log in or Register to get access to full text downloads. ... Most of the available IDSs use all the 41 features in the network to evaluate and search for intrusive pattern in which ...

  13. Intrusive Memories of Distressing Information: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Eva Battaglini

    Full Text Available Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42 viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13 demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13. Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC and dorsolateral prefrontal cortex (dlPFC, inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories.

  14. Stress, intrusive imagery, and chronic distress

    International Nuclear Information System (INIS)

    Baum, A.

    1990-01-01

    Discusses the nature of stress in the context of problems with its definition and sources of confusion regarding its usefulness and specificity. Stress can be defined as a negative emotional experience accompanied by predictable biochemical, physiological, and behavioral changes that are directed toward adaptation either by manipulating the situation to alter the stressor or by accommodating its effects. Chronic stress is more complex than most definitions suggest and is clearly not limited to situations in which stressors persist for long periods of time. Responses may habituate before a stressor disappears or may persist long beyond the physical presence of the stressor. This latter case, in which chronic stress and associated biobehavioral changes outlast their original cause, is considered in light of research at Three Mile Island and among Vietnam veterans. The role of intrusive images of the stressor or uncontrollable thoughts about it in maintaining stress is explored

  15. Metallogenic aspects of Itu intrusive suite

    International Nuclear Information System (INIS)

    Amaral, G.; Pascholati, E.M.

    1990-01-01

    The integrated use of geological, geochemical, geophysical and remote sensing data is providing interesting new information on the metallogenic characteristics of the Itu Intrusive Suite. During World War II, up to 1959, a wolframite deposit was mined near the border of the northernmost body (Itupeva Granite). This deposit is formed by greisen veins associated with cassiterite and topaz, clearly linked with later phases of magmatic differentiation. Generally those veins are related to hydrothermal alteration of the granites and the above mentioned shear zone. U, Th and K determinations by field and laboratory gammaspectrometry were used for regional distribution analysis of those elements and its ratios and calculation of radioactivity heat production. In this aspects, the Itupeva Granite is the hottest and presents several anomalies in the Th/U ratio, indicative of late or post magmatic oxidation processes. (author)

  16. USBcat - Towards an Intrusion Surveillance Toolset

    Directory of Open Access Journals (Sweden)

    Chris Chapman

    2014-10-01

    Full Text Available This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by observing the behaviour and communications of the intruder. Subsequently a more complete picture of the attacker's identity, objectives, capabilities, and infiltration could be formulated than is possible with present technologies. This research focused on developing an extensible framework to permit the covert investigation of malware. Additionally, a Universal Serial Bus (USB Mass Storage Device (MSD based covert channel was designed to enable remote command and control of the framework. The work was validated through the design, implementation and testing of a toolset.

  17. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  18. A Machine Learning Based Intrusion Impact Analysis Scheme for Clouds

    Directory of Open Access Journals (Sweden)

    Junaid Arshad

    2012-01-01

    Full Text Available Clouds represent a major paradigm shift, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of on demand expandable computing infrastructures. However, Clouds introduce novel security challenges which need to be addressed to facilitate widespread adoption. This paper is focused on one such challenge - intrusion impact analysis. In particular, we highlight the significance of intrusion impact analysis for the overall security of Clouds. Additionally, we present a machine learning based scheme to address this challenge in accordance with the specific requirements of Clouds for intrusion impact analysis. We also present rigorous evaluation performed to assess the effectiveness and feasibility of the proposed method to address this challenge for Clouds. The evaluation results demonstrate high degree of effectiveness to correctly determine the impact of an intrusion along with significant reduction with respect to the intrusion response time.

  19. Potential use of reverse osmosis in managing saltwater waste collected at road-salt storage facilites [sic].

    Science.gov (United States)

    2006-01-01

    The implementation of its anti-icing program comprises a large part of the Virginia Department of Transportation's (VDOT) maintenance effort. Earlier research confirmed that VDOT captures a large volume of salt-laden stormwater runoff at its 300+ sal...

  20. An assessment of the radiological impact of human intrusion at the UK Low Level Waste Repository (LLWR) - 59356

    International Nuclear Information System (INIS)

    Hicks, Tim; Baldwin, Tamara; Cummings, Richard; Sumerling, Trevor

    2012-01-01

    The UK Low Level Waste Repository Ltd submitted an Environmental Safety Case for the disposal of low-level waste (LLW) to the Environment Agency on the 1 May 2011. The Environmental Safety Case (ESC) presents a complete case for the environmental safety of the Low Level Waste Repository (LLWR) both during operations and in the long term (Cummings et al, in these proceedings). This includes an assessment of the long-term radiological safety of the facility, including an assessment of the potential consequences of human intrusion at the site. The human intrusion assessment is based on a cautiously realistic approach in defining intrusion cases and parameter values. A range of possible human intrusion events was considered based on present-day technologies and credible future uses of the site. This process resulted in the identification of geotechnical investigations, a housing development and a smallholding as requiring quantitative assessment. A particular feature of the site is that, because of its proximity to the coast and in view of expected global sea-level rise, it is vulnerable to coastal erosion. During such erosion, wastes and engineered barrier materials will be exposed, and could become targets for investigation or recovery. Therefore, human intrusion events have been included that are associated with such activities. A radiological assessment model has been developed to analyse the impacts of potential human intrusion at the site. A key feature of the model is the representation of the spatial layout of the disposal site, including the engineered cap design and the large-scale spatial heterogeneity of radionuclide concentrations within the repository. The model has been used to calculate the radiation dose to intruders and to others following intrusion at different times and at different locations across the site, for the each of the selected intrusion events, considering all relevant exposure modes. Potential doses due to radon and its daughters in

  1. Bubble-size distributions produced by wall injection of air into flowing freshwater, saltwater and surfactant solutions

    Science.gov (United States)

    Winkel, Eric S.; Ceccio, Steven L.; Dowling, David R.; Perlin, Marc

    2004-12-01

    As air is injected into a flowing liquid, the resultant bubble characteristics depend on the properties of the injector, near-wall flow, and flowing liquid. Previous research has shown that near-wall bubbles can significantly reduce skin-friction drag. Air was injected into the turbulent boundary layer on a test section wall of a water tunnel containing various concentrations of salt and surfactant (Triton-X-100, Union Carbide). Photographic records show that the mean bubble diameter decreased monotonically with increasing salt and surfactant concentrations. Here, 33 ppt saltwater bubbles had one quarter, and 20 ppm Triton-X-100 bubbles had one half of the mean diameter of freshwater bubbles.

  2. A deposit model for carbonatite and peralkaline intrusion-related rare earth element deposits: Chapter J in Mineral deposit models for resource assessment

    Science.gov (United States)

    Verplanck, Philip L.; Van Gosen, Bradley S.; Seal, Robert R.; McCafferty, Anne E.

    2014-01-01

    Carbonatite and alkaline intrusive complexes, as well as their weathering products, are the primary sources of rare earth elements. A wide variety of other commodities have been exploited from carbonatites and alkaline igneous rocks including niobium, phosphate, titanium, vermiculite, barite, fluorite, copper, calcite, and zirconium. Other elements enriched in these deposits include manganese, strontium, tantalum, thorium, vanadium, and uranium. Carbonatite and peralkaline intrusion-related rare earth element deposits are presented together in this report because of the spatial, and potentially genetic, association between carbonatite and alkaline rocks. Although these rock types occur together at many locations, carbonatite and peralkaline intrusion-related rare earth element deposits are not generally found together.

  3. Simulation of groundwater flow pathlines and freshwater/saltwater transition zone movement, Manhasset Neck, Nassau County, New York

    Science.gov (United States)

    Misut, Paul; Aphale, Omkar

    2014-01-01

    A density-dependent groundwater flow and solute transport model of Manhasset Neck, Long Island, New York, was used to analyze (1) the effects of seasonal stress on the position of the freshwater/saltwater transition zone and (2) groundwater flowpaths. The following were used in the simulation: 182 transient stress periods, representing the historical record from 1920 to 2011, and 44 transient stress periods, representing future hypothetical conditions from 2011 to 2030. Simulated water-level and salinity (chloride concentration) values are compared with values from a previously developed two-stress-period (1905–1944 and 1945–2005) model. The 182-stress-period model produced salinity (chloride concentration) values that more accurately matched the observed salinity (chloride concentration) values in response to hydrologic stress than did the two-stress-period model, and salinity ranged from zero to about 3 parts per thousand (equivalent to zero to 1,660 milligrams per liter chloride). The 182-stress-period model produced improved calibration statistics of water-level measurements made throughout the study area than did the two-stress-period model, reducing the Lloyd aquifer root mean square error from 7.0 to 5.2 feet. Decreasing horizontal and vertical hydraulic conductivities (fixed anisotropy ratio) of the Lloyd and North Shore aquifers by 20 percent resulted in nearly doubling the simulated salinity(chloride concentration) increase at Port Washington observation well N12508. Groundwater flowpath analysis was completed for 24 production wells to delineate water source areas. The freshwater/saltwater transition zone moved toward and(or) away from wells during future hypothetical scenarios.

  4. Dissolved carbon dynamics in the freshwater-saltwater mixing zone of a coastal river entering the Northern Gulf of Mexico

    Science.gov (United States)

    He, S.; Xu, Y. J.

    2017-12-01

    Estuaries play an important role in the dynamics of dissolved carbon from freshwater to marine systems. This study aims to determine how dissolved inorganic carbon (DIC) and dissolved organic carbon (DOC) concentrations change along an 88-km long estuarine river with salinity ranging from 0.02 to 29.50. The study is expected to elucidate which processes most likely control carbon dynamics in a freshwater-saltwater mixing system, and to evaluate the net metabolism of this estuary using mixing curves and stable isotope analyses. From November 2014 to February 2016, water samples were collected and in-situ measurements on ambient water conditions were performed during eighteen field trips at six sites from upstream to downstream of the Calcasieu River, which enters the Northern Gulf of Mexico in the southern United States. δ13CDIC and δ13CDOC were measured from May 2015 to February 2017 during five of the field trips. The DIC concentration and δ13CDIC increased rapidly with increasing salinity in the mixing zone. The DIC concentrations appeared to be largely influenced by conservative mixing. The δ13CDIC values were close to those suggested by the conservative mixing model for May 2015, June 2015 and November 2015, but lower than those for July 2015 and February 2016, suggesting that an estuarine river can fluctuate from a balanced to a heterotrophic system (i.e., production/respiration aquatic photosynthesis from carbon produced by terrestrial photosynthesis in a river-ocean continuum. These findings suggest that riverine dissolved carbon undergoes a rapid change in freshwater-saltwater mixing, and that these dynamics should be taken into account in carbon processing and budgeting in the world's estuarine systems.

  5. Salt-water encroachment in southern Nassau and southeastern Queens Counties, Long Island, New York

    Science.gov (United States)

    Lusczynski, N.J.; Swarzenski, Wolfgang V.

    1966-01-01

    deposits. It extends from the seaward areas inland about 2 miles into Island Park. The deep wedge extends into southeastern Queens County and southern Nassau County principally in the deeper parts of the Magothy (?) Formation and in the underlying clay member of the Raritan Formation. The leading edge of the deep wedge is at the base of the Magothy (?) Formation. This edge is apparently at the shoreline east of Lido Beach and extends inland about 4 miles to Woodmere and about 7 miles to South Ozone Park. Zones of diffusion as much as 6 miles wide and about 500 feet thick were delineated in the frontal part of the salty-water wedges. These thick and broad zones of diffusion were probably formed during the past 1,000 or more years in heterogeneous unconsolidated deposits by long- and short-term changes in sea level and in fresh-water outflow to the sea and by dispersion caused by the movements of the water and its salt mass. Changes in sea level and fresh-water outflow together produced appreciable advances and recessions of the salt-water front. The chemical compositions of the diffused water in all wedges are modified to some extent by base exchange and other physical and chemical processes and also by diffusion. The intermediate wedge of salty water is moving landward at a rate of less than 20 feet a year in the vicinity of Island Park and, thus, has moved less than 1,000 feet since 1900. The leading edge of the deep wedge has advanced landward at about 300 feet a :ear in Woodmere in southwestern Nassau County and about 160 feet a year at South Ozone Park in southeastern Queens County, principally under the influence of local withdrawals near the toe of the wedge. Between Hewlett and Lido Beach, the deep wedge is moving inland at the rate of about 10 feet a year under the influence of regional withdrawals in inland areas. Regional encroachment of the deep wedge is apparently retarded appreciably by cyclic flow, that is, by the return seaward in the upper

  6. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  7. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  8. Modelling saline intrusion for repository performance assessment

    International Nuclear Information System (INIS)

    Jackson, C.P.

    1989-04-01

    UK Nirex Ltd are currently considering the possibility of disposal of radioactive waste by burial in deep underground repositories. The natural pathway for radionuclides from such a repository to return to Man's immediate environment (the biosphere) is via groundwater. Thus analyses of the groundwater flow in the neighbourhood of a possible repository, and consequent radionuclide transport form an important part of a performance assessment for a repository. Some of the areas in the UK that might be considered as possible locations for a repository are near the coast. If a repository is located in a coastal region seawater may intrude into the groundwater flow system. As seawater is denser than fresh water buoyancy forces acting on the intruding saline water may have significant effects on the groundwater flow system, and consequently on the time for radionuclides to return to the biosphere. Further, the chemistry of the repository near-field may be strongly influenced by the salinity of the groundwater. It is therefore important for Nirex to have a capability for reliably modelling saline intrusion to an appropriate degree of accuracy in order to make performance assessments for a repository in a coastal region. This report describes work undertaken in the Nirex Research programme to provide such a capability. (author)

  9. Formation of continental crust by intrusive magmatism

    Science.gov (United States)

    Rozel, A. B.; Golabek, G. J.; Jain, C.; Tackley, P. J.; Gerya, T.

    2017-09-01

    How were the continents formed in the Earth? No global numerical simulation of our planet ever managed to generate continental material self-consistently. In the present study, we show that the latest developments of the convection code StagYY enable to estimate how to produce the early continents, more than 3 billion years ago. In our models, melting of pyrolitic rocks generates a basaltic melt and leaves behind a depleted solid residue (a harzburgite). The melt generated in the mantle is transported to the surface. Only basaltic rocks melting again can generate continental crust. Should the basaltic melt always reach the open air and cool down? Should the melt be intruded warm in the pre-existing crust? The present study shows that both processes have to be considered to produce continents. Indeed, granitoids can only be created in a tight window of pressure-temperature. If all basalt is quickly cooled by surface volcanism, the lithosphere will be too cold. If all basalt is intruded warm below the crust then the lithosphere will be too warm. The key is to have both volcanism and plutonism (intrusive magmatism) to reach the optimal temperature and form massive volumes of continental material.

  10. Salinity intrusion modeling for Sungai Selangor

    International Nuclear Information System (INIS)

    Mohamed Roseli Zainal Abidin; Abd Jalil Hassan; Suriyani Awang; Liew Yuk San; Norbaya Hashim

    2006-01-01

    Salinity intrusion into estuary of the Sungai Selangor has been carried out on a hydrodynamic numerical modeling to access the parameter that governed the amount of salt in the river. Issues such as water pollution and extraction of water from Sungai Selangor system has been said to be the cause of fading fireflies. The berembang trees on the river bank that become the fireflies habitat need some amount of salt for proper growth. Living at the lower reaches of Sungai Selangor, the fireflies are affected not only by the activities in their vicinity, but by activities in the entire river basin. Rapid economic development in the basin and the strong demand for the water resources puts pressure on the ecosystem. This research has been carried out to investigate the effect of water extraction along Sungai Selangor towards altering the amount of salt content in the river. The hydrodynamic modeling with regards to the salt content is expected to support long term assessment that may affect the berembang trees as a result of changes in the flow from upstream because of the water abstraction activity for domestic water supply. (Author)

  11. On the classification of seawater intrusion

    Science.gov (United States)

    Werner, Adrian D.

    2017-08-01

    Seawater intrusion (SWI) arising from aquifer depletion is often classified as ;active; or ;passive;, depending on whether seawater moves in the same direction as groundwater flow or not. However, recent studies have demonstrated that alternative forms of active SWI show distinctly different characteristics, to the degree that the term ;active SWI; may be misleading without additional qualification. In response, this article proposes to modify hydrogeology lexicon by defining and characterizing three classes of SWI, namely passive SWI, passive-active SWI and active SWI. The threshold parameter combinations for the onset of each form of SWI are developed using sharp-interface, steady-state analytical solutions. Numerical simulation is then applied to a hypothetical case study to test the developed theory and to provide additional insights into dispersive SWI behavior. The results indicate that the three classes of SWI are readily predictable, with the exception of active SWI occurring in the presence of distributed recharge. The key characteristics of each SWI class are described to distinguish their most defining features. For example, active SWI occurring in aquifers receiving distributed recharge only creates watertable salinization downstream of the groundwater mound and only where dispersion effects are significant. The revised classification of SWI proposed in this article, along with the analysis of thresholds and SWI characteristics, provides coastal aquifer custodians with an improved basis upon which to expect salinization mechanisms to impact freshwater availability following aquifer depletion.

  12. The geographical conditions of intensity of salty waters intrusions to coastal lakes on Polish Southern Baltic coast

    Science.gov (United States)

    Cieslinski, R.

    2009-04-01

    geographical conditions, especially on hydrographical and hydrological ones, which determine their variability and distribution. The objects of research have been chosen to be the two largest coastal lakes in the Polish section of the southern Baltic shore, i.e. Łebsko and Gardno. References: Ataie-Ashtiani, B., Volkerand, R.E., Lockington, D.A. (1999) Tidal effects on sea water intrusion in unconfined aquifers, Journal of Hydrology, 216 (1-2), 17-31. Cieśliński R., Drwal J. (2005) Quasi - estuary processes and consequences for human activity, South Baltic, Estuarine, Coastal and Shelf Science, 62, 477 - 485. De Louw, P., Oude Essink, G. (2001) Salinisation of the northern coastel area of the netherlands due to land subsidence and sea level rise. In: Vijay P. Singh (eds), Coastal Environment and Water Quality (ed. by Y. Jun Xu & V. P. Singh), 424 - 434. Water Resources Publications. Demirel, Z. (2004) The history and evaluation of saltwater intrusion into a coastal aquifer in Mersin, Turkey, Journal of Environmental Management, 70 (3), 275-282. Drwal, J., Cieśliński, R. (2007) Coastal lakes and marine intrusions on the southern Baltic coast, Oceanological and Hydrobiological Studies, XXXVI (2), 61 - 75. Grassi, S., Netti, R. (2000) Sea water intrusion and mercury pollution of some coastal aquifers in the province of Grosseto (Southern Tuscany — Italy), Journal of Hydrology, 237 (3-4), 198-211. Hsing-Juh, L., Xiao-Xun, D., Kwang-Tsao, S., Huei-Meei, S., Wen-Tseng, L., Hwey-Lian, H., Lee-Shing, F., Jia-Jang, H. (2006) Trophic structure and functioning in a eutrophic and poorly flushed lagoon in southwestern Taiwan, Marine environmental research, 62 (1), 61-82. Ishitobi, Y., Kamiya, H., Yokoyama, K., Kumagai, M., Okuda, S. (1999) Physical Conditions of Saline Water Intrusion into a Coastal Lagoon, Lake Shinji, Japanese Journal of Limnology, 4, 439-452. Uncles, R. J. , Stephens, J. A., Smith, R. E. (2002) The dependence of estuarine turbidity on tidal intrusion length

  13. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  14. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  15. QOS and Control-Theoretic Techniques for Intrusion Tolerance

    National Research Council Canada - National Science Library

    Ye, Nong

    2004-01-01

    ...), even in the face of intrusions. This report examines two host-based resources, a router and a web server, and presents simulated models of modifications that can be made to these resources to make them QoS-capable...

  16. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    spatiotemporal relations to form complex events which model the intrusion patterns. ... Wireless sensor networks; complex event processing; event stream; ...... of the 2006 ACM SIGMOD International Conference on Management of Data, 407– ...

  17. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  18. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  19. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  20. How Intrusion Detection Can Improve Software Decoy Applications

    National Research Council Canada - National Science Library

    Monteiro, Valter

    2003-01-01

    This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack...

  1. Ant colony induced decision trees for intrusion detection

    CSIR Research Space (South Africa)

    Botes, FH

    2017-06-01

    Full Text Available platform. Intrusion Detection Systems (IDS) analyse network traffic to identify suspicious patterns with the intention to compromise the system. Practitioners train classifiers to classify the data within different categories e.g. malicious or normal...

  2. Intrusion resistant underground structure (IRUS) - safety assessment and licensing

    International Nuclear Information System (INIS)

    Lange, B. A.

    1997-01-01

    This paper describes the safety goals, human exposure scenarios and critical groups, the syvac-nsure performance assessment code, groundwater pathway safety results, and inadvertent human intrusion of the IRUS. 2 tabs

  3. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against

  4. Simulation of sea water intrusion in coastal aquifers

    Indian Academy of Sciences (India)

    dependent miscible flow and transport modelling approach for simulation of seawater intrusion in coastal aquifers. A nonlinear optimization-based simulation methodology was used in this study. Various steady state simulations are performed for a ...

