WorldWideScience

Sample records for resin intrusion environment

  1. Resin intrusion into the primary circuit of NPP Jaslovske Bohunice V-1

    International Nuclear Information System (INIS)

    Grezdo, O.; Mraz, V.

    2005-01-01

    During the refueling at the first unit of Bohunice NPP in 2005 a lot of sediment was found on the upper storage rack. This sediment was identification as a filter resin. Resin was found in most of the fuel assemblies, pipes and tanks of the primary circuit and his auxiliary systems. Resin producer and WANO network was contacted in order to get information about similar events. Management of Bohunice NPP made a decision that primary circuit, fuel assemblies and auxiliary systems have to be cleaned. Subsequent cleaning extended outage by 31 days. This paper summarizes causes, existing consequences and corrective actions. Accent was put on the hydraulic characteristics of the primary circuit measurement, power distribution core monitoring and the primary circuit water quality verification (Authors)

  2. Corrosion inhibitor development for slightly sour environments with oxygen intrusion

    Energy Technology Data Exchange (ETDEWEB)

    Wylde, J.; Wang, H.; Li, J. [Clariant Oil Services North America, Calgary, AB (Canada)

    2009-07-01

    This presentation reported on a study that examined the effect of oxygen on the inhibition of carbon steel in slightly sour corrosion, and the initiation and propagation of localized attack. Oxygen can enter sour water injection systems through the vapor space in storage tanks and process system. Oxygen aggravates the corrosion attack by participating in the cathodic reaction under full or partial diffusion control. Laboratory testing results were reported in this presentation along with the development of corrosion inhibitors for such a slightly sour system. Bubble testing cells were used with continuous H{sub 2}/CO{sub 2} mixture gas sparging and occasional oxygen intrusion of 2 to 4 hours during a week long test. Linear polarization resistance (LPR) measurements and weight loss corrosion coupons were used to quantify the corrosion attack. The findings were presented in terms of the magnitude of localized attacks at different oxygen concentrations and intrusion periods, with and without the presence of corrosion inhibitors. tabs., figs.

  3. An Analysis of Security System for Intrusion in Smartphone Environment

    Directory of Open Access Journals (Sweden)

    Maya Louk

    2014-01-01

    Full Text Available There are many malware applications in Smartphone. Smartphone’s users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a MDTN process is possible and will be enabled for Smartphone environment. (b The methods are shown to be an advanced security for private sensitive data of the Smartphone user.

  4. An analysis of security system for intrusion in Smartphone environment.

    Science.gov (United States)

    Louk, Maya; Lim, Hyotaek; Lee, HoonJae

    2014-01-01

    There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone--whether for business or personal use--may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user.

  5. Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment

    Directory of Open Access Journals (Sweden)

    Kai Peng

    2018-01-01

    Full Text Available Fog computing, as the supplement of cloud computing, can provide low-latency services between mobile users and the cloud. However, fog devices may encounter security challenges as a result of the fog nodes being close to the end users and having limited computing ability. Traditional network attacks may destroy the system of fog nodes. Intrusion detection system (IDS is a proactive security protection technology and can be used in the fog environment. Although IDS in tradition network has been well investigated, unfortunately directly using them in the fog environment may be inappropriate. Fog nodes produce massive amounts of data at all times, and, thus, enabling an IDS system over big data in the fog environment is of paramount importance. In this study, we propose an IDS system based on decision tree. Firstly, we propose a preprocessing algorithm to digitize the strings in the given dataset and then normalize the whole data, to ensure the quality of the input data so as to improve the efficiency of detection. Secondly, we use decision tree method for our IDS system, and then we compare this method with Naïve Bayesian method as well as KNN method. Both the 10% dataset and the full dataset are tested. Our proposed method not only completely detects four kinds of attacks but also enables the detection of twenty-two kinds of attacks. The experimental results show that our IDS system is effective and precise. Above all, our IDS system can be used in fog computing environment over big data.

  6. Proposed Network Intrusion Detection System ‎Based on Fuzzy c Mean Algorithm in Cloud ‎Computing Environment

    Directory of Open Access Journals (Sweden)

    Shawq Malik Mehibs

    2017-12-01

    Full Text Available Nowadays cloud computing had become is an integral part of IT industry, cloud computing provides Working environment allow a user of environmental to share data and resources over the internet. Where cloud computing its virtual grouping of resources offered over the internet, this lead to different matters related to the security and privacy in cloud computing. And therefore, create intrusion detection very important to detect outsider and insider intruders of cloud computing with high detection rate and low false positive alarm in the cloud environment. This work proposed network intrusion detection module using fuzzy c mean algorithm. The kdd99 dataset used for experiments .the proposed system characterized by a high detection rate with low false positive alarm

  7. Proposed Network Intrusion Detection System ‎In Cloud Environment Based on Back ‎Propagation Neural Network

    Directory of Open Access Journals (Sweden)

    Shawq Malik Mehibs

    2017-12-01

    Full Text Available Cloud computing is distributed architecture, providing computing facilities and storage resource as a service over the internet. This low-cost service fulfills the basic requirements of users. Because of the open nature and services introduced by cloud computing intruders impersonate legitimate users and misuse cloud resource and services. To detect intruders and suspicious activities in and around the cloud computing environment, intrusion detection system used to discover the illegitimate users and suspicious action by monitors different user activities on the network .this work proposed based back propagation artificial neural network to construct t network intrusion detection in the cloud environment. The proposed module evaluated with kdd99 dataset the experimental results shows promising approach to detect attack with high detection rate and low false alarm rate

  8. Carbon-14 behavior in a cement-dominated environment: Implications for spent CANDU resin waste disposal

    International Nuclear Information System (INIS)

    Dayal, R.; Reardon, E.J.

    1994-01-01

    Cement based waste forms and concrete engineered barriers are expected to play a key role in providing 14 C waste containment and control 14 C migration for time periods commensurate with its hazardous life of about 50,000 years. The main thrust of this study was, therefore, to evaluate the performance of cement based waste forms with regard to 14 C containment. Of particular importance are the geochemical processes controlling 14 C solubility and release under anticipated cement dominated low and intermediate level waste repository conditions. Immobilization of carbonate-form exchange resin in grout involves transfer of sorbed 14 CO 3 2- ions, through exchange for hydroxyl ions from the grout slurry, followed by localized precipitation of solid calcium carbonate at the cement/resin interface in the grout matrix. Carbon-14 release behavior can be attributed to the dissolution characteristics and solubility of calcite present in the cement based waste form. The groundwater flow regime can exert a pronounced effect both on the near-field chemistry and the leaching behavior of 14 C. For a cement dominated repository, at relatively low-flow or stagnant groundwater conditions, the alkaline near-field chemical environments inhibits the release of 14 C from the cemented waste form. Under high flow conditions, the near-field environment is characterized by relatively neutral pH conditions which promote calcite dissolution, thus resulting in 14 C release from the waste form

  9. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  10. Network Intrusion Detection System (NIDS in Cloud Environment based on Hidden Naïve Bayes Multiclass Classifier

    Directory of Open Access Journals (Sweden)

    Hafza A. Mahmood

    2018-04-01

    Full Text Available Cloud Environment is next generation internet based computing system that supplies customiza-ble services to the end user to work or access to the various cloud applications. In order to provide security and decrease the damage of information system, network and computer system it is im-portant to provide intrusion detection system (IDS. Now Cloud environment are under threads from network intrusions, as one of most prevalent and offensive means Denial of Service (DoS attacks that cause dangerous impact on cloud computing systems. This paper propose Hidden naïve Bayes (HNB Classifier to handle DoS attacks which is a data mining (DM model used to relaxes the conditional independence assumption of Naïve Bayes classifier (NB, proposed sys-tem used HNB Classifier supported with discretization and feature selection where select the best feature enhance the performance of the system and reduce consuming time. To evaluate the per-formance of proposal system, KDD 99 CUP and NSL KDD Datasets has been used. The experi-mental results show that the HNB classifier improves the performance of NIDS in terms of accu-racy and detecting DoS attacks, where the accuracy of detect DoS is 100% in three test KDD cup 99 dataset by used only 12 feature that selected by use gain ratio while in NSL KDD Dataset the accuracy of detect DoS attack is 90 % in three Experimental NSL KDD dataset by select 10 fea-ture only.

  11. Review of the intrusive, structural and metamorphic history of the Namaqualand geotraverse and environs

    International Nuclear Information System (INIS)

    Blignault, H.J.; Van Aswegen, G.; Van der Merwe, S.W.

    1981-01-01

    The Namaqualand excursion is concerned with the geologic strata, stratigraphy and metamorhic history of the Namaqualand geotraverse and its environs. The general aim of the project was to decipher the history and interactions of tectonic, metamorphic and magmatic processes. Isotope dating were used to determine the ages of various rock formations

  12. Adsorption of trace metals to plastic resin pellets in the marine environment

    International Nuclear Information System (INIS)

    Holmes, Luke A.; Turner, Andrew; Thompson, Richard C.

    2012-01-01

    Plastic production pellets collected from beaches of south west England contain variable concentrations of trace metals (Cr, Co, Ni, Cu, Zn, Cd and Pb) that, in some cases, exceed concentrations reported for local estuarine sediments. The rates and mechanisms by which metals associate with virgin and beached polyethylene pellets were studied by adding a cocktail of 5 μg L −1 of trace metals to 10 g L −1 pellet suspensions in filtered seawater. Kinetic profiles were modelled using a pseudo-first-order equation and yielded response times of less than about 100 h and equilibrium partition coefficients of up to about 225 ml g −1 that were consistently higher for beached pellets than virgin pellets. Adsorption isotherms conformed to both the Langmuir and Freundlich equations and adsorption capacities were greater for beached pellets than for virgin pellets. Results suggest that plastics may represent an important vehicle for the transport of metals in the marine environment. - Highlights: ► Beached plastic production pellets contain considerable concentrations of trace metals. ► In laboratory experiments trace metals are shown to adsorb to both virgin and beached pellets. ► Metal adsorption is greater on aged pellets. ► Pellets may represent an important vehicle for metal transport in the marine environment. - Trace metals accumulate on plastic resin pellets in the marine environment through adsorption to the polymer and to chemical and biological attritions thereon.

  13. Intrusion Detection and Marking Transactions in a Cloud of Databases Environment

    OpenAIRE

    Syrine Chatti; Habib Ounelli

    2016-01-01

    The cloud computing is a paradigm for large scale distributed computing that includes several existing technologies. A database management is a collection of programs that enables you to store, modify and extract information from a database. Now, the database has moved to cloud computing, but it introduces at the same time a set of threats that target a cloud of database system. The unification of transaction based application in these environments present also a set of vulnerabilities and th...

  14. Cyprus as a degraded landscape or resilient environment in the wake of colonial intrusion

    Science.gov (United States)

    Harris, Sarah E.

    2012-01-01

    Concerns about global warming, degradation of fragile ecosystems, and environmental and societal collapse have increased interest for lessons and/or solutions for today's environmental issues. Popular writers have turned to a classic degradation thesis of deforestation and presumed desertification within the Eastern Mediterranean as a cautionary tale of how past societies have committed ecological suicide. However, degradation and/or collapse is far more complex than the thesis permits, and uncritical adoption of such simplified stories encourages continued use of inaccurate assumptions about human–environment interaction. In Cyprus, such a degradation story materialized 150 y ago, and its promoters aimed to impress on readers their responsibility to reverse past environmental mistakes. Both the British Colonial authorities (1878–1960) and the post-Independence Cypriot government used it to justify their environmental policies. Unfortunately, this thesis was formed around several misunderstandings about Cypriot environments and society: (i) judgment of degradation without appropriate consideration of the difference between degradation and change; (ii) oversimplified representation of ruling powers and those people ruled; and (iii) denigration of the shepherd lifestyle and its presumed environmental impact. A multimethod approach using archival and field research offers a more nuanced understanding of the complexity of human–environment interaction, the underappreciated environmental and societal resilience of areas classified as degraded, and the importance of placing events within changing socioeconomic and political contexts. This study of natural resource management and environmental resilience illustrates that the practices that the colonial government viewed as unsustainable likely were sustainable. PMID:22371577

  15. The selection and properties of epoxide resins used for the insulation of magnet systems in radiation environments

    International Nuclear Information System (INIS)

    Phillips, D.C.; Scott, J.M.; Goebel, K.; Schoenbacher, H.

    1981-01-01

    Laboratory tests have been carried out on five types of epoxy resins - four based on bisphenol A, one on hydantoin-bisphenol A - applicable in the construction of large magnet coils. Two of the resin compositions have already been used in large quantities as insulating material for magnets at the European Organization for Nuclear Research (CERN); the others were selected for comparison according to their good radiation resistance, good initial mechanical properties, and optimal properties for vacuum impregnation. Three types of tests are discussed in detail: creep, crack propagation (as a measure of toughness), and radiation resistance. The results show that the resin composition with hydantoin exhibits the best resistance to crack propagation but, on the other hand, the lowest resistance to ionizing radiation, and can therefore not be recommended for use in a radiation environment. Among the other materials based on biosphenol A, better toughness values were obtained with lower-cross-linked resin systems, whereas the radiation resistance is better for highly-cross-linked materials. It is concluded that a reasonable compromise combining good processing and operational properties with sufficiently high radiation resistance is obtained with a standard epoxy-resin-type bisphenol A with a specially formulated anhydride hardener and an amine-substituted phenol-type accelerator. (orig.)

  16. Non-intrusive activity assessment of a vulnerable individual for real living environments

    International Nuclear Information System (INIS)

    Xu, Shaoqiu; Jones, Gordon R

    2008-01-01

    A system for addressing the scale of activity and detecting periods of immobility of a vulnerable individual is described. The system does not invade the privacy of the individual, is robust to ambient changes and is economic in terms of cost and the amount of data captured. The system is based upon the cross-correlation of changes in the chromatic signatures of a limited number of locations in an environment with the outputs from a triggerable infrared sensor. Results are presented to indicate the system performance

  17. Influence of salivary enzymes and alkaline pH environment on fatigue behavior of resin composites

    NARCIS (Netherlands)

    Mirmohammadi, H.; Kleverlaan, C.J.; Aboushelib, M.N.; Feilzer, A.J.

    2011-01-01

    Purpose: To evaluate the effect of enzymatic activity and alkaline medium on flexural strength and rotary fatigue resistance of direct and indirect resin composite restorative materials. Methods: Three direct resin composite materials Filtek Z100, Filtek Z250 and Filtek Silorane (3M ESPE), and two

  18. The Cretaceous Duimiangou adakite-like intrusion from the Chifeng region, northern North China Craton: Crustal contamination of basaltic magma in an intracontinental extensional environment

    Science.gov (United States)

    Fu, Lebing; Wei, Junhao; Kusky, Timothy M.; Chen, Huayong; Tan, Jun; Li, Yanjun; Shi, Wenjie; Chen, Chong; Zhao, Shaoqing

    2012-03-01

    Zircon U-Pb ages, major and trace element and Sr, Nd and Pb isotope compositions of the Duimiangou (DMG) quartz monzonite from the Chifeng region on the northern North China Craton (NCC) were studied to investigate its derivation, evolution and geodynamic significance. Laser ablation inductively coupled plasma mass spectrometry (LA-ICP-MS) zircon U-Pb dating yields an emplacement age of 128 ± 1 Ma for this intrusion, with numerous Mesozoic inherited zircons clustering at 219 ± 12 Ma and 161 ± 3 Ma, along with some ancient zircons with ages of 2.5 Ga, 1.77 Ga and 324 Ma. Bulk-rock analyses show that this intrusion is characterized by variable SiO2 (63.4-69.4 wt.%), Al2O3 (14.5-16.3 wt.%), Na2O + K2O (8.01-8.95 wt.%), and Mg# (41.3-48.0). They are enriched in large ion lithophile elements and light rare earth elements without significant Eu anomalies (mostly between 0.89-1.10), and depleted in heavy rare earth elements and high field strength elements, with high Sr/Y (63.7-101.7) and (La/Yb)N (20.5-31.0) ratios. The DMG intrusion formed in an intracontinental extensional setting contemporaneous with the formation of pull-apart basins, metamorphic core complexes and intense magmatism, rather than in a convergent margin. It has homogeneous Sr ((87Sr/86Sr)i = 0.7059-0.7066), Nd (εNd(t) = - 6.2 to - 7.2) and Pb ((206Pb/204Pb)i = 17.289-17.375, (207Pb/204Pb)i = 15.359-15.463, (208Pb/204Pb)i = 37.130-37.472) isotope compositions. Sr-Nd isotope modeling results, plus relatively young Nd model ages (1522-1618 Ma) and the presence of relict zircons, suggest that this intrusion could have originated from crustal contamination of newly formed basaltic melts derived from asthenospheric mantle, accompanied by fractional crystallization of K-feldspar, biotite, apatite, Fe-Ti oxides and minor hornblende and plagioclase. Thus, the DMG adakite-like intrusion may record the magmatic event associated with underplating of asthenospheric magma in an intracontinental extensional

  19. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  20. Nuclear characteristics of epoxy resin as a space environment neutron shielding

    Energy Technology Data Exchange (ETDEWEB)

    Adeli, Ruhollah [Nuclear Science and Technology Research Institute, Yazd (Iran, Islamic Republic of). Central Iran Research Complex; Shirmardi, Seyed Pezhman [Nuclear Science and Technology Research Institute, Tehran (Iran, Islamic Republic of). Radiation Application Research School; Mazinani, Saideh [Amirkabir Nanotechnology Research Institute, Tehran (Iran, Islamic Republic of); Ahmadi, Seyed Javad [Nuclear Science and Technology Research Institute, Tehran (Iran, Islamic Republic of). Nuclear Fuel Cycle Research School

    2017-03-15

    In recent years many investigations have been done for choosing applicable light neutron shielding in space environmental applications. In this study, we have considered the neutron radiation-protective characteristics of neat epoxy resin, a thermoplastic polymer material and have compared it with various candidate materials in neutron radiation protection such as Al 6061 alloy and Polyethylene. The aim of this investigation is the effect of type of moderator for fast neutron, notwithstanding neutron absorbers fillers. The nuclear interactions and the effective dose at shields have been studied with the Monte Carlo N-Particle transport code (MCNP), using variance reductions to reduce the relative error. Among the candidates, polymer matrix showed a better performance in attenuating fast neutrons and caused a lower neutron and secondary photon effective dose.

  1. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  2. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  3. Human intrusion: New ideas?

    International Nuclear Information System (INIS)

    Cooper, J.R.

    2002-01-01

    Inadvertent human intrusion has been an issue for the disposal of solid radioactive waste for many years. This paper discusses proposals for an approach for evaluating the radiological significance of human intrusion as put forward by ICRP with contribution from work at IAEA. The approach focuses on the consequences of the intrusion. Protective actions could, however, include steps to reduce the probability of human intrusion as well as the consequences. (author)

  4. Novel chelating resin with cyanoguanidine group: Useful recyclable materials for Hg(II) removal in aqueous environment

    International Nuclear Information System (INIS)

    Ma Xiaojie; Li Yanfeng; Ye Zhengfang; Yang Liuqing; Zhou Lincheng; Wang Liyuan

    2011-01-01

    A novel chelating resin containing cyanoguanidine moiety has been successfully prepared by the functionalizing reaction of a macroporous bead based on chloromethylated copolymer of styrene-divinylbenzene (CMPS) with dicyandiamide (DCDA) in the presence of phase transfer catalyst. The Fourier transform-infrared spectra (FT-IR) and scanning electron microscopy (SEM) were employed in the characterization of the resulting chelating resin, meanwhile, the adsorption properties of the resin for Hg(II) were investigated by batch and column methods. The results indicated that the resin displayed a marked advantage in Hg(II) binding capacity, and the saturated adsorption capacity estimated from the Langmuir model was dramatically up to 1077 mg g -1 at 45 deg. C. Furthermore, it was found that the resin was able to selectively separate Hg(II) from multicomponent solutions with Zn(II), Cu(II), Pb(II) and Mg(II). The desorption process of Hg(II) was tested with different eluents and the ratio of the highest recovery reached to 96% under eluting condition of 1 M HCl + 10% thiourea. Consequently, the resulting chelating resin would provide a potential application for treatment process of Hg(II) containing wastewater.

  5. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  6. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  7. Options for human intrusion

    International Nuclear Information System (INIS)

    Bauser, M.; Williams, R.

    1993-01-01

    This paper addresses options for dealing with human intrusion in terms of performance requirements and repository siting and design requirements. Options are presented, along with the advantages and disadvantages of certain approaches. At the conclusion, a conceptual approach is offered emphasizing both the minimization of subjective judgements concerning future human activity, and specification of repository requirements to minimize the likelihood of human intrusion and any resulting, harmful effects should intrusion occur

  8. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  9. Long-term degradation of resin-based cements in substances present in the oral environment: influence of activation mode

    Directory of Open Access Journals (Sweden)

    Eduardo Moreira da SILVA

    2013-06-01

    Full Text Available Indirect restorations in contact with free gingival margins or principally within the gingival sulcus, where the presence of organic acids produced by oral biofilm is higher, may present faster degradation of the resin-based cement pellicle. Objectives To investigate the degradation of four resin-based cements: Rely X ARC (R, Variolink II (V, Enforce (E and All Cem (A, after immersion in distilled water (DW, lactic acid (LA and artificial saliva (AS and to analyze the influence of the activation mode on this response. Material and Methods Two activation modes were evaluated: chemical (Ch and dual (D. In the dual activation, a two-millimeter thick ceramic disk (IPS Empress System was interposed between the specimen and light-curing unit tip. Specimens were desiccated, immersed in distilled water, artificial saliva and lactic acid 0.1 M at 37°C for 180 days, weighed daily for the first 7 days, and after 14, 21, 28, 90 and 180 days and were desiccated again. Sorption and solubility (µg/mm 3 were calculated based on ISO 4049. The data were submitted to multifactor analysis of variance (MANOVA and Tukey's HSD test for media comparisons (α=0.05. Results Sorption was higher after immersion in LA (pD (p<0.05. The lowest solubility was presented by R (p<0.05. Conclusions Lactic acid increased the degradation of resin-based cements. Moreover, the physical component of activation, i.e., light-activation, contributed to a low degradation of resin-based cements.

  10. 40 CFR 414.50 - Applicability; description of the thermosetting resins subcategory.

    Science.gov (United States)

    2010-07-01

    ... thermosetting resins subcategory. 414.50 Section 414.50 Protection of Environment ENVIRONMENTAL PROTECTION... Thermosetting Resins § 414.50 Applicability; description of the thermosetting resins subcategory. The provisions... the products classified under SIC 28214 thermosetting resins including those resins and resin groups...

  11. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    Part of the stakeholder consultation addressed strategies that media audiences are developing to cope with pressures and intrusions in a changing media environment, characterised by digitalisation and interactive possibilities. We interviewed ten stakeholders representing interests such as content...... production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...... no consensual motivation, nor any clear avenue for action. Therefore, we have analysed different discursive positions that prevent acknowledging or taking action upon the pressures and intrusions that we presented to these stakeholders. The discursive positions are outlined below....

  12. Resin composites

    DEFF Research Database (Denmark)

    Benetti, Ana Raquel; Peutzfeldt, Anne; Lussi, Adrian

    2014-01-01

    OBJECTIVE: To investigate how the modulus of elasticity of resin composites influences marginal quality in restorations submitted to thermocyclic and mechanical loading. METHODS: Charisma, Filtek Supreme XTE and Grandio were selected as they were found to possess different moduli of elasticity...... of resin composite (p=0.81) on the quality of dentine margins was observed, before or after loading. Deterioration of all margins was evident after loading (p....008). CONCLUSIONS: The resin composite with the highest modulus of elasticity resulted in the highest number of gap-free enamel margins but with an increased incidence of paramarginal enamel fractures. CLINICAL SIGNIFICANCE: The results from this study suggest that the marginal quality of restorations can...

  13. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  14. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    International Conference on Computational Intelligence and Natural Computing, volume 2, pages 413–416, June 2009. • Rung Ching Chen, Kai -Fan Cheng, and...Chia-Fen Hsieh . “Using rough set and support vector machine for network intrusion detection.” International Journal of Network Security & Its...intrusion detection using FP tree rules.” Journal Of Advanced Networking and Applications, 1(1):30–39, 2009. • Ming-Yang Su, Gwo-Jong Yu , and Chun-Yuen

  15. Long-Term Durability of Basalt Fiber-Reinforced Polymer (BFRP Sheets and the Epoxy Resin Matrix under a Wet–Dry Cyclic Condition in a Chloride-Containing Environment

    Directory of Open Access Journals (Sweden)

    Zhongyu Lu

    2017-11-01

    Full Text Available Basalt fiber-reinforced polymer (BFRP composites are receiving increasing attention as they represent a low-cost green source of raw materials. FRP composites have to face harsh environments, such as chloride ions in coastal marine environments or cold regions with salt deicing. The resistance of FRPs subjected to the above environments is critical for the safe design and application of BFRP composites. In the present paper, the long-term durability of BFRP sheets and the epoxy resin matrix in a wet–dry cyclic environment containing chloride ions was studied. The specimens of the BFRP sheet and epoxy resin matrix were exposed to alternative conditions of 8-h immersion in 3.5% NaCl solution at 40 °C and 16-h drying at 25 °C and 60% relative humidity (RH. The specimens were removed from the exposure chamber at the end of the 180th, 270th and 360th cycles of exposure and were analyzed for degradation with tensile tests, scanning electron microscopy (SEM and void volume fractions. It was found that the tensile modulus of the BFRP sheet increased by 3.4%, and the tensile strength and ultimate strain decreased by 45% and 65%, respectively, after the 360th cycle of exposure. For the epoxy resin matrix, the tensile strength, tensile modulus and ultimate strain decreased by 27.8%, 3.2% and 64.8% after the 360th cycle of exposure, respectively. The results indicated that the degradation of the BFRP sheet was dominated by the damage of the interface between the basalt fiber and epoxy resin matrix. In addition, salt precipitate accelerated the fiber–matrix interfacial debonding, and hydrolysis of the epoxy resin matrix resulted in many voids, which accelerated the degradation of the BFRP sheet.

  16. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  17. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  18. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  19. Acoustic emission intrusion detector

    International Nuclear Information System (INIS)

    Carver, D.W.; Whittaker, J.W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal

  20. Immobilization of spent resin with epoxy resin

    International Nuclear Information System (INIS)

    Gultom, O.; Suryanto; Sayogo; Ramdan

    1997-01-01

    immobilization of spent resin using epoxy resin has been conducted. The spent resin was mixtured with epoxy resin in variation of concentration, i.e., 30, 40, 50, 60, 70 weight percent of spent resin. The mixture were pour into the plastic tube, with a diameter of 40 mm and height of 40 mm. The density, compressive strength and leaching rate were respectively measured by quanta chrome, paul weber apparatus and gamma spectrometer. The results showed that the increasing of waste concentration would be decreased the compressive strength, and increased density by immobilized waste. The leaching rate of 137 Cs from waste product was not detected in experiment (author)

  1. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  2. 40 CFR 721.5762 - Aromatic aldehyde phenolic resin (generic).

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Aromatic aldehyde phenolic resin... Specific Chemical Substances § 721.5762 Aromatic aldehyde phenolic resin (generic). (a) Chemical substance... aromatic aldehyde phenolic resin (PMN P-01-573) is subject to reporting under this section for the...

  3. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    -intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results......Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non...

  4. Persistent organic pollutants monitoring in marine coastal environment using beached plastic resin pellets and effective risk communication via International Pellet Watch (IPW) as a tool.

    Science.gov (United States)

    Yeo, B. G. M.; Takada, H.; Hosoda, J.

    2014-12-01

    International Pellet Watch (IPW) is an ongoing global monitoring of persistent organic pollutants (POPs) using preproduction plastic resin pellets. These pellets are easily collected and transported allowing the general public worldwide to get involved. Thus, risk communication toward the pellet collectors is a significant part of IPW to ensure continuous effort and interest. The pellet samples were analyzed for polychlorinated biphenyl (PCBs), dichlorodiphenyltrichloroethane and degradation products (DDTs), and hexachlorocyclohexanes (HCHs). Additional pollutants such as polycyclic aromatic hydrocarbons (PAHs) and Hopanes were also analyzed for some samples. Analytical results showed distinct patterns with high concentrations (ban in the late 1980's. Pesticide DDTs instead were found to be higher in developing countries such as Brazil and Vietnam (> 500ng/g-pellet). These countries may still be using DDTs as a vector control mostly to combat malaria. High concentrations of DDTs were also found in Greece, China and Australia (> 100ng/g-pellet) suggesting the possibility of illegal usage as pesticide or anti fouling paint. HCHs concentrations were mostly low due to its low retention in the environment. However, high HCHs concentrations were mostly found in the southern hemisphere. Very high concentration of PAHs in pellet samples can be utilized for early identification of recent oil pollution. High PAHs concentration in Tauranga, New Zealand was found to be caused by local oil spill. Hopanes in pellets can be used for source identification of oil pollution. Global mapping and comparison among IPW data can be used to provide better explanations to IPW volunteers by sorting concentrations into pollution categories. Communication reports are tailor written based on the volunteers familiarity to IPW's issues, educational background, occupation and their potential to further spread awareness. Based on feedbacks, the volunteers were grateful to receive reports of their

  5. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  6. Network Intrusion Forensic Analysis Using Intrusion Detection System

    OpenAIRE

    Manish Kumar; Dr. M. Hanumanthappa; Dr. T.V. Suresh Kumar

    2011-01-01

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investi...