  5. Evaluating the Precision of Auditory Sensory Memory as an Index of Intrusion in Tinnitus.

    Science.gov (United States)

    Barrett, Doug J K; Pilling, Michael

    The purpose of this study was to investigate the potential of measures of auditory short-term memory (ASTM) to provide a clinical measure of intrusion in tinnitus. Response functions for six normal listeners on a delayed pitch discrimination task were contrasted in three conditions designed to manipulate attention in the presence and absence of simulated tinnitus: (1) no-tinnitus, (2) ignore-tinnitus, and (3) attend-tinnitus. Delayed pitch discrimination functions were more variable in the presence of simulated tinnitus when listeners were asked to divide attention between the primary task and the amplitude of the tinnitus tone. Changes in the variability of auditory short-term memory may provide a novel means of quantifying the level of intrusion associated with the tinnitus percept during listening.

  6. Influences of menstrual cycle position and sex hormone levels on spontaneous intrusive recollections following emotional stimuli.

    Science.gov (United States)

    Ferree, Nikole K; Kamat, Rujvi; Cahill, Larry

    2011-12-01

    Spontaneous intrusive recollections (SIRs) are known to follow emotional events in clinical and non-clinical populations. Previous work in our lab has found that women report more SIRs than men after exposure to emotional films, and that this effect is driven entirely by women in the luteal phase of the menstrual cycle. To replicate and extend this finding, participants viewed emotional films, provided saliva samples for sex hormone concentration analysis, and estimated SIR frequency following film viewing. Women in the luteal phase reported significantly more SIRs than did women in the follicular phase, and SIR frequency significantly correlated with salivary progesterone levels. The results are consistent with an emerging pattern in the literature suggesting that menstrual cycle position of female participants can potently influence findings in numerous cognitive domains. The potential implications of these results for disorders characterized by intrusions, such as post-traumatic stress disorder, are also discussed. Copyright © 2011 Elsevier Inc. All rights reserved.

  7. Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks

    KAUST Repository

    Wang, Wei; Guyet, Thomas; Quiniou, René ; Cordier, Marie-Odile; Masseglia, Florent; Zhang, Xiangliang

    2014-01-01

    In this work, we propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection over unlabeled HTTP traffic streams in computer networks. The framework holds potential for self-managing: self-labeling, self-updating and self-adapting. Our framework employs the Affinity Propagation (AP) algorithm to learn a subject’s behaviors through dynamical clustering of the streaming data. It automatically labels the data and adapts to normal behavior changes while identifies anomalies. Two large real HTTP traffic streams collected in our institute as well as a set of benchmark KDD’99 data are used to validate the framework and the method. The test results show that the autonomic model achieves better results in terms of effectiveness and efficiency compared to adaptive Sequential Karhunen–Loeve method and static AP as well as three other static anomaly detection methods, namely, k-NN, PCA and SVM.

  8. Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks

    KAUST Repository

    Wang, Wei

    2014-06-22

    In this work, we propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection over unlabeled HTTP traffic streams in computer networks. The framework holds potential for self-managing: self-labeling, self-updating and self-adapting. Our framework employs the Affinity Propagation (AP) algorithm to learn a subject’s behaviors through dynamical clustering of the streaming data. It automatically labels the data and adapts to normal behavior changes while identifies anomalies. Two large real HTTP traffic streams collected in our institute as well as a set of benchmark KDD’99 data are used to validate the framework and the method. The test results show that the autonomic model achieves better results in terms of effectiveness and efficiency compared to adaptive Sequential Karhunen–Loeve method and static AP as well as three other static anomaly detection methods, namely, k-NN, PCA and SVM.

  9. Intrusion of soil covered uranium mill tailings by whitetail prairie dogs and Richardson's ground squirrels

    International Nuclear Information System (INIS)

    Shuman, R.

    1984-01-01

    The primary objective of the reclamation of uranium mill tailings is the long-term isolation of the matrial from the biosphere. Fossorial and semi-fossorial species represent a potentially disruptive influence as a result of their burrowing habits. The potential for intrusion was investigated with respect to two sciurids, the whitetail prairie dog (Cynomys leucurus) and Richardson's ground squirrel (Spermophilus richardsonii). Populations of prairie dogs were established on a control area, lacking a tailings layer, and two experimental areas, underlain by a waste layer, in southeastern Wyoming. Weekly measurements of prairie dog mound surface activities were conducted to demonstrate penetration, or lack thereof, of the tailings layer. Additionally, the impact of burrowing upon radon flux was determined. Limited penetration of the waste layer was noted after which frequency of inhabitance of the intruding burrow system declined. No significant changes in radon flux were detected. In another experiment, it was found that Richardson's ground squirrels burrowed to less extreme depths when confronted by mill tailings. Additional work at an inactive tailings pile in western Colorado revealed repeated intrusion through a shallow cover, and subsequent transport of radioactive material to the ground surface by prairie dogs. Radon flux from burrow entrances was significantly greater than that from undisturbed ground. Data suggested that textural and pH properties of tailings material may act to discourage repeated intrusion at some sites. 58 references

  10. A survey of intrusion detection techniques in Cloud

    OpenAIRE

    Modi, C.; Patel, D.; Patel, H.; Borisaniya, B.; Patel, A.; Rajarajan, M.

    2013-01-01

    Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and...

  11. Environmental data processor of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Rogers, M.S.

    1977-06-01

    A data acquisition system oriented specifically toward collection and processing of various meteorological and environmental parameters has been designed around a National Semiconductor IMP-16 microprocessor, This system, called the Environmental Data Processor (EDP), was developed specifically for use with the Adaptive Intrusion Data System (AIDS) in a perimeter intrusion alarm evaluation, although its design is sufficiently general to permit use elsewhere. This report describes in general detail the design of the EDP and its interaction with other AIDS components

  12. Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

    OpenAIRE

    Jingyu Wang; xuefeng Zheng; Dengliang Luo

    2011-01-01

    Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources and reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. In order to address the problem of intrusion tolerance of cloud computing platform and sensitive data in...

  13. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  14. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  15. When Intrusion Detection Meets Blockchain Technology: A Review

    OpenAIRE

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju; Wang, Yu; Han, Jinguang

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness ...

  16. Multisensor Fusion for Intrusion Detection and Situational Awareness

    OpenAIRE

    Hallstensen, Christoffer V

    2017-01-01

    Cybercrime damage costs the world several trillion dollars annually. And al-though technical solutions to protect organizations from hackers are being con-tinuously developed, criminals learn fast to circumvent them. The question is,therefore, how to create leverage to protect an organization by improving in-trusion detection and situational awareness? This thesis seeks to contribute tothe prior art in intrusion detection and situational awareness by using a multi-sensor data fusion...

  17. Unique Challenges in WiFi Intrusion Detection

    OpenAIRE

    Milliken, Jonny

    2014-01-01

    The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more deta...

  18. Application of the grey correlative analysis to predicting uranium-mineralized faults in middle Miaoershan intrusive mass

    International Nuclear Information System (INIS)

    Zhu Minqiang; Zhou Lilin; Kang Zili

    1996-01-01

    On the basis of summarizing the features of metallogenic faults of uranium ore field in middle Miaoershan intrusive mass, the method of grey system theory is used to analyze the grey correlation of tectonic conditions of 37 major silicified fault zones in this area. The faults are discriminated and sought optimally for the potential faults of prospecting, good results are obtained

  19. The Innovative Structure Solution for Preventing Salt Intrusion and Retaining Freshwater In Mekong Delta VietNam

    NARCIS (Netherlands)

    Hong, S.T.; Vrijling, J.K.; Stive, M.J.F.

    2013-01-01

    In the Mekong Delta Vietnam, the construction of sluices with the purpose of retaining fresh water and preventing salt water intrusion potentially plays a very important role. However, the structures constructed in small rivers according to local or traditional technology revealed many disadvantages

  20. A Survey on Anomaly Based Host Intrusion Detection System

    Science.gov (United States)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  1. Rapid laccolith intrusion driven by explosive volcanic eruption.

    Science.gov (United States)

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  2. Fusion of arkosic sand by intrusive andesite

    Science.gov (United States)

    Bailey, Roy A.

    1954-01-01

    An andesite dike in the Valles Mountains of northern New Mexico has intruded and partly fused arkosic sediments for a distance of 50 feet from its contacts. The dike is semi-circular in form, has a maximum width of about 100 feet, and is about 500 feet long. Small associated arcuate dikes are arranged in spiral fashion around the main dike, suggesting that they were intruded along shear fractures similar to those described by Burbank (1941). The fused rocks surrounding the andesite dike are of three general types: 1) partly fused arkosic sand, 2) fused clay, and 3) hybrid rocks. The fused arkosic sand consists of relict detrital grains of quartz, orthoclose, and plagioclase, imbedded in colorless glass containing microlites of tridymite, cordierite, and magnetite. The relict quartz grains are corroded and embayed by glass; the orthoclase is sanidinized and partly fused; and the plagioclase is inverted to the high temperature form and is partly fused. The fused clay, which was originally a mixture of montmorillonite and hydromica, consists primarily of cordierite but also contains needle-like crystals of sillimanite (?) or mullite (?). The hybrid rocks originated in part by intermixing of fused arkosic sediments and andesitic liquid and in part by diffusion of mafic constituents through the fused sediments. They are rich in cordierite and magnetite and also contain hypersthene, augite, and plagioclase. The composition of pigeonite in the andesite indicates that the temperature of the andesite at the time of intrusion probably did not exceed 1200?C. Samples of arkosic sand were fused in the presence of water in a Morey bomb at 1050?C. Stability relations of certain minerals in the fused sand suggest that fusion may have taken place at a lower temperature, however, and the fluxing action of volatiles from the andesite are thought to have made this possible.

  3. Non-Intrusive Battery Health Monitoring

    Directory of Open Access Journals (Sweden)

    Gajewski Laurent

    2017-01-01

    Full Text Available The “Non-intrusive battery health monitoring”, developed by Airbus Defence and Space (ADS in cooperation with the CIRIMAT-CNRS laboratory and supported by CNES, aims at providing a diagnosis of the battery ageing in flight, called State of Health (SOH, using only the post-treatment of the battery telemetries. The battery current and voltage telemetries are used by a signal processing tool on ground to characterize and to model the battery at low frequencies which allows monitoring the evolution of its degradation with great accuracy. The frequential behaviour estimation is based on inherent disturbances on the current during the nominal functioning of the battery. For instance, on-board thermal control or equipment consumption generates random disturbances on battery current around an average current. The battery voltage response to these current random disturbances enables to model the low frequency impedance of the battery by a signal processing tool. The re-created impedance is then compared with the evolution model of the low frequencies impedance as a function of the battery ageing to estimate accurately battery degradation. Hence, this method could be applied to satellites which are already in orbit and whose battery telemetries acquisition system fulfils the constraints determined in the study. This innovative method is an improvement of present state-of-the-art and is important to have a more accurate in-flight knowledge of battery ageing which is crucial for mission and operation planning and also for possible satellite mission extension or deorbitation. This method is patented by Airbus Defence and Space and CNES.

  4. Contribution to uranium geochemistry in intrusive granites

    International Nuclear Information System (INIS)

    Coulomb, R.

    1959-01-01

    This work aims to define the position of a certain number of French granitic deposits within the field of the geochemistry of granites in general, and of the geochemistry of uranium in particular. The regions concerned are: - 3 French Hercynian ranges, in the Vendee, in Brittany and in the Morvan, - 1 African range, probably precambrian, of the Hoggar. For each range, the petrochemical framework is first of all determined and then the degree of chemical homogeneity of the rocks is evaluated. In the petrochemical groups thus obtained the geochemical behaviour of the uranium is studied. From a point of view of the geochemistry of the granites under investigation, a comparison of the laws of distribution of the major elements in the 4 ranges shows up a convergence of average composition which was not anticipated by geological and petrographic considerations alone. The statistical and geochemical distribution laws of the total uranium as a function of the petrochemical variations are established. A study of the chemical forms of uranium in the rocks has drawn an attention to the qualitative and quantitative importance of the fraction of this uranium soluble in dilute acids. We have therefore reconsidered on the one hand, the laws of distribution of the insoluble uranium, which represents essentially the uranium fixed in crystalline structures (zircon, allanite...), and we have justified on the other hand the interest presented by the soluble uranium: this, although more complex in character, presents a geochemical unity in post magmatic phenomena which makes possible to find a genetic connection between the uraniferous deposits and the intrusive massifs. Finally we have given a plan of the geochemical cycle of uranium, in which we hope to have provided some more accurate data on the igneous phase. (author) [fr

  5. DFCL: DYNAMIC FUZZY LOGIC CONTROLLER FOR INTRUSION DETECTION

    Directory of Open Access Journals (Sweden)

    Abdulrahim Haroun Ali

    2014-08-01

    Full Text Available Intrusions are a problem with the deployment of Networks which give misuse and abnormal behavior in running reliable network operations and services. In this work, a Dynamic Fuzzy Logic Controller (DFLC is proposed for an anomaly detection problem, with the aim of solving the problem of attack detection rate and faster response process. Data is collected by PingER project. PingER project actively measures the worldwide Internet’s end-to-end performance. It covers over 168 countries around the world. PingER uses simple ubiquitous Internet Ping facility to calculate number of useful performance parameters. From each set of 10 pings between a monitoring host and a remote host, the features being calculated include Minimum Round Trip Time (RTT, Jitter, Packet loss, Mean Opinion Score (MOS, Directness of Connection (Alpha, Throughput, ping unpredictability and ping reachability. A set of 10 pings is being sent from the monitoring node to the remote node every 30 minutes. The received data shows the current characteristic and behavior of the networks. Any changes in the received data signify the existence of potential threat or abnormal behavior. D-FLC uses the combination of parameters as an input to detect the existence of any abnormal behavior of the network. The proposed system is simulated in Matlab Simulink environment. Simulations results show that the system managed to catch 95% of the anomalies with the ability to distinguish normal and abnormal behavior of the network.

  6. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients

    Directory of Open Access Journals (Sweden)

    Usha Bapat

    2012-01-01

    Full Text Available To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients′ above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life

  7. Evaluation of Dicentrarchus labrax meats and the vegetable quality of Beta vulgaris var. Cicla farmed in freshwater and saltwater aquaponic systems

    OpenAIRE

    Nozzi, Valentina; Parisi, Giuliana; Di Crescenzo, Davide; Giordano, Mario; Carnevali, Oliana

    2016-01-01

    The purpose of this study is to exploit the euryhaline nature of commercially attractive species for their cultivation in freshwater aquaponic systems. This approach may increase the profitability of aquaponic production in coastal countries where the consumption of marine fish is traditional and of commercial relevance. For this purpose, juvenile European sea bass (Dicentrarchus labrax) were reared in an aquaponic freshwater (AFW) system and an aquaponic saltwater (ASW) system (salinity 20 p...

  8. Procrastination as a Self-Regulation Failure: The Role of Impulsivity and Intrusive Thoughts.

    Science.gov (United States)

    Rebetez, Marie My Lien; Rochat, Lucien; Barsics, Catherine; Van der Linden, Martial

    2018-02-01

    Procrastination has been described as the quintessence of self-regulatory failure. This study examines the relationships between this self-regulatory failure and other manifestations of self-regulation problems, namely impulsivity and intrusive thoughts. One hundred and forty-one participants completed questionnaires assessing procrastination, impulsivity (in particular, the urgency and lack of perseverance dimensions), and intrusive thoughts (i.e., rumination and daydreaming). Main results show that urgency mediated the association between rumination and procrastination, whereas rumination did not mediate the relation between urgency and procrastination. Lack of perseverance mediated the association between daydreaming and procrastination, and daydreaming mediated the relation between lack of perseverance and procrastination. This study highlights the role of impulsivity and intrusive thoughts in procrastination, specifies the links between these self-regulation problems, and provides insights into their (potential) underlying mechanisms. It also opens interesting prospects for management strategies for implementing targeted psychological interventions to reduce impulsive manifestations and/or thought control difficulties accompanying procrastination.

  9. Politically-focused intrusive thoughts and associated ritualistic behaviors in a community sample.

    Science.gov (United States)

    Cepeda, Sandra L; McKay, Dean; Schneider, Sophie C; La Buissonnière-Ariza, Valérie; Egberts, Jolenthe T N E; McIngvale, Elizabeth; Goodman, Wayne K; Storch, Eric A

    2018-05-01

    A significant proportion of the U.S. population report increased stress attributed to the political climate following the controversial 2016 United States (U.S.) Presidential election. The political stressors paired with the growth in news consumption and social media-use could be a potential trigger for obsessive-compulsive-like symptoms specific to politics in some individuals. This study aimed to elucidate the rate of Politically-focused Intrusive Thoughts and associated Ritualistic Behaviors (PITRB), their demographic and clinical correlates, and the degree of association with political ideology. Survey data were collected using the crowdsourcing platform Mechanical Turk. A total of N = 484 individuals completed the survey. Measures of politically-focused intrusive thoughts and ritualistic behaviors, general obsessive-compulsive symptoms, depression, anxiety, anxiety control, worry, and disability were administered, as well as a measure of social and economic conservative affiliation. Results showed that a quarter of the sample (25.2%) had at least one PITRB more than once a day. PITRB was associated with all measures of psychopathology and disability. Finally, anxiety control moderated the relationship between PITRB and both anxiety and depression. No differences in psychopathology were found between major party affiliations. The findings suggest that politically-focused intrusive thoughts and ritualistic behaviors are associated with psychopathology domains in a manner comparable to general obsessive-compulsive symptoms. Copyright © 2018 Elsevier Ltd. All rights reserved.

  10. Consideration of impact of atmospheric intrusion in subsurface sampling for investigation of suspected underground nuclear explosions

    International Nuclear Information System (INIS)

    Lowrey, J.D.; Bowyer, T.W.; Haas, D.A.; Hayes, J.C.; Biegalski, S.R.

    2016-01-01

    Radioactive noble gases radioxenon and radioargon constitute the primary smoking gun of an underground nuclear explosion. The aim of subsurface sampling of soil gas as part of an on-site inspection (OSI) is to search for evidence of a suspected underground nuclear event. It has been hypothesized that atmospheric gas can disturb soil gas concentrations and therefore potentially add to problems in civilian source discrimination verifying treaty compliance under the comprehensive nuclear-test ban treaty. This work describes a study of intrusion of atmospheric air into the subsurface and its potential impact on an OSI using results of simulations from the underground transport of environmental xenon (UTEX) model. (author)

  11. Reducing intrusive traumatic memories after emergency caesarean section: A proof-of-principle randomized controlled study.

    Science.gov (United States)

    Horsch, Antje; Vial, Yvan; Favrod, Céline; Harari, Mathilde Morisod; Blackwell, Simon E; Watson, Peter; Iyadurai, Lalitha; Bonsall, Michael B; Holmes, Emily A

    2017-07-01

    Preventative psychological interventions to aid women after traumatic childbirth are needed. This proof-of-principle randomized controlled study evaluated whether the number of intrusive traumatic memories mothers experience after emergency caesarean section (ECS) could be reduced by a brief cognitive intervention. 56 women after ECS were randomized to one of two parallel groups in a 1:1 ratio: intervention (usual care plus cognitive task procedure) or control (usual care). The intervention group engaged in a visuospatial task (computer-game 'Tetris' via a handheld gaming device) for 15 min within six hours following their ECS. The primary outcome was the number of intrusive traumatic memories related to the ECS recorded in a diary for the week post-ECS. As predicted, compared with controls, the intervention group reported fewer intrusive traumatic memories (M = 4.77, SD = 10.71 vs. M = 9.22, SD = 10.69, d = 0.647 [95% CI: 0.106, 1.182]) over 1 week (intention-to-treat analyses, primary outcome). There was a trend towards reduced acute stress re-experiencing symptoms (d = 0.503 [95% CI: -0.032, 1.033]) after 1 week (intention-to-treat analyses). Times series analysis on daily intrusions data confirmed the predicted difference between groups. 72% of women rated the intervention "rather" to "extremely" acceptable. This represents a first step in the development of an early (and potentially universal) intervention to prevent postnatal posttraumatic stress symptoms that may benefit both mother and child. ClinicalTrials.gov, www.clinicaltrials.gov, NCT02502513. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  12. A novel method for rearing first-feeding larval zebrafish: polyculture with Type L saltwater rotifers (Brachionus plicatilis).

    Science.gov (United States)

    Best, Jason; Adatto, Isaac; Cockington, Jason; James, Althea; Lawrence, Christian

    2010-09-01

    Promoting high rates of growth and survival can be a major challenge in zebrafish culture, especially during the first-feeding stage. Here we describe a new rearing technique in which zebrafish larvae are polycultured in static tanks with Type "L" saltwater rotifers (Brachionus plicatilis) for the first 5 days of feeding (days 5-9 postfertilization). To demonstrate the effectiveness of this technique, we conducted rearing trials using fish from two different strains: AB and nacre. Growth, survival, water quality, and rotifer density were assayed daily through the polyculture phase (days 5-9), and during the transition to standard rearing conditions (days 10-12). After that point, once the fish were fully integrated onto recirculating systems, parameters were measured once per week out to day 30. In all trials, the fish displayed high rates of growth and survival throughout the three phases (polyculture, transition, and recirculating flow), indicating that this method may be employed during the critical first-feeding stage to help improve rearing performance in zebrafish facilities. Additionally, water quality parameters observed during the polyculture phase of the trials reveal that early zebrafish larvae are much more tolerant of elevated levels of ammonia and salinity than previously believed.

  13. Inferring spatial and temporal behavioral patterns of free-ranging manatees using saltwater sensors of telemetry tags

    Science.gov (United States)

    Castelblanco-Martínez, Delma Nataly; Morales-Vela, Benjamin; Slone, Daniel H.; Padilla-Saldívar, Janneth Adriana; Reid, James P.; Hernández-Arana, Héctor Abuid

    2015-01-01

    Diving or respiratory behavior in aquatic mammals can be used as an indicator of physiological activity and consequently, to infer behavioral patterns. Five Antillean manatees, Trichechus manatus manatus, were captured in Chetumal Bay and tagged with GPS tracking devices. The radios were equipped with a micropower saltwater sensor (SWS), which records the times when the tag assembly was submerged. The information was analyzed to establish individual fine-scale behaviors. For each fix, we established the following variables: distance (D), sampling interval (T), movement rate (D/T), number of dives (N), and total diving duration (TDD). We used logic criteria and simple scatterplots to distinguish between behavioral categories: ‘Travelling’ (D/T ≥ 3 km/h), ‘Surface’ (↓TDD, ↓N), ‘Bottom feeding’ (↑TDD, ↑N) and ‘Bottom resting’ (↑TDD, ↓N). Habitat categories were qualitatively assigned: Lagoon, Channels, Caye shore, City shore, Channel edge, and Open areas. The instrumented individuals displayed a daily rhythm of bottom activities, with surfacing activities more frequent during the night and early in the morning. More investigation into those cycles and other individual fine-scale behaviors related to their proximity to concentrations of human activity would be informative

  14. Review of the geochemistry and metallogeny of approximately 1.4 Ga granitoid intrusions of the conterminous United States

    Science.gov (United States)

    du Bray, Edward A.; Holm-Denoma, Christopher S.; Lund, Karen; Premo, Wayne R.

    2018-03-27

    primitive, mantle-derived components and evolved, crust-derived components.Each compositional subtype can be ascribed to a relatively unique petrogenetic history. The numerically dominant ferroan, peraluminous granites probably represent low-degree, relatively high-pressure partial melting of preexisting, crust-derived, intermediate-composition granitoids. The moderately numerous, weakly magnesian, peraluminous granites probably reflect similar partial melting but at a higher degree and in a lower pressure environment. In contrast, the ferroan but metaluminous granites may be the result of extensive differentiation of tholeiitic basalt. Finally, the peralkaline igneous rocks at Mountain Pass have compositions potentially derived by differentiation of alkali basalt. The varying alkalic character of each subtype probably reflects polybaric petrogenesis and the corresponding effect of diverse mineral stabilities on ultimate melt compositions. Mantle-derived mafic magma and variably assimilated partial melts of mainly juvenile Paleoproterozoic crustal components are required to generate the relatively low initial strontium (87Sr/86Sr) and distinctive neodymium isotope compositions characteristic of the U.S. 1.4 Ga granitoid intrusions. The characteristics of these intrusions are consistent with crustal melting in an extensional/decompressional, intracratonic setting that was triggered by mantle upwelling and emplacement of tholeiitic basaltic magma at or near the base of the crust. Composite magmas, formed by mingling and mixing mantle components with partial melts of Paleoproterozoic crust, produced variably homogenized storage reservoirs that continued polybaric evolution as intrusions lodged at various crustal depths.

  15. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  16. Environmental Characteristics of Carbonatite and Alkaline Intrusion-related Rare Earth Element (REE) Deposits

    Science.gov (United States)

    Seal, R. R., II; Piatak, N. M.

    2017-12-01

    Carbonatites and alkaline intrusions are important sources of REEs. Environmental risks related to these deposit types have been assessed through literature review and evaluation of the geochemical properties of representative samples of mill tailings and their leachates. The main ore mineral in carbonatite deposits is bastnasite [(Ce,La)(CO3)F], which is found with dolomite and calcite ( 65 %), barite (20 - 25 %), plus a number of minor accessory minerals including sulfides such as galena and pyrite. Generally, alkaline intrusion-related REE deposits either occur in layered complexes or with dikes and veins cutting alkaline intrusions. Such intrusions have a more diverse group of REE ore minerals that include fluorcarbonates, oxides, silicates, and phosphates. Ore also can include minor calcite and iron (Fe), lead (Pb), and zinc (Zn) sulfides. The acid-generating potential of both deposit types is low because of a predominance of carbonate minerals in the carbonatite deposits, the presence of feldspars and minor calcite in alkaline intrusion-related deposits, and to only minor to trace occurrence of potentially acid-generating sulfide minerals. Both deposit types, however, are produced by igneous and hydrothermal processes that enrich high-field strength, incompatible elements, which typically are excluded from common rock-forming minerals. Elements such as yttrium (Y), niobium Nb), zirconium (Zr), hafnium (Hf), tungsten (W), titanium (Ti), tantalum (Ta), scandium (Sc), thorium (Th), and uranium (U) can be characteristic of these deposits and may be of environmental concern. Most of these elements, including the REEs, but with the exception of U, have low solubilities in water at the near-neutral pH values expected around these deposits. Mill tailings from carbonatite deposits can exceed residential soil and sediment criteria for Pb, and leachates from mill tailings can exceed drinking water guidelines for Pb. The greatest environmental challenges, however, are

  17. Strontium isotopic geochemistry of intrusive rocks, Puerto Rico, Greater Antilles

    International Nuclear Information System (INIS)

    Jones, L.M.; Kesler, S.E.

    1980-01-01

    The strontium isotope geochemistry is given for three Puerto Rican intrusive rocks: the granodioritic Morovis and San Lorenzo plutons and the Rio Blanco stock of quartz dioritic composition. The average calculated initial 87 Sr/ 86 Sr ratios are 0.70370, 0.70355 and 0.70408, respectively. In addition, the San Lorenzo data establish a whole-rock isochron of 71 +- 2 m.y., which agrees with the previously reported K-Ar age of 73 m.y. Similarity of most of the intrusive rocks in the Greater Antilles with respect to their strontium isotopic geochemistry regardless of their major element composition indicates that intrusive magmas with a wide range of composition can be derived from a single source material. The most likely source material, in view of the available isotopic data, is the mantle wedge overlying the subduction zone. (orig.)

  18. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    Science.gov (United States)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  19. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    Science.gov (United States)

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  1. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  2. Drilling the Bushveld Complex- the world's largest layered mafic intrusion

    Science.gov (United States)

    Ashwal, L. D.; Webb, S. J.; Trumbull, R. B.

    2013-12-01

    The fact that surprising new discoveries can be made in layered mafic intrusions (e.g., subtle 100-150 m cyclicity in apparently homogeneous cumulates over 1000s of m) means that we are still in the first-order characterization phase of understanding these objects. Accordingly, we have secured funding from ICDP for a planning workshop to be held in Johannesburg in early 2014, aimed at scientific drilling of the Bushveld Complex, the world's largest layered mafic intrusion. Science objectives include, but are not limited to: 1. Magma chamber processes & melt evolution. How many melts/magmas/mushes were involved, what were their compositions and how did they interact? What, if anything, is missing from the Complex, and where did it go? Did Bushveld magmatism have an effect upon Earth's atmosphere at 2 Ga? 2. Crust-mantle interactions & origin of Bushveld granitoids. Are Bushveld granites & rhyolites crustal melts, differentiates from the mafic magmas or products of immiscibility? How can the evolved isotopic signatures in the mafic rocks (e.g., epsilon Nd to -8) be understood? 3. Origin of ore deposits. What were the relative roles of gravity settling, magma mixing, immiscibility and hydrothermal fluid transport in producing the PGE, Cr and V deposits? We have identified 3 potential drilling targets representing a total of ~12 km of drill core. Exact locations of drill sites are to be discussed at the workshop. Target A- East-Central Bushveld Complex. We propose 3 overlapping 3 km boreholes that will provide the first roof-to-floor continuous coverage of the Rustenburg Layered Suite. These boreholes will represent a curated, internationally available reference collection of Bushveld material for present and future research. Target B- Southeastern Bushveld Complex. We propose a single borehole of ~2 km depth, collared in Rooiberg felsite, and positioned to intersect the Roof Zone, Upper Zone, Main Zone and floor of the Complex. Amongst other things, this site will

  3. Working group 4B - human intrusion: Design/performance requirements

    International Nuclear Information System (INIS)

    Channell, J.

    1993-01-01

    There is no summary of the progress made by working group 4B (Human Intrusion: Design/performance Requirements) during the Electric Power Research Institute's EPRI Workshop on the technical basis of EPA HLW Disposal Criteria, March 1993. This group was to discuss the waste disposal standard, 40 CFR Part 191, in terms of the design and performance requirements of human intrusion. Instead, because there were so few members, they combined with working group 4A and studied the three-tier approach to evaluating postclosure performance

  4. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments....

  5. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  6. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  7. Lower crustal intrusions beneath the southern Baikal Rift Zone

    DEFF Research Database (Denmark)

    Nielsen, Christoffer; Thybo, Hans

    2009-01-01

    centre. The BEST (Baikal Explosion Seismic Transect) project acquired a 360-km long, deep seismic, refraction/wide-angle reflection profile in 2002 across southern Lake Baikal. The data from this project is used for identification of large-scale crustal structures and modelling of the seismic velocities....../s and 7.9 km/s. We interpret this feature as resulting from mafic to ultra-mafic intrusions in the form of sills. Petrological interpretation of the velocity values suggests that the intrusions are sorted by fractional crystallization into plagioclase-rich low-velocity layers and pyroxene- and olivine...

  8. Large-scale circulation associated with moisture intrusions into the Arctic during winter

    Science.gov (United States)

    Woods, Cian; Caballero, Rodrigo; Svensson, Gunilla

    2014-05-01

    intrusion events. A total of 298 events are objectively identified between 1990 and 2010 in the reanalysis dataset, an average of 14 per season, accounting for 28% of the total poleward moisture transport across 70N. Composites of sea level pressure and potential temperature on the 2 potential vorticity unit surface during intrusions show a large-scale blocking pattern to the east of each basin, deflecting midlatitude cyclones and their associated moisture poleward. The interannual variability of intrusions is strongly correlated with variability in winter-mean surface downward longwave radiation and skin temperature averaged over the Arctic. The 16 CMIP5 models are validated with respect to the reanalysis dataset and a subset of 7 models is chosen as best representing intrusions. Intrusions in the representative concentration pathway 8.5 scenario (RCP8.5) from these 7 models are analyzed between 2060 and 2100. Positive trends in the moisture transported by intrusions are noted. The mechanisms behind these trends are examined in each of the models, dynamically and thermodynamically, with regard to the positioning of the storm track and climatological jets in a moistening atmosphere.

  9. Intrusions of Modernity on a Traditional Culture.

    Science.gov (United States)

    Thomas, Anne Horsfall

    1991-01-01

    Presents a teacher's impressions of India, gathered during a Fulbright-sponsored study tour. Examines modernizing influences in the midst of traditional culture, religious cultural groups and potential religious conflict, women's status, and problems due to overpopulation. (CH)

  10. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  11. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  12. Risks assessment associated with the possibility of intrusion into the low and intermediate level waste disposal facility

    International Nuclear Information System (INIS)

    Didita, L.; Ilie, P.; Pavelescu, M.

    1997-01-01

    In post-closure performance assessment of low and intermediate level waste disposal facilities it is necessary to assess the individual risks associated with the possibility of intrusion into repository. Intruder induced disruptive events can potentially compromise the integrity of the disposal unit and result in exhumation of the waste and radionuclides migration into environment. In this way, the main routes of exposure are: -inhalation of radioactive materials by the intruder; - external gamma irradiation of the intruder, - long-term pathways resulting from the transfer of radioactive materials to the surface of the site. This paper describes the evaluation of conditional and absolute risks associated with each route of exposure as a function of time. To evaluate the risks, it is necessary to calculate the time-dependent activities of each nuclide considered. This is achieved by employing an analytic solution to the Bateman equation at specified times of evaluation. Conditional risks by inhalation, external exposure and long-term pathways and different modes of intrusion are evaluated on the basis of an annual probability of intrusion of unity. Absolute risks are calculated by scaling the user-supplied probabilities of intrusion at various times of evaluation. The evaluation of absolute risks by long-term exposure pathways involves an interpolation procedure in time. The calculations have been performed for the most important radionuclides present in low and intermediate wastes. (authors)

  13. Comparative study of adaptive-noise-cancellation algorithms for intrusion detection systems

    International Nuclear Information System (INIS)

    Claassen, J.P.; Patterson, M.M.

    1981-01-01

    Some intrusion detection systems are susceptible to nonstationary noise resulting in frequent nuisance alarms and poor detection when the noise is present. Adaptive inverse filtering for single channel systems and adaptive noise cancellation for two channel systems have both demonstrated good potential in removing correlated noise components prior detection. For such noise susceptible systems the suitability of a noise reduction algorithm must be established in a trade-off study weighing algorithm complexity against performance. The performance characteristics of several distinct classes of algorithms are established through comparative computer studies using real signals. The relative merits of the different algorithms are discussed in the light of the nature of intruder and noise signals

  14. Dead or Alive? Factors Affecting the Survival of Victims during Attacks by Saltwater Crocodiles (Crocodylus porosus in Australia.

    Directory of Open Access Journals (Sweden)

    Yusuke Fukuda

    Full Text Available Conflicts between humans and crocodilians are a widespread conservation challenge and the number of crocodile attacks is increasing worldwide. We identified the factors that most effectively decide whether a victim is injured or killed in a crocodile attack by fitting generalized linear models to a 42-year dataset of 87 attacks (27 fatal and 60 non-fatal by saltwater crocodiles (Crocodylus porosus in Australia. The models showed that the most influential factors were the difference in body mass between crocodile and victim, and the position of victim in relation to the water at the time of an attack. In-water position (for diving, swimming, and wading had a higher risk than on-water (boating or on-land (fishing, and hunting near the water's edge positions. In the in-water position a 75 kg person would have a relatively high probability of survival (0.81 if attacked by a 300 cm crocodile, but the probability becomes much lower (0.17 with a 400 cm crocodile. If attacked by a crocodile larger than 450 cm, the survival probability would be extremely low (<0.05 regardless of the victim's size. These results indicate that the main cause of death during a crocodile attack is drowning and larger crocodiles can drag a victim more easily into deeper water. A higher risk associated with a larger crocodile in relation to victim's size is highlighted by children's vulnerability to fatal attacks. Since the first recently recorded fatal attack involving a child in 2006, six out of nine fatal attacks (66.7% involved children, and the average body size of crocodiles responsible for these fatal attacks was considerably smaller (384 cm, 223 kg than that of crocodiles that killed adults (450 cm, 324 kg during the same period (2006-2014. These results suggest that culling programs targeting larger crocodiles may not be an effective management option to improve safety for children.

  15. Measuring behavioral responses of sea turtles, saltwater crocodiles, and crested terns to drone disturbance to define ethical operating thresholds.

    Science.gov (United States)

    Bevan, Elizabeth; Whiting, Scott; Tucker, Tony; Guinea, Michael; Raith, Andrew; Douglas, Ryan

    2018-01-01

    Drones are being increasingly used in innovative ways to enhance environmental research and conservation. Despite their widespread use for wildlife studies, there are few scientifically justified guidelines that provide minimum distances at which wildlife can be approached to minimize visual and auditory disturbance. These distances are essential to ensure that behavioral and survey data have no observer bias and form the basis of requirements for animal ethics and scientific permit approvals. In the present study, we documented the behaviors of three species of sea turtle (green turtles, Chelonia mydas, flatback turtles, Natator depressus, hawksbill turtles, Eretmochelys imbricata), saltwater crocodiles (Crocodylus porosus), and crested terns (Thalasseus bergii) in response to a small commercially available (1.4 kg) multirotor drone flown in Northern Territory and Western Australia. Sea turtles in nearshore waters off nesting beaches or in foraging habitats exhibited no evasive behaviors (e.g. rapid diving) in response to the drone at or above 20-30 m altitude, and at or above 10 m altitude for juvenile green and hawksbill turtles foraging on shallow, algae-covered reefs. Adult female flatback sea turtles were not deterred by drones flying forward or stationary at 10 m altitude when crawling up the beach to nest or digging a body pit or egg chamber. In contrast, flyovers elicited a range of behaviors from crocodiles, including minor, lateral head movements, fleeing, or complete submergence when a drone was present below 50 m altitude. Similarly, a colony of crested terns resting on a sand-bank displayed disturbance behaviors (e.g. flight response) when a drone was flown below 60 m altitude. The current study demonstrates a variety of behavioral disturbance thresholds for diverse species and should be considered when establishing operating conditions for drones in behavioral and conservation studies.

  16. Measuring behavioral responses of sea turtles, saltwater crocodiles, and crested terns to drone disturbance to define ethical operating thresholds

    Science.gov (United States)

    Whiting, Scott; Tucker, Tony; Guinea, Michael; Raith, Andrew; Douglas, Ryan

    2018-01-01

    Drones are being increasingly used in innovative ways to enhance environmental research and conservation. Despite their widespread use for wildlife studies, there are few scientifically justified guidelines that provide minimum distances at which wildlife can be approached to minimize visual and auditory disturbance. These distances are essential to ensure that behavioral and survey data have no observer bias and form the basis of requirements for animal ethics and scientific permit approvals. In the present study, we documented the behaviors of three species of sea turtle (green turtles, Chelonia mydas, flatback turtles, Natator depressus, hawksbill turtles, Eretmochelys imbricata), saltwater crocodiles (Crocodylus porosus), and crested terns (Thalasseus bergii) in response to a small commercially available (1.4 kg) multirotor drone flown in Northern Territory and Western Australia. Sea turtles in nearshore waters off nesting beaches or in foraging habitats exhibited no evasive behaviors (e.g. rapid diving) in response to the drone at or above 20–30 m altitude, and at or above 10 m altitude for juvenile green and hawksbill turtles foraging on shallow, algae-covered reefs. Adult female flatback sea turtles were not deterred by drones flying forward or stationary at 10 m altitude when crawling up the beach to nest or digging a body pit or egg chamber. In contrast, flyovers elicited a range of behaviors from crocodiles, including minor, lateral head movements, fleeing, or complete submergence when a drone was present below 50 m altitude. Similarly, a colony of crested terns resting on a sand-bank displayed disturbance behaviors (e.g. flight response) when a drone was flown below 60 m altitude. The current study demonstrates a variety of behavioral disturbance thresholds for diverse species and should be considered when establishing operating conditions for drones in behavioral and conservation studies. PMID:29561901

  17. Dead or Alive? Factors Affecting the Survival of Victims during Attacks by Saltwater Crocodiles (Crocodylus porosus) in Australia.

    Science.gov (United States)

    Fukuda, Yusuke; Manolis, Charlie; Saalfeld, Keith; Zuur, Alain

    2015-01-01

    Conflicts between humans and crocodilians are a widespread conservation challenge and the number of crocodile attacks is increasing worldwide. We identified the factors that most effectively decide whether a victim is injured or killed in a crocodile attack by fitting generalized linear models to a 42-year dataset of 87 attacks (27 fatal and 60 non-fatal) by saltwater crocodiles (Crocodylus porosus) in Australia. The models showed that the most influential factors were the difference in body mass between crocodile and victim, and the position of victim in relation to the water at the time of an attack. In-water position (for diving, swimming, and wading) had a higher risk than on-water (boating) or on-land (fishing, and hunting near the water's edge) positions. In the in-water position a 75 kg person would have a relatively high probability of survival (0.81) if attacked by a 300 cm crocodile, but the probability becomes much lower (0.17) with a 400 cm crocodile. If attacked by a crocodile larger than 450 cm, the survival probability would be extremely low (drag a victim more easily into deeper water. A higher risk associated with a larger crocodile in relation to victim's size is highlighted by children's vulnerability to fatal attacks. Since the first recently recorded fatal attack involving a child in 2006, six out of nine fatal attacks (66.7%) involved children, and the average body size of crocodiles responsible for these fatal attacks was considerably smaller (384 cm, 223 kg) than that of crocodiles that killed adults (450 cm, 324 kg) during the same period (2006-2014). These results suggest that culling programs targeting larger crocodiles may not be an effective management option to improve safety for children.