  7. Non-Intrusive Intelligibility Prediction Using a Codebook-Based Approach

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Kavalekalam, Mathew Shaji; Xenaki, Angeliki

    2017-01-01

    It could be beneficial for users of hearing aids if these were able to automatically adjust the processing according to the speech intelligibility in the specific acoustic environment. Most speech intelligibility metrics are intrusive, i.e., they require a clean reference signal, which is rarely...... a high correlation between the proposed non-intrusive codebookbased STOI (NIC-STOI) and the intrusive STOI indicating that NIC-STOI is a suitable metric for automatic classification of speech signals...

  8. From intrusive to oscillating thoughts.

    Science.gov (United States)

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  9. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  10. Polyvinyl chloride resin

    International Nuclear Information System (INIS)

    Kim, Hong Jae

    1976-06-01

    This book contains polyvinyl chloride resin industry with present condition such as plastic industry and polyvinyl chloride in the world and Japan, manufacture of polyvinyl chloride resin ; suspension polymerization and solution polymerization, extruding, injection process, hollow molding vinyl record, vacuum forming, polymer powders process, vinyl chloride varnish, vinyl chloride latex, safety and construction on vinyl chloride. Each chapter has descriptions on of process and kinds of polyvinyl chloride resin.

  11. Intrusion of beach-disposed dredger spoil into the Mhlathuze ...

    African Journals Online (AJOL)

    Sediment intrusion and its impact on the beds of the seagrass Zostera capensis in the estuary were monitored from 1996 to 1999. Fine sediment did enter the estuary from the marine environment and was deposited mainly in its lower reaches, where its settling on the leaves of Zostera resulted in a major die-back. However ...

  12. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  13. On emulation-based network intrusion detection systems

    NARCIS (Netherlands)

    Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; Etalle, S.; Stavrou, A.; Bos, H.; Portokalidis, G.

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity.

  14. Data Mining for Intrusion Detection

    Science.gov (United States)

    Singhal, Anoop; Jajodia, Sushil

    Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This chapter discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested.

  15. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor .... and after amplification is finally read by a digital multimeter (Fluke make: 179 true ... To study the response of the present FO refractometer, propylene glycol has been ... values of all the samples were initially measured by Abbe's refractometer.

  16. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  17. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  18. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  19. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  20. Evaluation of the resin oxidation process using Fenton's reagent

    International Nuclear Information System (INIS)

    Araujo, Leandro G.; Goes, Marcos M.; Marumo, Julio T.

    2013-01-01

    The ion exchange resin is considered radioactive waste after its final useful life in nuclear reactors. Usually, this type of waste is treated with the immobilization in cement Portland, in order to form a solid monolithic matrix, reducing the possibility of radionuclides release in to environment. Because of the characteristic of expansion and contraction of the resins in presence of water, its incorporation in the common Portland cement is limited in 10% in direct immobilization, causing high costs in the final product. A pre-treatment would be able to reduce the volume, degrading the resins and increasing the load capacity of this material. This paper is about a method of degradation of ion spent resins from the nuclear research reactor of Nuclear and Energy Research Institute (IPEN/CNEN-SP), Brazil, using the Fenton's reagent. The resin evaluated was a mixture of cationic and anionic resins. The reactions were conducted by varying the concentration of the catalyst (25 to 80 mM), with and without external heat. The time of reaction was two hours. The concentration of 50 mM of catalyst was the most effective in degrading approximately 99%. The resin degradation was confirmed by the presence of CaCO 3 as a white precipitate resulting from the reaction between the Ca(OH) 2 and the CO 2 from the resin degradation. It was possible to degrade the resins without external heating. The calcium carbonates showed no correlation with the residual resin mass. (author)

  1. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  2. Intrusive Images in Psychological Disorders

    OpenAIRE

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in th...

  3. Incineration of spent ion exchange resin

    International Nuclear Information System (INIS)

    Hasegawa, Chiaki

    1990-01-01

    It is a pressing need to reduce radioactive waste which is generated from the maintenance and operation of a nuclear power plant. Incineration of low level combustible solid waste such as polyethylene seats, paper and others have been successfully performed since 1984 at the Shimane Nuclear Power Station. Furthermore, for extending incineration treatment to spent ion exchange resin, the incineration test was carried out in 1989. However, as the cation exchange resin contains sulfur and then incineration generates SOx gases, so the components of this facility will be in a corrosive environment. We surveyed incineration conditions to improve the corrosive environment at the exhaust gas treatment system. This paper includes these test results and improved method to incinerate spent ion exchange resin. (author)

  4. Saharan dust intrusions in Spain: Health impacts and associated synoptic conditions.

    Science.gov (United States)

    Díaz, Julio; Linares, Cristina; Carmona, Rocío; Russo, Ana; Ortiz, Cristina; Salvador, Pedro; Trigo, Ricardo Machado

    2017-07-01

    A lot of papers have been published about the impact on mortality of Sahara dust intrusions in individual cities. However, there is a lack of studies that analyse the impact on a country and scarcer if in addition the analysis takes into account the meteorological conditions that favour these intrusions. The main aim is to examine the effect of Saharan dust intrusions on daily mortality in different Spanish regions and to characterize the large-scale atmospheric circulation anomalies associated with such dust intrusions. For determination of days with Saharan dust intrusions, we used information supplied by the Ministry of Agriculture, Food & Environment, it divides Spain into 9 main areas. In each of these regions, a representative province was selected. A time series analysis has been performed to analyse the relationship between daily mortality and PM 10 levels in the period from 01.01.04 to 31.12.09, using Poisson regression and stratifying the analysis by the presence or absence of Saharan dust advections. The proportion of days on which there are Saharan dust intrusions rises to 30% of days. The synoptic pattern is characterised by an anticyclonic ridge extending from northern Africa to the Iberian Peninsula. Particulate matter (PM) on days with intrusions are associated with daily mortality, something that does not occur on days without intrusions, indicating that Saharan dust may be a risk factor for daily mortality. In other cases, what Saharan dust intrusions do is to change the PM-related mortality behaviour pattern, going from PM 2.5 . A study such as the one conducted here, in which meteorological analysis of synoptic situations which favour Saharan dust intrusions, is combined with the effect on health at a city level, would seem to be crucial when it comes to analysing the differentiated mortality pattern in situations of Saharan dust intrusions. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection.

    Science.gov (United States)

    Hu, Weiming; Gao, Jun; Wang, Yanguo; Wu, Ou; Maybank, Stephen

    2014-01-01

    Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.

  6. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  7. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  8. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  9. An international perspective on Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  10. Intrusive Images in Psychological Disorders

    Science.gov (United States)

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  11. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  12. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    International Nuclear Information System (INIS)

    P. Bernot

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  13. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  14. Radiological risks due to intrusion into a deep bedrock repository

    International Nuclear Information System (INIS)

    Nordlinder, S.; Bergstroem, U.; Edlund, O.

    1999-01-01

    The Swedish concept for disposal of high-level waste is a deep (500 m) bedrock repository (SFL) protected by multiple barriers that isolate the waste from the environment for such a long time that the physical decay will cause a substantial reduction of the radioactivity. The aim of concentration and isolation of high-level waste is to reduce the radiation risk. Intrusion in the repository may introduce a small residual risk to individuals. A risk analysis was performed comprising dose assessment and probabilities of occurrence. Intrusions may be considered to take place either due to conscious actions or by actions without any knowledge about the repository. For conscious intrusion it may be assumed that there will be enough knowledge to manage the radiation situation in a professional manner. Several reasons for making inadvertent intrusion are possible. Independently of the purpose, the most probable initial way of coming into contact with the radioactive material is by deep drilling. Examples of causes for drilling could be general scientific purposes or exploitation of geothermal energy. Dose assessments were made for intrusion due to inclined drilling directly into a canister, and drilling near an initially malfunctioning canister from which radionuclides have leaked into the groundwater. For the former case, external pathways were considered due to exposure from a core of the canister with fuel and contaminated bore dust. The most common drilling method is with water flushing for removal of bore dust, which will not cause any substantial transfer of radionuclides to air. For the second case, it was assumed that there was a well in the vicinity. The only pathway considered was therefore consumption of water because it dominates the exposure. The highest dose rates to man were, as expected, obtained by drilling into the canister. Dose rates decrease with time after closure. During the first time the relatively short-lived radionuclides Cs-137 and Sr-90 give

  15. Human intrusion: issues concerning its assessment

    International Nuclear Information System (INIS)

    Grimwood, P.D.; Smith, G.M.

    1989-01-01

    The potential significance of human intrusion in the performance assessment of radioactive waste repositories has been increasingly recognized in recent years. It is however an area of assessment in which subjective judgments dominate. This paper identifies some of the issues involved. These include regulatory criteria, scenario development, probability assignment, consequence assessment and measures to mitigate human intrusion

  16. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  17. Abstracting massive data for lightweight intrusion detection in computer networks

    KAUST Repository

    Wang, Wei

    2016-10-15

    Anomaly intrusion detection in big data environments calls for lightweight models that are able to achieve real-time performance during detection. Abstracting audit data provides a solution to improve the efficiency of data processing in intrusion detection. Data abstraction refers to abstract or extract the most relevant information from the massive dataset. In this work, we propose three strategies of data abstraction, namely, exemplar extraction, attribute selection and attribute abstraction. We first propose an effective method called exemplar extraction to extract representative subsets from the original massive data prior to building the detection models. Two clustering algorithms, Affinity Propagation (AP) and traditional . k-means, are employed to find the exemplars from the audit data. . k-Nearest Neighbor (k-NN), Principal Component Analysis (PCA) and one-class Support Vector Machine (SVM) are used for the detection. We then employ another two strategies, attribute selection and attribute extraction, to abstract audit data for anomaly intrusion detection. Two http streams collected from a real computing environment as well as the KDD\\'99 benchmark data set are used to validate these three strategies of data abstraction. The comprehensive experimental results show that while all the three strategies improve the detection efficiency, the AP-based exemplar extraction achieves the best performance of data abstraction.

  18. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  19. Radiation curable epoxy resin

    International Nuclear Information System (INIS)

    Najvar, D.J.

    1978-01-01

    A carboxyl containing polymer is either prepared in the presence of a polyepoxide or reacted with a polyepoxide. The polymer has sufficient acid groups to react with only about 1 to 10 percent of the epoxide (oxirane) groups. The remaining epoxide groups are reacted with an unsaturated monocarboxylic acid such as acrylic or methacrylic acid to form a radiation curable resin

  20. Resin impregnation process for producing a resin-fiber composite

    Science.gov (United States)

    Palmer, Raymond J. (Inventor); Moore, William E. (Inventor)

    1994-01-01

    Process for vacuum impregnation of a dry fiber reinforcement with a curable resin to produce a resin-fiber composite, by drawing a vacuum to permit flow of curable liquid resin into and through a fiber reinforcement to impregnate same and curing the resin-impregnated fiber reinforcement at a sufficient temperature and pressure to effect final curing. Both vacuum and positive pressure, e.g. autoclave pressure, are applied to the dry fiber reinforcement prior to application of heat and prior to any resin flow to compact the dry fiber reinforcement, and produce a resin-fiber composite of reduced weight, thickness and resin content, and improved mechanical properties. Preferably both a vacuum and positive pressure, e.g. autoclave pressure, are also applied during final curing.

  1. The Sonju Lake layered intrusion, northeast Minnesota: Internal structure and emplacement history inferred from magnetic fabrics

    Science.gov (United States)

    Maes, S.M.; Tikoff, B.; Ferre, E.C.; Brown, P.E.; Miller, J.D.

    2007-01-01

    The Sonju Lake intrusion (SLI), in northeastern Minnesota, is a layered mafic complex of Keweenawan age (1096.1 ?? 0.8 Ma) related to the Midcontinent rift. The cumulate paragenesis of the intrusion is recognized as broadly similar to the Skaergaard intrusion, a classic example of closed-system differentiation of a tholeiitic mafic magma. The SLI represents nearly closed-system differentiation through bottom-up fractional crystallization. Geochemical studies have identified the presence of a stratabound, 50-100 m thick zone anomalously enriched in Au + PGE. Similar to the PGE reefs of the Skaergaard intrusion, this PGE-enriched zone is hosted within oxide gabbro cumulates, about two-third of the way up from the base of the intrusion. We present a petrofabric study using the anisotropy of magnetic susceptibility (AMS) to investigate the emplacement and flow patterns within the Sonju Lake intrusion. Petrographic and electron microprobe studies, combined with AMS and hysteresis measurements indicate the primary source of the magnetic signal is pseudo-single domain (PSD) magnetite or titanomagnetite. Low field AMS was measured at 32 sites within the Sonju Lake intrusion, which provided information about primary igneous fabrics. The magnetic fabrics in the layered series of the Sonju Lake intrusion are consistent with sub-horizontal to inclined emplacement of the intrusion and show evidence that the cumulate layers were deposited in a dynamic environment. Well-aligned magnetic lineations, consistently plunging shallowly toward the southwest, indicate the source of the magma is a vertical sill-like feeder, presumably located beneath the Finland granite. The Finland granite acted as a density trap for the Sonju Lake magmas, forcing lateral flow of magma to the northeast. The strongly oblate magnetic shape fabrics indicate the shallowly dipping planar fabrics were enhanced by compaction of the crystal mush. ?? 2007 Elsevier B.V. All rights reserved.

  2. Development of a High-Throughput Ion-Exchange Resin Characterization Workflow.

    Science.gov (United States)

    Liu, Chun; Dermody, Daniel; Harris, Keith; Boomgaard, Thomas; Sweeney, Jeff; Gisch, Daryl; Goltz, Bob

    2017-06-12

    A novel high-throughout (HTR) ion-exchange (IEX) resin workflow has been developed for characterizing ion exchange equilibrium of commercial and experimental IEX resins against a range of different applications where water environment differs from site to site. Because of its much higher throughput, design of experiment (DOE) methodology can be easily applied for studying the effects of multiple factors on resin performance. Two case studies will be presented to illustrate the efficacy of the combined HTR workflow and DOE method. In case study one, a series of anion exchange resins have been screened for selective removal of NO 3 - and NO 2 - in water environments consisting of multiple other anions, varied pH, and ionic strength. The response surface model (RSM) is developed to statistically correlate the resin performance with the water composition and predict the best resin candidate. In case study two, the same HTR workflow and DOE method have been applied for screening different cation exchange resins in terms of the selective removal of Mg 2+ , Ca 2+ , and Ba 2+ from high total dissolved salt (TDS) water. A master DOE model including all of the cation exchange resins is created to predict divalent cation removal by different IEX resins under specific conditions, from which the best resin candidates can be identified. The successful adoption of HTR workflow and DOE method for studying the ion exchange of IEX resins can significantly reduce the resources and time to address industry and application needs.

  3. The evolution of interior intrusion detection technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combination developed when commercial sensors were unavailable and the future application of expert systems. 5 refs

  4. The evolution of Interior Intrusion Detection Technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  5. The evolution of interior intrusion detection technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-01-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the U.S. Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). The authors also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  6. Modelling saline intrusion for repository performance assessment

    International Nuclear Information System (INIS)

    Jackson, C.P.

    1989-04-01

    UK Nirex Ltd are currently considering the possibility of disposal of radioactive waste by burial in deep underground repositories. The natural pathway for radionuclides from such a repository to return to Man's immediate environment (the biosphere) is via groundwater. Thus analyses of the groundwater flow in the neighbourhood of a possible repository, and consequent radionuclide transport form an important part of a performance assessment for a repository. Some of the areas in the UK that might be considered as possible locations for a repository are near the coast. If a repository is located in a coastal region seawater may intrude into the groundwater flow system. As seawater is denser than fresh water buoyancy forces acting on the intruding saline water may have significant effects on the groundwater flow system, and consequently on the time for radionuclides to return to the biosphere. Further, the chemistry of the repository near-field may be strongly influenced by the salinity of the groundwater. It is therefore important for Nirex to have a capability for reliably modelling saline intrusion to an appropriate degree of accuracy in order to make performance assessments for a repository in a coastal region. This report describes work undertaken in the Nirex Research programme to provide such a capability. (author)

  7. 40 CFR 63.5698 - What emission limit must I meet for open molding resin and gel coat operations?

    Science.gov (United States)

    2010-07-01

    ... open molding resin and gel coat operations? 63.5698 Section 63.5698 Protection of Environment... Manufacturing Standards for Open Molding Resin and Gel Coat Operations § 63.5698 What emission limit must I meet for open molding resin and gel coat operations? (a) You must limit organic HAP emissions from the five...

  8. 40 CFR 63.5731 - What standards must I meet for resin and gel coat mixing operations?

    Science.gov (United States)

    2010-07-01

    ... and gel coat mixing operations? 63.5731 Section 63.5731 Protection of Environment ENVIRONMENTAL... Manufacturing Standards for Resin and Gel Coat Mixing Operations § 63.5731 What standards must I meet for resin and gel coat mixing operations? (a) All resin and gel coat mixing containers with a capacity equal to...

  9. Alpha intrusion on ovenight polysomnogram

    Directory of Open Access Journals (Sweden)

    Nahapetian R

    2014-06-01

    Full Text Available No abstract available. Article truncated after 150 words. A 30 year-old Army veteran with a past medical history significant for chronic lumbar back pain stemming from a fall-from-height injury sustained in 2006 was referred to the sleep laboratory for evaluation of chronic fatigue and excessive daytime hypersomnolence. His Epworth sleepiness scale score was 16. He denied a history of snoring and witnessed apnea. Body Mass Index (BMI was 25.7 kg/m2. His main sleep related complaints were frequent nocturnal arousals, poor sleep quality, un-refreshing sleep, prolonged latency to sleep onset, and nightmares. An In-lab attended diagnostic polysomnogram was performed. Sleep efficiency was reduced (73% and overall arousal index was not significantly elevated (3.2 events/hour. The sleep study showed rapid eye movement (REM related sleep disordered breathing that did not meet diagnostic criteria for sleep apnea. There was no evidence for period limb movement disorder. However, the study was significant for alpha wave intrusion in stage N2 non-REM and stage ...

  10. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  11. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  12. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  13. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  14. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  15. Prevention and analysis of hacker's intrusion

    International Nuclear Information System (INIS)

    Liu Baoxu; An Dehai; Xu Rongsheng

    2000-01-01

    The author analyzes the behavior characteristics and relevant technologies about the hacker's intrusion, and gives some corresponding solutions pertinently. To the recent events about hackers, the author gives detailed introduction and puts forward the relevant advice and valuable consideration

  16. A Nuisance Alarm Data System for evaluation of intrusion detectors

    International Nuclear Information System (INIS)

    Ream, W.K.

    1990-01-01

    A Nuisance Alarm Data System (NADS) was developed to gather long-term background alarm data on exterior intrusion detectors as part of their evaluation. Since nuisance alarms play an important part in the selection of intrusion detectors for use at Department of Energy (DOE) facilities, an economical and reliable way to monitor and record these alarms was needed. NADS consists of an IBM personal computer and printer along with other commercial units to communicate with the detectors, to gather weather data, and to record video for assessment. Each alarm, its assessment, and the weather conditions occurring at alarm time are placed into a data base that is used in the evaluation of the detector. The operating software is written in Turbo Pascal for easy maintenance and modification. A portable system, based on the NADS design, has been built and shipped to other DOE locations to do on-site alarm monitoring. This has been valuable for the comparison of different detectors in the on-site environment and for testing new detectors when the appropriate conditions do not exist or cannot be simulated at the Exterior Intrusion Detection Testbed

  17. Environment

    DEFF Research Database (Denmark)

    Valentini, Chiara

    2017-01-01

    The term environment refers to the internal and external context in which organizations operate. For some scholars, environment is defined as an arrangement of political, economic, social and cultural factors existing in a given context that have an impact on organizational processes and structures....... For others, environment is a generic term describing a large variety of stakeholders and how these interact and act upon organizations. Organizations and their environment are mutually interdependent and organizational communications are highly affected by the environment. This entry examines the origin...... and development of organization-environment interdependence, the nature of the concept of environment and its relevance for communication scholarships and activities....

  18. Embedding in thermosetting resins

    International Nuclear Information System (INIS)

    Buzonniere, A. de

    1985-01-01

    Medium activity waste coming either from nuclear power plants in operation such as evaporator concentrates, spent resins, filter cartridges or the dismantling of installations are embedded in order to obtain a product suitable for long term disposal. Embedding in thermosetting resins (polyester or epoxy) is one among currently used techniques; it is being developed by the CEA (Commissariat a l'Energie Atomique) and Technicatome (subsidiary of CEA and EDF). The process is easy to operate and yields excellent results particularly as far as volume reduction and radioelement containment (cesium particularly) are concerned. The process has already been in operation in four stationary plants for several years. Extension of the process to mobile units has been completed by Technicatome in collaboration with the CEA [fr

  19. Intrusion problematic during water supply systems’ operation

    OpenAIRE

    Jesus Mora-Rodriguez, P. Amparo López-Jimenez, Helena M. Ramos

    2011-01-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuse...

  20. Paramagnetic epoxy resin

    Directory of Open Access Journals (Sweden)

    E. C. Vazquez Barreiro

    2017-01-01

    Full Text Available This work illustrates that macrocycles can be used as crosslinking agents for curing epoxy resins, provided that they have appropriate organic functionalities. As macrocycles can complex metal ions in their structure, this curing reaction allows for the introduction of that metal ion into the resin network. As a result, some characteristic physical properties of the metallomacrocycle could be transferred to the new material. The bisphenol A diglycidyl ether (BADGE, n = 0 and hemin (a protoporphyrin IX containing the Fe(III ion, and an additional chloride ligand have been chosen. The new material has been characterized by differential scanning calorimetry (DSC, thermogravimetric analysis (TGA, Fourier Transform Infrared (FT-IR, Nuclear Magnetic Resonance (NMR, Transmission Electron Microscopy (TEM, and magnetic susceptibility measurements. Fe(III remains in the high-spin state during the curing process and, consequently, the final material exhibits the magnetic characteristics of hemin. The loss of the chlorine atom ligand during the cure of the resin allows that Fe(III can act as Lewis acid, catalyzing the crosslinking reactions. At high BADGE n = 0/hemin ratios, the formation of ether and ester bonds occurs simultaneously during the process.

  1. System for removing contaminants from plastic resin

    Science.gov (United States)

    Bohnert, George W.; Hand, Thomas E.; DeLaurentiis, Gary M.

    2010-11-23

    A resin recycling system that produces essentially contaminant-free synthetic resin material in an environmentally safe and economical manner. The system includes receiving the resin in container form. A grinder grinds the containers into resin particles. The particles are exposed to a solvent in one or more solvent wash vessels, the solvent contacting the resin particles and substantially removing contaminants on the resin particles. A separator is used to separate the resin particles and the solvent. The resin particles are then placed in solvent removing element where they are exposed to a solvent removing agent which removes any residual solvent remaining on the resin particles after separation.

  2. A comparative study to determine strength of autopolymerizing acrylic resin and autopolymerizing composite resin influenced by temperature during polymerization: An In Vitro study

    Directory of Open Access Journals (Sweden)

    Anuj Chhabra

    2017-01-01

    Full Text Available Aim: Temporary coverage of a prepared tooth is an important step during various stages of the fixed dental prosthesis. Provisional restorations should satisfy proper mechanical requirements to resist functional and nonfunctional loads. A few studies are carried out regarding the comparison of the effect of curing environment, air and water, on mechanical properties of autopolymerizing acrylic and composite resin. Hence, the aim of this study was to compare the transverse strength of autopolymerizing acrylic resin and autopolymerizing composite resin as influenced by the temperature of air and water during polymerization. Materials and Methods: Samples of autopolymerizing acrylic resin and composite resin were prepared by mixing as per manufacturer's instructions and were placed in a preformed stainless steel mold. The mold containing the material was placed under different controlled conditions of water temperature and air at room temperature. Polymerized samples were then tested for transverse strength using an Instron universal testing machine. Results: Alteration of curing condition during polymerization revealed a significant effect on the transverse strength. The transverse strength of acrylic resin specimens cured at 60°C and composite resin specimens cured at 80°C was highest. Polymerizing the resin in cold water at 10°C reduced the mechanical strength. Conclusions: Polymerization of the resin in hot water greatly increased its mechanical properties. The method of placing resin restoration in hot water during polymerization may be useful for improving the mechanical requirements and obtaining long-lasting performance.

  3. Testing a 1-D Analytical Salt Intrusion Model and the Predictive Equation in Malaysian Estuaries

    Science.gov (United States)

    Gisen, Jacqueline Isabella; Savenije, Hubert H. G.

    2013-04-01

    Little is known about the salt intrusion behaviour in Malaysian estuaries. Study on this topic sometimes requires large amounts of data especially if a 2-D or 3-D numerical models are used for analysis. In poor data environments, 1-D analytical models are more appropriate. For this reason, a fully analytical 1-D salt intrusion model, based on the theory of Savenije in 2005, was tested in three Malaysian estuaries (Bernam, Selangor and Muar) because it is simple and requires minimal data. In order to achieve that, site surveys were conducted in these estuaries during the dry season (June-August) at spring tide by moving boat technique. Data of cross-sections, water levels and salinity were collected, and then analysed with the salt intrusion model. This paper demonstrates a good fit between the simulated and observed salinity distribution for all three estuaries. Additionally, the calibrated Van der Burgh's coefficient K, Dispersion coefficient D0, and salt intrusion length L, for the estuaries also displayed a reasonable correlations with those calculated from the predictive equations. This indicates that not only is the salt intrusion model valid for the case studies in Malaysia but also the predictive model. Furthermore, the results from this study describe the current state of the estuaries with which the Malaysian water authority in Malaysia can make decisions on limiting water abstraction or dredging. Keywords: salt intrusion, Malaysian estuaries, discharge, predictive model, dispersion

  4. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    International Nuclear Information System (INIS)

    Bernot, P.

    2004-01-01

    -chemical environment and seepage water alteration by reaction with intruded basalt. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the waste package pallet. The results of this model report will be used in TSPA for several parameters including (1) temperature of magma (used for the temperature of the waste form after an intrusion) (2) temperature increase in Zone 2 due to intrusion to evaluate impact to Zone 2 waste packages; (3) effects of exsolved gases reaching Zone 2 to evaluate impact to Zone 2 waste packages; and (4) pH and ionic strength of water reacted with basalt to be used in conjunction with ''Dissolved Concentration Limits of Radioactive Elements'' (BSC 2003 [DIRS: 163152]) to determine solubility of spent fuel within the basalt. Ionic strength will also be used in conjunction with ''Waste Form and In-Drift Colloids-Associated Radionuclide Concentrations: Abstraction and Summary'' (BSC 2003 [DIRS: 166845]) for stability of colloids

  5. Contact allergy to epoxy resin

    DEFF Research Database (Denmark)

    Bangsgaard, Nannie; Thyssen, Jacob Pontoppidan; Menné, Torkil

    2012-01-01

    Background. Epoxy resin monomers are strong skin sensitizers that are widely used in industrial sectors. In Denmark, the law stipulates that workers must undergo a course on safe handling of epoxy resins prior to occupational exposure, but the effectiveness of this initiative is largely unknown...... in an educational programme. Conclusion. The 1% prevalence of epoxy resin contact allergy is equivalent to reports from other countries. The high occurrence of epoxy resin exposure at work, and the limited use of protective measures, indicate that reinforcement of the law is required....

  6. Count out your intrusions: Effects of verbal encoding on intrusive memories

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.

    2009-01-01

    Peri-traumatic information processing is thought to affect the development of intrusive trauma memories. This study aimed to replicate and improve the study by Holmes, Brewin, and Hennessy (2004, Exp. 3) on the role of peri-traumatic verbal processing in analogue traumatic intrusion development.

  7. Resin regenerating device in condensate desalting system

    International Nuclear Information System (INIS)

    Sato, Yoshiaki; Igarashi, Hiroo; Oosumi, Katsumi; Nishimura, Yusaku; Ebara, Katsuya; Shindo, Norikazu.

    1984-01-01

    Purpose: To improve the accuracy in the separation of anionic and cationic exchange resins. Constitution: Resins transferred from a condensate desalting column are charged in a cationic exchange resin column. The temperature of water for separating and transferring the resins is measured by a temperature detector disposed in a purified water injection line, and water is adjusted to a suitable flow rate for the separation and transfer of the resins by an automatic flow rate control valve, and then is injected. The resins are separated into cationic exchange resins and anionic exchange resins, in which only the anionic exchange resins are transferred, through an anionic exchange transfer line, into an anionic exchange resin column. By controlling the flow rate depending on the temperature of the injected water, the developing rate of the resin layer is made constant to enable separation and transfer of the resins at high accuracy. (Seki, T.)

  8. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  9. Innovative methods to reduce salt water intrusion in harbours

    Science.gov (United States)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  10. Urea-formaldehyde resins: production, application, and testing

    Science.gov (United States)

    Nuryawan, A.; Risnasari, I.; Sucipto, T.; Heri Iswanto, A.; Rosmala Dewi, R.