  18. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  19. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  20. Capability for intrusion detection at nuclear fuel sites

    International Nuclear Information System (INIS)

    1978-03-01

    A safeguards vulnerability assessment was conducted at three separate licensed nuclear processing facilities. Emphasis was placed on: (1) performance of the total intrusion detection system, and (2) vulnerability of the system to compromise by insiders. The security guards were interviewed to evaluate their effectiveness in executing their duties in accordance with the plant's security plan and to assess their knowledge regarding the operation of the security equipment. A review of the training schedule showed that the guards, along with the other plant employees, are required to periodically attend in-plant training sessions. The vulnerability assessments continued with interviews of the personnel responsible for maintaining the security equipment, with discussions of detector false alarm and maintenance problems. The second part of the vulnerability assessments was to evaluate the effectiveness of the intrusion detection systems including the interior and the perimeter sensors, CCTV surveillance devices and the exterior lighting. Two types of perimeter detectors are used at the sites, a fence disturbance sensor and an infrared barrier type detector. Infrared barrier type detectors have a higher probability of detection, especially in conjunction with dedicated CCTV cameras. The exterior lights satisfy the 0.2 footcandle illumination requirement. The interior intrusion detection systems included ultrasonic motion detectors, microwave motion detectors,balanced magnetic switches, and CCTV cameras. Entrance doors to the materials access areas and vital areas are protected with balanced magnetic switches. The interior intrusion detection systems at the three nuclear processing sites are considered satisfactory with the exception of the areas protected with ultrasonic motion detectors

  1. Data Fusion for Network Intrusion Detection: A Review

    Directory of Open Access Journals (Sweden)

    Guoquan Li

    2018-01-01

    Full Text Available Rapid progress of networking technologies leads to an exponential growth in the number of unauthorized or malicious network actions. As a component of defense-in-depth, Network Intrusion Detection System (NIDS has been expected to detect malicious behaviors. Currently, NIDSs are implemented by various classification techniques, but these techniques are not advanced enough to accurately detect complex or synthetic attacks, especially in the situation of facing massive high-dimensional data. Besides, the inherent defects of NIDSs, namely, high false alarm rate and low detection rate, have not been effectively solved. In order to solve these problems, data fusion (DF has been applied into network intrusion detection and has achieved good results. However, the literature still lacks thorough analysis and evaluation on data fusion techniques in the field of intrusion detection. Therefore, it is necessary to conduct a comprehensive review on them. In this article, we focus on DF techniques for network intrusion detection and propose a specific definition to describe it. We review the recent advances of DF techniques and propose a series of criteria to compare their performance. Finally, based on the results of the literature review, a number of open issues and future research directions are proposed at the end of this work.

  2. A Labeled Data Set For Flow-based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Sadre, R.; van Vliet, Frank; Pras, Aiko; Nunzi, Giorgio; Scoglio, Caterina; Li, Xing

    2009-01-01

    Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field, benchmarking of flow-based IDS is still an open issue. In this paper, we propose the first publicly available, labeled data set

  3. Intrusion of beach-disposed dredger spoil into the Mhlathuze ...

    African Journals Online (AJOL)

    Sediment intrusion and its impact on the beds of the seagrass Zostera capensis in the estuary were monitored from 1996 to 1999. Fine sediment did enter the estuary from the marine environment and was deposited mainly in its lower reaches, where its settling on the leaves of Zostera resulted in a major die-back. However ...

  4. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  5. AANtID: an alternative approach to network intrusion detection ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Security has become not just a feature of an information system, but the core and a necessity especially the systems that communicate and transmit data over the Internet for they are more ... Keywords: Intrusion, Genetic Algorithm, detection, Security, DARPA dataset ...

  6. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    the Earth that includes accretion and dispersal of supercontinents, viz., Columbia (Rogers and. Santosh 2002; Zhao et al 2004) and Rodinia. Keywords. Chhattisgarh Supergroup; Singhora Group; diabasic intrusive; geochemistry and age. J. Earth Syst. Sci. 120, No. 2, April 2011, pp. 223–236 c Indian Academy of Sciences.

  7. Approaches in anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, S.; Di Pietro, R.; Mancini, L.V.

    2008-01-01

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  8. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  9. On emulation-based network intrusion detection systems

    NARCIS (Netherlands)

    Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; Etalle, S.; Stavrou, A.; Bos, H.; Portokalidis, G.

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity.

  10. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    2008-01-01

    We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying a new method for anomaly detection on the

  11. Approaches in Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  12. Petrography of some altered intrusive rocks from the Lower Benue ...

    African Journals Online (AJOL)

    Petrography of some altered intrusive rocks from the Lower Benue Trough, Nigeria. Smart C Obiora, Alphonso C Umeji. Abstract. No Abstract. Journal of Mining and Geology 2005, Vol 41(1): 1-9. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  13. Revised predictive equations for salt intrusion modelling in estuaries

    NARCIS (Netherlands)

    Gisen, J.I.A.; Savenije, H.H.G.; Nijzink, R.C.

    2015-01-01

    For one-dimensional salt intrusion models to be predictive, we need predictive equations to link model parameters to observable hydraulic and geometric variables. The one-dimensional model of Savenije (1993b) made use of predictive equations for the Van der Burgh coefficient $K$ and the dispersion

  14. Pre-Stressor Interference Control and Intrusive Memories

    NARCIS (Netherlands)

    Verwoerd, J.; Wessel, I.; De Jong, P.J.; Nieuwenhuis, Maurice; Huntjens, R.J.C.

    Although intrusive imagery is a common response in the aftermath of a stressful or traumatic event, only a minority of trauma victims show persistent re-experiencing and related psychopathology. Individual differences in pre-trauma executive control possibly play a critical role. Therefore, this

  15. Salt intrusion study in Cochin estuary - Using empirical models

    Digital Repository Service at National Institute of Oceanography (India)

    Jacob, B.; Revichandran, C.; NaveenKumar, K.R.

    been applied to the Cochin estuary in the present study to identify the most suitable model for predicting the salt intrusion length. Comparison of the obtained results indicate that the model of Van der Burgh (1972) is the most suitable empirical model...

  16. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data

    Science.gov (United States)

    2012-03-01

    52 Table 7. Place Reachability Statistics for Low Level CPN...54 Table 8. Place Reachability Statistics for High Level CPN................................................. 55 Table 9. Password Stealing...the efficiency of traditional anti-virus software tools that are dependent on gigantic , continuously updated databases. Fortunately, Intrusion

  17. State of the Practice of Intrusion Detection Technologies

    Science.gov (United States)

    2000-01-01

    functions, procedures, and scripts, an Oracle database structure, Borne shell scripts, and configuration files which together communicate with ASIM Sensor...34Plugging the Holes in eCommerce Leads to 135% Growth in the Intrusion Detection and Vulnerability Assessment Software Market," PRNewswire. August

  18. Illness intrusiveness among survivors of autologous blood and marrow transplantation.

    Science.gov (United States)

    Schimmer, A D; Elliott, M E; Abbey, S E; Raiz, L; Keating, A; Beanlands, H J; McCay, E; Messner, H A; Lipton, J H; Devins, G M

    2001-12-15

    Illness-induced disruptions to lifestyles, activities, and interests (i.e., illness intrusiveness) compromise subjective well-being. The authors measured illness intrusiveness in autologous blood and bone marrow transplantation (ABMT) survivors and compared the results with survivors of solid organ transplants. Forty-four of 64 consecutive ABMT survivors referred to the University of Toronto ABMT long-term follow-up clinic completed the Illness Intrusiveness Ratings Scale (IIRS), the Affect Balance Scale (ABS), the Atkinson Life Happiness Rating (ATKLH), the Beck Hopelessness Scale (BHS), and the Center for Epidemiologic Studies Depression (CES-D) Scale. Mean time from ABMT to evaluation was 4.6 +/- 2.8 years. All patients were in remission or had stable disease at the time of evaluation. Autologous blood and bone marrow transplantation patients' IIRS scores were compared with scores reported by recipients of kidney (n = 357), liver (n = 150), lung (n = 77), and heart (n = 60) transplants. Mean IIRS score for the 44 ABMT patients was 37.2 +/- 17 (maximum possible score, 91; minimum possible score, 13). Higher IIRS scores correlated with lower scores on the ABS (r = -0.54; P work, financial situation, and active recreation. Despite achieving a remission after ABMT, patients continue to experience illness intrusiveness compromising subjective well-being. Copyright 2001 American Cancer Society.

  19. Efficient cooling of rocky planets by intrusive magmatism

    Science.gov (United States)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  20. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  1. Trauma Films, Information Processing, and Intrusive Memory Development

    Science.gov (United States)

    Holmes, Emily A.; Brewin, Chris R.; Hennessy, Richard G.

    2004-01-01

    Three experiments indexed the effect of various concurrent tasks, while watching a traumatic film, on intrusive memory development. Hypotheses were based on the dual-representation theory of posttraumatic stress disorder (C. R. Brewin, T. Dalgleish, & S. Joseph, 1996). Nonclinical participants viewed a trauma film under various encoding conditions…

  2. Radiological risks due to intrusion into a deep bedrock repository

    International Nuclear Information System (INIS)

    Nordlinder, S.; Bergstroem, U.; Edlund, O.

    1999-01-01

    The Swedish concept for disposal of high-level waste is a deep (500 m) bedrock repository (SFL) protected by multiple barriers that isolate the waste from the environment for such a long time that the physical decay will cause a substantial reduction of the radioactivity. The aim of concentration and isolation of high-level waste is to reduce the radiation risk. Intrusion in the repository may introduce a small residual risk to individuals. A risk analysis was performed comprising dose assessment and probabilities of occurrence. Intrusions may be considered to take place either due to conscious actions or by actions without any knowledge about the repository. For conscious intrusion it may be assumed that there will be enough knowledge to manage the radiation situation in a professional manner. Several reasons for making inadvertent intrusion are possible. Independently of the purpose, the most probable initial way of coming into contact with the radioactive material is by deep drilling. Examples of causes for drilling could be general scientific purposes or exploitation of geothermal energy. Dose assessments were made for intrusion due to inclined drilling directly into a canister, and drilling near an initially malfunctioning canister from which radionuclides have leaked into the groundwater. For the former case, external pathways were considered due to exposure from a core of the canister with fuel and contaminated bore dust. The most common drilling method is with water flushing for removal of bore dust, which will not cause any substantial transfer of radionuclides to air. For the second case, it was assumed that there was a well in the vicinity. The only pathway considered was therefore consumption of water because it dominates the exposure. The highest dose rates to man were, as expected, obtained by drilling into the canister. Dose rates decrease with time after closure. During the first time the relatively short-lived radionuclides Cs-137 and Sr-90 give

  3. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    Science.gov (United States)

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...

  4. The effect of destination linked feature selection in real-time network intrusion detection

    CSIR Research Space (South Africa)

    Mzila, P

    2013-07-01

    Full Text Available techniques in the network intrusion detection system (NIDS) is the feature selection technique. The ability of NIDS to accurately identify intrusion from the network traffic relies heavily on feature selection, which describes the pattern of the network...

  5. Dose and risk assessment for intrusion into mixed waste disposal sites

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Aaberg, R.L.

    1991-10-01

    Sites previously used for disposal of radioactive and hazardous chemical materials have resulted in situations that pose a potential threat to humans from inadvertent intrusion. An example generic scenario analysis was developed to demonstrate the evaluation of potential exposure to either cleanup workers or members of the public who intrude into buried waste containing both radioactive and hazardous chemical contaminants. The example scenarios consist of a collection of exposure routes (or pathways) with specific modeling assumptions for well-drilling and for excavation to construct buildings. These scenarios are used to describe conceptually some potential patterns of activity by non-protected human beings during intrusion into mixed-waste disposal sites. The dose from exposure to radioactive materials is calculated using the GENII software system and converted to risk by using factors from ICRP Publication 60. The hazard assessment for nonradioactive materials is performed using recent guidelines from the US Environmental Protection Agency (EPA). The example results are in the form of cancer risk for carcinogens and radiation exposure

  6. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  7. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.

    Science.gov (United States)

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  8. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  9. Stakeholder Participation in Research Design and Decisions: Scientists, Fishers, and Mercury in Saltwater Fish

    Science.gov (United States)

    Burger, Joanna; Gochfeld, Michael; Fote, Tom

    2015-01-01

    Individuals who fish and eat self-caught fish make decisions about where to fish, the type to eat, and the quantity to eat. Federal and state agencies often issue consumption advisories for some fish with high mercury (Hg) concentrations, but seldom provide either the actual metal levels to the general public, or identify the fish that have low contaminant levels. Community participatory research is of growing importance in defining, studying, and resolving complex exposure and risk issues, and this paper is at the intersection of traditional stakeholder approaches and community-based participatory research. The objective of this paper is to describe the process whereby stakeholders (fishers), were involved in directing and refining research questions to address their particular informational needs about mercury levels in fish, potential risks, and methods to maintain health, by balancing the risks and benefits of fish consumption. A range of stakeholders, mainly individual fishers, fishing organizations, and other scientists, were involved at nearly every stage. Community participants influenced many aspects of the design and implementation of the research, in the determination of which fish species to sample, in the collection of the samples, and in the final analyses and synthesis, as well as the communication of results and implications of the research through their fishing club publications, talks and gatherings. By involving the most interested and affected communities, the data and conclusions are relevant to their needs because the fish examined were those they ate and wanted information about, and directly address concerns about the risk from consuming self-caught fish. Although mercury levels in fish presumed to be high in mercury are known, little information was available to the fishermen on mercury levels in fish that were low and thus provided little risk to their families. While community participatory research is more time-consuming and expensive

  10. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  11. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  12. U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland

    DEFF Research Database (Denmark)

    Þórarinsson, Sigurjón Böðvar; Holm, Paul Martin; Tappe, Sebatstian

    2016-01-01

    Several major tholeiitic (e.g. the Skaergaard intrusion) and alkaline (e.g. the Kangerlussuaq Syenite) intrusive complexes of the North Atlantic Large Igneous Province are exposed along the Kangerlussuaq Fjord in East Greenland. The Kærven Complex forms a satellite intrusion to the Kangerlussuaq ...

  13. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  14. Disruptive event analysis: volcanism and igneous intrusion

    International Nuclear Information System (INIS)

    Crowe, B.M.

    1980-08-01

    An evaluation is made of the disruptive effects of volcanic activity with respect to long term isolation of radioactive waste through deep geologic storage. Three major questions are considered. First, what is the range of disruption effects of a radioactive waste repository by volcanic activity. Second, is it possible, by selective siting of a repository, to reduce the risk of disruption by future volcanic activity. And third, can the probability of repository disruption by volcanic activity be quantified. The main variables involved in the evaluation of the consequences of repository disruption by volcanic activity are the geometry of the magma-repository intersection (partly controlled by depth of burial) and the nature of volcanism. Potential radionuclide dispersal by volcanic transport within the biosphere ranges in distance from several kilometers to global. Risk from the most catastrophic types of eruptions can be reduced by careful site selection to maximize lag time prior to the onset of activity. Certain areas or volcanic provinces within the western United States have been sites of significant volcanism and should be avoided as potential sites for a radioactive waste repository. Examples of projection of future sites of active volcanism are discussed for three areas of the western United States. Probability calculations require two types of data: a numerical rate or frequency of volcanic activity and a numerical evaluation of the areal extent of volcanic disruption for a designated region. The former is clearly beyond the current state of art in volcanology. The latter can be approximated with a reasonable degree of satisfaction. In this report, simplified probability calculations are attempted for areas of past volcanic activity

  15. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    -intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results......Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non...

  16. Sill intrusion in volcanic calderas: implications for vent opening probability

    Science.gov (United States)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    Calderas show peculiar behaviors with remarkable dynamic processes, which do not often culminate in eruptions. Observations and studies conducted in recent decades have shown that the most common cause of unrest in the calderas is due to magma intrusion; in particular, the intrusion of sills at shallow depths. Monogenic cones, with large areal dispersion, are quite common in the calderas, suggesting that the susceptibility analysis based on geological features, is not strictly suitable for estimating the vent opening probability in calderas. In general, the opening of a new eruptive vent can be regarded as a rock failure process. The stress field in the rocks that surrounds and tops the magmatic reservoirs plays an important role in causing the rock failure and creating the path that magma can follow towards the surface. In this conceptual framework, we approach the problem of getting clues about the probability of vent opening in volcanic calderas through the study of the stress field produced by the intrusion of magma, in particular, by the intrusion of a sill. We simulate the intrusion of a sill free to expand radially, with shape and dimensions which vary with time. The intrusion process is controlled by the elastic response of the rock plate above the sill, which bends because of the intrusion, and by gravity, that drives the magma towards the zones where the thickness of the sill is smaller. We calculated the stress field in the plate rock above the sill. We found that at the bottom of the rock plate above the sill the maximum intensity of tensile stress is concentrated at the front of the sill and spreads radially with it, over time. For this reason, we think that the front of the spreading sill is prone to open for eruptive vents. Even in the central area of the sill the intensity of stress is relatively high, but at the base of the rock plate stress is compressive. Under isothermal conditions, the stress soon reaches its maximum value (time interval

  17. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  18. Misuse and intrusion detection at Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1995-04-01

    An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in system audit records, in system vulnerability postures, and in other evidence found through active system testing. Since 1989 we have implemented a misuse and intrusion detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter, or NADIR. NADIR currently audits a Kerberos distributed authentication system, file activity on a mass, storage system, and four Cray supercomputers that run the UNICOS operating system. NADIR summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations, As NADIR is constantly evolving, this paper reports its development to date.

  19. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  20. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  1. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  2. Corrosion inhibitor development for slightly sour environments with oxygen intrusion

    Energy Technology Data Exchange (ETDEWEB)

    Wylde, J.; Wang, H.; Li, J. [Clariant Oil Services North America, Calgary, AB (Canada)

    2009-07-01

    This presentation reported on a study that examined the effect of oxygen on the inhibition of carbon steel in slightly sour corrosion, and the initiation and propagation of localized attack. Oxygen can enter sour water injection systems through the vapor space in storage tanks and process system. Oxygen aggravates the corrosion attack by participating in the cathodic reaction under full or partial diffusion control. Laboratory testing results were reported in this presentation along with the development of corrosion inhibitors for such a slightly sour system. Bubble testing cells were used with continuous H{sub 2}/CO{sub 2} mixture gas sparging and occasional oxygen intrusion of 2 to 4 hours during a week long test. Linear polarization resistance (LPR) measurements and weight loss corrosion coupons were used to quantify the corrosion attack. The findings were presented in terms of the magnitude of localized attacks at different oxygen concentrations and intrusion periods, with and without the presence of corrosion inhibitors. tabs., figs.

  3. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  4. Thermodynamics of water intrusion in nanoporous hydrophobic solids.

    Science.gov (United States)

    Cailliez, Fabien; Trzpit, Mickael; Soulard, Michel; Demachy, Isabelle; Boutin, Anne; Patarin, Joël; Fuchs, Alain H

    2008-08-28

    We report a joint experimental and molecular simulation study of water intrusion in silicalite-1 and ferrerite zeolites. The main conclusion of this study is that water condensation takes place through a genuine first-order phase transition, provided that the interconnected pores structure is 3-dimensional. In the extreme confinement situation (ferrierite zeolite), condensation takes place through a continuous transition, which is explained by a shift of both the first-order transition line and the critical point with increasing confinement. The present findings are at odds with the common belief that conventional phase transitions cannot take place in microporous solids such as zeolites. The most important features of the intrusion/extrusion process can be understood in terms of equilibrium thermodynamics considerations. We believe that these findings are very general for hydrophobic solids, i.e. for both nonwetting as well as wetting water-solid interface systems.

  5. Medication Adherence using Non-intrusive Wearable Sensors

    Directory of Open Access Journals (Sweden)

    T. H. Lim

    2017-12-01

    Full Text Available Activity recognition approaches have been applied in home ambient systems to monitor the status and well- being of occupant especially for home care systems. With the advancement of embedded wireless sensing devices, various applications have been proposed to monitor user´s activities and maintain a healthy lifestyle. In this paper, we propose and evaluate a Smart Medication Alert and Treatment Electronic Systems (SmartMATES using a non-intrusive wearable activity recognition sensing system to monitor and alert an user for missing medication prescription. Two sensors are used to collect data from the accelerometer and radio transceiver. Based on the data collected, SmartMATES processes the data and generate a model for the various actions including taking medication. We have evaluated the SmartMATES on 9 participants. The results show that the SmartMATES can identify and prevent missing dosage in a less intrusive way than existing mobile application and traditional approaches.

  6. Manipulating recall vantage perspective of intrusive memories in dysphoria.

    Science.gov (United States)

    Williams, Alishia D; Moulds, Michelle L

    2008-10-01

    The current study attempted to experimentally manipulate mode of recall (field, observer perspective) in a sample of mildly dysphoric participants (N=134) who reported a distressing intrusive memory of negative autobiographical event. Specifically, the current study sought to ascertain whether shifting participants into a converse perspective would have differential effects on the reported experience of their memory. Results indicated that shifting participants from a field to an observer perspective resulted in decreased experiential ratings: specifically, reduced distress and vividness. Also, as anticipated, the converse shift in perspective (from observer to field) did not lead to a corresponding increase in experiential ratings, but did result in reduced ratings of observation and a trend was observed for decreased levels of detachment. The findings support the notion that recall perspective has a functional role in the regulation of intrusion-related distress and represents a cognitive avoidance mechanism.

  7. Combined use of frequency‐domain electromagnetic and electrical resistivity surveys to delineate the freshwater/saltwater interface near saline lakes in the Nebraska Sand Hills, Nebraska, USA

    Science.gov (United States)

    Ong, John T.; White, Eric A.; Lane, John W.; Halihan, Todd; Zlotnik, Vitaly A; Butler, Dwain K.

    2009-01-01

    We investigate the use of frequency‐domain electromagnetic (FDEM) and electrical resistivity (ER) surveys for rapid and detailed characterization of the direction of lake‐aquifer fluxes and the configuration of salt plumes generated from saline lakes. This methodology was developed and applied at several lakes in the Nebraska Sand Hills, Nebraska, in an area with both freshwater and saline lakes hydraulically connected to the freshwater surficial aquifer. The FDEM survey was conducted by mounting the instrument on a fiberglass cart towed by an all‐terrain vehicle. The towed FDEM surveys covered about 25 km per day and served as a reconnaissance method for choosing locations for the more quantitative and detailed ER surveys. Around the saline lakes, areas with high electrical conductivity are consistent with the regional direction of ground‐water flow. Lower electrical conductivity was measured around the freshwater lakes with anomalies correlating to a paleovalley axis inferred from previous studies. The efficacy of this geophysical approach is attributed to: (1) significant contrast in electrical conductivity between freshwater and saltwater, (2) near‐surface location of the freshwater/saltwater interface, (3) minimal cultural interference, and (4) relative homogeneity of the aquifer materials.

  8. Molecular cloning and 3D model of first cytochrome P450 from CYP3A subfamily in saltwater crocodile (Crocodylus porosus).

    Science.gov (United States)

    Tabassum, Rabia

    2017-10-18

    Cytochrome P450s (CYPs) play critical role in oxidative metabolism of numerous xenobiotics and endogenous compounds. The first CYP3A subfamily member in saltwater crocodile has been cloned and modelled for three-dimensional (3D) structure. The full-length cDNA was obtained employing reverse transcription polymerase chain reaction (RT-PCR) strategy and rapid amplification of cDNA ends (RACE). The cDNA sequence of 1659 nucleotides includes 132 nucleotides from 5' untranslated region (UTR), an open reading frame of 1527 nucleotides encoding 509 amino acids designated as CYP3A163. The alignment of CYP3A163 sequence with CYP3A subfamily across the lineages exhibit the loss of 1 residue in birds and 7 residues in mammals in comparison to reptiles suggesting the adaptation processes during evolution. The amino acid identity of CYP3A163 with Alligator mississippiensis CYP3A77 and Homo sapiens CYP3A4 is 91% and 62% respectively. The 3D structure of CYP3A163 modelled using human CYP3A4 structure as a template with Phyre 2 software, represents high similarity with its functionally important motifs and catalytic domain. Both sequence and structure of CYP3A163 display the common and conserved features of CYP3A subfamily. Overall, this study provides primary molecular and structural data of CYP3A163 required to investigate the xenobiotic metabolism in saltwater crocodiles. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. Diel use of a saltwater creek by white-tip reef sharks Triaenodon obesus (Carcharhiniformes: Carcharhinidae) in Academy Bay, Galapagos Islands.

    Science.gov (United States)

    Peñiaherrera, César; Hearn, Alex R; Kuhn, Angela

    2012-06-01

    White-tip reef sharks are common inhabitants of the shallow waters surrounding the Galapagos Islands, where several known aggregation sites have become touristic attractions. With the aim to describe site fidelity and residency patterns of the white-tip reef sharks in a saltwater creek, we used the ultrasonic telemetry method. The study was undertaken in a saltwater channel South of Academy Bay, Santa Cruz Island, from May 2008-September 2009. A total of nine transmitters were attached to sharks and ultrasonic receivers were deployed at the inner and outside areas of the creek. From the total of fitted sharks, four lost their transmitters. The results obtained with the remaining sharks showed an elevated use of the inner area of the channel during the day, with more use of the external area during the night. However, none of the sharks were detected at the site every day, suggesting that they may have a number of preferred sites within their home range. More studies are needed to detail the home range and habitat use of this species, and to guide its protection level in the Academy Bay area.

  10. Diel use of a saltwater creek by white-tip reef sharks Triaenodon obesus (Carcharhiniformes: Carcharhinidae in Academy Bay, Galapagos Islands

    Directory of Open Access Journals (Sweden)

    César Peñaherrera

    2012-06-01

    Full Text Available White-tip reef sharks are common inhabitants of the shallow waters surrounding the Galapagos Islands, where several known aggregation sites have become touristic attractions. With the aim to describe site fidelity and residency patterns of the white-tip reef sharks in a saltwater creek, we used the ultrasonic telemetry method. The study was undertaken in a saltwater channel South of Academy Bay, Santa Cruz Island, from May 2008-September 2009. A total of nine transmitters were attached to sharks and ultrasonic receivers were deployed at the inner and outside areas of the creek. From the total of fitted sharks, four lost their transmitters. The results obtained with the remaining sharks showed an elevated use of the inner area of the channel during the day, with more use of the external area during the night. However, none of the sharks were detected at the site every day, suggesting that they may have a number of preferred sites within their home range. More studies are needed to detail the home range and habitat use of this species, and to guide its protection level in the AcademyBay area. Rev. Biol. Trop. 60 (2: 735-743. Epub 2012 June 01.

  11. An Immune-inspired Adaptive Automated Intrusion Response System Model

    Directory of Open Access Journals (Sweden)

    Ling-xi Peng

    2012-09-01

    Full Text Available An immune-inspired adaptive automated intrusion response system model, named as , is proposed. The descriptions of self, non-self, immunocyte, memory detector, mature detector and immature detector of the network transactions, and the realtime network danger evaluation equations are given. Then, the automated response polices are adaptively performed or adjusted according to the realtime network danger. Thus, not only accurately evaluates the network attacks, but also greatly reduces the response times and response costs.

  12. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    OpenAIRE

    Dhanalakshmi Krishnan Sadhasivan; Kannapiran Balasubramanian

    2017-01-01

    Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to...

  13. Mass memory formatter subsystem of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-09-01

    The Mass Memory Formatter was developed as part of the Adaptive Intrusion Data System (AIDS) to control a 2.4-megabit mass memory. The data from a Memory Controlled Processor is formatted before it is stored in the memory and reformatted during the readout mode. The data is then transmitted to a NOVA 2 minicomputer-controlled magnetic tape recorder for storage. Techniques and circuits are described

  14. Respon Konsumen pada Mobile Advergames: Intrusiveness dan Irritation

    Directory of Open Access Journals (Sweden)

    Sony Kusumasondjaja

    2016-12-01

    Full Text Available Abstract. Increasing adoption of mobile advergames to deliver marketing messages has not been followed by empirical findings to support its effectiveness. This research attempts to examine the effect of mobile advergames intrusiveness on consumer irritation, attitudes, and purchase intention. This investigation on mobile advergame effectiveness was based on the increasing use of mobile media to deliver marketing messages to consumers from different demographic background. Conceptual framework was developed based on Advertising Avoidance Theory. For data collection, self-administered survey was conducted by adopting purposive sampling involving 213 respondents residing in Surabaya who have had experience in playing mobile game as respondents. Results indicate that intrusiveness positively affects consumer irritation. Consumer irritation negatively affects attitude towards the mobile advergames and attitude towards the advertised product. The better the consumer attitude towards the mobile advergames, the more positive the attitude towards the advertised product. Moreover, the more positive the attitude towards the advertised product, the greater the consumer intention to purchase. Interestingly, consumer attitude toward the mobile advergames has insignificant influence on purchase intention. Findings of the study offer significant contribution to marketing practices using mobile advergames as media placement in their advertising strategy. Keywords: intrusiveness, irritation, mobile advergames, attitude, advertising

  15. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  16. Active Low Intrusion Hybrid Monitor for Wireless Sensor Networks.

    Science.gov (United States)

    Navia, Marlon; Campelo, Jose C; Bonastre, Alberto; Ors, Rafael; Capella, Juan V; Serrano, Juan J

    2015-09-18

    Several systems have been proposed to monitor wireless sensor networks (WSN). These systems may be active (causing a high degree of intrusion) or passive (low observability inside the nodes). This paper presents the implementation of an active hybrid (hardware and software) monitor with low intrusion. It is based on the addition to the sensor node of a monitor node (hardware part) which, through a standard interface, is able to receive the monitoring information sent by a piece of software executed in the sensor node. The intrusion on time, code, and energy caused in the sensor nodes by the monitor is evaluated as a function of data size and the interface used. Then different interfaces, commonly available in sensor nodes, are evaluated: serial transmission (USART), serial peripheral interface (SPI), and parallel. The proposed hybrid monitor provides highly detailed information, barely disturbed by the measurement tool (interference), about the behavior of the WSN that may be used to evaluate many properties such as performance, dependability, security, etc. Monitor nodes are self-powered and may be removed after the monitoring campaign to be reused in other campaigns and/or WSNs. No other hardware-independent monitoring platforms with such low interference have been found in the literature.

  17. Coplanar capacitance sensors for detecting water intrusion in composite structures

    International Nuclear Information System (INIS)

    Nassr, Amr A; El-Dakhakhni, Wael W; Ahmed, Wael H

    2008-01-01

    Composite materials are becoming more affordable and widely used for retrofitting, rehabilitating and repairing reinforced concrete structures designed and constructed under older specifications. However, the mechanical properties and long-term durability of composite materials may degrade severely in the presence of water intrusion. This study presents a new non-destructive evaluation (NDE) technique for detecting the water intrusion in composite structures by evaluating the dielectric properties of different composite system constituent materials. The variation in the dielectric signatures was employed to design a coplanar capacitance sensor with high sensitivity to detect such defects. An analytical model was used to study the effect of the sensor geometry on the output signal and to optimize sensor design. A finite element model was developed to validate analytical results and to evaluate other sensor design-related parameters. Experimental testing of a concrete specimen wrapped with composite laminate and containing a series of pre-induced water intrusion defects was conducted in order to validate the concept of the new technique. Experimental data showed excellent agreement with the finite element model predictions and confirmed sensor performance

  18. A Nuisance Alarm Data System for evaluation of intrusion detectors

    International Nuclear Information System (INIS)

    Ream, W.K.

    1990-01-01

    A Nuisance Alarm Data System (NADS) was developed to gather long-term background alarm data on exterior intrusion detectors as part of their evaluation. Since nuisance alarms play an important part in the selection of intrusion detectors for use at Department of Energy (DOE) facilities, an economical and reliable way to monitor and record these alarms was needed. NADS consists of an IBM personal computer and printer along with other commercial units to communicate with the detectors, to gather weather data, and to record video for assessment. Each alarm, its assessment, and the weather conditions occurring at alarm time are placed into a data base that is used in the evaluation of the detector. The operating software is written in Turbo Pascal for easy maintenance and modification. A portable system, based on the NADS design, has been built and shipped to other DOE locations to do on-site alarm monitoring. This has been valuable for the comparison of different detectors in the on-site environment and for testing new detectors when the appropriate conditions do not exist or cannot be simulated at the Exterior Intrusion Detection Testbed

  19. Kissing Bug ( spp. Intrusion into Homes: Troublesome Bites and Domiciliation

    Directory of Open Access Journals (Sweden)

    Stephen A. Klotz

    2016-01-01

    Full Text Available Kissing bugs ( Triatoma spp. frequently enter homes and bite human and pet occupants. Bites may lead to severe allergic reactions and, in some cases, death. Kissing bugs are also vectors of Trypanosoma cruzi , the cause of Chagas disease. In general, modern houses in the United States are not conducive to domiciliation of kissing bugs (bugs living out their entire life within the home with the presence of eggs, nymphs, adults, and exuviae. Construction features such as concrete foundations, solid walls and ceilings, window screens, tight thresholds for doors and windows, and other measures impede bug entry into homes, and air conditioning reduces the need for open doors and windows. Where Chagas disease is endemic in Mexico and Central and South America, homes often have thatch roofs, adobe walls, and open doors and windows. We investigated numerous instances of kissing bug intrusions into homes in Southern Arizona, California, and Louisiana and documented the reactions to kissing bug bites. Our work confirms the importance of modern home construction in limiting kissing bug intrusions. Older homes, especially those lacking modern screening, caulking, and weather stripping to reduce air leakage, may be subject to kissing bug intrusions and domiciliation. We describe a community in Southern Arizona where domiciliation of homes by Triatoma recurva is common. We also provide recent data regarding kissing bug bites and allergic reactions to the bites.

  20. Data mining approach to web application intrusions detection

    Science.gov (United States)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  1. Numerical Continuation Methods for Intrusive Uncertainty Quantification Studies

    Energy Technology Data Exchange (ETDEWEB)

    Safta, Cosmin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Najm, Habib N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Phipps, Eric Todd [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-09-01

    Rigorous modeling of engineering systems relies on efficient propagation of uncertainty from input parameters to model outputs. In recent years, there has been substantial development of probabilistic polynomial chaos (PC) Uncertainty Quantification (UQ) methods, enabling studies in expensive computational models. One approach, termed ”intrusive”, involving reformulation of the governing equations, has been found to have superior computational performance compared to non-intrusive sampling-based methods in relevant large-scale problems, particularly in the context of emerging architectures. However, the utility of intrusive methods has been severely limited due to detrimental numerical instabilities associated with strong nonlinear physics. Previous methods for stabilizing these constructions tend to add unacceptably high computational costs, particularly in problems with many uncertain parameters. In order to address these challenges, we propose to adapt and improve numerical continuation methods for the robust time integration of intrusive PC system dynamics. We propose adaptive methods, starting with a small uncertainty for which the model has stable behavior and gradually moving to larger uncertainty where the instabilities are rampant, in a manner that provides a suitable solution.

  2. An Automata Based Intrusion Detection Method for Internet of Things

    Directory of Open Access Journals (Sweden)

    Yulong Fu

    2017-01-01

    Full Text Available Internet of Things (IoT transforms network communication to Machine-to-Machine (M2M basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.

  3. AdaBoost-based algorithm for network intrusion detection.

    Science.gov (United States)

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  4. Abstracting massive data for lightweight intrusion detection in computer networks

    KAUST Repository

    Wang, Wei

    2016-10-15

    Anomaly intrusion detection in big data environments calls for lightweight models that are able to achieve real-time performance during detection. Abstracting audit data provides a solution to improve the efficiency of data processing in intrusion detection. Data abstraction refers to abstract or extract the most relevant information from the massive dataset. In this work, we propose three strategies of data abstraction, namely, exemplar extraction, attribute selection and attribute abstraction. We first propose an effective method called exemplar extraction to extract representative subsets from the original massive data prior to building the detection models. Two clustering algorithms, Affinity Propagation (AP) and traditional . k-means, are employed to find the exemplars from the audit data. . k-Nearest Neighbor (k-NN), Principal Component Analysis (PCA) and one-class Support Vector Machine (SVM) are used for the detection. We then employ another two strategies, attribute selection and attribute extraction, to abstract audit data for anomaly intrusion detection. Two http streams collected from a real computing environment as well as the KDD\\'99 benchmark data set are used to validate these three strategies of data abstraction. The comprehensive experimental results show that while all the three strategies improve the detection efficiency, the AP-based exemplar extraction achieves the best performance of data abstraction.

  5. Source and Enrichment of Toxic Elements in Coal Seams around Mafic Intrusions: Constraints from Pyrites in the Yuandian Coal Mine in Anhui, Eastern China

    Directory of Open Access Journals (Sweden)

    Yanfei An

    2018-04-01

    Full Text Available Pyrite, a mineral that can cause potential environmental issues in coal mining, is commonly found in coal seams around intrusions. In this paper, pyrites from the Yuandian Coal Mine (Huaibei Coalfield, Anhui, Eastern China were studied using SEM, Raman and LA-ICP-MS. The pyrite morphologic and geochemical data suggest that (1 four pyrite generations are present (framboidal sedimentary pyrites (Py I in the original coal, coarse-grained magmatic pyrites (Py II in the intruding diabase, fine-grained metamorphic pyrites (Py III in the intrusive contact aureole, and spheroid/vein hydrothermal pyrites (Py IV in the cokeite; and (2 concentrations of cobalt, nickel, arsenic, selenium, lead and copper in the metamorphic pyrites are much higher than the other pyrite generations. We propose that mafic magmatism is the main contributor of the toxic elements to the intrusion-related cokeite at Yuandian.

  6. Innovative methods to reduce salt water intrusion in harbours

    Science.gov (United States)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  7. Analyses of natural resources in 10 CFR Part 60 as related to inadvertent human intrusion

    International Nuclear Information System (INIS)

    Miklas, M.P.; Lefevre, H.E.

    1993-01-01

    The purpose of this paper is to examine the intent of the regulatory language of the portions of 10 CFR Part 60 which deal with considerations of the natural resources of a proposed geologic repository for high-level radioactive wastes as they relate to inadvertent human intrusion. Four Potentially Adverse Conditions (PAC) the requirements of 10 CFR 60.21(c)(13) are shown to be related to natural resources. Groundwater is identified as a natural resource known to be present at Yucca Mountain, Nevada. For economic considerations of natural resources, the open-quotes foreseeable futureclose quotes is thought to be no more than 50 years. Two of the topics addressed by the PACs, subsurface mining and drilling at a proposed repository site, are pre-site-characterization activities which must be evaluated in the context of repository performance criteria set by the US EPA standard, 40 CFR Part 191. An alternative US DOE compliance demonstration to another PAC, 10 CFR 60.122(c)(17), might be to use an open-quotes explorationist perspectiveclose quotes of natural resource assessment. The Commission intends for DOE to evaluate the likelihood and consequence of inadvertent human intrusion into a geologic repository as a result of exploration or exploitation of natural resources within or near a proposed high-level radioactive waste geologic repository

  8. Impacts of Changes of Indoor Air Pressure and Air Exchange Rate in Vapor Intrusion Scenarios.

    Science.gov (United States)

    Shen, Rui; Suuberg, Eric M

    2016-02-01

    There has, in recent years, been increasing interest in understanding the transport processes of relevance in vapor intrusion of volatile organic compounds (VOCs) into buildings on contaminated sites. These studies have included fate and transport modeling. Most such models have simplified the prediction of indoor air contaminant vapor concentrations by employing a steady state assumption, which often results in difficulties in reconciling these results with field measurements. This paper focuses on two major factors that may be subject to significant transients in vapor intrusion situations, including the indoor air pressure and the air exchange rate in the subject building. A three-dimensional finite element model was employed with consideration of daily and seasonal variations in these factors. From the results, the variations of indoor air pressure and air exchange rate are seen to contribute to significant variations in indoor air contaminant vapor concentrations. Depending upon the assumptions regarding the variations in these parameters, the results are only sometimes consistent with the reports of several orders of magnitude in indoor air concentration variations from field studies. The results point to the need to examine more carefully the interplay of these factors in order to quantitatively understand the variations in potential indoor air exposures.

  9. Aspects of cold intrusions over Greece during autumn

    Science.gov (United States)

    Mita, Constantina; Marinaki, Aggeliki; Zeini, Konstantina; Konstantara, Metaxia

    2010-05-01

    This study is focused on the description of atmospheric disturbances that caused intense cold intrusions over Greece during autumn for a period of 25 years (1982-2006). The study was based on data analysis from the meteorological station network of the Hellenic National Meteorological Service (HNMS) and the European Centre for Medium Range Weather Forecasts (ECMWF). Initially, the days with temperature at the isobaric surface of 850 hPa less or equal to the mean temperature for the 10-day period the day under investigation belongs to are isolated, composing a new confined data set which was further used. An event of intense cold intrusion is identified based on a subjective set of criteria, considering the temperature decrease at the level of 850 hPa and its duration. In particular, the criteria that were used to identify a cold intrusion were: temperature variation between two successive days at the isobaric level of 850 hPa being equal or greater than 50 C at least once during the event and duration of the event of at least two successive days with continuous temperature decrease. Additionally, the synoptic analysis of the atmospheric disturbances involved using weather charts from ECMWF, revealed that all cases were related to low pressure systems at the level of 500 hPa, accompanied by cold air masses. Moreover, a methodology proposed to classify the cold intrusions based on general circulation characteristics of the atmosphere, resulted in seven major categories. More than half of the events belong in two categories, originated northwest of the greater Greek area (Greece and parts of neighbouring countries), between 400 and 600 N. Further analysis indicated that the frequency of events increases from September to November and the majority of the events lasted two to three days. Additionally, the non-parametric Mann-Kendall test was used for the investigation of the statistical significance of the trends appearing in the results. The tests revealed that over

  10. Rare earth mineralisation in the Cnoc nan Cuilean intrusion of the Loch Loyal Syenite Complex, northern Scotland

    Science.gov (United States)

    Walters, A. S.; Hughes, H. S. R.; Goodenough, K. M.; Gunn, A. G.; Lacinska, A.