    2017-07-01

    Urea-formaldehyde (UF) resin, one of the most important formaldehyde resin adhesives, is a polymeric condensation product of formaldehyde with urea, and being widely used for the manufacture of wood-based composite panels, such as plywood, particleboard, and fiberboard. In spite of its benefits such as fast curing, good performance in the panels (colorless), and lower cost; formaldehyde emission (FE) originated from either UF resin itself or composite products bonded by UF resins is considered a critical drawback as it affects human health particularly in indoor environment. In order to reduce the FE, lowering formaldehyde/urea (F/U) mole ratio in the synthesis of the UF resin was done. In this study, synthesis of UF resins was carried out following the conventional alkaline-acid two-step reaction with a second addition of urea, resulting in F/U mole ratio around 1.0, namely 0.95; 1.05, and 1.15. The UF resins produced were used as binder for particleboard making. The board was manufactured in the laboratory using shaving type particle of Gmelina wood, 8% UF resin based on oven dry particle, and 1% NH4Cl (20%wt) as hardener for the resin. The target of the thickness was 10 mm and the dimension was 25 cm x 25 cm. The resulted particleboard then was evaluated the physical and the mechanical properties by Japanese Industrial Standard (JIS) A 5908 (2003). Further, the resulted particleboard also was used for the mice cage’s wall in order to mimic the real living environment. After four weeks exposure in the cages, the mice then were evaluated their mucous organs as well as their blood. The experiment results were as follows: 1) It was possible to synthesis UF resins with low F/U mole ratio; 2) However, the particleboard bonded UF resins with low F/U mole ratio showed poor properties, particularly on the thickness swelling and modulus of elasticity; 3) There was no significant differences among the mucous organs of the mice after a month exposure FE originated from

  11. Properties of the Carboxylate ion exchange resins

    International Nuclear Information System (INIS)

    Allard, Bert; Dario, Maarten; Boren, Hans; Torstenfelt, Boerje; Puigdomenech, Ignasi; Johansson, Claes

    2002-09-01

    Weakly acidic, carboxylic resin has been selected, together with strong base anion resins, for water purification at the Forsmark 1 and 2 reactors. For the strong (but not the weak) ion exchange resin the Nuclear Power Inspectorate has given permission to dispose the spent resins in the SFR 1 (the Final Repository for Radioactive Operational Waste). This report gives a review of the carboxylic resins and comes to the conclusion that the resins are very stable and that there should not exist any risks for increased leaching of radionuclides from SFR 1 if these resins are disposed (compared to the strong resins)

  12. Evidential reasoning research on intrusion detection

    Science.gov (United States)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  13. [Acrylic resin removable partial dentures

    NARCIS (Netherlands)

    Baat, C. de; Witter, D.J.; Creugers, N.H.J.

    2011-01-01

    An acrylic resin removable partial denture is distinguished from other types of removable partial dentures by an all-acrylic resin base which is, in principle, solely supported by the edentulous regions of the tooth arch and in the maxilla also by the hard palate. When compared to the other types of

  14. Chemoviscosity modeling for thermosetting resins

    Science.gov (United States)

    Tiwari, S. N.; Hou, T. H.; Bai, J. M.

    1985-01-01

    A chemoviscosity model, which describes viscosity rise profiles accurately under various cure cycles, and correlates viscosity data to the changes of physical properties associated with structural transformations of the thermosetting resin system during cure, was established. Work completed on chemoviscosity modeling for thermosetting resins is reported.

  15. Cure shrinkage in casting resins

    Energy Technology Data Exchange (ETDEWEB)

    Spencer, J. Brock [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-02-01

    A method is described whereby the shrinkage of a casting resin can be determined. Values for the shrinkage of several resin systems in frequent use by Sandia have been measured. A discussion of possible methods for determining the stresses generated by cure shrinkage and thermal contraction is also included.

  16. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  17. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  18. Magmatic intrusions in the lunar crust

    Science.gov (United States)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  19. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  20. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  1. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  2. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  3. Fossilization History of Fossil Resin from Jambi Province (Sumatra, Indonesia Based on Physico-Chemical Studies

    Directory of Open Access Journals (Sweden)

    Beata Naglik

    2018-03-01

    Full Text Available A unique specimen of fossil resin originating from the Dipterocarpaceae tree family found in Miocene brown coal deposits in Jambi Province (Sumatra, Indonesia was investigated via microscopic observations, microhardness testing and infrared and Raman spectroscopic methods. Its form is rare in nature, being an aggregate of three varieties of resin differing in colour, transparency and internal structure. This suggests the formation of the resins at different stages. Further alteration processes, including fossilization and maturation of the resin in a swamp environment resulted in stepwise aromatization of the cyclohexane ring in steroids and cross-linking through formation of ester bonds as well as carbon–carbon bonds between steroid molecules. The various environmental and geological conditions affecting the formation processes of the resins were recorded in their physico-chemical properties. Additionally, heating conditions accelerated by volcanism were proposed as a factor determining the maturation grade of the resin.

  4. Energy Efficient Monitoring for Intrusion Detection in Battery-Powered Wireless Mesh Networks

    KAUST Repository

    Hassanzadeh, Amin; Stoleru, Radu; Shihada, Basem

    2011-01-01

    in such environments battery-powered mesh routers, operating in an energy efficient manner, are required. To the best of our knowledge, the impact of energy efficient solutions, e.g., involving duty-cycling, on WMN intrusion detection systems, which require continuous

  5. Chromatography resin support

    Science.gov (United States)

    Dobos, James G.

    2002-01-01

    An apparatus and method of using an improved chromatography resin support is disclosed. The chromatography support platform is provided by a stainless steel hollow cylinder adapted for being inserted into a chromatography column. An exterior wall of the stainless steel cylinder defines a groove for carrying therein an "O"-ring. The upper surface of the stainless steel column is covered by a fine stainless steel mesh welded to the edges of the stainless steel cylinder. When placed upon a receiving ledge defined within a chromatography column, the "O"-ring provides a fluid tight seal with the inner edge wall of the chromatography cylinder. The stainless steel mesh supports the chromatography matrix and provides a back flushable support which is economical and simple to construct.

  6. Wave Induced Saline Intrusion in Sea Outfalls

    DEFF Research Database (Denmark)

    Larsen, Torben; Burrows, Richard

    1989-01-01

    Experimental and numerical studies have shown that the influence of wave increases the tendency of saline intrusion in multi-riser sea outfalls. The flow field in the diffusor under such unsteady and inhomogeneous circumstances is in general very complex, but when sufficient wave energy is dissip...

  7. Work Zone Intrusion Report Interface Design

    Science.gov (United States)

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  8. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  9. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  10. Root resorption after orthodontic intrusion and extrusion:.

    NARCIS (Netherlands)

    Han, G.; Huang, S.; Hoff, J.W. Von den; Zeng, X.; Kuijpers-Jagtman, A.M.

    2005-01-01

    The aim of this investigation was to compare root resorption in the same individual after application of continuous intrusive and extrusive forces. In nine patients (mean age 15.3 years), the maxillary first premolars were randomly intruded or extruded with a continuous force of 100 cN for eight

  11. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  12. Petrology of the Sutherland commanage melilite intrusives

    International Nuclear Information System (INIS)

    Viljoen, K.S.

    1990-01-01

    The petrology of the Sutherland Commonage olivine melilitite intrusives have been investigated using petrographic and chemical methods. The results of the geochemical study suggest that the Commonage melilites were derived by the melting of a recently metasomatised region of the asthenosphere, probably under the influence of an ocean-island-type hotspot situated in the lower mantle

  13. [Acrylic resin removable partial dentures].

    Science.gov (United States)

    de Baat, C; Witter, D J; Creugers, N H J

    2011-01-01

    An acrylic resin removable partial denture is distinguished from other types of removable partial dentures by an all-acrylic resin base which is, in principle, solely supported by the edentulous regions of the tooth arch and in the maxilla also by the hard palate. When compared to the other types of removable partial dentures, the acrylic resin removable partial denture has 3 favourable aspects: the economic aspect, its aesthetic quality and the ease with which it can be extended and adjusted. Disadvantages are an increased risk of caries developing, gingivitis, periodontal disease, denture stomatitis, alveolar bone reduction, tooth migration, triggering of the gag reflex and damage to the acrylic resin base. Present-day indications are ofa temporary or palliative nature or are motivated by economic factors. Special varieties of the acrylic resin removable partial denture are the spoon denture, the flexible denture fabricated of non-rigid acrylic resin, and the two-piece sectional denture. Furthermore, acrylic resin removable partial dentures can be supplied with clasps or reinforced by fibers or metal wires.

  14. LIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios; Krontiris, Ioannis; Dimitriou, Tassos

    2008-01-01

    to achieve a more autonomic and complete defense mechanism, even against attacks that have not been anticipated in advance. In this paper, we present a lightweight intrusion detection system, called LIDeA, designed for wireless sensor networks. LIDeA is based on a distributed architecture, in which nodes......Wireless sensor networks are vulnerable to adversaries as they are frequently deployed in open and unattended environments. Preventive mechanisms can be applied to protect them from an assortment of attacks. However, more sophisticated methods, like intrusion detection systems, are needed...

  15. Animal intrusion status report for fiscal year 1990

    International Nuclear Information System (INIS)

    Landeen, D.S.

    1991-03-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion work conducted by Westinghouse Hanford Company in fiscal year 1990 regarding small mammals and water infiltration. An animal intrusion lysimeter facility was constructed and installed in fiscal year 1988. The facility consists of two outer boxes buried at grade that serve as receptacles for six animal intrusion lysimeters. Small burrowing mammals common to the Hanford Site environs are introduced over a 3- to 4-month period. Supplemental precipitation is added to three of the lysimeters with a rainulator at a rate equivalent to a 100-year storm. Soil moisture samples are taken before and after each test, and soil moisture measurements are also taken with a hydroprobe during the test period. During fiscal year 1990, tests three and four were completed and test five was initiated. Results of test three (summer treatment), which used Townsend ground squirrels and pocket gophers, indicated that the additional 1.5 inches of precipitation that was added with the rainulator was lost during this test. The plots that did not receive any additional precipitation all lost water (5 to 6 percent). Results from test four (winter treatment), which used pocket gophers and pocket mice, indicated that all of the lysimeters except one gained water. The two control lysimeters (rainulator plots and nonrainulator lysimeters with no animals) gained more water than their corresponding animal burrow lysimeters. 4 refs., 9 figs., 3 tabs

  16. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    Seawater intrusion; coastal aquifers; density-dependent flow and ... The seawater intrusion mechanism in coastal aquifers generally causes the occurrence of ... (4) The dynamic viscosity of the fluid does not change with respect to salinity and.

  17. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  18. Attacks and Intrusion Detection in Cloud Computing Using Neural Networks and Particle Swarm Optimization Algorithms

    Directory of Open Access Journals (Sweden)

    Ahmad Shokuh Saljoughi

    2018-01-01

    Full Text Available Today, cloud computing has become popular among users in organizations and companies. Security and efficiency are the two major issues facing cloud service providers and their customers. Since cloud computing is a virtual pool of resources provided in an open environment (Internet, cloud-based services entail security risks. Detection of intrusions and attacks through unauthorized users is one of the biggest challenges for both cloud service providers and cloud users. In the present study, artificial intelligence techniques, e.g. MLP Neural Network sand particle swarm optimization algorithm, were used to detect intrusion and attacks. The methods were tested for NSL-KDD, KDD-CUP datasets. The results showed improved accuracy in detecting attacks and intrusions by unauthorized users.

  19. Effects of blood contamination on resin-resin bond strength.

    Science.gov (United States)

    Eiriksson, Sigurdur O; Pereira, Patricia N R; Swift, Edward J; Heymann, Harald O; Sigurdsson, Asgeir

    2004-02-01

    Incremental placement and curing of resin composites has been recommended. However, this requires longer operating time, and therefore, increased risk of contamination. The purpose of this study was to evaluate the effects of blood contamination on microtensile bond strengths (microTBS) between resin interfaces and to determine the best decontamination method to re-establish the original resin-resin bond strength. The top surfaces of 64, 4-mm composite blocks (Z-250, Renew, APX, Pertac II) were untreated as the control, or were treated as follows: blood applied and dried on the surface (Treatment 1), blood applied, rinsed, dried (Treatment 2), blood applied, rinsed, and an adhesive applied (Single Bond, One-Step, Clearfil SE, Prompt L-Pop) (Treatment 3). Fresh composite was applied and light-cured in 2-mm increments. After 24 h storage in water, the specimens were sectioned into 0.7-mm thick slabs, trimmed to a cross-sectional area of 1 mm(2), and loaded to failure at a crosshead speed of 1 mm/min using an Instron universal testing machine. Data were analyzed using two-way ANOVA and Fisher's PLSD test (pcontamination resulted in resin-resin bond strengths of only 1.0-13.1 MPa. Rinsing raised bond strengths to over 40 MPa for each material. Use of an adhesive further increased bond strengths except for Pertac II. Rinsing blood from contaminated surfaces increases the resin-resin bond strength significantly and the application of an appropriate adhesive increases the bond strength to control levels.

  20. Wireless sensing without sensors—an experimental study of motion/intrusion detection using RF irregularity

    International Nuclear Information System (INIS)

    Lee, Pius W Q; Tan, Hwee-Pink; Seah, Winston K G; Yao, Zexi

    2010-01-01

    Motion and intrusion detection are often cited as wireless sensor network (WSN) applications with typical configurations comprising clusters of wireless nodes equipped with motion sensors to detect human motion. Currently, WSN performance is subjected to several constraints, namely radio irregularity and finite on-board computation/energy resources. Radio irregularity in radio frequency (RF) propagation rises to a higher level in the presence of human activity due to the absorption effect of the human body. In this paper, we investigate the feasibility of monitoring RF transmission for the purpose of intrusion detection through experimentation. With empirical data obtained from the Crossbow TelosB platform in several different environments, the impact of human activity on the signal strength of RF signals in a WSN is evaluated. We then propose a novel approach to intrusion detection by turning a constraint in WSN, namely radio irregularity, into an advantage for the purpose of intrusion detection, using signal fluctuations to detect the presence of human activity within the WSN. Unlike RF fingerprinting, the 'intruders' here neither transmit nor receive any RF signals. By enabling existing wireless infrastructures to serve as intrusion detectors instead of deploying numerous costly sensors, this approach shows great promise for providing novel solutions

  1. Epoxy resin systems for FGD units

    International Nuclear Information System (INIS)

    Brytus, V.; Puglisi, J.S.

    1984-01-01

    This paper discusses ongoing research work which is directed towards epoxy resins and curing agents which are designed to withstand aggressive environments. This work includes not only a chemical description of the materials involved, but the application testing necessary to verify the usefulness of these systems. It demonstrates that new high performance epoxy systems are superior to those which traditionally come to mind when one thinks epoxy. Finally, it discusses the results of testing designed specifically to screen candidates for use in FGD units

  2. Intrusive trauma memory: A review and functional analysis

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.; Holmes, E.A.

    2009-01-01

    Our contribution to this special issue focuses on the phenomenon of intrusive trauma memory. While intrusive trauma memories can undoubtedly cause impairment, we argue that they may exist for a potentially adaptive reason. Theory and experimental research on intrusion development are reviewed and

  3. Bending characteristics of resin concretes

    Directory of Open Access Journals (Sweden)

    Ribeiro Maria Cristina Santos

    2003-01-01

    Full Text Available In this research work the influence of composition and curing conditions in bending strength of polyester and epoxy concrete is analyzed. Various mixtures of resin and aggregates were considered in view of an optimal combination. The Taguchi methodology was applied in order to reduce the number of tests, and in order to evaluate the influence of various parameters in concrete properties. This methodology is very useful for the planning of experiments. Test results, analyzed by this methodology, shown that the most significant factors affecting bending strength properties of resin concretes are the type of resin, resin content and charge content. An optimal formulation leading to a maximum bending strength was achieved in terms of material parameters.

  4. Mechanism for transporting used resin

    International Nuclear Information System (INIS)

    Sugimoto, Yoshikazu; Yusa, Hideo; Kamiya, Kunio.

    1975-01-01

    Object: In the operation of a light water reactor type atomic power plant, to permit transport and reuse of used ion exchange resin used for the filtering or cleaning of cooling water or the desalting of radioactive exhaust liquid through an ejector. Structure: Used ion exchange resin within a desalter having high radioactivity is withdrawn through the action of an ejector and led to a solid-liquid separator for separation into used resin and water. The separated resin is directly collected in a storage tank while the separated water is forced through a circulating pump to a gas-liquid separator for separation into gas having radioactivity and water. The separated gas is led to a radioactive gas treatment station while the water deprived of the gas is recirculated by a drive water pump for repeated use. (Kamimura, M.)

  5. Bulk-Fill Resin Composites

    DEFF Research Database (Denmark)

    Benetti, Ana Raquel; Havndrup-Pedersen, Cæcilie; Honoré, Daniel

    2015-01-01

    the restorative procedure. The aim of this study, therefore, was to compare the depth of cure, polymerization contraction, and gap formation in bulk-fill resin composites with those of a conventional resin composite. To achieve this, the depth of cure was assessed in accordance with the International Organization...... for Standardization 4049 standard, and the polymerization contraction was determined using the bonded-disc method. The gap formation was measured at the dentin margin of Class II cavities. Five bulk-fill resin composites were investigated: two high-viscosity (Tetric EvoCeram Bulk Fill, SonicFill) and three low......-viscosity (x-tra base, Venus Bulk Fill, SDR) materials. Compared with the conventional resin composite, the high-viscosity bulk-fill materials exhibited only a small increase (but significant for Tetric EvoCeram Bulk Fill) in depth of cure and polymerization contraction, whereas the low-viscosity bulk...

  6. Mechanism for transporting used resin

    Energy Technology Data Exchange (ETDEWEB)

    Sugimoto, Y; Yusa, H; Kamiya, K

    1975-01-16

    In the operation of a light water reactor type atomic power plant the objectives is to permit transport and reuse of used ion exchange resin used for the filtering or cleaning of cooling water or the desalting of radioactive exhaust liquid through an ejector. Used ion exchange resin within a desalter having high radioactivity is withdrawn through the action of an ejector and led to a solid-liquid separator for separation into used resin and water. The separated resin is directly collected in a storage tank while the separated water is forced through a circulating pump to a gas-liquid separator for separation into gas having radioactivity and water. The separated gas is led to a radioactive gas treatment station while the water deprived of the gas is recirculated by a drive water pump for repeated use.

  7. Acute effects of alcohol on intrusive memory development and viewpoint dependence in spatial memory support a dual representation model.

    Science.gov (United States)

    Bisby, James A; King, John A; Brewin, Chris R; Burgess, Neil; Curran, H Valerie

    2010-08-01

    A dual representation model of intrusive memory proposes that personally experienced events give rise to two types of representation: an image-based, egocentric representation based on sensory-perceptual features; and a more abstract, allocentric representation that incorporates spatiotemporal context. The model proposes that intrusions reflect involuntary reactivation of egocentric representations in the absence of a corresponding allocentric representation. We tested the model by investigating the effect of alcohol on intrusive memories and, concurrently, on egocentric and allocentric spatial memory. With a double-blind independent group design participants were administered alcohol (.4 or .8 g/kg) or placebo. A virtual environment was used to present objects and test recognition memory from the same viewpoint as presentation (tapping egocentric memory) or a shifted viewpoint (tapping allocentric memory). Participants were also exposed to a trauma video and required to detail intrusive memories for 7 days, after which explicit memory was assessed. There was a selective impairment of shifted-view recognition after the low dose of alcohol, whereas the high dose induced a global impairment in same-view and shifted-view conditions. Alcohol showed a dose-dependent inverted "U"-shaped effect on intrusions, with only the low dose increasing the number of intrusions, replicating previous work. When same-view recognition was intact, decrements in shifted-view recognition were associated with increases in intrusions. The differential effect of alcohol on intrusive memories and on same/shifted-view recognition support a dual representation model in which intrusions might reflect an imbalance between two types of memory representation. These findings highlight important clinical implications, given alcohol's involvement in real-life trauma. Copyright 2010 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.

  8. Resin transfer molding for advanced composite primary aircraft structures

    Science.gov (United States)

    Markus, Alan; Palmer, Ray

    1991-01-01

    Resin Transfer Molding (RTM) has been identified by Douglas Aircraft Company (DAC) and industry to be one of the promising processes being developed today which can break the cost barrier of implementing composite primary structures into a commercial aircraft production environment. The RTM process developments and scale-up plans Douglas Aircrart will be conducting under the NASA ACT contract are discussed.

  9. Degradation of dental resin composites during intra-oral wear

    NARCIS (Netherlands)

    Yulianto, Heribertus Dedy Kusuma

    2017-01-01

    Dental resin composites have become an integral part of modern dentistry and used worldwide to restore missing tooth structures, to modify tooth color and anatomical contour, and to enhance aesthetics and function. The dentist should be aware that, the aggressive complexity of the oral environment

  10. Characteristics of resin floc dispersion of anion and cation exchange resin in precoat filter using powdered ion exchange resin

    Energy Technology Data Exchange (ETDEWEB)

    Adachi, Tetsurou (Nitto Denko Corp., Ibaraki, Osaka (Japan)); Sawa, Toshio; Shindoh, Toshikazu

    1989-09-01

    The filtration performance of mixed filter aid consisting of powdered anion and cation exchange resins used in the precoat filter is closely related to the characteristics of resin floc dispersion. The factors related to resin floc dispersion of anion and cation exchange resin were investigated by measuring the specific settle volume of resin floc as an evaluating index in addition to the measurement of physical, chemical and electrochemical properties of powdered ion exchange resin. The effect of adsorption of iron oxide and polymer electrolyte and of ion exchange were determined. In addition, considered floc dispersion with adsorbing iron oxide, it was assumed that the amount and filling ratio of resin floc were related to summation and multiplication of surface electric charge respectively. An experimental expression was obtained for simulation of the change of specific settle volume of resin floc by particle size, surface area, ion exchange capacity and degree of ionization of the powdered ion exchange resin. (author).

  11. Characteristics of resin floc dispersion of anion and cation exchange resin in precoat filter using powdered ion exchange resin

    International Nuclear Information System (INIS)

    Adachi, Tetsurou; Sawa, Toshio; Shindoh, Toshikazu.

    1989-01-01

    The filtration performance of mixed filter aid consisting of powdered anion and cation exchange resins used in the precoat filter is closely related to the characteristics of resin floc dispersion. The factors related to resin floc dispersion of anion and cation exchange resin were investigated by measuring the specific settle volume of resin floc as an evaluating index in addition to the measurement of physical, chemical and electrochemical properties of powdered ion exchange resin. The effect of adsorption of iron oxide and polymer electrolyte and of ion exchange were determined. In addition, considered floc dispersion with adsorbing iron oxide, it was assumed that the amount and filling ratio of resin floc were related to summation and multiplication of surface electric charge respectively. An experimental expression was obtained for simulation of the change of specific settle volume of resin floc by particle size, surface area, ion exchange capacity and degree of ionization of the powdered ion exchange resin. (author)

  12. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  13. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  14. Measurement of net nitrogen and phosphorus mineralization in wetland soils using a modification of the resin-core technique

    Science.gov (United States)

    Noe, Gregory B.

    2011-01-01

    A modification of the resin-core method was developed and tested for measuring in situ soil N and P net mineralization rates in wetland soils where temporal variation in bidirectional vertical water movement and saturation can complicate measurement. The modified design includes three mixed-bed ion-exchange resin bags located above and three resin bags located below soil incubating inside a core tube. The two inner resin bags adjacent to the soil capture NH4+, NO3-, and soluble reactive phosphorus (SRP) transported out of the soil during incubation; the two outer resin bags remove inorganic nutrients transported into the modified resin core; and the two middle resin bags serve as quality-control checks on the function of the inner and outer resin bags. Modified resin cores were incubated monthly for a year along the hydrogeomorphic gradient through a floodplain wetland. Only small amounts of NH4+, NO3-, and SRP were found in the two middle resin bags, indicating that the modified resin-core design was effective. Soil moisture and pH inside the modified resin cores typically tracked changes in the surrounding soil abiotic environment. In contrast, use of the closed polyethylene bag method provided substantially different net P and N mineralization rates than modified resin cores and did not track changes in soil moisture or pH. Net ammonification, nitrifi cation, N mineralization, and P mineralization rates measured using modified resin cores varied through space and time associated with hydrologic, geomorphic, and climatic gradients in the floodplain wetland. The modified resin-core technique successfully characterized spatiotemporal variation of net mineralization fluxes in situ and is a viable technique for assessing soil nutrient availability and developing ecosystem budgets.

  15. An Analysis of Security System for Intrusion in Smartphone Environment

    OpenAIRE

    Louk, Maya; Lim, Hyotaek; Lee, HoonJae

    2014-01-01

    There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecti...

  16. Deception Based Intrusion Detection & Prevention for SCADA Environments -

    Science.gov (United States)

    types of cyber security, cutting-edge cyber security technologies that are being brought into the energy of a state sponsorship - for states, it's very easy just to open up a shell company and buy whatever security controls, things like FireEye or things like your various types of firewalls that are out there

  17. Multilayer Statistical Intrusion Detection in Wireless Networks

    Science.gov (United States)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  18. Distributed fiber optic moisture intrusion sensing system

    Science.gov (United States)

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  19. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  20. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    Sulfide intrusion in seagrasses represents a global threat to seagrasses and thereby an important parameter in resilience of seagrass ecosystems. In contrast seegrasses colonize and grow in hostile sediments, where they are constantly exposed to invasion of toxic gaseous sulfide. Remarkably little...... strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis, tracing sulfur compounds combined with ecosystem parameters we found different spatial, intraspecific and interspecific strategies to cope with sulfidic sediments. 1...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  1. Diffusion in composite materials made of thermosetting resins

    International Nuclear Information System (INIS)

    Morin, Bruno.

    1981-03-01

    The embedding process of low and medium level radioactive wastes in thermosetting resins allows their containment in a solid matrix. During storage the risk of circulation of water is possible. The aim of this containment process is to prevent radionuclide migration in environment. Ion migration through membranes of thermosetting resins alone or filler added were measured to evaluate released radioactivity by embedded blocks with time and to compare the different embedding formulas. Water influence on diffusion was taken into account considering that radioactive wastes dispersion is faster in a wet medium than in a dry one [fr

  2. Characterization of selected LDEF polymer matrix resin composite materials

    Science.gov (United States)

    Young, Philip R.; Slemp, Wayne S.; Witte, William G., Jr.; Shen, James Y.

    1991-01-01

    The characterization of selected graphite fiber reinforced epoxy (934 and 5208) and polysulfone (P1700) matrix resin composite materials which received 5 years and 10 months of exposure to the LEO environment on the Long Duration Exposure Facility is reported. Resin loss and a decrease in mechanical performance as well as dramatic visual effects were observed. However, chemical characterization including infrared, thermal, and selected solution property measurements showed that the molecular structure of the polymeric matrix had not changed significantly in response to this exposure. The potential effect of a silicon-containing molecular contamination of these specimens is addressed.

  3. Pyrolysis and oxidative pyrolysis experiments with organization exchange resin

    International Nuclear Information System (INIS)

    Chun, Ung Kyung

    1997-01-01

    Pyrolysis may be an important pretreatment step before vitrification in a cold crucible melter (CCM). During vitrification of organic resin the carbon or other remaining residues may harm the performance of the cold crucible melter of the eventual stability of the final glass product. Hence, it is important to reduce or prevent such harmful waste from entry into the cold crucible melter. Pretreatment with pyrolysis will generally provide volume reduction resulting in less amount of solid waste that needs to be handled by the CCM; in addition, the pyrolytic processes may breakdown much of the complex organics causing release through volatilization resulting in less carbon and other harmful substances. Hence, KEPRI has undertaken studies on the pyrolysis and oxidative pyrolysis of organic ion exchange resin. Pyrolysis and oxidative pyrolysis were examined with TGA and a tube furnace. TGA results for pyrolysis with the flow of nitrogen indicate that even after pyrolyzing from room temperature to about 900 deg C, a significant mass fraction of the original cationic resin remains, approximately 46 %. The anionic resin when pyrolytically heated in a flow of nitrogen only, from room temperature to about 900 deg C, produced a final residue mass fraction of about 8 percent. Oxidation at a ratio of air to nitrogen, 1:2, reduced the cationic resin to 5.3% when heated at 5 C/min. Oxidation of anionic resin at the same ratio and same heating rate left almost no solid residue. Pyrolysis (e.g. nitrogen-only environment) in the tube furnace of larger samples relative to the TGA produced very similar results to the TGA. The differences may be attributed to the scale effects such as surface area exposure to the gas stream, temperature distributions throughout the resin, etc. (author) 7 refs., 7 figs

  4. Pyrolysis and oxidative pyrolysis experiments with organization exchange resin

    Energy Technology Data Exchange (ETDEWEB)

    Chun, Ung Kyung [Korea Electric Power Research Insititute, Taejon (Korea, Republic of)

    1997-12-31

    Pyrolysis may be an important pretreatment step before vitrification in a cold crucible melter (CCM). During vitrification of organic resin the carbon or other remaining residues may harm the performance of the cold crucible melter of the eventual stability of the final glass product. Hence, it is important to reduce or prevent such harmful waste from entry into the cold crucible melter. Pretreatment with pyrolysis will generally provide volume reduction resulting in less amount of solid waste that needs to be handled by the CCM; in addition, the pyrolytic processes may breakdown much of the complex organics causing release through volatilization resulting in less carbon and other harmful substances. Hence, KEPRI has undertaken studies on the pyrolysis and oxidative pyrolysis of organic ion exchange resin. Pyrolysis and oxidative pyrolysis were examined with TGA and a tube furnace. TGA results for pyrolysis with the flow of nitrogen indicate that even after pyrolyzing from room temperature to about 900 deg C, a significant mass fraction of the original cationic resin remains, approximately 46 %. The anionic resin when pyrolytically heated in a flow of nitrogen only, from room temperature to about 900 deg C, produced a final residue mass fraction of about 8 percent. Oxidation at a ratio of air to nitrogen, 1:2, reduced the cationic resin to 5.3% when heated at 5 C/min. Oxidation of anionic resin at the same ratio and same heating rate left almost no solid residue. Pyrolysis (e.g. nitrogen-only environment) in the tube furnace of larger samples relative to the TGA produced very similar results to the TGA. The differences may be attributed to the scale effects such as surface area exposure to the gas stream, temperature distributions throughout the resin, etc. (author) 7 refs., 7 figs.

  5. WIPP performance assessment: impacts of human intrusion

    International Nuclear Information System (INIS)

    Anderson, D.R.; Hunter, R.L.; Bertram-Howery, S.G.; Lappin, A.R.