    2012-04-01

    Due to growing global concerns about security of rare earth element (REE) supply, there is considerable interest in identifying new deposits and in understanding the processes responsible for their formation. Ongoing studies by BGS on potential indigenous resources have focused on the Caledonian alkaline intrusive complexes of north-west Scotland. The highest values of total rare earth oxide (TREO) have been found in the Cnoc nan Cuilean intrusion of the Loch Loyal Complex in Sutherland. The Loch Loyal Syenite Complex comprises three intrusions: Ben Loyal, Beinn Stumanadh and Cnoc nan Cuilean. The Cnoc nan Cuilean intrusion, which covers an area of about 3 km2, can be subdivided into two zones: a Mixed Syenite Zone (MSZ) and a later Massive Leucosyenite Zone (MLZ). Evidence from field mapping and 3D-modelling suggests that the melasyenites were passively emplaced to form a lopolith concordant with the Moine and Lewisian country rocks. A later episode of leucosyenitic magmatism caused mixing and mingling with the melasyenite forming the MSZ. Continued intrusion of leucosyenite melts then formed the MLZ [1]. The melasyenites are enriched in TREO relative to the leucosyenites with average values of 3800 ppm and 1400 ppm respectively. The highest contents, up to 20 000 ppm TREO, are found in narrow biotite-magnetite-rich veins identified in a single stream section near the eastern margin of the intrusion. All lithologies are light rare earth element (LREE) dominated with high concentrations of Ba and Sr and low levels of Nb and Ta. Various REE-bearing minerals are present but allanite is dominant, being present in all major magmatic lithologies and the biotite-magnetite veins. Three generations of allanite have been identified: a late-magmatic phase rimming apatite; allanite micro veinlets cross-cutting the syenite; and a third phase only observed in the biotite-magnetite veins. TREO concentrations of the different allanite generations are similar, averaging 22%. The

  11. Intrusion of Magmatic Bodies Into the Continental Crust: 3-D Numerical Models

    Science.gov (United States)

    Gorczyk, Weronika; Vogt, Katharina

    2018-03-01

    Magma intrusion is a major material transfer process in the Earth's continental crust. Yet the mechanical behavior of the intruding magma and its host are a matter of debate. In this study we present a series of numerical thermomechanical simulations on magma emplacement in 3-D. Our results demonstrate the response of the continental crust to magma intrusion. We observe change in intrusion geometries between dikes, cone sheets, sills, plutons, ponds, funnels, finger-shaped and stock-like intrusions, and injection time. The rheology and temperature of the host are the main controlling factors in the transition between these different modes of intrusion. Viscous deformation in the warm and deep crust favors host rock displacement and plutons at the crust-mantle boundary forming deep-seated plutons or magma ponds in the lower to middle crust. Brittle deformation in the cool and shallow crust induces cone-shaped fractures in the host rock and enables emplacement of finger- or stock-like intrusions at shallow or intermediate depth. Here the passage of magmatic and hydrothermal fluids from the intrusion through the fracture pattern may result in the formation of ore deposits. A combination of viscous and brittle deformation forms funnel-shaped intrusions in the middle crust. Intrusion of low-density magma may more over result in T-shaped intrusions in cross section with magma sheets at the surface.

  12. Analysis and simulation of propagule dispersal and salinity intrusion from storm surge on the movement of a marsh–mangrove ecotone in South Florida

    Science.gov (United States)

    Jiang, Jiang; DeAngelis, Donald L.; Anderson, Gordon H.; Smith, Thomas J.

    2014-01-01

    Coastal mangrove–freshwater marsh ecotones of the Everglades represent transitions between marine salt-tolerant halophytic and freshwater salt-intolerant glycophytic communities. It is hypothesized here that a self-reinforcing feedback, termed a “vegetation switch,” between vegetation and soil salinity, helps maintain the sharp mangrove–marsh ecotone. A general theoretical implication of the switch mechanism is that the ecotone will be stable to small disturbances but vulnerable to rapid regime shifts from large disturbances, such as storm surges, which could cause large spatial displacements of the ecotone. We develop a simulation model to describe the vegetation switch mechanism. The model couples vegetation dynamics and hydrologic processes. The key factors in the model are the amount of salt-water intrusion into the freshwater wetland and the passive transport of mangrove (e.g., Rhizophora mangle) viviparous seeds or propagules. Results from the model simulations indicate that a regime shift from freshwater marsh to mangroves is sensitive to the duration of soil salinization through storm surge overwash and to the density of mangrove propagules or seedlings transported into the marsh. We parameterized our model with empirical hydrologic data collected from the period 2000–2010 at one mangrove–marsh ecotone location in southwestern Florida to forecast possible long-term effects of Hurricane Wilma (24 October 2005). The model indicated that the effects of that storm surge were too weak to trigger a regime shift at the sites we studied, 50 km south of the Hurricane Wilma eyewall, but simulations with more severe artificial disturbances were capable of causing substantial regime shifts.

  13. Animal intrusion status report for fiscal year 1990

    International Nuclear Information System (INIS)

    Landeen, D.S.

    1991-03-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion work conducted by Westinghouse Hanford Company in fiscal year 1990 regarding small mammals and water infiltration. An animal intrusion lysimeter facility was constructed and installed in fiscal year 1988. The facility consists of two outer boxes buried at grade that serve as receptacles for six animal intrusion lysimeters. Small burrowing mammals common to the Hanford Site environs are introduced over a 3- to 4-month period. Supplemental precipitation is added to three of the lysimeters with a rainulator at a rate equivalent to a 100-year storm. Soil moisture samples are taken before and after each test, and soil moisture measurements are also taken with a hydroprobe during the test period. During fiscal year 1990, tests three and four were completed and test five was initiated. Results of test three (summer treatment), which used Townsend ground squirrels and pocket gophers, indicated that the additional 1.5 inches of precipitation that was added with the rainulator was lost during this test. The plots that did not receive any additional precipitation all lost water (5 to 6 percent). Results from test four (winter treatment), which used pocket gophers and pocket mice, indicated that all of the lysimeters except one gained water. The two control lysimeters (rainulator plots and nonrainulator lysimeters with no animals) gained more water than their corresponding animal burrow lysimeters. 4 refs., 9 figs., 3 tabs

  14. Evolution of the bentonite barrier under glacial meltwater intrusion conditions

    Energy Technology Data Exchange (ETDEWEB)

    Schaefer, T.; Bouby, M. [Karlsruhe Institute of Technology (KIT), Eggenstein-Leopoldshafen (Germany). Inst. for Nuclear Waste Disposal (INE); Blechschmidt, I. [NAGRA National Cooperation Disposal Radioactive Waste, Wettingen (Switzerland); and others

    2015-07-01

    Recent safety assessments for repository concepts that combine a clay engineered barrier system (EBS) with a fractured rock have shown that melt water intrusion may have a direct impact on the EBS barrier function in two aspects: - Generation of colloids may degrade the engineered barrier - Colloid transport of radionuclides may reduce the efficiency of the natural barrier The studies presented here are performed in the framework of the Federal Ministry of Economic Affairs and Energy (BMWi) KIT/GRS project KOLLORADO-e, the EU collaborative project CP BELBaR (www.skb.se/belbar) and especially within the Colloid Formation and Migration (CFM) project at the Grimsel Test Site, GTS (www.grimsel.com). Key research areas are (a) the erosion of the bentonite buffer, (b) clay colloid stability and (c) colloid-radionuclide- host rock surface interactions. Concerning bentonite buffer integrity parameters like the bentonite type, Na-/Ca-exchangeable cation ratio, compaction density, role of accessory minerals, the fracture aperture size and groundwater chemistry and flow velocity are investigated in order to identify controlling factors, understand the main mechanisms of erosion from the bentonite surface and to quantify the extent of the possible erosion under these different conditions. Clay colloid stability studies are performed under different geochemical conditions. The main objective is to answer the question if colloids formed at the near/far field interface would be stable only if favourable conditions exist and therefore their relevance for radionuclide transport will be strongly dependent on the local geochemical conditions (inorganic cations Na{sup +}, Ca{sup 2+}, Mg{sup 2+}, Al{sup 3+} and organic complexing agents). Finally, the interaction between colloids and radionuclides and the host rock is intensively investigated in order to answer the question, how colloid mobility may be affected by the composition of the host rock, surface roughness and the mechanism of

  15. A Proposal for Non-Intrusive Namespaces in OCaml

    OpenAIRE

    Couderc , Pierrick; Canou , Benjamin; Chambart , Pierre; Le Fessant , Fabrice

    2014-01-01

    International audience; We present a work-in-progress about adding namespaces to OCaml. Inspired by other lan-guages such as Scala or C++, our aim is to de-sign and formalize a simple and non-intrusive namespace mechanism without complexifying the core language. Namespaces in our ap-proach are a simple way to define libraries while avoiding name clashes. They are also meant to simplify the build process, clarify-ing and reducing (to zero whenever possible) the responsibility of external tools.

  16. The role of extrusions and intrusions in fatigue crack initiation

    Czech Academy of Sciences Publication Activity Database

    Polák, Jaroslav; Mazánová, Veronika; Heczko, Milan; Petráš, Roman; Kuběna, Ivo; Casalena, L.; Man, Jiří

    2017-01-01

    Roč. 185, NOV (2017), s. 46-60 ISSN 0013-7944 R&D Projects: GA MŠk(CZ) LQ1601; GA MŠk LM2015069; GA ČR(CZ) GA13-23652S; GA ČR GA15-08826S Institutional support: RVO:68081723 Keywords : Extrusion * Fatigue crack initiation * Intrusion * Persistent slip marking * Stainless steel Subject RIV: JL - Materials Fatigue, Friction Mechanics OBOR OECD: Audio engineering, reliability analysis Impact factor: 2.151, year: 2016

  17. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  18. Neuroscientific Prediction and the Intrusion of Intuitive Metaphysics.

    Science.gov (United States)

    Rose, David; Buckwalter, Wesley; Nichols, Shaun

    2017-03-01

    How might advanced neuroscience-in which perfect neuro-predictions are possible-interact with ordinary judgments of free will? We propose that peoples' intuitive ideas about indeterminist free will are both imported into and intrude into their representation of neuroscientific scenarios and present six experiments demonstrating intrusion and importing effects in the context of scenarios depicting perfect neuro-prediction. In light of our findings, we suggest that the intuitive commitment to indeterminist free will may be resilient in the face of scientific evidence against such free will. Copyright © 2015 Cognitive Science Society, Inc.

  19. Non-intrusive load characterization of an airfoil using PIV

    Energy Technology Data Exchange (ETDEWEB)

    Oudheusden, B.W. van; Scarano, F.; Casimiri, E.W.F. [Dept. of Aerospace Engineering, Delft Univ. of Tech., Delft (Netherlands)

    2006-06-15

    An assessment is made of the feasibility of using PIV velocity data for the non-intrusive aerodynamic force characterization (lift, drag and pitching moment) of an airfoil. The method relies upon the application of control-volume approaches in combination with the deduction of the pressure from the PIV experimental data, by making use of the momentum equation. First, the consistency of the method is verified by means of synthetic data obtained from CFD. Subsequently, the procedure was applied in an experimental investigation, in which the PIV approach is validated against standard pressure-based methods (surface pressure distribution and wake rake). (orig.)

  20. Environnements de tests d’intrusion pour mobiles et tablettes

    OpenAIRE

    Vianin, Jérémie; Bocchi, Yann

    2017-01-01

    L’objectif de ce travail est de réaliser une recherche des possibilités actuelles de tests d’intrusion mobiles. Après avoir recherché les technologies existantes, nous les analysons et les comparons afin de proposer un outil complet. Dans ce travail, nous analysons les possibilités de pentesting mobile avec l’aide d’une tablette de la marque Nexus et un smartphone de la gamme One d’HTC. Nous voyons le pentest mobile sous trois grands angles : OS, package et application.

  1. DUNDRUM Restriction-Intrusion of Liberty Ladders (DRILL) Audit Toolkit

    LENUS (Irish Health Repository)

    Kennedy, Harry G

    2011-09-01

    This series of rating \\'ladders\\' is intended to allow a quantitative and qualitative analysis of the use of restrictive and intrusive interventions as part of the therapeutic management of violence and aggression in psychiatric hospital settings. This is an evolving handbook. The ladders are currently organised to facilitate a behavioural analysis. Context, antecedents, behaviour, interventions, consequences are conceptualised as a series of events organised in temporal sequence so that causes, interactions and effects can be considered. The complexity of analysis possible is limited by the statistical power of the numbers of cases and events available. \\r\

  2. The assessment of human intrusion into underground repositories for radioactive waste Volume 1: Main report

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Asthon, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  3. The assessment of human intrusion into underground repositories for radioactive waste Volume 2: Appendices

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Ashton, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  4. Non-Intrusive Intelligibility Prediction Using a Codebook-Based Approach

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Kavalekalam, Mathew Shaji; Xenaki, Angeliki

    2017-01-01

    It could be beneficial for users of hearing aids if these were able to automatically adjust the processing according to the speech intelligibility in the specific acoustic environment. Most speech intelligibility metrics are intrusive, i.e., they require a clean reference signal, which is rarely...... a high correlation between the proposed non-intrusive codebookbased STOI (NIC-STOI) and the intrusive STOI indicating that NIC-STOI is a suitable metric for automatic classification of speech signals...

  5. Springtime high surface ozone events over the western United States: Quantifying the role of stratospheric intrusions

    Science.gov (United States)

    Fiore, A. M.; Lin, M.; Cooper, O. R.; Horowitz, L. W.; Naik, V.; Levy, H.; Langford, A. O.; Johnson, B. J.; Oltmans, S. J.; Senff, C. J.

    2011-12-01

    As the National Ambient Air Quality (NAAQS) standard for ozone (O_{3}) is lowered, it pushes closer to policy-relevant background levels (O_{3} concentrations that would exist in the absence of North American anthropogenic emissions), making attainment more difficult with local controls. We quantify the Asian and stratospheric components of this North American background, with a primary focus on the western United States. Prior work has identified this region as a hotspot for deep stratospheric intrusions in spring. We conduct global simulations at 200 km and 50 km horizontal resolution with the GFDL AM3 model, including a stratospheric O_{3} tracer and two sensitivity simulations with anthropogenic emissions from Asia and North America turned off. The model is evaluated with a suite of in situ and satellite measurements during the NOAA CalNex campaign (May-June 2010). The model reproduces the principle features in the observed surface to near tropopause distribution of O_{3} along the California coast, including its latitudinal variation and the development of regional high-O_{3} episodes. Four deep tropopause folds are diagnosed and we find that the remnants of these stratospheric intrusions are transported to the surface of Southern California and Western U.S. Rocky Mountains, contributing 10-30 ppbv positive anomalies relative to the simulated campaign mean stratospheric component in the model surface layer. We further examine the contribution of North American background, including its stratospheric and Asian components, to the entire distribution of observed MDA8 O_{3} at 12 high-elevation CASTNet sites in the Mountain West. We find that the stratospheric O_{3} tracer constitutes 50% of the North American background, and can enhance surface maximum daily 8-hour average (MDA8) O_{3} by 20 ppb when observed surface O_{3} is in the range of 60-80 ppbv. Our analysis highlights the potential for natural sources such as deep stratospheric intrusions to contribute

  6. Early Permian intrusions in the Paleozoic sediments of the Eastern North Sea area

    DEFF Research Database (Denmark)

    Clausen, O.R.; Andresen, Katrine Juul; Rasmussen, Jens Andreas

    in the Northern Permian Basin which in the eastern North Sea is separated from the Southern Permian Basin by the Ringkøbing-Fyn High. The Permian basins were initiated during thermal subsidence following a late Carboniferous- early Permian rifting phase associated with extensive igneous activity recorded across...... the entire North Sea Basin. The easternmost intrusions and extrusions have been associated to the “Skagerrak-Centered Large Igneous Province” that has an early Permian age of c. 297 Ma. Compared to the Southern Permian Basin which historically has been intensely investigated because of the known presence...... of hydrocarbons within the Paleozoic sediments, the Northern Permian Basin has gained much less interest outside the hydrocarbon producing Mesozoic graben systems. This is mainly due to an apparent lack of potential source rocks. A major E-W striking northward dipping fault system characterizes the study area...

  7. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  8. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  9. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  10. The role of human intrusion in the dutch safety study

    International Nuclear Information System (INIS)

    Prij, J.; Weers, A.W.v.; Glasbergen, P.; Slot, A.F.M.

    1989-01-01

    In the Netherlands the OPLA research program in which a large number of possible disposal concepts for radioactive waste is investigated has been carried out recently. The disposal concepts concern three different waste strategies, two disposal techiques and three different types of salt formations. In the OPLA program the post-closure safety of the disposal concepts has been investigated. The paper reviews the role of the human intrusion in this safety study. The hydrological consequences of human activities in the underground are discussed and it has been demonstrated that these effects could be taken into account during the groundwater transport calculations. Four different scenario's for human intrusion in the repository have been studied to obtain an indication of the radiological effects. The results show that extremely high doses may result if, after several hundred years, human beings come into direct contact with highly active waste. For the final assessment the probability that the doses will be received should be calculated. This should be done in a subsequent research

  11. assessment of Seawater Intrusion in Concrete by Measuring Chlorine Concentration

    International Nuclear Information System (INIS)

    Abdel-Monem, A.M.; Kansouh, W.A.; Osman, A.M.; Bashter, I.I.

    2011-01-01

    The object of this work is to measure water intrusion in concrete using a new methodology based on neutron activation technique. The applied method depends on measuring the activated gamma energy lines emitted from 38 Cl using a gamma spectrometer with Ge(Li) and HPGe detectors. Concrete samples with different percentages of silica fume (SF), up to 20 % submerged in seawater for different period of time were used to perform the investigation. Samples of concrete taken from different positions along the direction of water intrusion in concrete block were irradiated by thermal neutrons using the irradiation cell of 252 Cf neutron source and one of the vertical channels of search reactor at Delft University. The measured 38 Cl concentrations of the irradiated samples were used to plot groups of water profiles distribution in concrete samples with different SF % and submerged in seawater for different periods. These profiles were compared with the others which use here measured by neutron back emitted method where a satisfactory agreement was observed between the two. Further, the displayed measured results; show that the diffusivity for all water contents decreases with increasing the silica fume percentage up to 15 %. However, for concrete samples with silica fume 20 % the observed phenomenon is reversed due to the deterioration of concrete physical and mechanical properties

  12. Effective approach toward Intrusion Detection System using data mining techniques

    Directory of Open Access Journals (Sweden)

    G.V. Nadiammai

    2014-03-01

    Full Text Available With the tremendous growth of the usage of computers over network and development in application running on various platform captures the attention toward network security. This paradigm exploits security vulnerabilities on all computer systems that are technically difficult and expensive to solve. Hence intrusion is used as a key to compromise the integrity, availability and confidentiality of a computer resource. The Intrusion Detection System (IDS plays a vital role in detecting anomalies and attacks in the network. In this work, data mining concept is integrated with an IDS to identify the relevant, hidden data of interest for the user effectively and with less execution time. Four issues such as Classification of Data, High Level of Human Interaction, Lack of Labeled Data, and Effectiveness of Distributed Denial of Service Attack are being solved using the proposed algorithms like EDADT algorithm, Hybrid IDS model, Semi-Supervised Approach and Varying HOPERAA Algorithm respectively. Our proposed algorithm has been tested using KDD Cup dataset. All the proposed algorithm shows better accuracy and reduced false alarm rate when compared with existing algorithms.

  13. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D. L.; Michlich, B. J.

    2000-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute nuclear technology and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested

  14. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D.L.; Micklich, B.J.

    2001-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute 'nuclear technology' and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested. (author)

  15. Hybrid feature selection for supporting lightweight intrusion detection systems

    Science.gov (United States)

    Song, Jianglong; Zhao, Wentao; Liu, Qiang; Wang, Xin

    2017-08-01

    Redundant and irrelevant features not only cause high resource consumption but also degrade the performance of Intrusion Detection Systems (IDS), especially when coping with big data. These features slow down the process of training and testing in network traffic classification. Therefore, a hybrid feature selection approach in combination with wrapper and filter selection is designed in this paper to build a lightweight intrusion detection system. Two main phases are involved in this method. The first phase conducts a preliminary search for an optimal subset of features, in which the chi-square feature selection is utilized. The selected set of features from the previous phase is further refined in the second phase in a wrapper manner, in which the Random Forest(RF) is used to guide the selection process and retain an optimized set of features. After that, we build an RF-based detection model and make a fair comparison with other approaches. The experimental results on NSL-KDD datasets show that our approach results are in higher detection accuracy as well as faster training and testing processes.