    1989-01-01

    The Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico is a research and development facility that may become the USA's first and only mined geologic repository for transuranic waste. Human intrusion into the WIPP repository after closure has been shown by preliminary sensitivity analyses and calculations of consequences to be an important, and perhaps the most important, factor in long-term repository performance

  6. AMDIS Case Conference: Intrusive Medication Safety Alerts.

    Science.gov (United States)

    Graham, J; Levick, D; Schreiber, R

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center's dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  7. AMDIS Case Conference: Intrusive Medication Safety Alerts

    OpenAIRE

    Graham, J.; Levick, D.; Schreiber, R.

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center’s dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  8. INTRUSIVE MARKETING METHODS A CONTEMPORARY CONSUMER PERSPECTIVE

    OpenAIRE

    Owais, Faizan

    2008-01-01

    Is marketing practice destroying the faith of consumers? It may be argued that marketing practice over recent years has taken a more direct approach that appears intrusive and manipulative to consumers. The marketing activities we see today are a desperate attempt to grab consumer attention in any way possible and it is all spelling out bad news for marketing. Marketers have been faced with many challenges, with markets at saturation point, competitiveness is on the rise and marketers are...

  9. Stochastic Tools for Network Intrusion Detection

    OpenAIRE

    Yu, Lu; Brooks, Richard R.

    2017-01-01

    With the rapid development of Internet and the sharp increase of network crime, network security has become very important and received a lot of attention. We model security issues as stochastic systems. This allows us to find weaknesses in existing security systems and propose new solutions. Exploring the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantages of the system weaknesses. We propose a hybrid network security scheme including intrusion detecti...

  10. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  11. Method of solidifying radioactive ion exchange resin

    International Nuclear Information System (INIS)

    Minami, Yuji; Tomita, Toshihide

    1989-01-01

    Spent anion exchange resin formed in nuclear power plants, etc. generally catch only a portion of anions in view of the ion exchange resins capacity and most of the anions are sent while possessing activities to radioactive waste processing systems. Then, the anion exchange resins increase the specific gravity by the capture of the anions. Accordingly, anions are caused to be captured on the anion exchange resin wastes such that the specific gravity of the anion exchange resin wastes is greater than that of the thermosetting resins to be mixed. This enables satisfactory mixing with the thermosetting resins and, in addition, enables to form integral solidification products in which anion exchange resins and cation exchange resins are not locallized separately and which are homogenous and free from cracks. (T.M.)

  12. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  13. Advanced inspection technology for non intrusive inspection (NII) program

    International Nuclear Information System (INIS)

    Zamir Mohamed Daud

    2003-01-01

    In the current economic environment, plants and facilities are under pressure to introduced cost saving as well as profit maximising measures. Among the many changes in the way things are run is a move towards Risk Based Inspection (RBI), with an emphasis on longer operating periods between shutdowns as well as to utilise components to their maximum capability. Underpinning and RBI program requires good data from an effective online inspections program, which would not require the shutdown of critical components. One methodology of online inspection is known as Non Intrusive Inspection (NII), an inspection philosophy with the objective of replacing internal inspection of a vessel by doing Non Destructive Testing (NDT) and inspections externally. To this end, a variety of advanced NDT techniques are needed to provide accurate online measurements. (Author)

  14. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  15. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    CERN Document Server

    INSPIRE-00416173; Kebschull, Udo

    2015-01-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machin...

  16. Late Neoproterozoic layered mafic intrusion of arc-affinity in the Arabian-Nubian Shield: A case study from the Shahira layered mafic intrusion, southern Sinai, Egypt

    Energy Technology Data Exchange (ETDEWEB)

    Azer, M.K.; Obeid, M.A.; Gahalan, H.A.

    2016-07-01

    The Shahira Layered Mafic Intrusion (SLMI), which belongs to the late Neoproterozoic plutonic rocks of the Arabian-Nubian Shield, is the largest layered mafic intrusion in southern Sinai. Field relations indicate that it is younger than the surrounding metamorphic rocks and older than the post-orogenic granites. Based on variation in mineral paragenesis and chemical composition, the SLMI is distinguished into pyroxene-hornblende gabbro, hornblende gabbro and diorite lithologies. The outer zone of the mafic intrusion is characterized by fine-grained rocks (chilled margin gabbroic facies), with typical subophitic and/or microgranular textures. Different rock units from the mafic intrusion show gradational boundaries in between. They show some indications of low grade metamorphism, where primary minerals are transformed into secondary ones. Geochemically, the Shahira layered mafic intrusion is characterized by enrichment in LILE relative to HFSE (e.g. Nb, P, Zr, Ti, Y), and LREE relative to HREE [(La/Lu)n= 4.75–8.58], with subalkaline characters. It has geochemical characteristics of pre-collisional arc-type environment. The geochemical signature of the investigated gabbros indicates partial melting of mantle wedge in a volcanic-arc setting, being followed by fractional crystallization and crustal contamination. Fractional crystallization processes played a vital role during emplacement of the Shahira intrusion and evolution of its mafic and intermediate rock units. The initial magma was evolved through crystallization of hornblende which was caused by slight increasing of H2O in the magma after crystallization of liquidus olivine, pyroxene and Ca-rich plagioclase. The gabbroic rocks crystallized at pressures between 4.5 and 6.9kbar (~15–20km depth). Whereas, the diorites yielded the lowest crystallization pressure between 1.0 to 4.4Kbar (<10km depth). Temperature was estimated by several geothermometers, which yielded crystallization temperatures ranging from 835

  17. Disposal of bead ion exchange resin wastes

    International Nuclear Information System (INIS)

    Gay, R.L.; Granthan, L.F.

    1985-01-01

    Bead ion exchange resin wastes are disposed of by a process which involves spray-drying a bead ion exchange resin waste in order to remove substantially all of the water present in such waste, including the water on the surface of the ion exchange resin beads and the water inside the ion exchange resin beads. The resulting dried ion exchange resin beads can then be solidified in a suitable solid matrix-forming material, such as a polymer, which solidifies to contain the dried ion exchange resin beads in a solid monolith suitable for disposal by burial or other conventional means

  18. Environment

    International Nuclear Information System (INIS)

    McIntyre, A.D.; Turnbull, R.G.H.

    1992-01-01

    The development of the hydrocarbon resources of the North Sea has resulted in both offshore and onshore environmental repercussions, involving the existing physical attributes of the sea and seabed, the coastline and adjoining land. The social and economic repercussions of the industry were equally widespread. The dramatic and speedy impact of the exploration and exploitation of the northern North Sea resources in the early 1970s, on the physical resources of Scotland was quickly realised together with the concern that any environmental and social damage to the physical and social fabric should be kept to a minimum. To this end, a wide range of research and other activities by central and local government, and other interested agencies was undertaken to extend existing knowledge on the marine and terrestrial environments that might be affected by the oil and gas industry. The outcome of these activities is summarized in this paper. The topics covered include a survey of the marine ecosystems of the North Sea, the fishing industry, the impact of oil pollution on seabirds and fish stocks, the ecology of the Scottish coastline and the impact of the petroleum industry on a selection of particular sites. (author)

  19. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  20. Action of ionizing radiation on epoxy resins

    Energy Technology Data Exchange (ETDEWEB)

    Van de Voorde, M. E.

    1970-12-01

    The resistance of classical and experimental epoxy resins to irradiation was studied. The resistance to irradiation of epoxy resins of diverse compositions as well as the development of resins having a radioresistance that approaches that of certain ceramics are discussed. Sources of irradiation and the techniques of dosimetry used are described. The structures of certain epoxy resins and of hardeners are given. The preparation of these resins and their physical properties is described. The effects of radiation on epoxy resins, as well as conditions of irradiation, and suggested mechanisms for degradation of the irradiated resins are discussed. The relationship between chemical structure of the resins and their physical properties is evaluated. (115 references) (JCB)

  1. Method for loading resin beds

    International Nuclear Information System (INIS)

    Notz, K.J.; Rainey, R.H.; Greene, C.W.; Shockley, W.E.

    1978-01-01

    An improved method of preparing nuclear reactor fuel by carbonizing a uranium loaded cation exchange resin provided by contacting a H+ loaded resin with a uranyl nitrate solution deficient in nitrate, comprises providing the nitrate deficient solution by a method comprising the steps of reacting in a reaction zone maintained between about 145 to 200 0 C, a first aqueous component comprising a uranyl nitrate solution having a boiling point of at least 145 0 C with a second aqueous component to provide a gaseous phase containing HNO 3 and a reaction product comprising an aqueous uranyl nitrate solution deficient in nitrate

  2. Geophysical characterization from Itu intrusive suite

    International Nuclear Information System (INIS)

    Pascholati, M.E.

    1989-01-01

    The integrated use of geophysical, geological, geochemical, petrographical and remote sensing data resulted in a substantial increase in the knowledge of the Itu Intrusive Suite. The main geophysical method was gamma-ray spectrometry together with fluorimetry and autoradiography. Three methods were used for calculation of laboratory gamma-ray spectrometry data. For U, the regression method was the best one. For K and Th, equations system and absolute calibration presented the best results. Surface gamma-ray spectrometry allowed comparison with laboratory data and permitted important contribution to the study of environmental radiation. (author)

  3. Unconventional applications of conventional intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.; Matter, J.C.

    1983-01-01

    A number of conventional intrusion detection sensors exists for the detection of persons entering buildings, moving within a given volume, and crossing a perimeter isolation zone. Unconventional applications of some of these sensors have recently been investigated. Some of the applications which are discussed include detection on the edges and tops of buildings, detection in storm sewers, detection on steam and other types of large pipes, and detection of unauthorized movement within secure enclosures. The enclosures can be used around complicated control valves, electrical control panels, emergency generators, etc

  4. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and...

  5. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  6. Introduction to gravity currents and intrusions

    CERN Document Server

    Ungarish, Marius

    2009-01-01

    The whole book is well written in a clear and pedagogical general style. … the author has, in my opinion, produced the first comprehensive book entirely devoted to the modeling of gravity currents and intrusions. This book will be particularly useful to graduate and PhD students, as well as to academics and research engineers working in this field. It may be used as a self-consistent document to get a detailed idea of the state of knowledge about a given problem or a guide toward more specialized papers. It is rich with ideas regarding the direction in which further research is warranted. This

  7. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  8. Resin for processing radioactive waste water

    International Nuclear Information System (INIS)

    Onozuka, Teruo; Shindo, Manabu; Kiba, Hideaki; Kubota, Hirohisa; Sawada, Shintaro.

    1995-01-01

    The present invention concerns an anionic exchange resin having a long service life with less radiation degradation. The resin is an anionic exchange resin in which a trimethyl ammonium group is introduced to a copolymer of 4-bromo-butoxymethyl styrene and divinyl benzene. The resin is excellent in economic performance, and can reduce the frequency for the exchange of cross-linked anionic exchangers. (T.M.)

  9. Resin for processing radioactive waste water

    Energy Technology Data Exchange (ETDEWEB)

    Onozuka, Teruo; Shindo, Manabu [Tohoku Electric Power Co., Inc., Sendai (Japan); Kiba, Hideaki; Kubota, Hirohisa; Sawada, Shintaro

    1995-11-07

    The present invention concerns an anionic exchange resin having a long service life with less radiation degradation. The resin is an anionic exchange resin in which a trimethyl ammonium group is introduced to a copolymer of 4-bromo-butoxymethyl styrene and divinyl benzene. The resin is excellent in economic performance, and can reduce the frequency for the exchange of cross-linked anionic exchangers. (T.M.).

  10. Fatigue of the Resin-Enamel Bonded Interface and the Mechanisms of Failure

    Science.gov (United States)

    Yahyazadehfar, Mobin; Mutluay, Mustafa Murat; Majd, Hessam; Ryou, Heonjune; Arola, Dwayne

    2013-01-01

    The durability of adhesive bonds to enamel and dentin and the mechanisms of degradation caused by cyclic loading are important to the survival of composite restorations. In this study a novel method of evaluation was used to determine the strength of resin-enamel bonded interfaces under both static and cyclic loading, and to identify the mechanisms of failure. Specimens with twin interfaces of enamel bonded to commercial resin composite were loaded in monotonic and cyclic 4-point flexure to failure within a hydrated environment. Results for the resin-enamel interface were compared with those for the resin composite (control) and values reported for resin-dentin adhesive bonds. Under both modes of loading the strength of the resin-enamel interface was significantly (p≤0.0001) lower than that of the resin composite and the resin-dentin bonded interface. Fatigue failure of the interface occurred predominately by fracture of enamel, adjacent to the interface, and not due to adhesive failures. In the absence of water aging or acid production of biofilms, the durability of adhesive bonds to enamel is lower than that achieved in dentin bonding. PMID:23571321

  11. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    OpenAIRE

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumben...

  12. Identification of Human Intrusion Types into Radwaste Disposal Facility

    International Nuclear Information System (INIS)

    Budi Setiawan

    2007-01-01

    Human intrusion has long been recognized as a potentially important post-closure safety issue for rad waste disposal facility. It is due to the difficulties in predicting future human activities. For the preliminary study of human intrusion, identification of human intrusion types need to be recognized and investigated also the approaching of problem solving must be known to predict the prevention act and accepted risk. (author)

  13. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  14. Principais métodos de caracterização da porosidade de resinas à base de divinilbenzeno The most important methods for the characterization of porosity of styrene-divinylbenzene based resins

    Directory of Open Access Journals (Sweden)

    Viviane Gomes Teixeira

    2001-12-01

    Full Text Available This paper reviews the most important methods used to characterize the porosity of styrene-divinylbenzene resins. Methods such as adsorption of nitrogen for determination of surface area and mercury intrusion porosimetry for characterization of pore size distribution are related.

  15. 21 CFR 177.1680 - Polyurethane resins.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 3 2010-04-01 2009-04-01 true Polyurethane resins. 177.1680 Section 177.1680 Food... of Single and Repeated Use Food Contact Surfaces § 177.1680 Polyurethane resins. The polyurethane...) For the purpose of this section, polyurethane resins are those produced when one or more of the...

  16. Method of removing contaminants from plastic resins

    Science.gov (United States)

    Bohnert, George W.; Hand, Thomas E.; DeLaurentiis, Gary M.

    2008-11-18

    A method for removing contaminants from synthetic resin material containers using a first organic solvent system and a second carbon dioxide system. The organic solvent is utilized for removing the contaminants from the synthetic resin material and the carbon dioxide is used to separate any residual organic solvent from the synthetic resin material.

  17. Method for removing contaminants from plastic resin

    Science.gov (United States)

    Bohnert, George W.; Hand, Thomas E.; DeLaurentiis, Gary M.

    2008-12-30

    A method for removing contaminants from synthetic resin material containers using a first organic solvent system and a second carbon dioxide system. The organic solvent is utilized for removing the contaminants from the synthetic resin material and the carbon dioxide is used to separate any residual organic solvent from the synthetic resin material.

  18. A methodological framework to assess the environmental and economic effects of injection barriers against seawater intrusion.

    Science.gov (United States)

    Siarkos, Ilias; Latinopoulos, Dionysis; Mallios, Zisis; Latinopoulos, Pericles

    2017-05-15

    Seawater intrusion is responsible for the progressive deterioration of groundwater quality in numerous coastal aquifers worldwide. As a consequence, seawater intrusion may constitute a serious threat to local groundwater resources, as well as to the regional economy of coastal areas. To alleviate these negative effects, a number of well-designed protective measures could be implemented. The implementation of these measures is usually associated with significant benefits for the environment and the local economy. In this perspective, the present study investigates the particular case of constructing injection barriers for controlling seawater intrusion by developing a methodological framework that combines numerical modeling with spatial and cost-benefit analyses. To this task, we introduce a novel approach, which considers the socio-economic aspects of seawater intrusion in the modeling procedure, and at the same time focuses on the spatial and temporal relationships between water salinity and farmers' income. To test the proposed methodology two alternative artificial recharge scenarios - with different volumes of water used for injection - are assessed. According to the results of this analysis, both scenarios are likely to have a positive impact on groundwater quality, as well as, a net economic benefit to local society. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    Science.gov (United States)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    We will present a detailed microstructural and geochemical study of reactive liquid flow in Unit 9 of the Rum Eastern Layered Intrusion. In the study region, Unit 9 comprises an underlying lens-like body of peridotite overlain by a sequence of troctolite and gabbro (termed allivalite), with some local and minor anorthosite. The troctolite is separated from the overlying gabbro by a distinct, sub-horizontal, undulose horizon (the major wavy horizon). Higher in the stratigraphy is another, similar, horizon (the minor wavy horizon) that separates relatively clinopyroxene-poor gabbro from an overlying gabbro. To the north of the peridotite lens, both troctolite and gabbro grade into poikilitic gabbro. Clinopyroxene habit in the allivalite varies from thin rims around olivine in troctolite, to equigranular crystals in gabbro, to oikocrysts in the poikilitic gabbro. The poikilitic gabbros contain multiple generations of clinopyroxene, with Cr-rich (~1.1 wt.% Cr2O3), anhedral cores with moderate REE concentrations (core1) overgrown by an anhedral REE-depleted second generation with moderate Cr (~0.7 wt.% Cr2O3) (core2). These composite cores are rimmed by Cr-poor (~0.2 wt.% Cr2O3) and REE-poor to moderate clinopyroxene. We interpret these microstructures as a consequence of two separate episodes of partial melting triggered by the intrusion of hot olivine-phyric picrite to form the discontinuous lenses that comprise the Unit 9 peridotite. Loss of clinopyroxene-saturated partial melt from the lower part of the allivalite immediately following the early stages of sill intrusion resulted in the formation of clinopyroxene-poor gabbro. The spatial extent of clinopyroxene loss is marked by the minor wavy horizon. A further partial melting event stripped out almost all clinopyroxene from the lowest allivalite, to form a troctolite, with the major wavy horizon marking the extent of melting during this second episode. The poikilitic gabbro formed from clinopyroxene-saturated melt

  20. Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Su, Chunhua

    2017-01-01

    many kinds of information among sensors, whereas such network is vulnerable to a wide range of attacks, especially insider attacks, due to its natural environment and inherent unreliable transmission. To safeguard its security, intrusion detection systems (IDSs) are widely adopted in a WSN to defend...... against insider attacks through implementing proper trustbased mechanisms. However, in the era of big data, sensors may generate excessive information and data, which could degrade the effectiveness of trust computation. In this paper, we focus on this challenge and propose a way of combining Bayesian......-based trust management with traffic sampling for wireless intrusion detection under a hierarchical structure. In the evaluation, we investigate the performance of our approach in both a simulated and a real network environment. Experimental results demonstrate that packet-based trust management would become...

  1. Intrusion detection in cloud computing based attack patterns and risk assessment

    Directory of Open Access Journals (Sweden)

    Ben Charhi Youssef

    2017-05-01

    Full Text Available This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment methodologies. The aim of our solution is to combine evidences obtained from Intrusion Detection Systems (IDS deployed in a cloud with risk assessment related to each attack pattern. Our approach presents a new qualitative solution for analyzing each symptom, indicator and vulnerability analyzing impact and likelihood of distributed and multi-steps attacks directed to cloud environments. The implementation of this approach will reduce the number of false alerts and will improve the performance of the IDS.

  2. Vitrification of cesium-contaminated organic ion exchange resin

    International Nuclear Information System (INIS)

    Sargent, T.N. Jr.

    1994-08-01

    Vitrification has been declared by the Environmental Protection Agency (USEPA) as the Best Demonstrated Available Technology (BDAT) for the permanent disposal of high-level radioactive waste. Savannah River Site currently uses a sodium tetraphenylborate (NaTPB) precipitation process to remove Cs-137 from a wastewater solution created from the processing of nuclear fuel. This process has several disadvantages such as the formation of a benzene waste stream. It has been proposed to replace the precipitation process with an ion exchange process using a new resorcinol-formaldehyde resin developed by Savannah River Technical Center (SRTC). Preliminary tests, however, showed that problems such as crust formation and a reduced final glass wasteform exist when the resin is placed in the melter environment. The newly developed stirred melter could be capable of overcoming these problems. This research explored the operational feasibility of using the stirred tank melter to vitrify an organic ion exchange resin. Preliminary tests included crucible studies to determine the reducing potential of the resin and the extent of oxygen consuming reactions and oxygen transfer tests to approximate the extent of oxygen transfer into the molten glass using an impeller and a combination of the impeller and an external oxygen transfer system. These preliminary studies were used as a basis for the final test which was using the stirred tank melter to vitrify nonradioactive cesium loaded organic ion exchange resin. Results from this test included a cesium mass balance, a characterization of the semi-volatile organic compounds present in the off gas as products of incomplete combustion (PIC), a qualitative analysis of other volatile metals, and observations relating to the effect the resin had on the final redox state of the glass

  3. A new intrusion prevention model using planning knowledge graph

    Science.gov (United States)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  4. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  5. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  6. Multi-User Low Intrusive Occupancy Detection

    Directory of Open Access Journals (Sweden)

    Azkario Rizky Pratama

    2018-03-01

    Full Text Available Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS of BLE (Bluetooth Low Energy nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach.

  7. Resins production: batch plant automation

    International Nuclear Information System (INIS)

    Banti, M.; Mauri, G.

    1996-01-01

    Companies that look for automation in their plants without external resources, have at their disposal flexible, custom and easy to use DCS, open towards PLC. In this article it is explained why Hoechts has followed this way of new plants for resins production automation

  8. Occupational exposure to epoxy resins

    NARCIS (Netherlands)

    Terwoert, J.; Kersting, K.

    2014-01-01

    Products based on epoxy resins as a binder have become popular in various settings, among which the construction industry and in windmill blade production, as a result of their excellent technical properties. However, due to the same properties epoxy products are a notorious cause of allergic skin

  9. A framework for implementing a Distributed Intrusion Detection System (DIDS) with interoperabilty and information analysis

    OpenAIRE

    Davicino, Pablo; Echaiz, Javier; Ardenghi, Jorge Raúl

    2011-01-01

    Computer Intrusion Detection Systems (IDS) are primarily designed to protect availability, condentiality and integrity of critical information infrastructures. A Distributed IDS (DIDS) consists of several IDS over a large network(s), all of which communicate with each other, with a central server or with a cluster of servers that facilitates advanced network monitoring. In a distributed environment, DIDS are implemented using cooperative intelligent sensors distributed across the network(s). ...

  10. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    Energy Technology Data Exchange (ETDEWEB)

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  11. Oxygen index tests of thermosetting resins

    Science.gov (United States)

    Gilwee, W. J., Jr.; Parker, J. A.; Kourtides, D. A.

    1980-01-01

    The flammability characteristics of nine thermosetting resins under evaluation for use in aircraft interiors are described. These resins were evaluated using the Oxygen Index (ASTM 2863) testing procedure. The test specimens consisted of both neat resin and glass reinforced resin. When testing glass-reinforced samples it was observed that Oxygen Index values varied inversely with resin content. Oxygen values were also obtained on specimens exposed to temperatures up to 300 C. All specimens experienced a decline in Oxygen Index when tested at an elevated temperature.

  12. Commercial Ion Exchange Resin Vitrification Studies

    International Nuclear Information System (INIS)

    Cicero-Herman, C.A

    2002-01-01

    In the nuclear industry, ion exchange resins are used for purification of aqueous streams. The major contaminants of the resins are usually the radioactive materials that are removed from the aqueous streams. The use of the ion exchange resins creates a waste stream that can be very high in both organic and radioactive constituents. Therefore, disposal of the spent resin often becomes an economic problem because of the large volumes of resin produced and the relatively few technologies that are capable of economically stabilizing this waste. Vitrification of this waste stream presents a reasonable disposal alternative because of its inherent destruction capabilities, the volume reductions obtainable, and the durable product that it produces

  13. Processing ix spent resin waste for C-14 isotope recovery

    International Nuclear Information System (INIS)

    Chang, F. H.; Woodall, K. B.; Sood, S. K.; Vogt, H. K.; Krochmainek, L. S.

    1991-01-01

    A process developed at Ontario Hydro for recovering carbon-14 (C-14) from spent ion exchange resin wastes is described. Carbon-14 is an undesirable by-product of CANDU 1 nuclear reactor operation. It has an extremely long (5730 years) half-life and can cause dosage to inhabitants by contact, inhalation, or through the food cycle via photosynthesis. Release of carbon-14 to the environment must be minimized. Presently, all the C-14 produced in the Moderator and Primary Heat Transport (PHT) systems of the reactor is effectively removed by the respective ion exchange columns, and the spent ion exchange resins are stored in suitably engineered concrete structures. Because of the large volumes of spent resin waste generated each year this method of disposal by long term storage tends to be uneconomical; and may also be unsatisfactory considering the long half-life of the C-14. However, purified C-14 is a valuable commercial product for medical, pharmaceutical, agricultural, and organic chemistry research. Currently, commercial C-14 is made artificially in research reactors by irradiating aluminum nitride targets for 4.5 years. If the C-14 containing resin waste can be used to reduce this unnecessary production of C-14, the total global build-up of this radioactive chemical can be reduced. There is much incentive in removing the C-14 from the resin waste to reduce the volume of C-14 waste, and also in purifying the recovered C-14 to supply the commercial market. The process developed by Ontario Hydro consists of three main steps: C-14 removal from spent resins, enrichment of recovered C-14, and preparation of final product. Components of the process have been successfully tested at Ontario Hydro's Research Division, but the integration of the process is yet to be demonstrated. A pilot scale plant capable of processing 4 m 3 of spent resins annually is being planned for demonstrating the technology. The measured C-14 activity levels on the spent resins ranged from 47

  14. Spray drying of bead resins: feasibility tests

    International Nuclear Information System (INIS)

    Gay, R.L.; Grantham, L.F.; Jones, L.J.

    1984-01-01

    Rockwell International has developed a volume reduction system for low-level reactor wastes based on drying the wastes in a heated-air spray dryer. The drying of slurries of sodium sulfate, boric acid, and powdered ion exchange resins was demonstrated in previous tests. The drying of bead ion exchange resins can be especially difficult due to the relatively large size of bead resins (about 500 to 800 microns) and their natural affinity for water. This water becomes part of the pore structure of the resins and normally comprises 50 t 60 wt % of the resin weight. A 76-cm-diameter spray dryer was used for feasibility tests of spray drying of cation and anion bead resins. These resins were fed to the dryer in the as-received form (similar to dewatered resins) and as slurries. A dry, free-flowing product was produced in all the tests. The volume of the spray-dried product was one-half to one-third the volume of the as-received material. An economic analysis was made of the potential cost savings that can be achieved using the Rockwel spray dryer system. In-plant costs, transportation costs, and burial costs of spray-dried resins were compared to similar costs for disposal of dewatered resins. A typical utility producing 170 m 3 (6,000 ft 3 ) per year of dewatered resins can save $600,000 to $700,000 per year using this volume reduction system

  15. Towards Reliable Evaluation of Anomaly-Based Intrusion Detection Performance

    Science.gov (United States)

    Viswanathan, Arun

    2012-01-01

    This report describes the results of research into the effects of environment-induced noise on the evaluation process for anomaly detectors in the cyber security domain. This research was conducted during a 10-week summer internship program from the 19th of August, 2012 to the 23rd of August, 2012 at the Jet Propulsion Laboratory in Pasadena, California. The research performed lies within the larger context of the Los Angeles Department of Water and Power (LADWP) Smart Grid cyber security project, a Department of Energy (DoE) funded effort involving the Jet Propulsion Laboratory, California Institute of Technology and the University of Southern California/ Information Sciences Institute. The results of the present effort constitute an important contribution towards building more rigorous evaluation paradigms for anomaly-based intrusion detectors in complex cyber physical systems such as the Smart Grid. Anomaly detection is a key strategy for cyber intrusion detection and operates by identifying deviations from profiles of nominal behavior and are thus conceptually appealing for detecting "novel" attacks. Evaluating the performance of such a detector requires assessing: (a) how well it captures the model of nominal behavior, and (b) how well it detects attacks (deviations from normality). Current evaluation methods produce results that give insufficient insight into the operation of a detector, inevitably resulting in a significantly poor characterization of a detectors performance. In this work, we first describe a preliminary taxonomy of key evaluation constructs that are necessary for establishing rigor in the evaluation regime of an anomaly detector. We then focus on clarifying the impact of the operational environment on the manifestation of attacks in monitored data. We show how dynamic and evolving environments can introduce high variability into the data stream perturbing detector performance. Prior research has focused on understanding the impact of this

  16. Salt Intrusion in the Tweed Estuary

    Science.gov (United States)

    Uncles, R. J.; Stephens, J. A.

    1996-09-01

    Results are presented from a 2-week field programme in the Tweed Estuary, U.K. Maximum values of the empirically based Estuarine Richardson Number, Ri E, occurred during neap tides, and minimum values occurred during spring tides. Estimated values of Ri Evaried between 0·3 and 2·3, suggesting the occurrence of partially mixed to stratified conditions, depending on tidal state and freshwater inflow. These relatively large values of Ri Ewere consistent with both observed strong salinity stratification and large salt fluxes due to vertical shear transport. Low values (0·5) values in the halocline. A velocity maximum occurred within the halocline during the early flood. Wave-like spatial oscillations of the halocline occurred on the ebb. The oscillation troughs were situated above deep holes located just down-estuary of the rail and old road bridges. There was an indication that the constricted flow between the bridges' arches resulted in enhanced mixing of near-surface waters and a thickening of the halocline. It is also possible that these wave-like structures were stationary, near-critical internal lee waves, triggered by the deep holes. Trapping of high-salinity waters occurred on the ebb. Saline pools were isolated within a deep hole or deeper section of bed by the falling halocline. When the salt wedge moved further down-estuary, the ' trapped ' waters were subjected to strongly ebbing, overlying freshwater, and were subsequently entrained and flushed. The salinity intrusion was a strong function of spring-neap tidal state and a weaker function of freshwater inflow. The estimated salinity intrusion varied from about 4·7 to 7·6 km during the fieldwork period. The strong dependence on tidal range followed from the comparable lengths of the tidal excursion and salinity intrusion. Long excursion lengths were also partly responsible for the short residence (or flushing) times and their strong dependence on spring-neap tidal state. For typical summer freshwater

  17. EDF specifications on nuclear grade resins

    International Nuclear Information System (INIS)

    Mascarenhas, Darren; Gressier, Frederic; Taunier, Stephane; Le-Calvar, Marc; Ranchoux, Gilles; Marteau, Herve; Labed, Veronique

    2012-09-01

    Ion exchange resins are widely used across EDF, especially within the nuclear division for the purification of water. Important applications include primary circuit, secondary circuit and effluent treatment, which require high quality nuclear grade resins to retain the dissolved species, some of which may be radioactive. There is a need for more and more efficient purification in order to decrease worker dose during maintenance but also to decrease volumes of radioactive resin waste. Resin performance is subject to several forms of degradation, including physical, chemical, thermal and radioactive, therefore appropriate resin properties have to be selected to reduce such effects. Work has been done with research institutes, manufacturers and on EDF sites to select these properties, create specifications and to continuously improve on these specifications. An interesting example of research regarding resin performance is the resin degradation under irradiation. Resins used in the CVCS circuit of EDF nuclear power plants are subject to irradiation over their lifetime. A study was carried out on the effects of total integrated doses of 0.1, 1 and 10 MGy on typically used EDF mixed bed resins in a 'mini-CVCS' apparatus to simultaneously test actual primary circuit fluid. The tests confirmed that the resins still perform efficiently after a typical CVCS radiation dose. Certain resins also need additional specifications in order to maintain the integrity of the particular circuits they are used in. Recently, EDF has updated its requirements on these high purity nuclear grade resins, produced generic doctrines for all products and materials used on site which include resins of all grades, and as a result have also updated a guide on recommended resin usage for the French fleet of reactors. An overview of the evolutions will be presented. (authors)

  18. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  19. An ontology-based intrusion patterns classification system | Shonubi ...

    African Journals Online (AJOL)

    Studies have shown that computer intrusions have been on the increase in recent times. Many techniques and patterns are being used by intruders to gain access to data on host computer networks. In this work, intrusion patterns were identified and classified and inherent knowledge were represented using an ontology of ...

  20. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  1. An evaluation of classification algorithms for intrusion detection ...

    African Journals Online (AJOL)

    An evaluation of classification algorithms for intrusion detection. ... Log in or Register to get access to full text downloads. ... Most of the available IDSs use all the 41 features in the network to evaluate and search for intrusive pattern in which ...

  2. Intrusive Memories of Distressing Information: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Eva Battaglini

    Full Text Available Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42 viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13 demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13. Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC and dorsolateral prefrontal cortex (dlPFC, inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories.

  3. Thermal History and Crystallinity of Sheet Intrusions

    Science.gov (United States)

    Whittington, A. G.; Nabelek, P. I.; Hofmeister, A.

    2011-12-01

    Magma emplaced in a sheet intrusion has two potential fates: to crystallize, or quench to glass. Rapidly chilled sheet margins are typically glassy or microcrystalline, while interiors are coarser-grained. The actual textures result from a combination of thermal history and crystallization kinetics, which are related by various feedback mechanisms. The thermal history of cooling sheet intrusions is often approximated using the analytical solution for a semi-infinite half-space, which uses constant thermal properties such as heat capacity (CP), thermal diffusivity (D) and thermal conductivity (k = DρCP), where ρ is density. In reality, both CP and D are strongly T-dependent for glasses and crystals, and melts have higher CP and lower D than crystals or glasses. Another first-order feature ignored in the analytical solution is latent heat of crystallization (ΔHxt), which can be implemented numerically as extra heat capacity over the crystallization interval. For rhyolite melts, D is ~0.5 mm2s-1 and k is ~1.5 Wm-1K-1, which are similar to those of major crustal rock types and granitic protoliths at magmatic temperatures, suggesting that changes in thermal properties accompanying partial melting of the crust should be relatively minor. Numerical models of hot (~920°C liquidus for 0.5 wt.% H2O) shallow rhyolite intrusions indicate that the key difference in thermal history between bodies that quench to obsidian, and those that crystallize, results from the release of latent heat of crystallization, which enables bodies that crystallize to remain at high temperatures for much longer times. The time to solidification is similar in both cases, however, because solidification requires cooling through the glass transition (Tg ~620°C) in the first case, and cooling only to the solidus (~770°C) in the second. For basaltic melts, D is ~0.3 mm2s-1 and k is ~1.0 Wm-1K-1, compared to ~0.6 mm2s-1 and 2.5 Wm-1K-1 for crystalline basalt or peridotite at magmatic temperatures

  4. Stress, intrusive imagery, and chronic distress

    International Nuclear Information System (INIS)

    Baum, A.

    1990-01-01

    Discusses the nature of stress in the context of problems with its definition and sources of confusion regarding its usefulness and specificity. Stress can be defined as a negative emotional experience accompanied by predictable biochemical, physiological, and behavioral changes that are directed toward adaptation either by manipulating the situation to alter the stressor or by accommodating its effects. Chronic stress is more complex than most definitions suggest and is clearly not limited to situations in which stressors persist for long periods of time. Responses may habituate before a stressor disappears or may persist long beyond the physical presence of the stressor. This latter case, in which chronic stress and associated biobehavioral changes outlast their original cause, is considered in light of research at Three Mile Island and among Vietnam veterans. The role of intrusive images of the stressor or uncontrollable thoughts about it in maintaining stress is explored

  5. Metallogenic aspects of Itu intrusive suite

    International Nuclear Information System (INIS)

    Amaral, G.; Pascholati, E.M.

    1990-01-01

    The integrated use of geological, geochemical, geophysical and remote sensing data is providing interesting new information on the metallogenic characteristics of the Itu Intrusive Suite. During World War II, up to 1959, a wolframite deposit was mined near the border of the northernmost body (Itupeva Granite). This deposit is formed by greisen veins associated with cassiterite and topaz, clearly linked with later phases of magmatic differentiation. Generally those veins are related to hydrothermal alteration of the granites and the above mentioned shear zone. U, Th and K determinations by field and laboratory gammaspectrometry were used for regional distribution analysis of those elements and its ratios and calculation of radioactivity heat production. In this aspects, the Itupeva Granite is the hottest and presents several anomalies in the Th/U ratio, indicative of late or post magmatic oxidation processes. (author)

  6. USBcat - Towards an Intrusion Surveillance Toolset

    Directory of Open Access Journals (Sweden)

    Chris Chapman

    2014-10-01

    Full Text Available This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by observing the behaviour and communications of the intruder. Subsequently a more complete picture of the attacker's identity, objectives, capabilities, and infiltration could be formulated than is possible with present technologies. This research focused on developing an extensible framework to permit the covert investigation of malware. Additionally, a Universal Serial Bus (USB Mass Storage Device (MSD based covert channel was designed to enable remote command and control of the framework. The work was validated through the design, implementation and testing of a toolset.

  7. Degradation of ion spent resin using the Fenton's reagent

    International Nuclear Information System (INIS)

    Araujo, Leandro Goulart de

    2013-01-01

    The most common method for spent radioactive ion exchange resin treatment is its immobilization in cement, which reduces the radionuclides release into the environment. Although this method is efficient, it increases considerably the final volume of the waste due to the low incorporation capacity. The objective of this work was to develop a degradation method of spent resins arising from the nuclear research reactor located at the Nuclear and Energy Research Institute (IPEN-CNEN/SP), using an Advanced Oxidation Process (AOP) with Fenton's reagents. This method would allow a higher incorporation in cement. Three different resins were evaluated: cationic, anionic and a mixture of both resins. The reactions were conducted varying the catalyst concentration (25, 50, 100 and 150 mM), the volume of hydrogen peroxide (320 to 460 mL), and three different temperatures, 50, 60 and 70 deg C. Degradation of about 98% was achieved using a 50 mM catalyst solution and 330 mL of hydrogen peroxide solution. The most efficient temperature was 60 deg C. (author)

  8. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  9. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  10. A Machine Learning Based Intrusion Impact Analysis Scheme for Clouds

    Directory of Open Access Journals (Sweden)

    Junaid Arshad

    2012-01-01

    Full Text Available Clouds represent a major paradigm shift, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of on demand expandable computing infrastructures. However, Clouds introduce novel security challenges which need to be addressed to facilitate widespread adoption. This paper is focused on one such challenge - intrusion impact analysis. In particular, we highlight the significance of intrusion impact analysis for the overall security of Clouds. Additionally, we present a machine learning based scheme to address this challenge in accordance with the specific requirements of Clouds for intrusion impact analysis. We also present rigorous evaluation performed to assess the effectiveness and feasibility of the proposed method to address this challenge for Clouds. The evaluation results demonstrate high degree of effectiveness to correctly determine the impact of an intrusion along with significant reduction with respect to the intrusion response time.

  11. Foam, Foam-resin composite and method of making a foam-resin composite

    Science.gov (United States)

    Cranston, John A. (Inventor); MacArthur, Doug E. (Inventor)

    1995-01-01

    This invention relates to a foam, a foam-resin composite and a method of making foam-resin composites. The foam set forth in this invention comprises a urethane modified polyisocyanurate derived from an aromatic amino polyol and a polyether polyol. In addition to the polyisocyanurate foam, the composite of this invention further contains a resin layer, wherein the resin may be epoxy, bismaleimide, or phenolic resin. Such resins generally require cure or post-cure temperatures of at least 350.degree. F.

  12. On Cyber Attacks and Signature Based Intrusion Detection for MODBUS Based Industrial Control Systems

    Directory of Open Access Journals (Sweden)

    Wei Gao

    2014-03-01

    Full Text Available Industrial control system communication networks are vulnerable to reconnaissance, response injection, command injection, and denial of service attacks.  Such attacks can lead to an inability to monitor and control industrial control systems and can ultimately lead to system failure. This can result in financial loss for control system operators and economic and safety issues for the citizens who use these services.  This paper describes a set of 28 cyber attacks against industrial control systems which use the MODBUS application layer network protocol. The paper also describes a set of standalone and state based intrusion detection system rules which can be used to detect cyber attacks and to store evidence of attacks for post incident analysis. All attacks described in this paper were validated in a laboratory environment. The detection rate of the intrusion detection system rules presented by attack class is also presented.

  13. SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    The development of collaborative intrusion detection networks (CIDNs) aims to enhance the performance of a single intrusion detection system (IDS), through communicating and collecting information from other IDS nodes. To defend CIDNs against insider attacks, trust-based mechanisms are crucial...... and render CIDNs still vulnerable to advanced insider attacks in a practical deployment. In this paper, our motivation is to investigate the effect of On-Off attacks on challenge-based CIDNs. In particular, as a study, we explore a special On-Off attack (called SOOA), which can keep responding normally...... to one node while acting abnormally to another node. In the evaluation, we explore the attack performance under simulated CIDN environments. Experimental results indicate that our attack can interfere the effectiveness of trust computation for CIDN nodes....

  14. PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2016-01-01

    To enhance the performance of single intrusion detection systems (IDSs), collaborative intrusion detection networks (CIDNs) have been developed, which enable a set of IDS nodes to communicate with each other. In such a distributed network, insider attacks like collusion attacks are the main threat...... to advanced insider attacks in practical deployment. In this paper, we design a novel type of collusion attack, called passive message fingerprint attack (PMFA), which can collect messages and identify normal requests in a passive way. In the evaluation, we explore the attack performance under both simulated...... and real network environments. Experimental results indicate that under our attack, malicious nodes can send malicious responses to normal requests while maintaining their trust values....

  15. An intrusion prevention system as a proactive security mechanism in network infrastructure

    Directory of Open Access Journals (Sweden)

    Dulanović Nenad

    2008-01-01

    Full Text Available A properly configured firewall is a good starting point in securing a computer network. However, complex network environments that involve higher number of participants and endpoints require better security infrastructure. Intrusion Detection Systems (IDS, proposed as a solution to perimeter defense, have many open problems and it is clear that better solutions must be found. Due to many unsolved problems associated with IDS, Intrusion Prevention Systems (IPS are introduced. The main idea in IPS is to be proactive. This paper gives an insight of Cobrador Bouncer IPS implementation. System architecture is given and three different Bouncer IPS deployment modes are presented. The Bouncer IPS as a proactive honeypot is also discussed.

  16. Modulating state transition and mechanical properties of viscoelastic resins from maize zein through interactions with plasticizers and co-proteins

    NARCIS (Netherlands)

    Erickson, D.P.; Renzetti, S.; Jurgens, A.; Campanella, O.H.; Hamaker, B.R.

    2014-01-01

    Viscoelastic properties have been observed in maize zein above its glass transition temperature; however, current understanding of how these viscoelastic polymers can be further manipulated for optimal performance is limited. Using resins formed via precipitation from aqueous ethanolic environments,

  17. Diclofenac removal in urine using strong-base anion exchange polymer resins.

    Science.gov (United States)

    Landry, Kelly A; Boyer, Treavor H

    2013-11-01

    One of the major sources of pharmaceuticals in the environment is wastewater effluent of which human urine contributes the majority of pharmaceuticals. Urine source separation has the potential to isolate pharmaceuticals at a higher concentration for efficient removal as well as produce a nutrient byproduct. This research investigated the efficacy of using strong-base anion exchange polymer resins to remove the widely detected and abundant pharmaceutical, diclofenac, from synthetic human urine under fresh and ureolyzed conditions. The majority of experiments were conducted using a strong-base, macroporous, polystyrene resin (Purolite A520E). Ion-exchange followed a two-step removal rate with rapid removal in 1 h and equilibrium removal in 24 h. Diclofenac removal was >90% at a resin dose of 8 mL/L in both fresh and ureolyzed urine. Sorption of diclofenac onto A520E resin was concurrent with desorption of an equivalent amount of chloride, which indicates the ion-exchange mechanism is occurring. The presence of competing ions such as phosphate and citrate did not significantly impact diclofenac removal. Comparisons of three polystyrene resins (A520E, Dowex 22, Dowex Marathon 11) as well as one polyacrylic resin (IRA958) were conducted to determine the major interactions between anion exchange resin and diclofenac. The results showed that polystyrene resins provide the highest level of diclofenac removal due to electrostatic interactions between quaternary ammonium functional groups of resin and carboxylic acid of diclofenac and non-electrostatic interactions between resin matrix and benzene rings of diclofenac. Diclofenac was effectively desorbed from A520E resin using a regeneration solution that contained 4.5% (m/m) NaCl in an equal-volume mixture of methanol and water. The greater regeneration efficiency of the NaCl/methanol-water mixture over the aqueous NaCl solution supports the importance of non-electrostatic interactions between resin matrix and benzene rings

  18. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  19. Solidifying power station resins and sludges

    International Nuclear Information System (INIS)

    Willis, A.S.D.; Haigh, C.P.

    1984-01-01

    Radioactive ion exchange resins and sludges arise at nuclear power stations from various operations associated with effluent treatment and liquid waste management. As the result of an intensive development programme, the Central Electricity Generating Board (CEGB) has designed a process to convert power station resins and sludges into a shielded, packaged solid monolithic form suitable for final disposal. Research and development, the generic CEGB sludge/resin conditioning plant and the CEGB Active Waste Project are described. (U.K.)

  20. Volumetric polymerization shrinkage of contemporary composite resins

    OpenAIRE

    Nagem Filho, Halim; Nagem, Haline Drumond; Francisconi, Paulo Afonso Silveira; Franco, Eduardo Batista; Mondelli, Rafael Francisco Lia; Coutinho, Kennedy Queiroz

    2007-01-01

    The polymerization shrinkage of composite resins may affect negatively the clinical outcome of the restoration. Extensive research has been carried out to develop new formulations of composite resins in order to provide good handling characteristics and some dimensional stability during polymerization. The purpose of this study was to analyze, in vitro, the magnitude of the volumetric polymerization shrinkage of 7 contemporary composite resins (Definite, Suprafill, SureFil, Filtek Z250, Fill ...

  1. Removal of radiocesium using cation exchange resin

    International Nuclear Information System (INIS)

    Morita-Murase, Yuko; Mizumura, Ryosuke; Tachibana, Yoshitaka; Kanazawa, Hideko

    2013-01-01

    Cation exchange resins (calcium polystyrene sulfonate, Ca-resin and sodium polystyrene sulfonate, Na-resin) have been used as agents to improve hyperkerlemia. For removing 137 Cs from the human body, the adsorption ability of the resin for 137 Cs was examined and evaluated. Resin (0.03 g) and 137 Cs (ca.1 kBq) were introduced into 3 mL of water, the Japanese Pharmacopoeia 1st fluid for a dissolution test (pH 1.2) and 2nd fluid (pH 6.8), respectively, and shaken. After 1-3 hours, the 137 Cs adsorption (%) of Na-resin was 99% in water, 60% in a pH 1.2 fluid and, 66% in a pH 6.8 fluid. By adding potassium, the 137 Cs adsorption (%) of Ca-resin was reduced. However, the 137 Cs adsorption (%) of Na-resin was almost unchanged. These results show that both resins have adsorption ability for 137 Cs in the stomach and the intestines. Therefore, the proposed method will be an effective means in the case of a radiological emergency due to 137 Cs. (author)

  2. The absorption of plutonium by anion resins

    Energy Technology Data Exchange (ETDEWEB)

    Durham, R. W.; Mills, R.

    1961-10-15

    Equilibrium experiments have shown Pu{sup +4} to be absorbed from nitric acid onto an anion resin as a complex anion Pu(NO{sub 3}){sub 6}{sup -2}. The amount of absorption is dependent on the plutonium and nitric acid concentrations in the equilibrium solution with a maximum at 7N to 8N HNO{sub 3}. A low cross-linked resin has a higher capacity and reaches equilibrium more rapidly than the normally supplied resin. Saturation capacity of one per cent cross-linked Nalcite SBR (Dowex 1), 50 -- 100 mesh, is 385 mg Pu/gram dry resin. (author)

  3. Novel silica-based ion exchange resin

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    Eichrom`s highly successful Diphonixo resin resembles a conventional ion exchange resin in its use of sulfonic acid ligands on a styrene- divinylbenzene matrix. Diphonix resin exhibits rapid exchange kinetics that allow economical operation of ion exchange systems. Unlike conventional resins, Diphonix resin contains chelating ligands that are diphosphonic acid groups that recognize and remove the targeted metals and reject the more common elements such as sodium, calcium and magnesium. This latter property makes Diphonix ideal for many industrial scale applications, including those involving waste treatment. For treatment of low-level, transuranic (TRU) and high- level radioactive wastes, Diphonix`s polystyrene backbone hinders its application due to radiolytic stability of the carbon-hydrogen bonds and lack of compatibility with expected vitrification schemes. Polystyrene-based Diphonix is approximately 60% carbon- hydrogen. In response to an identified need within the Department of Energy for a resin with the positive attributes of Diphonix that also exhibits greater radiolytic stability and final waste form compatibility, Eichrom has successfully developed a new, silica-based resin version of Diphonix. Target application for this new resin is for use in environmental restoration and waste management situations involving the processing of low-level, transuranic and high-level radioactive wastes. The resin can also be used for processing liquid mixed waste (waste that contains low level radioactivity and hazardous constituents) including mixed wastes contaminated with organic compounds. Silica-based Diphonix is only 10% carbon-hydrogen, with the bulk of the matrix silica.

  4. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  5. Double Vacuum Bag Process for Resin Matrix Composite Manufacturing

    Science.gov (United States)

    Hou, Tan-Hung (Inventor); Jensen, Brian J. (Inventor)

    2007-01-01

    A double vacuum bag molding assembly with improved void management and laminate net shape control which provides a double vacuum enviromnent for use in fabricating composites from prepregs containing air and/or volatiles such as reactive resin matrix composites or composites from solvent containing prepregs with non-reactive resins matrices. By using two vacuum environments during the curing process, a vacuum can be drawn during a B-stage of a two-step cycle without placing the composite under significant relative pressure. During the final cure stage, a significant pressure can be applied by releasing the vacuum in one of the two environments. Inner and outer bags are useful for creating the two vacuum environments with a perforated tool intermediate the two. The composite is placed intermediate a tool plate and a caul plate in the first environment with the inner bag and tool plate defining the first environment. The second environment is characterized by the outer bag which is placed over the inner bag and the tool plate.

  6. Irradiation effects in the storage and disposal of radioactive ion-exchange resins

    International Nuclear Information System (INIS)

    Swyler, K.J.; Dodge, C.E.; Dayal, R.; Weiss, A.J.

    1982-01-01

    Research is under way to characterize the effects of self-irradiation on radwastes which may be generated when organic ion-exchange media are used in water demineralization or decontamination operations at nuclear facilities. External factors affecting the relation between laboratory evaluations and field performance are emphasized. Initial experiments do not yet indicate substantial radiation dose-rate effects on radiolytic gas yields or acid product formation, when (fully swollen) sulfonic acid resins are irradiated in a sealed air environment. At the same time, oxygen gas is removed from the environment of irradiated resins. Interaction between mild steel coupons and acidic species produced in the irradiation induced decomposition of sulfonic acid resin results in irradiation enhanced corrosion. Corrosion rates depend on radiation dose rate, moisture content and resin chemical loading. In some cases, corrosion rates decrease with time, suggesting depletion of acidic species within the resin bed, or a synergistic interaction between resin and corrosion coupon. Implications of these and other results on evaluating field behavior of radwaste containing ion-exchange media are discussed. 4 figures, 2 tables

  7. An assessment of the radiological impact of human intrusion at the UK Low Level Waste Repository (LLWR) - 59356

    International Nuclear Information System (INIS)

    Hicks, Tim; Baldwin, Tamara; Cummings, Richard; Sumerling, Trevor

    2012-01-01

    The UK Low Level Waste Repository Ltd submitted an Environmental Safety Case for the disposal of low-level waste (LLW) to the Environment Agency on the 1 May 2011. The Environmental Safety Case (ESC) presents a complete case for the environmental safety of the Low Level Waste Repository (LLWR) both during operations and in the long term (Cummings et al, in these proceedings). This includes an assessment of the long-term radiological safety of the facility, including an assessment of the potential consequences of human intrusion at the site. The human intrusion assessment is based on a cautiously realistic approach in defining intrusion cases and parameter values. A range of possible human intrusion events was considered based on present-day technologies and credible future uses of the site. This process resulted in the identification of geotechnical investigations, a housing development and a smallholding as requiring quantitative assessment. A particular feature of the site is that, because of its proximity to the coast and in view of expected global sea-level rise, it is vulnerable to coastal erosion. During such erosion, wastes and engineered barrier materials will be exposed, and could become targets for investigation or recovery. Therefore, human intrusion events have been included that are associated with such activities. A radiological assessment model has been developed to analyse the impacts of potential human intrusion at the site. A key feature of the model is the representation of the spatial layout of the disposal site, including the engineered cap design and the large-scale spatial heterogeneity of radionuclide concentrations within the repository. The model has been used to calculate the radiation dose to intruders and to others following intrusion at different times and at different locations across the site, for the each of the selected intrusion events, considering all relevant exposure modes. Potential doses due to radon and its daughters in

  8. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    Science.gov (United States)

    Gomez, Andres; Lara, Camilo; Kebschull, Udo

    2015-12-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machine Learning approach. We plan to implement the proposed framework as a software prototype that will be tested as a component of the ALICE Grid middleware.

  9. DFCL: DYNAMIC FUZZY LOGIC CONTROLLER FOR INTRUSION DETECTION

    Directory of Open Access Journals (Sweden)

    Abdulrahim Haroun Ali

    2014-08-01

    Full Text Available Intrusions are a problem with the deployment of Networks which give misuse and abnormal behavior in running reliable network operations and services. In this work, a Dynamic Fuzzy Logic Controller (DFLC is proposed for an anomaly detection problem, with the aim of solving the problem of attack detection rate and faster response process. Data is collected by PingER project. PingER project actively measures the worldwide Internet’s end-to-end performance. It covers over 168 countries around the world. PingER uses simple ubiquitous Internet Ping facility to calculate number of useful performance parameters. From each set of 10 pings between a monitoring host and a remote host, the features being calculated include Minimum Round Trip Time (RTT, Jitter, Packet loss, Mean Opinion Score (MOS, Directness of Connection (Alpha, Throughput, ping unpredictability and ping reachability. A set of 10 pings is being sent from the monitoring node to the remote node every 30 minutes. The received data shows the current characteristic and behavior of the networks. Any changes in the received data signify the existence of potential threat or abnormal behavior. D-FLC uses the combination of parameters as an input to detect the existence of any abnormal behavior of the network. The proposed system is simulated in Matlab Simulink environment. Simulations results show that the system managed to catch 95% of the anomalies with the ability to distinguish normal and abnormal behavior of the network.

  10. Duo: Software Defined Intrusion Tolerant System Using Dual Cluster

    Directory of Open Access Journals (Sweden)

    Yongjae Lee

    2018-01-01

    Full Text Available An intrusion tolerant system (ITS is a network security system that is composed of redundant virtual servers that are online only in a short time window, called exposure time. The servers are periodically recovered to their clean state, and any infected servers are refreshed again, so attackers have insufficient time to succeed in breaking into the servers. However, there is a conflicting interest in determining exposure time, short for security and long for performance. In other words, the short exposure time can increase security but requires more servers to run in order to process requests in a timely manner. In this paper, we propose Duo, an ITS incorporated in SDN, which can reduce exposure time without consuming computing resources. In Duo, there are two types of servers: some servers with long exposure time (White server and others with short exposure time (Gray server. Then, Duo classifies traffic into benign and suspicious with the help of SDN/NFV technology that also allows dynamically forwarding the classified traffic to White and Gray servers, respectively, based on the classification result. By reducing exposure time of a set of servers, Duo can decrease exposure time on average. We have implemented the prototype of Duo and evaluated its performance in a realistic environment.

  11. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    International Nuclear Information System (INIS)

    Gomez, Andres; Lara, Camilo; Kebschull, Udo

    2015-01-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machine Learning approach. We plan to implement the proposed framework as a software prototype that will be tested as a component of the ALICE Grid middleware. (paper)

  12. Formation of continental crust by intrusive magmatism

    Science.gov (United States)

    Rozel, A. B.; Golabek, G. J.; Jain, C.; Tackley, P. J.; Gerya, T.

    2017-09-01

    How were the continents formed in the Earth? No global numerical simulation of our planet ever managed to generate continental material self-consistently. In the present study, we show that the latest developments of the convection code StagYY enable to estimate how to produce the early continents, more than 3 billion years ago. In our models, melting of pyrolitic rocks generates a basaltic melt and leaves behind a depleted solid residue (a harzburgite). The melt generated in the mantle is transported to the surface. Only basaltic rocks melting again can generate continental crust. Should the basaltic melt always reach the open air and cool down? Should the melt be intruded warm in the pre-existing crust? The present study shows that both processes have to be considered to produce continents. Indeed, granitoids can only be created in a tight window of pressure-temperature. If all basalt is quickly cooled by surface volcanism, the lithosphere will be too cold. If all basalt is intruded warm below the crust then the lithosphere will be too warm. The key is to have both volcanism and plutonism (intrusive magmatism) to reach the optimal temperature and form massive volumes of continental material.

  13. Salinity intrusion modeling for Sungai Selangor

    International Nuclear Information System (INIS)

    Mohamed Roseli Zainal Abidin; Abd Jalil Hassan; Suriyani Awang; Liew Yuk San; Norbaya Hashim

    2006-01-01

    Salinity intrusion into estuary of the Sungai Selangor has been carried out on a hydrodynamic numerical modeling to access the parameter that governed the amount of salt in the river. Issues such as water pollution and extraction of water from Sungai Selangor system has been said to be the cause of fading fireflies. The berembang trees on the river bank that become the fireflies habitat need some amount of salt for proper growth. Living at the lower reaches of Sungai Selangor, the fireflies are affected not only by the activities in their vicinity, but by activities in the entire river basin. Rapid economic development in the basin and the strong demand for the water resources puts pressure on the ecosystem. This research has been carried out to investigate the effect of water extraction along Sungai Selangor towards altering the amount of salt content in the river. The hydrodynamic modeling with regards to the salt content is expected to support long term assessment that may affect the berembang trees as a result of changes in the flow from upstream because of the water abstraction activity for domestic water supply. (Author)

  14. On the classification of seawater intrusion

    Science.gov (United States)

    Werner, Adrian D.

    2017-08-01

    Seawater intrusion (SWI) arising from aquifer depletion is often classified as ;active; or ;passive;, depending on whether seawater moves in the same direction as groundwater flow or not. However, recent studies have demonstrated that alternative forms of active SWI show distinctly different characteristics, to the degree that the term ;active SWI; may be misleading without additional qualification. In response, this article proposes to modify hydrogeology lexicon by defining and characterizing three classes of SWI, namely passive SWI, passive-active SWI and active SWI. The threshold parameter combinations for the onset of each form of SWI are developed using sharp-interface, steady-state analytical solutions. Numerical simulation is then applied to a hypothetical case study to test the developed theory and to provide additional insights into dispersive SWI behavior. The results indicate that the three classes of SWI are readily predictable, with the exception of active SWI occurring in the presence of distributed recharge. The key characteristics of each SWI class are described to distinguish their most defining features. For example, active SWI occurring in aquifers receiving distributed recharge only creates watertable salinization downstream of the groundwater mound and only where dispersion effects are significant. The revised classification of SWI proposed in this article, along with the analysis of thresholds and SWI characteristics, provides coastal aquifer custodians with an improved basis upon which to expect salinization mechanisms to impact freshwater availability following aquifer depletion.