  16. Nuclear-power-plant perimeter-intrusion alarm systems

    International Nuclear Information System (INIS)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981

  17. Ameliorating intrusive memories of distressing experiences using computerized reappraisal training.

    Science.gov (United States)

    Woud, Marcella L; Holmes, Emily A; Postma, Peggy; Dalgleish, Tim; Mackintosh, Bundy

    2012-08-01

    The types of appraisals that follow traumatic experiences have been linked to the emergence of posttraumatic stress disorder (PTSD). Could changing reappraisals following a stressful event reduce the emergence of PTSD symptoms? The present proof-of-principle study examined whether a nonexplicit, systematic computerized training in reappraisal style following a stressful event (a highly distressing film) could reduce intrusive memories of the film, and symptoms associated with posttraumatic distress over the subsequent week. Participants were trained to adopt a generally positive or negative poststressor appraisal style using a series of scripted vignettes after having been exposed to highly distressing film clips. The training targeted self-efficacy beliefs and reappraisals of secondary emotions (emotions in response to the emotional reactions elicited by the film). Successful appraisal induction was verified using novel vignettes and via change scores on the post traumatic cognitions inventory. Compared with those trained negatively, those trained positively reported in a diary fewer intrusive memories of the film during the subsequent week, and lower scores on the Impact of Event Scale (a widely used measure of posttraumatic stress symptoms). Results support the use of computerized, nonexplicit, reappraisal training after a stressful event has occurred and provide a platform for future translational studies with clinical populations that have experienced significant real-world stress or trauma.

  18. Marshes on the Move: Testing effects of seawater intrusion on ...

    Science.gov (United States)

    The Northeastern United States is a hotspot for sea level rise (SLR), subjecting coastal salt marshes to erosive loss, shifts in vegetation communities, and altered biogeochemistry due to seawater intrusion. Salt marsh plant community zonation is driven by tradeoffs in stress tolerance and interspecific interactions. As seawater inundates progressively higher marsh elevations, shifts in marsh vegetation communities landward may herald salt marsh “migration”, which could allow continuity of marsh function and ecosystem service provision. To elucidate possible effects of seawater intrusion on marsh-upland edge plant communities, a space-for-time approach was replicated at two Rhode Island salt marshes. At each site, peat blocks (0.5 m x 0.5 m x 0.5 m, n=6) with intact upland-marsh edge vegetation were transplanted downslope into the regularly-inundated mid-marsh. Procedural controls (n=3) were established at each elevation by removing and replacing peat blocks, and natural controls (n=3) consisted of undisturbed plots. During peak productivity, each plot was assessed for species composition, percent cover and average height. Results demonstrate stunting of marsh-upland edge vegetation in response to increased inundation, and the beginnings of colonization of the transplanted plots by salt marsh species. The extent of colonization differed between the two sites, suggesting that site-specific factors govern vegetation responses to increased inundation.

  19. Oxygen intrusion into anoxic fjords leads to increased methylmercury availability

    Science.gov (United States)

    Veiteberg Braaten, Hans Fredrik; Pakhomova, Svetlana; Yakushev, Evgeniy

    2013-04-01

    Mercury (Hg) appears in the oxic surface waters of the oceans at low levels (sub ng/L). Because inorganic Hg can be methylated into the toxic and bioaccumulative specie methylmercury (MeHg) levels can be high at the top of the marine food chain. Even though marine sea food is considered the main risk driver for MeHg exposure to people most research up to date has focused on Hg methylation processes in freshwater systems. This study identifies the mechanisms driving formation of MeHg during oxygen depletion in fjords, and shows how MeHg is made available in the surface water during oxygen intrusion. Studies of the biogeochemical structure in the water column of the Norwegian fjord Hunnbunn were performed in 2009, 2011 and 2012. In autumn of 2011 mixing flushing events were observed and lead to both positive and negative effects on the ecosystem state in the fjord. The oxygenated water intrusions lead to a decrease of the deep layer concentrations of hydrogen sulfide (H2S), ammonia and phosphate. On the other hand the intrusion also raised the H2S boundary from 8 m to a shallower depth of just 4 m. Following the intrusion was also observed an increase at shallower depths of nutrients combined with a decrease of pH. Before flushing events were observed concentrations of total Hg (TotHg) increased from 1.3 - 1.7 ng/L in the surface layer of the fjord to concentrations ranging from 5.2 ng/L to 6.4 ng/L in the anoxic zone. MeHg increased regularly from 0.04 ng/L in the surface water to a maximum concentration of 5.2 ng/L in the deeper layers. This corresponds to an amount of TotHg present as MeHg ranging from 2.1 % to 99 %. The higher concentrations of MeHg in the deeper layer corresponds to an area where no oxygen is present and concentrations of H2S exceeds 500 µM, suggesting a production of MeHg in the anoxic area as a result of sulphate reducing bacteria activity. After flushing the concentrations of TotHg showed a similar pattern ranging from 0.6 ng/L in the

  20. Magmatic Diversity of the Wehrlitic Intrusions in the Oceanic Lower Crust of the Northern Oman Ophiolite

    Science.gov (United States)

    Kaneko, R.; Adachi, Y.; Miyashita, S.

    2014-12-01

    The Oman ophiolite extends along the east coast of Oman, and is the world's largest and best-preserved slice of obducted oceanic lithosphere. The magmatic history of this ophiolite is complex and is generally regarded as having occurred in three stages (MOR magmatism, subduction magmatism and intraplate magmatism). Wehrlitic intrusions constitute an important element of oceanic lower crust of the ophiolite, and numerous intrusions cut gabbro units in the northern Salahi block of this ophiolite. In this study area, we identified two different types of wehrlitic intrusions. One type of the intrusions mainly consists of dunite, plagioclase (Pl) wehrlite and mela-olivine (Ol) gabbro, in which the crystallization sequence is Ol followed by the contemporaneous crystallization of Pl and clinopyroxene (Cpx). This type is called "ordinary" wehrlitic intrusions and has similar mineral compositions to host gabbros (Adachi and Miyashita 2003; Kaneko et al. 2014). Another type of the intrusions is a single intrusion that crops out in an area 250 m × 150 m along Wadi Salahi. This intrusion consists of Pl-free "true" wehrlite, in which the crystallization sequence is Ol and then Cpx. The forsterite contents (Fo%) of Ol from the "ordinary" wehrlitic intrusions and "true" wehrlitic intrusions have ranges of 90.8-87.0 (NiO = 0.36-0.13 wt%) and 84.7 (NiO = 0.31 wt%), respectively. Cr numbers (Cr#) of Cr-spinel from the "true" wehrlitic intrusions show higher Cr# value of 0.85 than those of the "ordinary" wehrlitic intrusions (0.48-0.64). But the former is characterized by very high Fe3+ values (YFe3+ = 0.49-0.68). Kaneko et al. (2014) showed that the "ordinary" ubiquitous type has similar features to MOR magmatism and the depleted type in the Fizh block (Adachi and Miyashita 2003) links to subduction magmatism. These types are distinguished by their mineral chemistries (TiO2 and Na2O contents of Cpx). The TiO2 and Na2O contents of Cpx from the "true" wehrlitic intrusions have 0

  1. Saharan dust intrusions in Spain: Health impacts and associated synoptic conditions.

    Science.gov (United States)

    Díaz, Julio; Linares, Cristina; Carmona, Rocío; Russo, Ana; Ortiz, Cristina; Salvador, Pedro; Trigo, Ricardo Machado

    2017-07-01

    A lot of papers have been published about the impact on mortality of Sahara dust intrusions in individual cities. However, there is a lack of studies that analyse the impact on a country and scarcer if in addition the analysis takes into account the meteorological conditions that favour these intrusions. The main aim is to examine the effect of Saharan dust intrusions on daily mortality in different Spanish regions and to characterize the large-scale atmospheric circulation anomalies associated with such dust intrusions. For determination of days with Saharan dust intrusions, we used information supplied by the Ministry of Agriculture, Food & Environment, it divides Spain into 9 main areas. In each of these regions, a representative province was selected. A time series analysis has been performed to analyse the relationship between daily mortality and PM 10 levels in the period from 01.01.04 to 31.12.09, using Poisson regression and stratifying the analysis by the presence or absence of Saharan dust advections. The proportion of days on which there are Saharan dust intrusions rises to 30% of days. The synoptic pattern is characterised by an anticyclonic ridge extending from northern Africa to the Iberian Peninsula. Particulate matter (PM) on days with intrusions are associated with daily mortality, something that does not occur on days without intrusions, indicating that Saharan dust may be a risk factor for daily mortality. In other cases, what Saharan dust intrusions do is to change the PM-related mortality behaviour pattern, going from PM 2.5 . A study such as the one conducted here, in which meteorological analysis of synoptic situations which favour Saharan dust intrusions, is combined with the effect on health at a city level, would seem to be crucial when it comes to analysing the differentiated mortality pattern in situations of Saharan dust intrusions. Copyright © 2017 Elsevier Inc. All rights reserved.

  2. Linking precious metal enrichment and halogen cycling in mafic magmatic systems: insights from the Rum layered intrusion, NW Scotland

    Science.gov (United States)

    Kelly, A. P.; O'Driscoll, B.; Clay, P. L.; Burgess, R.

    2017-12-01

    to the local involvement of an organic-rich sedimentary assimilant and potentially represents an important trigger for PGE-mineralisation. Similarly high I/Cl signatures in some of the late-stage pegmatites suggest that fluids with this distinctive composition circulated the cooling Rum intrusion for a protracted period of time.

  3. Source characteristics and tectonic setting of mafic-ultramafic intrusions in North Xinjiang, NW China: Insights from the petrology and geochemistry of the Lubei mafic-ultramafic intrusion

    Science.gov (United States)

    Chen, Bao-Yun; Yu, Jin-Jie; Liu, Shuai-Jie

    2018-05-01

    The newly discovered Lubei sulfide-bearing mafic-ultramafic intrusion forms the western extension of the Huangshan-Jin'erquan mafic-ultramafic intrusion belt in East Tianshan, NW China. The Lubei intrusion comprises hornblende peridotite, lherzolite, and harzburgite in its southern portion, gabbro in its middle portion, and hornblende gabbro in its northern portion. Intrusive relationships indicate that three magma pulses were involved in the formation of the intrusion, and that they were likely evolved from a common primitive magma. Estimated compositions of the Lubei primitive magma are similar to those of island arc calc-alkaline basalt except for the low Na2O and CaO contents of the Lubei primitive magma. This paper reports on the mineral compositions, whole-rock major and trace element contents, and Rb-Sr and Sm-Nd isotopic compositions of the Lubei intrusion, and a zircon LA-MC-ICP-MS U-Pb age for hornblende gabbro. The Lubei intrusion is characterized by enrichment in large-ion lithophile elements, depletion in high-field-strength elements, and marked negative Nb and Ta anomalies, with enrichment in chondrite-normalized light rare earth elements. It exhibits low (87Sr/86Sr)i ratios of 0.70333-0.70636 and low (143Nd/144Nd)i ratios of 0.51214-0.51260, with positive εNd values of +4.01 to +6.33. LA-ICP-MS U-Pb zircon ages yielded a weighted-mean age of 287.9 ± 1.6 Ma for the Lubei intrusion. Contemporaneous mafic-ultramafic intrusions in different tectonic domains in North Xinjiang show similar geological and geochemical signatures to the Lubei intrusion, suggesting a source region of metasomatized mantle previously modified by hydrous fluids from the slab subducted beneath the North Xinjiang region in the early Permian. Metasomatism of the mantle was dominated by hydrous fluids and was related to subduction of the Paleo-Asian oceanic lithosphere during the Paleozoic. Sr-Nd-Pb isotopic compositions suggest that the mantle source was a mixture of depleted mid

  4. 3D modeling of a dolerite intrusion from the photogrammetric and geophysical data integration.

    Science.gov (United States)

    Duarte, João; Machadinho, Ana; Figueiredo, Fernando; Mira, Maria

    2015-04-01

    The aims of this study is create a methodology based on the integration of data obtained from various available technologies, which allow a credible and complete evaluation of rock masses. In this particular case of a dolerite intrusion, which deployed an exploration of aggregates and belongs to the Jobasaltos - Extracção e Britagem. S.A.. Dolerite intrusion is situated in the volcanic complex of Serra de Todo-o-Mundo, Casais Gaiola, intruded in Jurassic sandstones. The integration of the surface and subsurface mapping, obtained by technology UAVs (Drone) and geophysical surveys (Electromagnetic Method - TEM 48 FAST), allows the construction of 2D and 3D models of the study local. The combination of the 3D point clouds produced from two distinct processes, modeling of photogrammetric and geophysical data, will be the basis for the construction of a single model of set. The rock masses in an integral perspective being visible their development above the surface and subsurface. The presentation of 2D and 3D models will give a perspective of structures, fracturation, lithology and their spatial correlations contributing to a better local knowledge, as well as its potential for the intended purpose. From these local models it will be possible to characterize and quantify the geological structures. These models will have its importance as a tool to assist in the analysis and drafting of regional models. The qualitative improvement in geological/structural modeling, seeks to reduce the value of characterization/cost ratio, in phase of prospecting, improving the investment/benefit ratio. This methodology helps to assess more accurately the economic viability of the projects.

  5. Longitudinal Relations of Intrusive Parenting and Effortful Control to Ego-Resiliency during Early Childhood

    Science.gov (United States)

    Taylor, Zoe E.; Eisenberg, Nancy; Spinrad, Tracy L.; Widaman, Keith F.

    2013-01-01

    Longitudinal relations among ego-resiliency (ER), effortful control (EC), and observed intrusive parenting were examined at 18, 30, and 42 months of age ("Ns" = 256, 230, and 210) using structural equation modeling. Intrusive parenting at 18 and 30 months negatively predicted EC a year later, over and above earlier levels. EC at…

  6. Appraisal and control of sexual and non-sexual intrusive thoughts in university students.

    Science.gov (United States)

    Clark, D A; Purdon, C; Byers, E S

    2000-05-01

    This study examined differences in the appraisal and thought control strategies associated with the perceived control of unwanted sexual and non-sexual intrusive thoughts. Eleven appraisal dimensions, subjective physiological arousal and 10 thought control strategies were measured in 171 university students who were administered the Revised Obsessive Intrusions Inventory-Sex Version, a self-report measure of unwanted intrusive thoughts. Thought-action fusion (TAF) likelihood was a significant unique predictor of the perceived controllability of respondents' most upsetting sexual and non-sexual intrusive thought. Moreover greater subjective physiological arousal was a significant predictor of reduced control over sexual intrusions, whereas worry that one might act on an intrusive thought and greater effort to control the intrusion were significant unique predictors of the control of non-sexual intrusive thoughts. Various thought control strategies were more often used in response to non-sexual than sexual cognitions. The results are discussed in terms of the differential role of various appraisal processes in the control of unwanted sexual and non-sexual thoughts.

  7. Pukala intrusion, its age and connection to hydrothermal alteration in Orivesi, southwestern Finland

    Directory of Open Access Journals (Sweden)

    Matti Talikka

    2005-01-01

    Full Text Available The Pukala intrusion is situated in the Paleoproterozoic Svecofennian domain of the Fennoscandian Shield in the contact region between the Central Finland Granitoid Complex and the Tampere Belt. The acid subvolcanic intrusion, which is in contact or close to severalaltered domains, mainly consists of porphyritic granodiorite and trondhjemite. The Pukala intrusion was emplaced into volcanic sequence in an island-arc or fore-arc setting before or during the early stages of the main regional deformation phase of the Svecofennian orogeny. On the basis of the geochemical data, the Pukala intrusion is a peraluminous volcanic-arc granitoid. After crystallisation at 1896±3 Ma, multiphase deformation and metamorphismcaused alteration, recrystallisation, and orientation of the minerals, and tilted the intrusion steeply towards south. The 1851±5 Ma U-Pb age for titanite is connected to the late stages of the Svecofennian tectonometamorphic evolution of the region. Several hydrothermally altered domains are located in the felsic and intermediate metavolcanic rocks of the Tampere Belt within less than one kilometre south of the Pukala intrusion. Alteration is divided into three basic types: partial silica alteration, chlorite-sericite±silica alteration, and sericite alteration in shear zones. The first two types probably formed during the emplacement and crystallisation of the Pukala intrusion, and the third is linked to late shearing. Intense sericitisation and comb quartz bands in the contact of theintrusion and the altered domain at Kutemajärvi suggest that the hydrothermal system was driven by the Pukala intrusion.

  8. Context-aware local Intrusion Detection in SCADA systems : a testbed and two showcases

    NARCIS (Netherlands)

    Chromik, Justyna Joanna; Haverkort, Boudewijn R.H.M.; Remke, Anne Katharina Ingrid; Pilch, Carina; Brackmann, Pascal; Duhme, Christof; Everinghoff, Franziska; Giberlein, Artur; Teodorowicz, Thomas; Wieland, Julian

    2017-01-01

    This paper illustrates the use of a testbed that we have developed for context-aware local intrusion detection. This testbed is based on the co-simulation framework Mosaik and allows for the validation of local intrusion detection mechanisms at field stations in power distribution networks. For two

  9. Individual differences in experiencing intrusive memories : The role of the ability to resist proactive interference

    NARCIS (Netherlands)

    Verwoerd, Johan; Wessel, Ineke; de Jong, Peter J.

    This study explored whether a relatively poor ability to resist or inhibit interference from irrelevant information in working memory is associated with experiencing undesirable intrusive memories. Non-selected participants (N = 91) completed a self-report measure of intrusive memories, and carried

  10. Intensively exploited Mediterranean aquifers: resilience and proximity to critical points of seawater intrusion

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2013-11-01

    We investigate here seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta Aquifer, the Israel Coastal Aquifer and the Cyprus Akrotiri Aquifer. Using a generalized analytical sharp-interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future sea intrusion forcings. We identify two different critical limits of sea intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete sea intrusion upto the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that sea intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that the advance of seawater currently seriously threatens the Nile Delta Aquifer and the Israel Coastal Aquifer. The Cyprus Akrotiri Aquifer is currently somewhat less threatened by increased seawater intrusion.

  11. Intensively exploited Mediterranean aquifers: resilience to seawater intrusion and proximity to critical thresholds

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2014-05-01

    We investigate seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta, Israel Coastal and Cyprus Akrotiri aquifers. Using a generalized analytical sharp interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future seawater intrusion forcings. We identify two different critical limits of seawater intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete seawater intrusion up to the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that seawater intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that (a) the intruding seawater currently seriously threatens the Nile Delta aquifer, (b) in the Israel Coastal aquifer the sharp interface toe approaches the well location and (c) the Cyprus Akrotiri aquifer is currently somewhat less threatened by increased seawater intrusion.

  12. A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing

    DEFF Research Database (Denmark)

    Wang, Yu; Xie, Lin; Li, Wenjuan

    2017-01-01

    Nowadays, cyber threats (e.g., intrusions) are distributed across various networks with the dispersed networking resources. Intrusion detection systems (IDSs) have already become an essential solution to defend against a large amount of attacks. With the development of cloud computing, a modern IDS...

  13. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection.

    Science.gov (United States)

    Hu, Weiming; Gao, Jun; Wang, Yanguo; Wu, Ou; Maybank, Stephen

    2014-01-01

    Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.

  14. Evaluation of of μ-controller PIR Intrusion Detector | Eludire | West ...

    African Journals Online (AJOL)

    When there is intrusion, a piezo speaker beeps and also a visual indicator with light emitting diode blinks to indicate intrusion. For security, cost effectiveness and access control to certain areas of homes, offices and industries this system is a better replacement to human surveillance needed around our valuable goods and ...

  15. Evidence of a sewer vapor transport pathway at the USEPA vapor intrusion research duplex

    Science.gov (United States)

    The role of sewer lines as preferential pathways for vapor intrusion is poorly understood. Although the importance of sewer lines for volatile organic compound (VOC) transport has been documented at a small number of sites with vapor intrusion, sewer lines are not routinely sampl...

  16. A study on the intrusion model by physical modeling

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jung Yul; Kim, Yoo Sung; Hyun, Hye Ja [Korea Inst. of Geology Mining and Materials, Taejon (Korea, Republic of)

    1995-12-01

    In physical modeling, the actual phenomena of seismic wave propagation are directly measured like field survey and furthermore the structure and physical properties of subsurface can be known. So the measured datasets from physical modeling can be very desirable as input data to test the efficiency of various inversion algorithms. An underground structure formed by intrusion, which can be often seen in seismic section for oil exploration, is investigated by physical modeling. The model is characterized by various types of layer boundaries with steep dip angle. Therefore, this physical modeling data are very available not only to interpret seismic sections for oil exploration as a case history, but also to develop data processing techniques and estimate the capability of software such as migration, full waveform inversion. (author). 5 refs., 18 figs.