  15. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei

    2010-01-01

    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  16. Geochemistry and petrogenesis of the Feshark intrusion (NE Isfahan city

    Directory of Open Access Journals (Sweden)

    Ali Kananian

    2017-11-01

    variations in La/Yb and Tb/Yb ratios, suggesting fractional crystallization. Chondrite-normalized REE patterns (Sun and McDonough, 1989 of all the samples essentially have the same shape with light REE (LREE enrichment, flat high REE (HREE and significant negative Eu anomalies. All of the samples exhibit similar trace element abundance patterns, with enrichment in large ion lithophile elements (LILE and negative anomalies in high field strength elements (HFSE; e.g. Ba, Nb, Ta, P, and Ti compared to primitive mantle (Sun and McDonough, 1989. The enrichment of LILE and LREE relative to the HFSE and HREE along with Nb, Ta, and Ti anomalies display close similarities to those of magmatic arc granites (Pearce et al., 1984 and also negative Nb–Ti anomalies are thought to be related to the fractionation of Ti-bearing phases (titanite, etc.. Moreover, these are the typical features of arc and / or crustal contamination (Kuster and Harms, 1998, while the negative P anomalies should result from apatite fractionation. The increasing of Ba and slightly decreasing Sr with increasing Rb, indicate that plagioclase fractionation plays an important role in the evolution of the studied intrusion. Tectonic environment discrimination diagrams such as Nb vs. Y, Nb vs. Yb+Ta (Pearce et al., 1984 and Th/Yb vs. Ta/Yb (Pearce, 1983 with enrichment in the LILE and LREE relative to HFSE and HREE and negative anomaly in the Nb, Ti and Eu indicate that their initial magma is generated in the subduction zone related to an active continental margin setting. ‏The rocks genesis determining diagrams such as Nb vs. Nb/U (Taylor and McLennan, 1985, Ti vs. Ti/Zr (Rudnick et al. 2000, (La/Smcn vs. Nb/U (Hofmann et al., 1986, and Sr/Y vs. Y (Sun and McDonough, 1989 show that the magma was probably generated by partial melting of amphibolitic continental crust. References He, Y., Zhao, G., Sun, M. and Han, Y., 2009. Petrogenesis and tectonic setting of volcanic rocks in the Xiaoshan and Waifangshan areas along

  17. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  18. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  19. QOS and Control-Theoretic Techniques for Intrusion Tolerance

    National Research Council Canada - National Science Library

    Ye, Nong

    2004-01-01

    ...), even in the face of intrusions. This report examines two host-based resources, a router and a web server, and presents simulated models of modifications that can be made to these resources to make them QoS-capable...

  20. Heart rate, startle response, and intrusive trauma memories

    Science.gov (United States)

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  1. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    spatiotemporal relations to form complex events which model the intrusion patterns. ... Wireless sensor networks; complex event processing; event stream; ...... of the 2006 ACM SIGMOD International Conference on Management of Data, 407– ...

  2. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  3. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  4. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  5. Nuclear waste disposal facility intrusion: an archeologist's perspective

    International Nuclear Information System (INIS)

    Virginia, C.; Christie, L.

    1981-01-01

    A scenario is presented for the intrusion of a shallow land burial site by archeologists from a future generation. A description is given for the potential widespread exposure and contamination of populations by recovered artifacts

  6. How Intrusion Detection Can Improve Software Decoy Applications

    National Research Council Canada - National Science Library

    Monteiro, Valter

    2003-01-01

    This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack...

  7. Ant colony induced decision trees for intrusion detection

    CSIR Research Space (South Africa)

    Botes, FH

    2017-06-01

    Full Text Available platform. Intrusion Detection Systems (IDS) analyse network traffic to identify suspicious patterns with the intention to compromise the system. Practitioners train classifiers to classify the data within different categories e.g. malicious or normal...

  8. Intrusion resistant underground structure (IRUS) - safety assessment and licensing

    International Nuclear Information System (INIS)

    Lange, B. A.

    1997-01-01

    This paper describes the safety goals, human exposure scenarios and critical groups, the syvac-nsure performance assessment code, groundwater pathway safety results, and inadvertent human intrusion of the IRUS. 2 tabs

  9. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against

  10. Simulation of sea water intrusion in coastal aquifers

    Indian Academy of Sciences (India)

    dependent miscible flow and transport modelling approach for simulation of seawater intrusion in coastal aquifers. A nonlinear optimization-based simulation methodology was used in this study. Various steady state simulations are performed for a ...

  11. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    Science.gov (United States)

    Ganapathy, S.; Yogesh, P.; Kannan, A.

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. PMID:23056036

  12. Bacterial amplification and in-place carpet drying: implications for category 1 water intrusion restoration.

    Science.gov (United States)

    Holland, Jim; Banta, John; Passmore, Boni; Ayers, Mark; Abbott, Sean P; Cole, Eugene C

    2012-05-01

    The study described in this article investigated whether in-place carpet drying processes resulted in bacterial amplification following water intrusion from a clean water source (category 1) in a residential indoor environment. Bacterial amplification was examined after wetting a 10-year-old carpet and pad that had no history of water intrusion. Three test areas were extracted and dried using industry-recommended procedures for in-place drying and compared to a control area that was not extracted or dried. Results from carpet, pad, and subsurface dust demonstrated that bacterial amplification occurred in all test areas. CFUs of bacteria per gram of carpet surface dust and subsurface dust prior to water intrusion were lower than levels in subsurface dust after in-place drying. The authors' study contributes to information regarding the restoration of water-based carpet damage by professional water damage restoration companies, building maintenance personnel, and housekeeping managers. Results suggest that the appropriate response time for carpet pad salvage is considerably shorter than the current industry recommendation of 72 hours.

  13. A survey of intrusion detection techniques in Cloud

    OpenAIRE

    Modi, C.; Patel, D.; Patel, H.; Borisaniya, B.; Patel, A.; Rajarajan, M.

    2013-01-01

    Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and...

  14. Environmental data processor of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Rogers, M.S.

    1977-06-01

    A data acquisition system oriented specifically toward collection and processing of various meteorological and environmental parameters has been designed around a National Semiconductor IMP-16 microprocessor, This system, called the Environmental Data Processor (EDP), was developed specifically for use with the Adaptive Intrusion Data System (AIDS) in a perimeter intrusion alarm evaluation, although its design is sufficiently general to permit use elsewhere. This report describes in general detail the design of the EDP and its interaction with other AIDS components

  15. Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

    OpenAIRE

    Jingyu Wang; xuefeng Zheng; Dengliang Luo

    2011-01-01

    Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources and reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. In order to address the problem of intrusion tolerance of cloud computing platform and sensitive data in...

  16. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  17. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  18. When Intrusion Detection Meets Blockchain Technology: A Review

    OpenAIRE

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju; Wang, Yu; Han, Jinguang

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness ...

  19. Multisensor Fusion for Intrusion Detection and Situational Awareness

    OpenAIRE

    Hallstensen, Christoffer V

    2017-01-01

    Cybercrime damage costs the world several trillion dollars annually. And al-though technical solutions to protect organizations from hackers are being con-tinuously developed, criminals learn fast to circumvent them. The question is,therefore, how to create leverage to protect an organization by improving in-trusion detection and situational awareness? This thesis seeks to contribute tothe prior art in intrusion detection and situational awareness by using a multi-sensor data fusion...

  20. Unique Challenges in WiFi Intrusion Detection

    OpenAIRE

    Milliken, Jonny

    2014-01-01

    The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more deta...

  1. Research and development for decontamination system of spent resin in Hanbit Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Sung, Gi Hong [Dept. of Nuclear Engineering, Chosun University, Gwangju (Korea, Republic of)

    2015-12-15

    When reactor coolant leaks occur due to cracks of a steam generator tube, radioactive materials contained in the primary cooling water in nuclear power plant are forced out toward the secondary systems. At this time the secondary water purification resin in the ion exchange resin tower of the steam generator blowdown system is contaminated by the radioactivity of the leaked radioactive materials, so we pack this in special containers and store temporarily because we could not dispose it by ourselves. If steam generator tube leakage occurs, it produces contaminated spent resins annually about 5,000-7,000 liters. This may increase the amount of nuclear waste productions, a disposal working cost and a unit price of generating electricity in the plant. For this reasons, it is required to develop a decontamination process technique for reducing the radioactive level of these resins enough to handle by the self-disposal method. In this research, First, Investigated the structure and properties of the ion exchange resin used in a steam generator blowdown system. Second, Checked for a occurrence status of contaminated spent resin and a disposal technology. Third, identified the chemical characteristics of the waste radionuclides of the spent resin, and examined ionic bonding and separation mechanism of radioactive nuclear species and a spent resin. Finally, we carried out the decontamination experiment using chemicals, ultrasound, microbubbles, supercritical carbon dioxide to process these spent resin. In the case of the spent resin decontamination method using chemicals, the higher the concentration of the drug decontamination efficiency was higher. In the ultrasound method, foreign matter of the spent resin was removed and was found that the level of radioactivity is below of the MDA. In the microbubbles method, we found that the concentration of the radioactivity decreased after the experiment, so it can be used to the decontamination process of the spent resin. In

  2. Research and development for decontamination system of spent resin in Hanbit Nuclear Power Plant

    International Nuclear Information System (INIS)

    Sung, Gi Hong

    2015-01-01

    When reactor coolant leaks occur due to cracks of a steam generator tube, radioactive materials contained in the primary cooling water in nuclear power plant are forced out toward the secondary systems. At this time the secondary water purification resin in the ion exchange resin tower of the steam generator blowdown system is contaminated by the radioactivity of the leaked radioactive materials, so we pack this in special containers and store temporarily because we could not dispose it by ourselves. If steam generator tube leakage occurs, it produces contaminated spent resins annually about 5,000-7,000 liters. This may increase the amount of nuclear waste productions, a disposal working cost and a unit price of generating electricity in the plant. For this reasons, it is required to develop a decontamination process technique for reducing the radioactive level of these resins enough to handle by the self-disposal method. In this research, First, Investigated the structure and properties of the ion exchange resin used in a steam generator blowdown system. Second, Checked for a occurrence status of contaminated spent resin and a disposal technology. Third, identified the chemical characteristics of the waste radionuclides of the spent resin, and examined ionic bonding and separation mechanism of radioactive nuclear species and a spent resin. Finally, we carried out the decontamination experiment using chemicals, ultrasound, microbubbles, supercritical carbon dioxide to process these spent resin. In the case of the spent resin decontamination method using chemicals, the higher the concentration of the drug decontamination efficiency was higher. In the ultrasound method, foreign matter of the spent resin was removed and was found that the level of radioactivity is below of the MDA. In the microbubbles method, we found that the concentration of the radioactivity decreased after the experiment, so it can be used to the decontamination process of the spent resin. In

  3. Input to Resin Column Structural Analysis if Autocatalytic Resin Reaction Occurs in HB-Line Phase II

    Energy Technology Data Exchange (ETDEWEB)

    Hallman, D.F.

    2001-07-10

    Solutions of plutonium in nitric acid are purified and concentrated using anion resin prior to precipitation. There have been instances of resin column explosions caused by autocatalytic reactions of anion resins in nitric acid within the DOE complex

  4. Properties of the Carboxylate ion exchange resins; Karboxylatjonbytarmassans egenskaper

    Energy Technology Data Exchange (ETDEWEB)

    Allard, Bert; Dario, Maarten [Oerebro Univ. (Sweden); Boren, Hans [Linkoepings Univ. (Sweden); Torstenfelt, Boerje [Swedpower, Stockholm (Sweden); Puigdomenech, Ignasi; Johansson, Claes [Swedish Nuclear Fuel and Waste Management Co., Stockholm (Sweden)

    2002-09-01

    Weakly acidic, carboxylic resin has been selected, together with strong base anion resins, for water purification at the Forsmark 1 and 2 reactors. For the strong (but not the weak) ion exchange resin the Nuclear Power Inspectorate has given permission to dispose the spent resins in the SFR 1 (the Final Repository for Radioactive Operational Waste). This report gives a review of the carboxylic resins and comes to the conclusion that the resins are very stable and that there should not exist any risks for increased leaching of radionuclides from SFR 1 if these resins are disposed (compared to the strong resins)

  5. A Survey on Anomaly Based Host Intrusion Detection System

    Science.gov (United States)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  6. Rapid laccolith intrusion driven by explosive volcanic eruption.

    Science.gov (United States)

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  7. Resin Viscosity Influence on Fiber Compaction in Tapered Resin Injection Pultrusion Manufacturing

    Science.gov (United States)

    Masuram, N. B.; Roux, J. A.; Jeswani, A. L.

    2018-06-01

    Viscosity of the liquid resin effects the chemical and mechanical properties of the pultruded composite. In resin injection pultrusion manufacturing the liquid resin is injected into a specially designed tapered injection chamber through the injection slots present on top and bottom of the chamber. The resin is injected at a pressure so as to completely wetout the fiber reinforcements inside the tapered injection chamber. As the resin penetrates through the fibers, the resin also pushes the fibers away from the wall towards the center of chamber causing compaction of the fiber reinforcements. The fibers are squeezed together due to compaction, making resin penetration more difficult; thus higher resin injection pressures are required to efficaciously penetrate through the compacted fibers and achieve complete wetout. The impact of resin viscosity on resin flow, fiber compaction, wetout and on the final product is further discussed. Injection chamber design predominantly effects the resin flow inside the chamber and the minimum injection pressure required to completely wet the fibers. Therefore, a desirable injection chamber design is such that wetout occurs at lower injection pressures and at low internal pressures inside the injection chamber.

  8. Overview on resins available in microlithography

    International Nuclear Information System (INIS)

    Serre, B.; Schue, F.; Montginoul, C.; Giral, L.

    1985-01-01

    Lithographic equipments using electrons and X radiation are developed. Velocity and resolution requirements fix the nature of the material to irradiate. Circuit making principles are recalled here; resists (organic polymers) are employed for it. The different types of resins and then needed characteristics are reviewed here. In the scope of electron sensitive resins methyl polymethacrylate and derivative and its copolymers (and copolymers of methacrylonitrile) and reticulated copolymers are studied. Polysulfones are also presented (poly(buten-1 sulfone), poly(styrene sulfone), poly(methyl-1 cyclopentene-1 sulfone). The interest in photosensitive resins (such as AZ) as electron sensitive resins is recalled. In the field of negative resins, the polyepoxyds, polystyrene and halogenated derivates from polystyrene (CMS and PCMS), the poly(vinyl-2 naphtalene) and its derivatives (PSTTF) are presented. The X radiation sensitive resins are also reviewed: the methyl polymethacrylate and its halogenated derivates, the acrylic homopolymers and copolymers (example of poly(acrylate of chlorinated alcoyls). The resins developable by plasma are mentioned. At last, for photosensitive resins, the diazide polydiene systems are presented together with systems diazo-2 2H-naphtalenone-1. The systems with salt photolysis are just recalled [fr

  9. Epoxidation of linseed oil-Alkyd resins

    International Nuclear Information System (INIS)

    Motawie, A.M.; Ismail, E.A.; Mazroua, A.M.; Abd EI Aziem, M.S.; Ramadan, A.M.

    2004-01-01

    Three types of different linseed oil-alkyd resin ( Alk (I), Alk (II), and Alk (III) ) were prepared with the calculated amounts of mono glycerides and adipic acid (1:1, 1:2, and 2:1 Eq.Wt) respectively via monoglyceride method. The obtained alkyd resins were epoxidized via reaction with the calculated quantities of peracetic acid, which was prepared by the reaction of acetic anhydride with H 2 O 2 . Epoxidation occurred with the ratio (1: 1, 1 :3, and 1:6 Eq. Wt) of alkyd to peracetic acid. The effect of reaction time on the epoxy group content was measured during the epoxidation process. The prepared alkyd resins were analyzed by IR and H 1 NMR. The metal coated film properties of epoxidized alkyd resins were compared with those of unmodified alkyd resins. It was observed that the coating films of epoxidized alkyd resins have better in drying properties, hardness, adhesion, impact and flexibility than those of un epoxidized alkyd resins. The flammability properties of the paper coated films for the prepared brominated epoxidized alkyd resins were found to be fire retardant

  10. 21 CFR 177.1655 - Polysulfone resins.

    Science.gov (United States)

    2010-04-01

    ... disodium salt of 4,4′-isopropylidenediphenol is made to react with 4,4′-dichlorodiphenyl sulfone in such a... Limitations Dimethyl sulfoxide Not to exceed 50 parts per million as residual solvent in finished basic resin... residual solvent in finished basic resin in paragraph (a)(1) of this section. N-methyl-2-pyrrolidone Not to...

  11. 21 CFR 177.1580 - Polycarbonate resins.

    Science.gov (United States)

    2010-04-01

    ...′-iso-propylidenediphenol with molten diphenyl carbonate in the presence of the disodium salt of 4,4... chloride Monochlorobenzene Not to exceed 500 p.p.m. as residual solvent in finished resin. Pentaerythritol...-88-3) Not to exceed 800 parts per million as residual solvent in finished resin. Triethylamine (c...

  12. 21 CFR 177.1595 - Polyetherimide resin.

    Science.gov (United States)

    2010-04-01

    ... polyetherimide resin identified in this section may be safely used as an article or component of an article... substances required in the production of basic resins or finished food-contact articles. The optional... and Applied Nutrition (HFS-200), Food and Drug Administration, 5100 Paint Branch Pkwy., College Park...

  13. 21 CFR 177.2440 - Polyethersulfone resins.

    Science.gov (United States)

    2010-04-01

    ... Components of Articles Intended for Repeated Use § 177.2440 Polyethersulfone resins. Polyethersulfone resins identified in paragraph (a) of this section may be safely used as articles or components of articles intended... Petition Control (HFS-215), Center for Food Safety and Applied Nutrition, 1110 Vermont Ave. NW., suite 1200...

  14. Modified resins for solid-phase extraction

    Science.gov (United States)

    Fritz, James S.; Sun, Jeffrey J.

    1991-12-10

    A process of treating aqueous solutions to remove organic solute contaminants by contacting an aqueous solution containing polar organic solute contaminants with a functionalized polystyrene-divinyl benzene adsorbent resin, with the functionalization of said resin being accomplished by organic hydrophilic groups such as hydroxymethyl, acetyl and cyanomethyl.

  15. Measurement of opalescence of resin composites.

    Science.gov (United States)

    Lee, Yong-Keun; Lu, Huan; Powers, John M

    2005-11-01

    Opalescence is an optical property, where there is light scattering of the shorter wavelengths of the visible spectrum, giving the material a bluish appearance under reflected light and an orange/brown appearance under transmitted light. The objective of this study was to determine the opalescence of resin composites with a color measuring spectrophotometer. Colors of A2 and enamel or translucent shades of four resin composites and of an unfilled resin measured in the reflectance and transmittance modes were compared, and the opalescence parameter (OP) was calculated as the difference in blue-yellow coordinate (Deltab*) and red-green parameter (Deltaa*) between the reflected and transmitted colors of 1-mm thick specimens. The masking effect was calculated as the color difference between the color of a black background and the color of specimen over the black background. The range of OP in resin composites was 5.7-23.7, which was higher than that of the unfilled resin. However, there were significant differences among the brands and shades of the resin composites. Opalescence varied by brand and shade of the resin composites, and contributed to the masking of background color along with translucency parameter. Some of the resin composites actually displayed opalescence.

  16. Fusion of arkosic sand by intrusive andesite

    Science.gov (United States)

    Bailey, Roy A.

    1954-01-01

    An andesite dike in the Valles Mountains of northern New Mexico has intruded and partly fused arkosic sediments for a distance of 50 feet from its contacts. The dike is semi-circular in form, has a maximum width of about 100 feet, and is about 500 feet long. Small associated arcuate dikes are arranged in spiral fashion around the main dike, suggesting that they were intruded along shear fractures similar to those described by Burbank (1941). The fused rocks surrounding the andesite dike are of three general types: 1) partly fused arkosic sand, 2) fused clay, and 3) hybrid rocks. The fused arkosic sand consists of relict detrital grains of quartz, orthoclose, and plagioclase, imbedded in colorless glass containing microlites of tridymite, cordierite, and magnetite. The relict quartz grains are corroded and embayed by glass; the orthoclase is sanidinized and partly fused; and the plagioclase is inverted to the high temperature form and is partly fused. The fused clay, which was originally a mixture of montmorillonite and hydromica, consists primarily of cordierite but also contains needle-like crystals of sillimanite (?) or mullite (?). The hybrid rocks originated in part by intermixing of fused arkosic sediments and andesitic liquid and in part by diffusion of mafic constituents through the fused sediments. They are rich in cordierite and magnetite and also contain hypersthene, augite, and plagioclase. The composition of pigeonite in the andesite indicates that the temperature of the andesite at the time of intrusion probably did not exceed 1200?C. Samples of arkosic sand were fused in the presence of water in a Morey bomb at 1050?C. Stability relations of certain minerals in the fused sand suggest that fusion may have taken place at a lower temperature, however, and the fluxing action of volatiles from the andesite are thought to have made this possible.

  17. Non-Intrusive Battery Health Monitoring

    Directory of Open Access Journals (Sweden)

    Gajewski Laurent

    2017-01-01

    Full Text Available The “Non-intrusive battery health monitoring”, developed by Airbus Defence and Space (ADS in cooperation with the CIRIMAT-CNRS laboratory and supported by CNES, aims at providing a diagnosis of the battery ageing in flight, called State of Health (SOH, using only the post-treatment of the battery telemetries. The battery current and voltage telemetries are used by a signal processing tool on ground to characterize and to model the battery at low frequencies which allows monitoring the evolution of its degradation with great accuracy. The frequential behaviour estimation is based on inherent disturbances on the current during the nominal functioning of the battery. For instance, on-board thermal control or equipment consumption generates random disturbances on battery current around an average current. The battery voltage response to these current random disturbances enables to model the low frequency impedance of the battery by a signal processing tool. The re-created impedance is then compared with the evolution model of the low frequencies impedance as a function of the battery ageing to estimate accurately battery degradation. Hence, this method could be applied to satellites which are already in orbit and whose battery telemetries acquisition system fulfils the constraints determined in the study. This innovative method is an improvement of present state-of-the-art and is important to have a more accurate in-flight knowledge of battery ageing which is crucial for mission and operation planning and also for possible satellite mission extension or deorbitation. This method is patented by Airbus Defence and Space and CNES.

  18. Contribution to uranium geochemistry in intrusive granites

    International Nuclear Information System (INIS)

    Coulomb, R.

    1959-01-01

    This work aims to define the position of a certain number of French granitic deposits within the field of the geochemistry of granites in general, and of the geochemistry of uranium in particular. The regions concerned are: - 3 French Hercynian ranges, in the Vendee, in Brittany and in the Morvan, - 1 African range, probably precambrian, of the Hoggar. For each range, the petrochemical framework is first of all determined and then the degree of chemical homogeneity of the rocks is evaluated. In the petrochemical groups thus obtained the geochemical behaviour of the uranium is studied. From a point of view of the geochemistry of the granites under investigation, a comparison of the laws of distribution of the major elements in the 4 ranges shows up a convergence of average composition which was not anticipated by geological and petrographic considerations alone. The statistical and geochemical distribution laws of the total uranium as a function of the petrochemical variations are established. A study of the chemical forms of uranium in the rocks has drawn an attention to the qualitative and quantitative importance of the fraction of this uranium soluble in dilute acids. We have therefore reconsidered on the one hand, the laws of distribution of the insoluble uranium, which represents essentially the uranium fixed in crystalline structures (zircon, allanite...), and we have justified on the other hand the interest presented by the soluble uranium: this, although more complex in character, presents a geochemical unity in post magmatic phenomena which makes possible to find a genetic connection between the uraniferous deposits and the intrusive massifs. Finally we have given a plan of the geochemical cycle of uranium, in which we hope to have provided some more accurate data on the igneous phase. (author) [fr

  19. Embedding of reactor wastes in plastic resins

    International Nuclear Information System (INIS)

    1979-01-01

    STEAG Kernenergie GmbH is so far the only firm commercially to condition radioactive bead ion exchange resins by embedding in polystyrene resins. The objective of the work reported here was to study and develop methods for immobilization of other reactor wastes in plastic resins. Comparison studies on high quality cement however showed favourable results for cement with respect to process safety and economy. For this reason STEAG interrupted its work in the field of resin embedding after about one year. The work carried out during this period is surveyed in this report, which includes a comprehensive literature study on reactor wastes and their solidification in plastic resins as well as on regulations with regard to radioactive waste disposal in the member states of the European Communities

  20. Chemoviscosity modeling for thermosetting resins, 2

    Science.gov (United States)

    Hou, T. H.

    1985-01-01

    A new analytical model for simulating chemoviscosity of thermosetting resin was formulated. The model is developed by modifying the Williams-Landel-Ferry (WLF) theory in polymer rheology for thermoplastic materials. By assuming a linear relationship between the glass transition temperature and the degree of cure of the resin system under cure, the WLF theory can be modified to account for the factor of reaction time. Temperature dependent functions of the modified WLF theory constants were determined from the isothermal cure data of Lee, Loos, and Springer for the Hercules 3501-6 resin system. Theoretical predictions of the model for the resin under dynamic heating cure cycles were shown to compare favorably with the experimental data reported by Carpenter. A chemoviscosity model which is capable of not only describing viscosity profiles accurately under various cure cycles, but also correlating viscosity data to the changes of physical properties associated with the structural transformations of the thermosetting resin systems during cure was established.

  1. Electrodialytic decontamination of spent ion exchange resins

    International Nuclear Information System (INIS)

    Nott, B.R.

    1982-01-01

    Development of a novel electrodialytic decontamination process for the selective removal of radioactive Cs from spent ion exchange resins containing large amounts of Li is described. The process involves passage of a dc electric current through a bed of the spent ion exchange resin in a specially designed electrodialytic cell. The radiocesium so removed from a volume of the spent resin is concentrated onto a much smaller volume of a Cs selective sorbent to achieve a significant radioactive waste volume reduction. Technical feasibility of the electrodialytic resin decontamination process has been demonstrated on a bench scale with a batch of simulated spent ion exchange resin and using potassium cobalt ferrocyanide as the Cs selective sorbent. A volume reduction factor between 10 and 17 has been estimated. The process appears to be economically attractive. Improvements in process economics can be expected from optimization of the process. Other possible applications of the EDRD process have been identified

  2. A Neuro-genetic Based Short-term Forecasting Framework for Network Intrusion Prediction System

    Institute of Scientific and Technical Information of China (English)

    Siva S. Sivatha Sindhu; S. Geetha; M. Marikannan; A. Kannan

    2009-01-01

    Information systems are one of the most rapidly changing and vulnerable systems, where security is a major issue. The number of security-breaking attempts originating inside organizations is increasing steadily. Attacks made in this way, usually done by "authorized" users of the system, cannot be immediately traced. Because the idea of filtering the traffic at the entrance door, by using firewalls and the like, is not completely successful, the use of intrusion detection systems should be considered to increase the defense capacity of an information system. An intrusion detection system (IDS) is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current IDS depends on the system operators in working out the tuning solution and in integrating it into the detection model. Furthermore, an extensive effort is required to tackle the newly evolving attacks and a deep study is necessary to categorize it into the respective classes. To reduce this dependence, an automatically evolving anomaly IDS using neuro-genetic algorithm is presented. The proposed system automatically tunes the detection model on the fly according to the feedback provided by the system operator when false predictions are encountered. The system has been evaluated using the Knowledge Discovery in Databases Conference (KDD 2009) intrusion detection dataset. Genetic paradigm is employed to choose the predominant features, which reveal the occurrence of intrusions. The neuro-genetic IDS (NGIDS) involves calculation of weightage value for each of the categorical attributes so that data of uniform representation can be processed by the neuro-genetic algorithm. In this system unauthorized invasion of a user are identified and newer types of attacks are sensed and classified respectively by the neuro-genetic algorithm. The experimental results obtained in this

  3. Solidification of ion exchange resin wastes

    International Nuclear Information System (INIS)

    1982-08-01

    Solidification media investigated included portland type I, portland type III and high alumina cements, a proprietary gypsum-based polymer modified cement, and a vinyl ester-styrene thermosetting plastic. Samples formulated with hydraulic cement were analyzed to investigate the effects of resin type, resin loading, waste-to-cement ratio, and water-to-cement ratio. The solidification of cation resin wastes with portland cement was characterized by excessive swelling and cracking of waste forms, both after curing and during immersion testing. Mixed bed resin waste formulations were limited by their cation component. Additives to improve the mechanical properties of portland cement-ion exchange resin waste forms were evaluated. High alumina cement formulations dislayed a resistance to deterioration of mechanical integrity during immersion testing, thus providing a significant advantage over portland cements for the solidification of resin wastes. Properties of cement-ion exchange resin waste forms were examined. An experiment was conducted to study the leachability of 137 Cs, 85 Sr, and 60 Co from resins modified in portland type III and high alumina cements. The cumulative 137 Cs fraction release was at least an order of magnitude greater than that of either 85 Sr or 60 Co. Release rates of 137 Cs in high alumina cement were greater than those in portland III cement by a factor of two.Compressive strength and leach testing were conducted for resin wastes solidified with polymer-modified gypsum based cement. 137 Cs, 85 Sr, and 60 Co fraction releases were about one, two and three orders of magnitude higher, respectively, than in equivalent portland type III cement formulations. As much as 28.6 wt % dry ion exchange resin was successfully solidified using vinyl ester-styrene compared with a maximum of 25 wt % in both portland and gypsum-based cement

  4. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients

    Directory of Open Access Journals (Sweden)

    Usha Bapat

    2012-01-01

    Full Text Available To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients′ above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life

  5. Aspects of bonding between resin luting cements and glass ceramic materials.

    Science.gov (United States)

    Tian, Tian; Tsoi, James Kit-Hon; Matinlinna, Jukka P; Burrow, Michael F

    2014-07-01

    The bonding interface of glass ceramics and resin luting cements plays an important role in the long-term durability of ceramic restorations. The purpose of this systematic review is to discuss the various factors involved with the bond between glass ceramics and resin luting cements. An electronic Pubmed, Medline and Embase search was conducted to obtain laboratory studies on resin-ceramic bonding published in English and Chinese between 1972 and 2012. Eighty-three articles were included in this review. Various factors that have a possible impact on the bond between glass ceramics and resin cements were discussed, including ceramic type, ceramic crystal structure, resin luting cements, light curing, surface treatments, and laboratory test methodology. Resin-ceramic bonding has been improved substantially in the past few years. Hydrofluoric acid (HF) etching followed by silanizaiton has become the most widely accepted surface treatment for glass ceramics. However, further studies need to be undertaken to improve surface preparations without HF because of its toxicity. Laboratory test methods are also required to better simulate the actual oral environment for more clinically compatible testing. Copyright © 2014 Academy of Dental Materials. Published by Elsevier Ltd. All rights reserved.