  17. Advanced inspection technology for non intrusive inspection (NII) program

    International Nuclear Information System (INIS)

    Zamir Mohamed Daud

    2003-01-01

    In the current economic environment, plants and facilities are under pressure to introduced cost saving as well as profit maximising measures. Among the many changes in the way things are run is a move towards Risk Based Inspection (RBI), with an emphasis on longer operating periods between shutdowns as well as to utilise components to their maximum capability. Underpinning and RBI program requires good data from an effective online inspections program, which would not require the shutdown of critical components. One methodology of online inspection is known as Non Intrusive Inspection (NII), an inspection philosophy with the objective of replacing internal inspection of a vessel by doing Non Destructive Testing (NDT) and inspections externally. To this end, a variety of advanced NDT techniques are needed to provide accurate online measurements. (Author)

  18. Non-intrusive Quality Analysis of Monitoring Data

    CERN Document Server

    Brightwell, M; Suwalska, Anna

    2010-01-01

    Any large-scale operational system running over a variety of devices requires a monitoring mechanism to assess the health of the overall system. The Technical Infrastructure Monitoring System (TIM) at CERN is one such system, and monitors a wide variety of devices and their properties, such as electricity supplies, device temperatures, liquid flows etc. Without adequate quality assurance, the data collected from such devices leads to false-positives and false-negatives, reducing the effectiveness of the monitoring system. The quality must, however, be measured in a non-intrusive way, so that the critical path of the data flow is not affected by the quality computation. The quality computation should also scale to large volumes of incoming data. To address these challenges, we develop a new statistical module, which monitors the data collected by TIM and reports its quality to the operators. The statistical module uses Oracle RDBMS as the underlying store, and builds hierarchical summaries on the basic events ...

  19. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  20. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  1. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  2. CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2011-12-01

    Full Text Available Critical Information Infrastructure security will always be difficult to ensure, just because of the features that make it irreplaceable tor other critical infrastructures normal operation. It is decentralized, interconnected interdependent, controlled by multiple actors (mainly private and incorporating diverse types of technologies. It is almost axiomatic that the disruption of the Critical Information Infrastructure affects systems located much farther away, and the cyber problems have direct consequences on the real world. Indeed the Internet can be used as a multiplier in order to amplify the effects of an attack on some critical infrastructures. Security challenges increase with the technological progress. One of the last lines of defense which comes to complete the overall security scheme of the Critical Information Infrastructure is represented by the Network Intrusion Detection Systems.

  3. Non-Intrusive Optical Diagnostic Methods for Flowfield Characterization

    Science.gov (United States)

    Tabibi, Bagher M.; Terrell, Charles A.; Spraggins, Darrell; Lee, Ja. H.; Weinstein, Leonard M.

    1997-01-01

    Non-intrusive optical diagnostic techniques such as Electron Beam Fluorescence (EBF), Laser-Induced Fluorescence (LIF), and Focusing Schlieren (FS) have been setup for high-speed flow characterization and large flowfield visualization, respectively. Fluorescence emission from the First Negative band of N2(+) with the (0,0) vibration transition (at lambda =391.44 nm) was obtained using the EBF technique and a quenching rate of N2(+)* molecules by argon gas was reported. A very high sensitivity FS system was built and applied in the High-Speed Flow Generator (HFG) at NASA LaRC. A LIF system is available at the Advanced Propulsion Laboratory (APL) on campus and a plume exhaust velocity measurement, measuring the Doppler shift from lambda = 728.7 nm of argon gas, is under way.

  4. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    CERN Document Server

    INSPIRE-00416173; Kebschull, Udo

    2015-01-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machin...

  5. INTRUSION DETECTION PREVENTION SYSTEM (IDPS PADA LOCAL AREA NETWORK (LAN

    Directory of Open Access Journals (Sweden)

    Didit Suhartono

    2015-02-01

    Full Text Available Penelitian ini berjudul “Intrusion Detection Prevention System Local Area Network (LAN” yang bertujuan untuk memproteksi jaringan dari usaha- usaha penyusupan yang dilakukan oleh seorang intruder. Metode yang digunakan pada penelitian ini adalah menggunakan metode kerangka pikir sebagai acuan dari tahap- tahap penelitian yang penulis lakukan. IDS difungsikan sebagai pendeteksi adanya serangan sesuai rule yang ada kemudian pesan peringatan disimpan dalam database dan dikirim via sms kepada seorang network administrator, sedangkan Firewall digunakan sebagai packet filtering dengan cara menentukan security policy yang dinilai penting. Hasilnya adalah ketika IDS memberikanpesan peringatan ketika ada serangan, seorang network administrator dapat memblok adanya serangan tersebut dengan cara manual dengan firewall, ataupun firewall akan memblok sendiri serangan tersebut sesuai dengan security policy yang diterapkan oleh network adminisrator sebelumnya

  6. Forecasting deflation, intrusion and eruption at inflating volcanoes

    Science.gov (United States)

    Blake, Stephen; Cortés, Joaquín A.

    2018-01-01

    A principal goal of volcanology is to successfully forecast the start of volcanic eruptions. This paper introduces a general forecasting method, which relies on a stream of monitoring data and a statistical description of a given threshold criterion for an eruption to start. Specifically we investigate the timing of intrusive and eruptive events at inflating volcanoes. The gradual inflation of the ground surface is a well-known phenomenon at many volcanoes and is attributable to pressurised magma accumulating within a shallow chamber. Inflation usually culminates in a rapid deflation event caused by magma escaping from the chamber to produce a shallow intrusion and, in some cases, a volcanic eruption. We show that the ground elevation during 15 inflation periods at Krafla volcano, Iceland, increased with time towards a limiting value by following a decaying exponential with characteristic timescale τ. The available data for Krafla, Kilauea and Mauna Loa volcanoes show that the duration of inflation (t*) is approximately equal to τ. The distribution of t* / τ values follows a log-logistic distribution in which the central 60% of the data lie between 0.99 deflation event starting during a specified time interval to be estimated. The time window in which there is a specified probability of deflation starting can also be forecast, and forecasts can be updated after each new deformation measurement. The method provides stronger forecasts than one based on the distribution of repose times alone and is transferable to other types of monitoring data and/or other patterns of pre-eruptive unrest.

  7. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M.; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N.; Mazzoni, Elvis; Pappas, Ilias O.; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M. S.; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS. PMID:27994566

  8. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes

    Science.gov (United States)

    L., Passarelli; E., Rivalta; A., Shuler

    2014-01-01

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process. PMID:24469260

  9. Facebook intrusion, fear of missing out, narcissism, and life satisfaction: A cross-sectional study.

    Science.gov (United States)

    Błachnio, Agata; Przepiórka, Aneta

    2018-01-01

    Facebook is one of the most popular social networking sites. The present paper examines the relations between fear of missing out, narcissism, Facebook intrusion, and life satisfaction. We hypothesized that the fear of missing out and narcissism would play a significant role in Facebook intrusion. The participants in the study were 360 Polish users of Facebook. We administered the Facebook Intrusion Scale, the Fear of Missing Out Scale, the Narcissistic Personality Inventory, and the Satisfaction with Life Scale. The results showed that a high level of fear of missing out and high narcissism are predictors of Facebook intrusion, while a low level of fear of missing out and high narcissism are related to satisfaction with life. Our findings provide a more comprehensive picture of the predictors of Facebook intrusion and reveal interesting patterns. Copyright © 2017 Elsevier B.V. All rights reserved.

  10. Nuisance alarm suppression techniques for fibre-optic intrusion detection systems

    Science.gov (United States)

    Mahmoud, Seedahmed S.; Visagathilagar, Yuvaraja; Katsifolis, Jim

    2012-02-01

    The suppression of nuisance alarms without degrading sensitivity in fibre-optic intrusion detection systems is important for maintaining acceptable performance. Signal processing algorithms that maintain the POD and minimize nuisance alarms are crucial for achieving this. A level crossings algorithm is presented for suppressing torrential rain-induced nuisance alarms in a fibre-optic fence-based perimeter intrusion detection system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr, and intrusion events can be detected simultaneously during rain periods. The use of a level crossing based detection and novel classification algorithm is also presented demonstrating the suppression of nuisance events and discrimination of nuisance and intrusion events in a buried pipeline fibre-optic intrusion detection system. The sensor employed for both types of systems is a distributed bidirectional fibre-optic Mach Zehnder interferometer.

  11. Working memory and inhibitory control across the life span: Intrusion errors in the Reading Span Test.

    Science.gov (United States)

    Robert, Christelle; Borella, Erika; Fagot, Delphine; Lecerf, Thierry; de Ribaupierre, Anik

    2009-04-01

    The aim of this study was to examine to what extent inhibitory control and working memory capacity are related across the life span. Intrusion errors committed by children and younger and older adults were investigated in two versions of the Reading Span Test. In Experiment 1, a mixed Reading Span Test with items of various list lengths was administered. Older adults and children recalled fewer correct words and produced more intrusions than did young adults. Also, age-related differences were found in the type of intrusions committed. In Experiment 2, an adaptive Reading Span Test was administered, in which the list length of items was adapted to each individual's working memory capacity. Age groups differed neither on correct recall nor on the rate of intrusions, but they differed on the type of intrusions. Altogether, these findings indicate that the availability of attentional resources influences the efficiency of inhibition across the life span.

  12. THE GEOMORPHOLOGIC FEATURES OF INTRUSIVE MAGMATIC STRUCTURES FROM BÂRGĂU MOUNTAINS (EASTERN CARPATHIANS, ROMANIA

    Directory of Open Access Journals (Sweden)

    Ioan Bâca

    2016-08-01

    Full Text Available Igneous intrusive structures from Bârgău Mountains belong to the group of central Neogene volcanic chain of the Eastern Carpathians of Romania. The evolution of the relief developed on these structures are three main stages: the stage of injection of structures (Pannonian, the stage of uncovering of igneous intrusive bodies from Oligo-Miocene sedimentary cover (Pliocene, and the stage of subaerial modeling of magmatic bodies (Pliocene-current.In those circumstances, the geodiversity of intrusive magmatic structures from Bârgău Mountains is represented by several types of landforms such as: polycyclic landforms (erosional levels, structural landforms (the configuration of igneous intrusive structures, petrographic landforms (andesites, lithological contact, fluvial landforms (valleys, slopes, ridges, periglacial landforms (cryogenic and crionival landforms, biogenic and anthropogenic landforms. This study highlights certain features of the landforms modeled on igneous intrusive bodies with the aim of developing some strategy for tourism recovery by local and county authorities.

  13. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS.

  14. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Directory of Open Access Journals (Sweden)

    Agata Błachnio

    2016-12-01

    Full Text Available The increase in the number of users of social networking sites has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2,628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Measure, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively and low context (positively; of the personality variables, conscientiousness and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of social networking sites (SNS.

  15. The appraisal of intrusive thoughts in relation to obsessional-compulsive symptoms.

    Science.gov (United States)

    Barrera, Terri L; Norton, Peter J

    2011-01-01

    Research has shown that although intrusive thoughts occur universally, the majority of individuals do not view intrusive thoughts as being problematic (Freeston, Ladouceur, Thibodeau, & Gagnon, 1991; Rachman & de Silva, 1978; Salkovskis & Harrison, 1984). Thus, it is not the presence of intrusive thoughts that leads to obsessional problems but rather some other factor that plays a role in the development of abnormal obsessions. According to the cognitive model of obsessive-compulsive disorder (OCD) put forth by Salkovskis (1985), the crucial factor that differentiates between individuals with OCD and those without is the individual's appraisal of the naturally occurring intrusive thoughts. This study aimed to test Salkovskis's model by examining the role of cognitive biases (responsibility, thought-action fusion, and thought control) as well as distress in the relationship between intrusive thoughts and obsessive-compulsive symptoms in an undergraduate sample of 326 students. An existing measure of intrusive thoughts (the Revised Obsessional Intrusions Inventory) was modified for this study to include a scale of distress associated with each intrusive thought in addition to the current frequency scale. When the Yale-Brown Obsessive-Compulsive Scale was used as the measure of OCD symptoms, a significant interaction effect of frequency and distress of intrusive thoughts resulted. Additionally, a significant three-way interaction of Frequency × Distress × Responsibility was found when the Obsessive Compulsive Inventory-Revised was used as the measure of OCD symptoms. These results indicate that the appraisal of intrusive thoughts is important in predicting OCD symptoms, thus providing support for Salkovskis's model of OCD.

  16. Diel use of a saltwater creek by white-tip reef sharks Triaenodon obesus (Carcharhiniformes: Carcharhinidae in Academy Bay, Galapagos Islands

    Directory of Open Access Journals (Sweden)

    César Peñaherrera

    2012-06-01

    Full Text Available White-tip reef sharks are common inhabitants of the shallow waters surrounding the Galapagos Islands, where several known aggregation sites have become touristic attractions. With the aim to describe site fidelity and residency patterns of the white-tip reef sharks in a saltwater creek, we used the ultrasonic telemetry method. The study was undertaken in a saltwater channel South of Academy Bay, Santa Cruz Island, from May 2008-September 2009. A total of nine transmitters were attached to sharks and ultrasonic receivers were deployed at the inner and outside areas of the creek. From the total of fitted sharks, four lost their transmitters. The results obtained with the remaining sharks showed an elevated use of the inner area of the channel during the day, with more use of the external area during the night. However, none of the sharks were detected at the site every day, suggesting that they may have a number of preferred sites within their home range. More studies are needed to detail the home range and habitat use of this species, and to guide its protection level in the AcademyBay area. Rev. Biol. Trop. 60 (2: 735-743. Epub 2012 June 01.Los tiburones punta blanca de arrecife son habitantes comunes de las aguas que rodean las Islas Galápagos, por lo que muchos de sus sitios de agregación se han convertido en atractivos turísticos. Con el objetivo de describir la fidelidad del sitio y los patrones de residencia de nueve tiburones desde mayo 2008-septiembre 2009, se utilizó telemetría ultrasónica en un canal de agua salada en el sur de Bahía Academia, Isla Santa Cruz. A pesar de que cuatro tiburones perdieron sus transmisores, los restantes tiburones monitoreados mostraron un uso elevado del interior del canal durante el día y del exterior durante la noche. Sin embargo, ninguno de los tiburones fue detectado en el sitio diariamente, lo cual sugiere que deben tener un número mayor de sitios preferidos dentro de su área de vida.

  17. Reactive and multiphase modelling for the identification of monitoring parameters to detect CO2 intrusion into freshwater aquifers

    Science.gov (United States)

    Fahrner, S.; Schaefer, D.; Wiegers, C.; Köber, R.; Dahmke, A.

    2011-12-01

    A monitoring at geological CO2 storage sites has to meet environmental, regulative, financial and public demands and thus has to enable the detection of CO2 leakages. Current monitoring concepts for the detection of CO2 intrusion into freshwater aquifers located above saline storage formations in course of leakage events lack the identification of monitoring parameters. Their response to CO2 intrusion still has to be enlightened. Scenario simulations of CO2 intrusion in virtual synthetic aquifers are performed using the simulators PhreeqC and TOUGH2 to reveal relevant CO2-water-mineral interactions and multiphase behaviour on potential monitoring parameters. The focus is set on pH, total dissolved inorganic carbon (TIC) and the hydroelectric conductivity (EC). The study aims at identifying at which conditions the parameters react rapidly, durable and in a measurable degree. The depth of the aquifer, the mineralogy, the intrusion rates, the sorption specification and capacities, and groundwater flow velocities are varied in the course of the scenario modelling. All three parameters have been found suited in most scenarios. However, in case of a lack of calcite combined with low saturation of the water with respect to CO2 and shallow conditions, changes are close to the measurement resolution. Predicted changes in EC result from the interplay between carbonic acid production and its dissociation, and pH buffering by mineral dissolution. The formation of a discrete gas phase in cases of full saturation of the groundwater in confined aquifers illustrates the potential bipartite resistivity response: An increased hydroelectric conductivity at locations with dissolved CO2, and a high resistivity where the gas phase dominates the pore volume occupation. Increased hydrostatic pressure with depth and enhanced groundwater flow velocities enforce gas dissolution and diminish the formation of a discrete gas phase. Based on the results, a monitoring strategy is proposed which

  18. Intrusive sampling and testing of ferrocyanide tanks, Hanford Site, Richland, Washington: Environmental Assessment

    International Nuclear Information System (INIS)

    1992-02-01

    The proposed action involves intrusive sampling and testing of 24 Hanford Site single-shell waste tanks that contain ferrocyanide-nitrate/nitrite mixtures to determine the physical and chemical properties of the waste material. The Department of Energy (DOE) needs to take this action to help define the required controls to prevent or mitigate the potential for an accident during future characterization and monitoring of these tanks. Given the Unreviewed Safety Question associated with the consequences of a potential ferrocyanide nitrate/nitrite reaction, two safety assessments and this environmental assessment (EA) have been prepared to help ensure that the proposed action is conducted in a safe and environmentally sound manner. Standard operating procedures for sampling high-level waste tanks have been revised to reflect the potential presence of flammable or explosive mixtures in the waste. The proposed action would be conducted using nonsparking materials, spark resistant tools, and a portable containment enclosure (greenhouse) and plastic ground cover. The proposed activities involving Hanford Site ferrocyanide-containing tanks would be on land dedicated to DOE waste management

  19. A common-sense probabilistic approach to assessing inadvertent human intrusion into low-level radioactive waste at the Nevada Test Site

    International Nuclear Information System (INIS)

    Black, P.; Hooten, M.; Black, K.; Moore, B.; Rawlinson, S.; Barker, L.

    1997-01-01

    Each site disposing of low-level radioactive waste is required to prepare and maintain a site-specific performance assessment (1) to determine potential risks posed by waste management systems to the public, and the environment, and (2) to compare these risks to established performance objectives. The DOE Nevada Operations Office, Waste Management Program recently completed a one-year study of site-specific scenarios for inadvertent human intrusion by drilling into buried low-level radioactive waste sites, as part of ongoing performance assessment studies. Intrusion scenarios focus on possible penetration of buried waste through drilling for sources of groundwater. The probability of drilling penetration into waste was judged to be driven primarily by two settlement scenarios: (1) scattered individual homesteaders, and (2) a community scenario consisting of a cluster of settlers that share drilling and distribution systems for groundwater. Management control factors include institutional control, site knowledge, placards and markers, surface barriers, and subsurface barriers. The Subject Matter Experts concluded that institutional control and site knowledge may be important factors for the first few centuries, but are not significant over the evaluation period of 10,000 years. Surface barriers can be designed that would deter the siting of a drill rig over the waste site to an effectiveness of 95%. Subsurface barriers and placards and markers will not as effectively prevent inadvertent human intrusion. Homestead and community scenarios were considered by the panel to render a site-specific probability of around 10% for inadvertent human intrusion. If management controls are designed and implemented effectively, then the probability of inadvertent human intrusion can be reduced to less than 1%

  20. Hazard Models From Periodic Dike Intrusions at Kı¯lauea Volcano, Hawai`i

    Science.gov (United States)

    Montgomery-Brown, E. K.; Miklius, A.

    2016-12-01

    The persistence and regular recurrence intervals of dike intrusions in the East Rift Zone (ERZ) of Kı¯lauea Volcano lead to the possibility of constructing a time-dependent intrusion hazard model. Dike intrusions are commonly observed in Kı¯lauea Volcano's ERZ and can occur repeatedly in regions that correlate with seismic segments (sections of rift seismicity with persistent definitive lateral boundaries) proposed by Wright and Klein (USGS PP1806, 2014). Five such ERZ intrusions have occurred since 1983 with inferred locations downrift of the bend in Kı¯lauea's ERZ, with the first (1983) being the start of the ongoing ERZ eruption. The ERZ intrusions occur on one of two segments that are spatially coincident with seismic segments: Makaopuhi (1993 and 2007) and Nāpau (1983, 1997, and 2011). During each intrusion, the amount of inferred dike opening was between 2 and 3 meters. The times between ERZ intrusions for same-segment pairs are all close to 14 years: 14.07 (1983-1997), 14.09 (1997-2011), and 13.95 (1993-2007) years, with the Nāpau segment becoming active about 3.5 years after the Makaopuhi segment in each case. Four additional upper ERZ intrusions are also considered here. Dikes in the upper ERZ have much smaller opening ( 10 cm), and have shorter recurrence intervals of 8 years with more variability. The amount of modeled dike opening during each of these events roughly corresponds to the amount of seaward south flank motion and deep rift opening accumulated in the time between events. Additionally, the recurrence interval of 14 years appears to be unaffected by the magma surge of 2003-2007, suggesting that flank motion, rather than magma supply, could be a controlling factor in the timing and periodicity of intrusions. Flank control over the timing of magma intrusions runs counter to the historical research suggesting that dike intrusions at Kı¯lauea are driven by magma overpressure. This relatively free sliding may have resulted from decreased