  6. Review of the geochemistry and metallogeny of approximately 1.4 Ga granitoid intrusions of the conterminous United States

    Science.gov (United States)

    du Bray, Edward A.; Holm-Denoma, Christopher S.; Lund, Karen; Premo, Wayne R.

    2018-03-27

    primitive, mantle-derived components and evolved, crust-derived components.Each compositional subtype can be ascribed to a relatively unique petrogenetic history. The numerically dominant ferroan, peraluminous granites probably represent low-degree, relatively high-pressure partial melting of preexisting, crust-derived, intermediate-composition granitoids. The moderately numerous, weakly magnesian, peraluminous granites probably reflect similar partial melting but at a higher degree and in a lower pressure environment. In contrast, the ferroan but metaluminous granites may be the result of extensive differentiation of tholeiitic basalt. Finally, the peralkaline igneous rocks at Mountain Pass have compositions potentially derived by differentiation of alkali basalt. The varying alkalic character of each subtype probably reflects polybaric petrogenesis and the corresponding effect of diverse mineral stabilities on ultimate melt compositions. Mantle-derived mafic magma and variably assimilated partial melts of mainly juvenile Paleoproterozoic crustal components are required to generate the relatively low initial strontium (87Sr/86Sr) and distinctive neodymium isotope compositions characteristic of the U.S. 1.4 Ga granitoid intrusions. The characteristics of these intrusions are consistent with crustal melting in an extensional/decompressional, intracratonic setting that was triggered by mantle upwelling and emplacement of tholeiitic basaltic magma at or near the base of the crust. Composite magmas, formed by mingling and mixing mantle components with partial melts of Paleoproterozoic crust, produced variably homogenized storage reservoirs that continued polybaric evolution as intrusions lodged at various crustal depths.

  7. Treatment of radioactive ionic exchange resins by super- and sub-critical water oxidation (SCWO)

    International Nuclear Information System (INIS)

    Kim, Kyeongsook; Son, Soon Hwan; Kim, Kwang Sin; Han, Joo Hee; Han, Kee Do; Do, Seung Hoe

    2010-01-01

    As the usage of ion exchange resins increases the inventory of spent ion exchange resins increases in nuclear power plants. This study is to find an environmental-friendly process to treat theses spent resins. The test samples were prepared by diluting the slurry made by wet ball milling the spent cationic exchange resins for 24 h. The spent cationic exchange resins were separated from mixed ion exchange resins by a fluidized bed gravimetric separator. The decomposition of the samples was investigated with super-critical water oxidation (SCWO) equipment. A statistical test method - the central composite design as a statistical design of experiments - was adopted to find the optimum condition to decompose the spent exchange resins. The optimum condition was 60% of excess oxygen, 22.5 min of residence time, 0.615 wt% of NaOH, 358 of reaction temperature, and 3600 psi of reaction pressure, which is a sub-critical condition. The liquid product of the decomposition has the characteristics of 80-185 ppm of COD (Chemical Oxygen Demand), 4.0-6.0 of pH, and <1.0 ppm of corrosive components (Ni, Fe, Cr, and Mo). The exhaust gas from the SCWO equipment contained NOx of 0 ppm, SOx of 3 ppm (environment exhaust standard in Korea: NOx 200 ppm, SOx 300 ppm). Co-substituted mock samples were prepared to simulate spent cationic exchange resins from nuclear power plants which can contain radioactive Co isotopes. The conditions to obtain organic compound destruction ratio which conforms the effluent stand for the mock samples were found. The treated water filtered with 0.2-filter contained less than 1 ppm of Co. Thus Co recovery rate of more 99% was achieved.

  8. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  9. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  10. EPICOR-II resin degradation results from first resin samples of PF-8 and PF-20

    International Nuclear Information System (INIS)

    McConnell, J.W. Jr.; Sanders, R.D. Sr.

    1985-12-01

    The 28 March 1979 accident at Three Mile Island Unit 2 released approximately 560,000 gallons of contaminated water to the Auxiliary and Fuel Handling Buildings. The water was decontaminated using a demineralization system called EPICOR-II developed by Epicor, Inc. The Low-Level Waste Data Base Development - EPICOR-II Resin/Liner Investigation Project is studying the chemical and physical conditions of the synthetic ion exchange resins found in several EPICOR-II prefilters. This report summarizes results and analyses of the first sampling of ion exchange resins from EPICOR-II prefilters PE-8 and -20. Results are compared with baseline data from tests performed on unirradiated Epicor, Inc. resins to determine if degradation has occurred due to the high internal radiation dose received by the EPICOR-II resins. Results also are compared with recent findings on resin degradation by Battelle Columbus Laboratories and Brookhaven National Laboratory. Analyses comparing test results of resins from EPICOR-II prefilters PF-8 and -20 with unirradiated resins obtained from Epicor, Inc. show resin degradation has occurred in some of the EPICOR-II resins examined. The mechanism of degradation is compared with work of other researchers and is consistent with their findings. The strong acid cation resins (divinylbenzene, styrene base structure) are losing effective cross-linking along with scission of functional groups and are experiencing first an increase and eventually a decrease in total exchange capacity as the absorbed radiation dose increases. The phenolic cation resins (phenol-formaldehyde base structure) show a loss of effective cross-linking and oxidation of the polymer chain. Analyses of resins removed from EPICOR-II prefilters PF-8 and -20 over the next several years should show a further increase in degradation

  11. Investigation of Seawater Intrusion into Coastal Groundwater ...

    African Journals Online (AJOL)

    ADOWIE PERE

    Malaysia (Baharuddin et al. 2009). ... internationally as result of activities of oil and gas exploration and ... freshwater swamps vegetation, such as palm tree and shrubs. ... environment, the sands are the aquifers, while the clays are the ...

  12. Decomposing method for ion exchange resin

    International Nuclear Information System (INIS)

    Sako, Takeshi; Sato, Shinshi; Akai, Yoshie; Moniwa, Shinobu; Yamada, Kazuo

    1998-01-01

    The present invention concerns a method of decomposing ion exchange resins generated in a nuclear power plant to carbon dioxide reliably in a short period of time. (1) The ion exchange resins are mixed with water, and then they are kept for a predetermined period of time in the presence of an inert gas at high temperature and high pressure exceeding the critical point of water to decompose the ion exchange resins. (2) The ion exchange resins is mixed with water, an oxidant is added and they are kept for a predetermined time in the presence of an inert gas at a high temperature and a high pressure exceeding a critical point of water of an inert gas at a high temperature to decompose the ion exchange resins. (3) An alkali or acid is added to ion exchange resins and water to control the hydrogen ion concentration in the solution and the ion exchange resins are decomposed in above-mentioned (1) or (2). Sodium hydroxide is used as the alkali and hydrochloric acid is used as the acid. In addition, oxygen, hydrogen peroxide or ozone is used as an oxidant. (I.S.)

  13. Safety evaluation of cation-exchange resins

    International Nuclear Information System (INIS)

    Kalkwarf, D.R.

    1977-08-01

    Results are presented of a study to evaluate whether sufficient information is available to establish conservative limits for the safe use of cation-exchange resins in separating radionuclides and, if not, to recommend what new data should be acquired. The study was also an attempt to identify in-line analytical techniques for the evaluation of resin degradation during radionuclide processing. The report is based upon a review of the published literature and upon discussions with many people engaged in the use of these resins. It was concluded that the chief hazard in the use of cation-exchange resins for separating radionuclides is a thermal explosion if nitric acid or other strong oxidants are present in the process solution. Thermal explosions can be avoided by limiting process parameters so that the rates of heat and gas generation in the system do not exceed the rates for their transfer to the surroundings. Such parameters include temperature, oxidant concentration, the amounts of possible catalysts, the radiation dose absorbed by the resin and the diameter of the resin column. Current information is not sufficient to define safe upper limits for these parameters. They can be evaluated, however, from equations derived from the Frank-Kamenetskii theory of thermal explosions provided the heat capacities, thermal conductivities and rates of heat evolution in the relevant resin-oxidant mixtures are known. It is recommended that such measurements be made and the appropriate limits be evaluated. A list of additional safety precautions are also presented to aid in the application of these limits and to provide additional margins of safety. In-line evaluation of resin degradation to assess its safety hazard is considered impractical. Rather, it is recommended that the resin be removed from use before it has received the limiting radiation dose, evaluated as described above

  14. Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks

    Directory of Open Access Journals (Sweden)

    Wenjuan Li

    2018-01-01

    Full Text Available Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN has thus been developed by allowing intrusion detection system (IDS nodes to exchange data with each other. Insider attacks are a great threat for such types of collaborative networks, where an attacker has the authorized access within the network. In literature, a challenge-based trust mechanism is effective at identifying malicious nodes by sending challenges. However, such mechanisms are heavily dependent on two assumptions, which would cause CIDNs to be vulnerable to advanced insider attacks in practice. In this work, we investigate the influence of advanced on–off attacks on challenge-based CIDNs, which can respond truthfully to one IDS node but behave maliciously to another IDS node. To evaluate the attack performance, we have conducted two experiments under a simulated and a real CIDN environment. The obtained results demonstrate that our designed attack is able to compromise the robustness of challenge-based CIDNs in practice; that is, some malicious nodes can behave untruthfully without a timely detection.

  15. Risks assessment associated with the possibility of intrusion into the low and intermediate level waste disposal facility

    International Nuclear Information System (INIS)

    Didita, L.; Ilie, P.; Pavelescu, M.

    1997-01-01

    In post-closure performance assessment of low and intermediate level waste disposal facilities it is necessary to assess the individual risks associated with the possibility of intrusion into repository. Intruder induced disruptive events can potentially compromise the integrity of the disposal unit and result in exhumation of the waste and radionuclides migration into environment. In this way, the main routes of exposure are: -inhalation of radioactive materials by the intruder; - external gamma irradiation of the intruder, - long-term pathways resulting from the transfer of radioactive materials to the surface of the site. This paper describes the evaluation of conditional and absolute risks associated with each route of exposure as a function of time. To evaluate the risks, it is necessary to calculate the time-dependent activities of each nuclide considered. This is achieved by employing an analytic solution to the Bateman equation at specified times of evaluation. Conditional risks by inhalation, external exposure and long-term pathways and different modes of intrusion are evaluated on the basis of an annual probability of intrusion of unity. Absolute risks are calculated by scaling the user-supplied probabilities of intrusion at various times of evaluation. The evaluation of absolute risks by long-term exposure pathways involves an interpolation procedure in time. The calculations have been performed for the most important radionuclides present in low and intermediate wastes. (authors)

  16. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  17. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  18. Posterior bulk-filled resin composite restorations.

    DEFF Research Database (Denmark)

    van Dijken, Jan WV; Pallesen, Ulla

    2016-01-01

    up to 4mm as needed to fill the cavity 2mm short of the occlusal cavosurface. The occlusal part was completed with the nano-hybrid resin composite (Ceram X mono+). In the other cavity, the resin composite-only (Ceram X mono+) was placed in 2mm increments. The restorations were evaluated using...... Class II, 4 SDR-CeramX mono+ and 6 CeramXmono+-only restorations. The main reasons for failurewere tooth fracture (6) and secondary caries (4). The annual failure rate (AFR) for all restorations (Class I and II) was for the bulk-filled-1.1% and for the resin composite-only restorations 1...

  19. Immobilisation of ion exchange resins in cement

    International Nuclear Information System (INIS)

    Howard, C.G.; Jolliffe, C.B.; Lee, D.J.

    1990-09-01

    The removal of activity from spent decontaminating solutions eg LOMI can be achieved using organic ion exchange resins. These resins can be successfully immobilised in cement based matrices. The optimum cement system contained 10% ordinary Portland cement 84% gg blast furnace slag, 6% microsilica with a water cement ratio of 0.5 and a dry resin loading of 36% with respect to total weight. This formulation was successfully scaled up to 200 litres giving a product with acceptable compressive strength, dimensional stability and elastic modulus. Storage of samples under water appears to have no detrimental effects on the product's properties. (author)

  20. Immobilisation of ion exchange resins in cement

    International Nuclear Information System (INIS)

    Howard, C.G.; Jolliffe, C.B.; Lee, D.J.

    1990-09-01

    The removal of activity from spent decontaminating solutions eg LOMI can be achieved using organic ion exchange resins. These resins can be successfully immobilised in cement based matrices. The optimum cement system contained 10% ordinary Portland cement, 84% gg blast furnace slag, 6% microsilica with a water cement ratio of 0.5 and a dry resin loading of 36% with respect to total weight. This formulation was successfully scaled up to 200 litres giving a product with acceptable compressive strength, dimensional stability and elastic modulus. Storage of samples under water appears to have no detrimental effects on the products' properties. (author)

  1. Thermosetting resins for nuclear track detection

    International Nuclear Information System (INIS)

    Fujii, M.

    1985-01-01

    Several new thermosetting resins with a three dimensional network structure like CR-39 were polymerized to study their characteristics for use as nuclear track detectors. During the course of this study, thermosetting resins with good etching properties and various sensitivities have been obtained. The comparison of the molecular structures of these resins gives up an important clue for the development of highly sensitive polymeric track detectors. They will also be useful for observations of ultra-heavy cosmic rays and heavily ionizing particles at low energies. (orig.)

  2. Thermosetting resins for nuclear track detection

    International Nuclear Information System (INIS)

    Fujii, Masami; Yokota, Rikio

    1985-01-01

    Several new thermosetting resins with a three dimensional network structure like CR-39 were polymerized to study their characteristics for use as nuclear track detectors. During the course of this study, thermosetting resins with good etching properties and various sensitivities have been obtained. The comparison of the molecular structures of these resins gives us an important clue for the development of highly sensitive polymeric track detectors. They will also be useful for observations of ultra-heavy cosmic rays and heavily ionizing particles at low energies. (author)

  3. Incineration of ion-exchange resins

    International Nuclear Information System (INIS)

    Valkiainen, M.; Nykyri, M.

    1985-01-01

    Incineration of ion-exchange resins in a fluidized bed was studied on a pilot plant scale at the Technical Research Centre of Finland. Both granular and powdered resins were incinerated in dry and slurry form. Different bed materials were used in order to trap as much cesium and cobalt (inactive tracers) as possible in the bed. Also the sintering of the bed materials was studied in the presence of sodium. When immobilized with cement the volume of ash-concrete is 4 to 22% of the concrete of equal compressive strength acquired by direct solidification. Two examples of multi-purpose equipment capable of incinerating ion-exchange resins are presented. (orig.)

  4. SEM and elemental analysis of composite resins

    International Nuclear Information System (INIS)

    Hosoda, H.; Yamada, T.; Inokoshi, S.

    1990-01-01

    Twenty-four chemically cured, 21 light-cured anterior, three light-cured anterior/posterior, and 18 light-cured posterior composite resins were examined using scanning electron microscopy, and the elemental composition of their filler particles was analyzed with an energy dispersive electron probe microanalyzer. According to the results obtained, the composite resins were divided into five groups (traditional, microfilled type, submicrofilled type, hybrid type, and semihybrid), with two additional hypothetical categories (microfilled and hybrid). Characteristics of each type were described with clinical indications for selective guidance of respective composite resins for clinical use

  5. Thermosetting behavior of pitch-resin from heavy residue

    Energy Technology Data Exchange (ETDEWEB)

    Qingfang, Z.; Yansheng, G.; Baohua, H.; Yuzhen, Z. [China Univ. of Petroleum, Dongying, Shandong (China). State Key LAboratory of Heavy Oil Processing, Heavy Oil Research Inst.

    2006-07-01

    Thermosetting resins are widely employed as a basic matrix for c/c composites in carbon materials production. A new type of synthesized thermosetting resin is called pitch resin. Pitch resin is a cheaper resin and possesses a potential opportunity for future use. However, the thermosetting behavior of pitch resin is not very clear. The hardening process and conditions for thermosetting are very important for future use of pitch resin. B-stage pitch resin is a soluble and meltable inter-media condensed polymer, which is not fully reacted and is of a low molecular weight. The insoluble and unmelted pitch resin can only be obtained from synthesized B-stage resin after a hardening stage. This paper presented an experiment that synthesized B-stage pitch resin with a link agent (PXG) under catalyst action from fluid catalytic cracking (FCC) of the slurry's aromatic enriched component (FCCDF). The paper discussed the experiment, including the synthesis of pitch resin and thermosetting of pitch resin. Two kinds of thermosetting procedures were used in the study called one-step thermosetting and two-step thermosetting. It was concluded that the B-stage pitch resin could be hardened after a thermosetting procedure by heat treatment. The thermosetting pitch resin from 2-step thermosetting possesses was found to have better thermal resistant properties than that of the 1-step thermosetting pitch resin. 13 refs., 2 tabs., 6 figs.

  6. Environmental Characteristics of Carbonatite and Alkaline Intrusion-related Rare Earth Element (REE) Deposits

    Science.gov (United States)

    Seal, R. R., II; Piatak, N. M.

    2017-12-01

    Carbonatites and alkaline intrusions are important sources of REEs. Environmental risks related to these deposit types have been assessed through literature review and evaluation of the geochemical properties of representative samples of mill tailings and their leachates. The main ore mineral in carbonatite deposits is bastnasite [(Ce,La)(CO3)F], which is found with dolomite and calcite ( 65 %), barite (20 - 25 %), plus a number of minor accessory minerals including sulfides such as galena and pyrite. Generally, alkaline intrusion-related REE deposits either occur in layered complexes or with dikes and veins cutting alkaline intrusions. Such intrusions have a more diverse group of REE ore minerals that include fluorcarbonates, oxides, silicates, and phosphates. Ore also can include minor calcite and iron (Fe), lead (Pb), and zinc (Zn) sulfides. The acid-generating potential of both deposit types is low because of a predominance of carbonate minerals in the carbonatite deposits, the presence of feldspars and minor calcite in alkaline intrusion-related deposits, and to only minor to trace occurrence of potentially acid-generating sulfide minerals. Both deposit types, however, are produced by igneous and hydrothermal processes that enrich high-field strength, incompatible elements, which typically are excluded from common rock-forming minerals. Elements such as yttrium (Y), niobium Nb), zirconium (Zr), hafnium (Hf), tungsten (W), titanium (Ti), tantalum (Ta), scandium (Sc), thorium (Th), and uranium (U) can be characteristic of these deposits and may be of environmental concern. Most of these elements, including the REEs, but with the exception of U, have low solubilities in water at the near-neutral pH values expected around these deposits. Mill tailings from carbonatite deposits can exceed residential soil and sediment criteria for Pb, and leachates from mill tailings can exceed drinking water guidelines for Pb. The greatest environmental challenges, however, are

  7. Condensate-polisher resin-leakage quantification and resin-transport studies

    International Nuclear Information System (INIS)

    Stauffer, C.C.; Doss, P.L.

    1983-04-01

    The objectives of this program were to: (1) determine the extent of resin leakage from current generation condensate polisher systems, both deep bed and powdered resin design, during cut-in, steady-state and flow transient operation, (2) analyze moisture separator drains and other secondary system samples for resin fragments and (3) document the level of organics in the secondary system. Resin leakage samples were obtained from nine-power stations that have either recirculating steam generators or once through steam generators. Secondary system samples were obtained from steam generator feedwater, recirculating steam generator blowdown and moisture separator drains. Analysis included ultraviolet light examination, SEM/EDX, resin quantification and infrared analysis. Data obtained from the various plants were compared and factors affecting resin leakage were summarized

  8. The mechanism of uranium adsorption on Resin 508 and isoelectric point of the resin

    International Nuclear Information System (INIS)

    Han Qingping; Lu Weichang; Su Huijuan; Hu Jinbo; Zhang Liqin; Chen Banglin

    1990-01-01

    The adsorption process of uranium by Resin 508 at the solid-liquid interface was investigated and the mechanism of uranium adsorption including adsorption dynamics, adsorption thermodynamics and isoelectric point of resin was studied. The results are as follows: The maximum of uranium adsorption is attained at pH5-7; Uranium adsorption isotherm by Resin 508 in experimental conditions agrees with Langmuir's adsorption isotherm, the maximum of uranium adsorbed (Vm) is 716 mg U/g-dried resin; The adsorption of uranium by Resin 508 is an endothermic reaction and ΔH = 16.87 kJ/mol; The exchange-adsorption rate is mainly controlled by liquid film diffusion; The isoelectric points of Resin 508 before and after uranium adsorption are found to be pH7.5 and pH5.7 respectively. It is a specific adsorption for uranium

  9. New Resin for the Selective Extraction of {sup 129}I

    Energy Technology Data Exchange (ETDEWEB)

    Bombard, A.; Happel, S. [TrisKem International, Bruz (France); Zulauf, A. [NUKEM Technologies GmbH, Alzenau (Germany); Streng, R. [Radiochemistry, Department of Chemistry, Philipps-University Marburg, Marburg (Germany)

    2013-07-15

    {sup 129}I is an ideal tracer of the marine environment. It has been used for some years particularly in the northeast Atlantic, Nordic seas and Arctic to determine its distribution after its discharges from La Hague and Sellafield reprocessing plants. Various methods for {sup 129}I determination exist. A new resin selective for iodine has been developed, characterized and tested on environmental samples. In order to allow {sup 129}I determination and to obtain accurate and precise results, the samples have to pass a number of sample preparation steps; among these steps are chemical separation and purification. The results of the analysis of seawater samples are presented. (author)

  10. Strontium isotopic geochemistry of intrusive rocks, Puerto Rico, Greater Antilles

    International Nuclear Information System (INIS)

    Jones, L.M.; Kesler, S.E.

    1980-01-01

    The strontium isotope geochemistry is given for three Puerto Rican intrusive rocks: the granodioritic Morovis and San Lorenzo plutons and the Rio Blanco stock of quartz dioritic composition. The average calculated initial 87 Sr/ 86 Sr ratios are 0.70370, 0.70355 and 0.70408, respectively. In addition, the San Lorenzo data establish a whole-rock isochron of 71 +- 2 m.y., which agrees with the previously reported K-Ar age of 73 m.y. Similarity of most of the intrusive rocks in the Greater Antilles with respect to their strontium isotopic geochemistry regardless of their major element composition indicates that intrusive magmas with a wide range of composition can be derived from a single source material. The most likely source material, in view of the available isotopic data, is the mantle wedge overlying the subduction zone. (orig.)

  11. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    Science.gov (United States)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  12. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    Science.gov (United States)

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  14. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  15. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...... the intersection of IDSs and blockchains. In particular, we introduce the background of intrusion detection and blockchain, discuss the applicability of blockchain to intrusion detection, and identify open challenges in this direction....

  16. 5-year clinical performance of resin composite versus resin modified glass ionomer restorative system in non-carious cervical lesions

    DEFF Research Database (Denmark)

    Franco, Eduardo Batista; Benetti, Ana Raquel; Ishikiriama, Sérgio Kiyoshi

    2006-01-01

    To comparatively assess the 5-year clinical performance of a 1-bottle adhesive and resin composite system with a resin-modified glass ionomer restorative in non-carious cervical lesions.......To comparatively assess the 5-year clinical performance of a 1-bottle adhesive and resin composite system with a resin-modified glass ionomer restorative in non-carious cervical lesions....

  17. Nanosilica Modification of Elastomer-Modified VARTM Epoxy Resins for Improved Resin and Composite Toughness

    National Research Council Canada - National Science Library

    Robinette, Jason; Bujanda, Andres; DeSchepper, Daniel; Dibelka, Jessica; Costanzo, Philip; Jensen, Robert; McKnight, Steven

    2007-01-01

    Recent publications have reported a synergy between rubber and silica in modified epoxy resins that results in significantly improved fracture toughness without reductions in other material properties...

  18. Method for regenerating magnetic polyamine-epichlorohydrin resin

    Science.gov (United States)

    Kochen, Robert L.; Navratil, James D.

    1997-07-29

    Magnetic polymer resins capable of efficient removal of actinides and heavy metals from contaminated water are disclosed together with methods for making, using, and regenerating them. The resins comprise polyamine-epichlorohydrin resin beads with ferrites attached to the surfaces of the beads. Markedly improved water decontamination is demonstrated using these magnetic polymer resins of the invention in the presence of a magnetic field, as compared with water decontamination methods employing ordinary ion exchange resins or ferrites taken separately.

  19. A method for producing a hydrocarbon resin

    Energy Technology Data Exchange (ETDEWEB)

    Tsachev, A B; Andonov, K S; Igliyev, S P

    1980-11-25

    Rock coal resin (KS), for instance, with a relative density of 1,150 to 1,190 kilograms per cubic meter, which contains 8 to 10 percent naphthaline, 1.5 to 2.8 percent phenol and 6 to 15 percent substances insoluble in toluene, or its mixture with rock coal or oil fractions of resin are subjected to distillation (Ds) in a pipe furnace with two evaporators (Is) and a distillation tower with a temperature mode in the second stage of 320 to 360 degrees and 290 to 340 degrees in the pitch compartment. A hydrocarbon resin is produced with a high carbon content, especially for the production of resin and dolomite refractory materials, as well as fuel mixtures for blast furnace and open hearth industry.

  20. Synthesis of improved phenolic and polyester resins

    Science.gov (United States)

    Delano, C. B.

    1980-01-01

    Thirty-seven cured phenolic resin compositions were prepared and tested for their ability to provide improved char residues and moisture resistance over state of the art epoxy resin composite matrices. Cyanate, epoxy novolac and vinyl ester resins were investigated. Char promoter additives were found to increase the anaerobic char yield at 800 C of epoxy novolacs and vinyl esters. Moisture resistant cyanate and vinyl ester compositions were investigated as composite matrices with Thornel 300 graphite fiber. A cyanate composite matrix provided state of the art composite mechanical properties before and after humidity exposure and an anaerobic char yield of 46 percent at 800 C. The outstanding moisture resistance of the matrix was not completely realized in the composite. Vinyl ester resins showed promise as candidates for improved composite matrix systems.

  1. Integrating Porous Resins In Enzymatic Processes

    DEFF Research Database (Denmark)

    Al-Haque, Naweed

    . Screening resins for moderately hydrophobic multi-component systems is challenging. Often it is found that the capacity of the resin is inversely related with product selectivity. Therefore a tradeoff has to be made between these parameters which can be crucial from an economic point of view. A low resin...... procedure. The screening therefore becomes a multi-objective task that has to be solved simultaneously. Such an approach has been applied in the method formulated in this framework. To overcome these challenges, different process strategies are required to obtain high yields. A number of different...... inhibition, has gained considerable recognition. The resins act as a reservoir for the inhibitory substrate and a sink for the inhibitory product and simultaneously attain the required high substrate loading to make the process economically feasible. In this way the potential benefit of the enzyme can...

  2. Amine chemistry. Update on impact on resin

    International Nuclear Information System (INIS)

    Bachman, Gregory; Kellogg, Douglas; Wilkes, Marty

    2012-01-01

    Impurity removal in the steam cycle and the associated prevention of corrosion and/or fouling of system components are the goals of ion exchange resins. However, in many instances (such as a switch to amine chemistry or a change in product specifications), resins do not remove, and, in fact, contribute impurities to the steam cycle. This paper reviews recent data compiled to determine the direct and indirect effects of amines on ion exchange resins used in the power industry. Water chemistries have improved in recent years, in large part due to changes in chemistry and resins, but it is necessary to continue to develop products, processes and techniques to reduce impurities and improve overall water chemistry in power plant systems. (orig.)

  3. Amine chemistry. Update on impact on resin

    Energy Technology Data Exchange (ETDEWEB)

    Bachman, Gregory; Kellogg, Douglas [Siemens Industry, Inc., Rockford, IL (United States). Technology and Lab Services; Wilkes, Marty [Siemens Industry, Inc., Rockford, IL (United States). Water Technologies Div.

    2012-03-15

    Impurity removal in the steam cycle and the associated prevention of corrosion and/or fouling of system components are the goals of ion exchange resins. However, in many instances (such as a switch to amine chemistry or a change in product specifications), resins do not remove, and, in fact, contribute impurities to the steam cycle. This paper reviews recent data compiled to determine the direct and indirect effects of amines on ion exchange resins used in the power industry. Water chemistries have improved in recent years, in large part due to changes in chemistry and resins, but it is necessary to continue to develop products, processes and techniques to reduce impurities and improve overall water chemistry in power plant systems. (orig.)

  4. Feasibility of vitrifying EPICOR II organic resins

    International Nuclear Information System (INIS)

    Buelt, J.L.

    1981-11-01

    Two laboratory-scale runs have recently been completed to test the feasibility of a single-step incineration/vitrification process for Three Mile Island EPICOR II resins. The process utilizes vitrification equipment, specifically a 15-cm-dia in-can melter, and a specially designed feed technique. Two process tests, each conducted with 1.2 kg of EPICOR II resins loaded with nonradioactive cesium and strontium, showed excellent operational characteristics. Less than 0.8 wt% of the resins were entrained with the gaseous effluents in the second test. Cesium and strontium losses were controlled to 0.71 wt% and less. In addition, all the carbonaceous resins were converted completely to CO 2 with no detectable CO. Future activities are being directed to longer-term tests in laboratory-scale equipment to determine attainable volume reduction, process rates, and material conformance to processing conditions

  5. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  6. Photopolymerizable silicone monomers, oligomers, and resins

    International Nuclear Information System (INIS)

    Jacobine, A.F.; Nakos, S.T.

    1992-01-01

    The purpose of this chapter is to acquaint the general photopolymer researcher with the historical development of the chemistry and technology of photopolymerizable silicone monomers, fluids, and resins. The current status of research in these areas is assessed. The focus of this chapter is not only on the polymer chemistry and application of this technology, but also on important aspects of the synthetic chemistry involved in the preparation of UV-curable silicone monomers, oligomers, and resins. 236 refs., 6 tabs

  7. Cycloaliphatic epoxide resins for cationic UV - cure

    International Nuclear Information System (INIS)

    Verschueren, K.; Balwant Kaur

    1999-01-01

    This paper introduces the cyclo - aliphatic epoxide resins used for the various applications of radiation curing and their comparison with acrylate chemistry. Radiation curable coatings and inks are pre - dominantly based on acrylate chemistry but over the last few years, cationic chemistry has emerged successfully with the unique properties inherent with cyclo - aliphatic epoxide ring structures. Wide variety of cationic resins and diluents, the formulation techniques to achieve the desired properties greatly contributes to the advancement of UV - curing technology

  8. Volumetric polymerization shrinkage of contemporary composite resins

    Directory of Open Access Journals (Sweden)

    Halim Nagem Filho

    2007-10-01

    Full Text Available The polymerization shrinkage of composite resins may affect negatively the clinical outcome of the restoration. Extensive research has been carried out to develop new formulations of composite resins in order to provide good handling characteristics and some dimensional stability during polymerization. The purpose of this study was to analyze, in vitro, the magnitude of the volumetric polymerization shrinkage of 7 contemporary composite resins (Definite, Suprafill, SureFil, Filtek Z250, Fill Magic, Alert, and Solitaire to determine whether there are differences among these materials. The tests were conducted with precision of 0.1 mg. The volumetric shrinkage was measured by hydrostatic weighing before and after polymerization and calculated by known mathematical equations. One-way ANOVA (a or = 0.05 was used to determine statistically significant differences in volumetric shrinkage among the tested composite resins. Suprafill (1.87±0.01 and Definite (1.89±0.01 shrank significantly less than the other composite resins. SureFil (2.01±0.06, Filtek Z250 (1.99±0.03, and Fill Magic (2.02±0.02 presented intermediate levels of polymerization shrinkage. Alert and Solitaire presented the highest degree of polymerization shrinkage. Knowing the polymerization shrinkage rates of the commercially available composite resins, the dentist would be able to choose between using composite resins with lower polymerization shrinkage rates or adopting technical or operational procedures to minimize the adverse effects deriving from resin contraction during light-activation.

  9. Working group 4B - human intrusion: Design/performance requirements

    International Nuclear Information System (INIS)

    Channell, J.

    1993-01-01

    There is no summary of the progress made by working group 4B (Human Intrusion: Design/performance Requirements) during the Electric Power Research Institute's EPRI Workshop on the technical basis of EPA HLW Disposal Criteria, March 1993. This group was to discuss the waste disposal standard, 40 CFR Part 191, in terms of the design and performance requirements of human intrusion. Instead, because there were so few members, they combined with working group 4A and studied the three-tier approach to evaluating postclosure performance

  10. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments....

  11. Lower crustal intrusions beneath the southern Baikal Rift Zone

    DEFF Research Database (Denmark)

    Nielsen, Christoffer; Thybo, Hans

    2009-01-01

    centre. The BEST (Baikal Explosion Seismic Transect) project acquired a 360-km long, deep seismic, refraction/wide-angle reflection profile in 2002 across southern Lake Baikal. The data from this project is used for identification of large-scale crustal structures and modelling of the seismic velocities....../s and 7.9 km/s. We interpret this feature as resulting from mafic to ultra-mafic intrusions in the form of sills. Petrological interpretation of the velocity values suggests that the intrusions are sorted by fractional crystallization into plagioclase-rich low-velocity layers and pyroxene- and olivine...

  12. Cleanup of TMI-2 demineralizer resins

    International Nuclear Information System (INIS)

    Bond, W.D.; King, L.J.; Knauer, J.B.; Hofstetter, K.J.; Thompson, J.D.

    1985-01-01

    Radiocesium is being removed from Demineralizers A and B (DA and DB by a process that was developed from laboratory tests on small samples of resin from the demineralizers. The process was designed to elute the radiocesium from the demineralizer resins and then to resorb it onto the zeolite ion exchangers contained in the Submerged Demineralizer System (SDS). The process was also required to limit the maximum cesium activities in the resin eluates (SDS feeds) so that the radiation field surrounding the pipelines would not be excessive. The process consists of 17 stages of batch elution. In the initial stage, the resin is contacted with 0.18 M boric acid. Subsequent stages subject the resin to increasing concentrations of sodium in NaH 2 BO 3 -H 3 BO 3 solution (total B = 0.35 M) and then 1 M sodium hydroxide in the final stages. Results on the performance of the process in the cleanup of the demineralizers at TMI-2 are compared to those obtained from laboratory tests with small samples of the DA and DB resins. To date, 15 stages of batch elution have been completed on the demineralizers at TMI-2 which resulted in the removal of about 750 Ci of radiocesium from DA and about 3300 Ci from DB

  13. An Intrusion Detection System for the Protection of Railway Assets Using Fiber Bragg Grating Sensors

    Directory of Open Access Journals (Sweden)

    Angelo Catalano

    2014-09-01

    Full Text Available We demonstrate the ability of Fiber Bragg Gratings (FBGs sensors to protect large areas from unauthorized activities in railway scenarios such as stations or tunnels. We report on the technological strategy adopted to protect a specific depot, representative of a common scenario for security applications in the railway environment. One of the concerns in the protection of a railway area centers on the presence of rail-tracks, which cannot be obstructed with physical barriers. We propose an integrated optical fiber system composed of FBG strain sensors that can detect human intrusion for protection of the perimeter combined with FBG accelerometer sensors for protection of rail-track access. Several trials were carried out in indoor and outdoor environments. The results demonstrate that FBG strain sensors bonded under a ribbed rubber mat enable the detection of intruder break-in via the pressure induced on the mat, whereas the FBG accelerometers installed under the rails enable the detection of intruders walking close to the railroad tracks via the acoustic surface waves generated by footsteps. Based on a single enabling technology, this integrated system represents a valuable intrusion detection system for railway security and could be integrated with other sensing functionalities in the railway field using fiber optic technology.

  14. Energy Efficient Monitoring for Intrusion Detection in Battery-Powered Wireless Mesh Networks

    KAUST Repository

    Hassanzadeh, Amin

    2011-07-18

    Wireless Mesh Networks (WMN) are easy-to-deploy, low cost solutions for providing networking and internet services in environments with no network infrastructure, e.g., disaster areas and battlefields. Since electric power is not readily available in such environments battery-powered mesh routers, operating in an energy efficient manner, are required. To the best of our knowledge, the impact of energy efficient solutions, e.g., involving duty-cycling, on WMN intrusion detection systems, which require continuous monitoring, remains an open research problem. In this paper we propose that carefully chosen monitoring mesh nodes ensure continuous and complete detection coverage, while allowing non-monitoring mesh nodes to save energy through duty-cycling. We formulate the monitoring node selection problem as an optimization problem and propose distributed and centralized solutions for it, with different tradeoffs. Through extensive simulations and a proof-of-concept hardware/software implementation we demonstrate that our solutions extend the WMN lifetime by 8%, while ensuring, at the minimum, a 97% intrusion detection rate.

  15. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  16. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  17. Influence of the silica fillers on the ageing of epoxy resins under irradiations

    International Nuclear Information System (INIS)

    Benard, F.

    2004-01-01

    Various studies were carried out on the ageing of epoxy resins under irradiations. In all cases, pure polymers were studied. The aim of our work managed by the CEA and the CNRS consists on studying the part of fillers and particularly the part of silica on ageing process under electron beam irradiations. Because of their wide use in industrial applications and especially in nuclear environment, the DGEBA-TETA resins (Diglycidylether of Bisphenol A - Triethylenetetramine) were chosen. Those epoxy resins are difficult to analyse because of their insolubility. Some pure and nano-metric silica filled chemical models which chemical structure very close to the one the DGEBA/TETA resin were synthesized and analysed with classical methods in organic chemistry. A major phenomenon of rupture of the C-O and C-N chemical bonds with creation of phenolic extremities, methylketone extremities, of primary and tertiary amines and notably enamine functions were revealed by the analyses. The quantitative 1 H and 13 C NMR analyses revealed the screen effect due to the silica and the reactions between the chemical species created by the irradiations and the silica surface. Thermic and thermodynamic analyses of the different epoxy resins in function of the irradiation dose and of the kind of silica showed the decrease of the glass transition temperature, of the relaxation temperature and of the crosslink density confirming the major phenomenon of bond ruptures during irradiations. With silica, the decrease of the crosslink density is slowed. This phenomenon can be explained with interactions between the nano-metric silica surface and the epoxy resin offsetting the effect of the chain rupture on the resin mechanical properties. The 13 C solid state NMR analyses confirmed the choice of the chemical models and permitted to detect the chemical species created by the irradiations. The analyse of the polarization transfers with 13 C CP-MAS NMR spectroscopy revealed the stiffening of the nano

  18. Bond strength of resin-resin interfaces contaminated with saliva and submitted to different surface treatments

    Directory of Open Access Journals (Sweden)

    Adilson Yoshio Furuse

    2007-12-01

    Full Text Available The purpose of this study was to investigate the effect of different surface treatments on shear bond strength of saliva-contaminated resin-resin interfaces. Flat resin surfaces were fabricated. In the control group, no contamination or surface treatment was performed. The resin surfaces of the experimental groups were contaminated with saliva and air-dried, and then submitted to: (G1 rinsing with water and drying; (G2 application of an adhesive system; (G3 rinsing and drying, abrasion with finishing disks, etching and application of adhesive system; (G4 rinsing and drying, etching, application of silane and adhesive system. Resin cylinders were placed over the treated surfaces. The specimens were stored in water or ethanol. Shear bond strength tests were performed and the mode of failure was evaluated. Data were submitted to two-way ANOVA and Dunnett T3 test. Contamination of resin-resin interfaces with saliva significantly reduced shear strength, especially after prolonged storage (p<0.05. Similar values to the original bond strength were obtained after abrasion and application of adhesive (G3 or etching and application of silane and adhesive (G4. If contamination occurs, a surface treatment is required to guarantee an adequate interaction between the resin increments.

  19. Bond strength of resin-resin interfaces contaminated with saliva and submitted to different surface treatments

    DEFF Research Database (Denmark)

    Furuse, Adilson Yoshio; da Cunha, Leonardo Fernandes; Benetti, Ana Raquel

    2007-01-01

    of silane and adhesive system. Resin cylinders were placed over the treated surfaces. The specimens were stored in water or ethanol. Shear bond strength tests were performed and the mode of failure was evaluated. Data were submitted to two-way ANOVA and Dunnett T3 test. Contamination of resin...

  20. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  1. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  2. Capability for intrusion detection at nuclear fuel sites

    International Nuclear Information System (INIS)

    1978-03-01

    A safeguards vulnerability assessment was conducted at three separate licensed nuclear processing facilities. Emphasis was placed on: (1) performance of the total intrusion detection system, and (2) vulnerability of the system to compromise by insiders. The security guards were interviewed to evaluate their effectiveness in executing their duties in accordance with the plant's security plan and to assess their knowledge regarding the operation of the security equipment. A review of the training schedule showed that the guards, along with the other plant employees, are required to periodically attend in-plant training sessions. The vulnerability assessments continued with interviews of the personnel responsible for maintaining the security equipment, with discussions of detector false alarm and maintenance problems. The second part of the vulnerability assessments was to evaluate the effectiveness of the intrusion detection systems including the interior and the perimeter sensors, CCTV surveillance devices and the exterior lighting. Two types of perimeter detectors are used at the sites, a fence disturbance sensor and an infrared barrier type detector. Infrared barrier type detectors have a higher probability of detection, especially in conjunction with dedicated CCTV cameras. The exterior lights satisfy the 0.2 footcandle illumination requirement. The interior intrusion detection systems included ultrasonic motion detectors, microwave motion detectors,balanced magnetic switches, and CCTV cameras. Entrance doors to the materials access areas and vital areas are protected with balanced magnetic switches. The interior intrusion detection systems at the three nuclear processing sites are considered satisfactory with the exception of the areas protected with ultrasonic motion detectors

  3. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  4. Data Fusion for Network Intrusion Detection: A Review

    Directory of Open Access Journals (Sweden)

    Guoquan Li

    2018-01-01

    Full Text Available Rapid progress of networking technologies leads to an exponential growth in the number of unauthorized or malicious network actions. As a component of defense-in-depth, Network Intrusion Detection System (NIDS has been expected to detect malicious behaviors. Currently, NIDSs are implemented by various classification techniques, but these techniques are not advanced enough to accurately detect complex or synthetic attacks, especially in the situation of facing massive high-dimensional data. Besides, the inherent defects of NIDSs, namely, high false alarm rate and low detection rate, have not been effectively solved. In order to solve these problems, data fusion (DF has been applied into network intrusion detection and has achieved good results. However, the literature still lacks thorough analysis and evaluation on data fusion techniques in the field of intrusion detection. Therefore, it is necessary to conduct a comprehensive review on them. In this article, we focus on DF techniques for network intrusion detection and propose a specific definition to describe it. We review the recent advances of DF techniques and propose a series of criteria to compare their performance. Finally, based on the results of the literature review, a number of open issues and future research directions are proposed at the end of this work.

  5. A Labeled Data Set For Flow-based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Sadre, R.; van Vliet, Frank; Pras, Aiko; Nunzi, Giorgio; Scoglio, Caterina; Li, Xing

    2009-01-01

    Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field, benchmarking of flow-based IDS is still an open issue. In this paper, we propose the first publicly available, labeled data set

  6. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  7. AANtID: an alternative approach to network intrusion detection ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Security has become not just a feature of an information system, but the core and a necessity especially the systems that communicate and transmit data over the Internet for they are more ... Keywords: Intrusion, Genetic Algorithm, detection, Security, DARPA dataset ...

  8. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    the Earth that includes accretion and dispersal of supercontinents, viz., Columbia (Rogers and. Santosh 2002; Zhao et al 2004) and Rodinia. Keywords. Chhattisgarh Supergroup; Singhora Group; diabasic intrusive; geochemistry and age. J. Earth Syst. Sci. 120, No. 2, April 2011, pp. 223–236 c Indian Academy of Sciences.

  9. Approaches in anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, S.; Di Pietro, R.; Mancini, L.V.

    2008-01-01

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  10. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    2008-01-01

    We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying a new method for anomaly detection on the

  11. Approaches in Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  12. Petrography of some altered intrusive rocks from the Lower Benue ...

    African Journals Online (AJOL)

    Petrography of some altered intrusive rocks from the Lower Benue Trough, Nigeria. Smart C Obiora, Alphonso C Umeji. Abstract. No Abstract. Journal of Mining and Geology 2005, Vol 41(1): 1-9. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  13. Climate Change and Saltwater Intrusion along the Eastern ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Eastern Mediterranean is highly vulnerable to saltwater intrusion into the freshwater aquifers along its coasts. The degradation of these aquifers would result in serious socioeconomic consequence to people living there. This project will investigate how climate change is affecting the salinity of coastal aquifers at several ...

  14. Revised predictive equations for salt intrusion modelling in estuaries

    NARCIS (Netherlands)

    Gisen, J.I.A.; Savenije, H.H.G.; Nijzink, R.C.

    2015-01-01

    For one-dimensional salt intrusion models to be predictive, we need predictive equations to link model parameters to observable hydraulic and geometric variables. The one-dimensional model of Savenije (1993b) made use of predictive equations for the Van der Burgh coefficient $K$ and the dispersion

  15. Pre-Stressor Interference Control and Intrusive Memories

    NARCIS (Netherlands)

    Verwoerd, J.; Wessel, I.; De Jong, P.J.; Nieuwenhuis, Maurice; Huntjens, R.J.C.

    Although intrusive imagery is a common response in the aftermath of a stressful or traumatic event, only a minority of trauma victims show persistent re-experiencing and related psychopathology. Individual differences in pre-trauma executive control possibly play a critical role. Therefore, this

  16. Salt intrusion study in Cochin estuary - Using empirical models

    Digital Repository Service at National Institute of Oceanography (India)

    Jacob, B.; Revichandran, C.; NaveenKumar, K.R.

    been applied to the Cochin estuary in the present study to identify the most suitable model for predicting the salt intrusion length. Comparison of the obtained results indicate that the model of Van der Burgh (1972) is the most suitable empirical model...

  17. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data

    Science.gov (United States)

    2012-03-01

    52 Table 7. Place Reachability Statistics for Low Level CPN...54 Table 8. Place Reachability Statistics for High Level CPN................................................. 55 Table 9. Password Stealing...the efficiency of traditional anti-virus software tools that are dependent on gigantic , continuously updated databases. Fortunately, Intrusion

  18. State of the Practice of Intrusion Detection Technologies

    Science.gov (United States)

    2000-01-01

    functions, procedures, and scripts, an Oracle database structure, Borne shell scripts, and configuration files which together communicate with ASIM Sensor...34Plugging the Holes in eCommerce Leads to 135% Growth in the Intrusion Detection and Vulnerability Assessment Software Market," PRNewswire. August

  19. Saltwater Intrusion Appraisal of Shallow Aquifer in Burutu Area of ...

    African Journals Online (AJOL)

    ADOWIE PERE

    is not caused by saltwater intrusion rather by iron which cannot be separately distinguished from groundwater by ... The sand and gravels forms the aquifer in the. Formation and are .... K.S; Soulios, G; Pliakas, F; Tsokas, G ( 2016). Seawater ...

  20. Illness intrusiveness among survivors of autologous blood and marrow transplantation.

    Science.gov (United States)

    Schimmer, A D; Elliott, M E; Abbey, S E; Raiz, L; Keating, A; Beanlands, H J; McCay, E; Messner, H A; Lipton, J H; Devins, G M

    2001-12-15

    Illness-induced disruptions to lifestyles, activities, and interests (i.e., illness intrusiveness) compromise subjective well-being. The authors measured illness intrusiveness in autologous blood and bone marrow transplantation (ABMT) survivors and compared the results with survivors of solid organ transplants. Forty-four of 64 consecutive ABMT survivors referred to the University of Toronto ABMT long-term follow-up clinic completed the Illness Intrusiveness Ratings Scale (IIRS), the Affect Balance Scale (ABS), the Atkinson Life Happiness Rating (ATKLH), the Beck Hopelessness Scale (BHS), and the Center for Epidemiologic Studies Depression (CES-D) Scale. Mean time from ABMT to evaluation was 4.6 +/- 2.8 years. All patients were in remission or had stable disease at the time of evaluation. Autologous blood and bone marrow transplantation patients' IIRS scores were compared with scores reported by recipients of kidney (n = 357), liver (n = 150), lung (n = 77), and heart (n = 60) transplants. Mean IIRS score for the 44 ABMT patients was 37.2 +/- 17 (maximum possible score, 91; minimum possible score, 13). Higher IIRS scores correlated with lower scores on the ABS (r = -0.54; P work, financial situation, and active recreation. Despite achieving a remission after ABMT, patients continue to experience illness intrusiveness compromising subjective well-being. Copyright 2001 American Cancer Society.

  1. Efficient cooling of rocky planets by intrusive magmatism

    Science.gov (United States)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  2. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  3. Trauma Films, Information Processing, and Intrusive Memory Development

    Science.gov (United States)

    Holmes, Emily A.; Brewin, Chris R.; Hennessy, Richard G.

    2004-01-01

    Three experiments indexed the effect of various concurrent tasks, while watching a traumatic film, on intrusive memory development. Hypotheses were based on the dual-representation theory of posttraumatic stress disorder (C. R. Brewin, T. Dalgleish, & S. Joseph, 1996). Nonclinical participants viewed a trauma film under various encoding conditions…

  4. Dental Cements for Luting and Bonding Restorations: Self-Adhesive Resin Cements.

    Science.gov (United States)

    Manso, Adriana P; Carvalho, Ricardo M

    2017-10-01

    Self-adhesive resin cements combine easy application of conventional luting materials with improved mechanical properties and bonding capability of resin cements. The presence of functional acidic monomers, dual cure setting mechanism, and fillers capable of neutralizing the initial low pH of the cement are essential elements of the material and should be understood when selecting the ideal luting material for each clinical situation. This article addresses the most relevant aspects of self-adhesive resin cements and their potential impact on clinical performance. Although few clinical studies are available to establish solid clinical evidence, the information presented provides clinical guidance in the dynamic environment of material development. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. Treatment of Soil Decontamination Solution by the Cs{sup +} Ion Selective Ion Exchange Resin

    Energy Technology Data Exchange (ETDEWEB)

    Won, Hui Jun; Kim, Gye Nam; Jung, Chung Hun; Oh, Won Zin [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    2005-07-01

    Occasionally, radioactively contaminated soils have been excavated and stored at the temporary storage facility. Cesium as a radionuclide is one of the most toxic elements and it has a long half decay life. During the operation of nuclear facility, soils near the facility would be contaminated with radioactive cesium and it will cause the deleterious effect to human body and environment. In this study, Cs{sup +} ion selective ion exchange resin was prepared by changing the functional group of commercial anion exchange resin for a ferrocyanide ion. Ion exchange capability of using the soil decontamination solution was investigated. We also performed the feasibility test of recycling the spent Cs ion selective ion exchange resin.

  6. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    Science.gov (United States)

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...

  7. The effect of destination linked feature selection in real-time network intrusion detection

    CSIR Research Space (South Africa)

    Mzila, P

    2013-07-01

    Full Text Available techniques in the network intrusion detection system (NIDS) is the feature selection technique. The ability of NIDS to accurately identify intrusion from the network traffic relies heavily on feature selection, which describes the pattern of the network...

  8. Analysis of the microstructure and mechanical performance of composite resins after accelerated artificial aging.

    Science.gov (United States)

    De Oliveira Daltoé, M; Lepri, C Penazzo; Wiezel, J Guilherme G; Tornavoi, D Cremonezzi; Agnelli, J A Marcondes; Reis, A Cândido Dos

    2013-03-01

    Researches that assess the behavior of dental materials are important for scientific and industrial development especially when they are tested under conditions that simulate the oral environment, so this work analyzed the compressive strength and microstructure of three composite resins subjected to accelerated artificial aging (AAA). Three composites resins of 3M (P90, P60 and Z100) were analyzed and were obtained 16 specimens for each type (N.=48). Half of each type were subjected to UV-C system AAA and then were analyzed the surfaces of three aged specimens and three not aged of each type through the scanning electron microscope (SEM). After, eight specimens of each resin, aged and not aged, were subjected to compression test. After statistical analysis of compressive strength values, it was found that there was difference between groups (α aged P60 presented lower values of compressive strength statistically significant when compared to the not subject to the AAA. For the other composite resins, there was no difference, regardless of aging, a fact confirmed by SEM. The results showed that the AAA influenced the compressive strength of the resin aged P60; confirmed by surface analysis by SEM, which showed greater structural disarrangement on surface material.

  9. Phosphorus recovery as struvite from eutropic waters by XDA-7 resin.

    Science.gov (United States)

    Li, Huanwen; Ye, Zhiping; Lin, Ying; Wang, Fengying

    2012-01-01

    Phosphorus releases into aquatic environment and its subsequent contribution to eutrophication have resulted in a widespread global pollution issue. However, phosphorus is a non-renewable source. The potential supplies of phosphorus are decreasing worldwide. Therefore, removal and recovery of phosphorus from the eutropic waters is important, emergent and necessary. In this research, experiments for recovering phosphate from eutropic waters by anion exchange combined with struvite precipitation were conducted. The results indicated that the prepared XDA-7 resin was an effective adsorbent for phosphate. The adsorption isotherm of XDA-7 resin was found to be a modified Freundlich type. The maximum phosphate adsorption (20.9 mg/g) occurred in the pH range of 6.0-8.0. Phosphate adsorbed on the XDA-7 resin was effectively desorbed with 8% NaCl solution, and the resin was able to be regenerated with 3% NaClO and 4% NaOH solutions. Phosphate desorbed from the resin was recovered as magnesium ammonium phosphate (struvite). The obtained struvite was analyzed by acid dissolution method, scanning electron microscope (SEM) and Fourier transform infrared spectroscopy (FTIR). The struvite precipitate was found to be 75.8% in purity, a high-value fertilizer.

  10. Saturated Resin Ectopic Regeneration by Non-Thermal Dielectric Barrier Discharge Plasma

    Directory of Open Access Journals (Sweden)

    Chunjing Hao

    2017-11-01

    Full Text Available Textile dyes are some of the most refractory organic compounds in the environment due to their complex and various structure. An integrated resin adsorption/Dielectric Barrier Discharge (DBD plasma regeneration was proposed to treat the indigo carmine solution. It is the first time to report ectopic regeneration of the saturated resins by non-thermal Dielectric Barrier Discharge. The adsorption/desorption efficiency, surface functional groups, structural properties, regeneration efficiency, and the intermediate products between gas and liquid phase before and after treatment were investigated. The results showed that DBD plasma could maintain the efficient adsorption performance of resins while degrading the indigo carmine adsorbed by resins. The degradation rate of indigo carmine reached 88% and the regeneration efficiency (RE can be maintained above 85% after multi-successive regeneration cycles. The indigo carmine contaminants were decomposed by a variety of reactive radicals leading to fracture of exocyclic C=C bond, which could cause decoloration of dye solution. Based on above results, a possible degradation pathway for the indigo carmine by resin adsorption/DBD plasma treatment was proposed.

  11. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  12. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.

    Science.gov (United States)

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  13. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  14. Thermal cycling effects on adhesion of resin-bovine enamel junction among different composite resins.

    Science.gov (United States)

    Chen, Wen-Cheng; Ko, Chia-Ling; Wu, Hui-Yu; Lai, Pei-Ling; Shih, Chi-Jen

    2014-10-01

    Thermal cycling is used to mimic the changes in oral cavity temperature experienced by composite resins when used clinically. The purpose of this study is to assess the thermal cycling effects of in-house produced composite resin on bonding strength. The dicalcium phosphate anhydrous filler surfaces are modified using nanocrystals and silanization (w/NP/Si). The resin is compared with commercially available composite resins Filtek Z250, Z350, and glass ionomer restorative material GIC Fuji-II LC (control). Different composite resins were filled into the dental enamel of bovine teeth. The bond force and resin-enamel junction graphical structures of the samples were determined after thermal cycling between 5 and 55°C in deionized water for 600 cycles. After thermal cycling, the w/NP/Si 30wt%, 50wt% and Filtek Z250, Z350 groups showed higher shear forces than glass ionomer GIC, and w/NP/Si 50wt% had the highest shear force. Through SEM observations, more of the fillings with w/NP/Si 30wt% and w/NP/Si 50wt% groups flowed into the enamel tubule, forming closed tubules with the composite resins. The push-out force is proportional to the resin flow depth and uniformity. The push-out tubule pore and resin shear pattern is the most uniform and consistent in the w/NP/Si 50wt% group. Accordingly, this developed composite resin maintains great mechanical properties after thermal cycling. Thus, it has the potential to be used in a clinical setting when restoring non-carious cervical lesions. Copyright © 2014 Elsevier Ltd. All rights reserved.

  15. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  16. Hot dewatering and resin encapsulation of intermediate level radioactive waste

    International Nuclear Information System (INIS)

    Rickman, J.; Birch, D.

    1985-01-01

    The chemistry of the processes involved in the hot dewatering and encapsulation of alumino-ferric hydroxide floc in epoxide resin have been studied. Pretreatment of the floc to reduce resin attack and hydrolysis and to increase the dimensional stability of the solidified wasteform has been evaluated. It has been demonstrated that removal of ammonium nitrate from the floc and control of the residual water in the resin are important factors in ensuring dimensional stability of the solidified resin. Resin systems have been identified which, together with the appropriate waste pretreatment have successfully encapsulated a simulated magnox sludge producing a stable wasteform having mechanical and physical properties comparable with the basic resin. (author)

  17. Study by dynamic light scattering of an o/w emulsion of an epoxi resin dispersed in water by means of a triblock copolymer of type PEO-PPO-PEO

    International Nuclear Information System (INIS)

    Uscanga, E. H.; Rio, J. M. del; Avendano-Gomez, J. R.

    2009-01-01

    The curing epoxy resins are widely used in various fields of chemical industry, such as adhesives, automotive, coatings, etc. The process operation consisting of flow and mixing of epoxy resins become difficult due to their high viscosity. One solution is to dissolve the epoxy resin in volatile organic solvents (VOS) such as toluene, xylene or benzene. However, the use of VOS is not only expensive but harmful to the environment. (Author)

  18. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  19. Characterization of Polyimide Matrix Resins and Prepregs

    Science.gov (United States)

    Maximovich, M. G.; Galeos, R. M.

    1985-01-01

    Graphite/polyimide composite materials are attractive candidates for a wide range of aerospace applications. They have many of the virtues of graphite/epoxies, i.e., high specific strengths and stiffness, and also outstanding thermal/oxidative stability. Yet they are not widely used in the aerospace industry due to problems of procesability. By their nature, modern addition polyimide (PI) resins and prepregs are more complex than epoxies; the key to processing lies in characterizing and understanding the materials. Chemical and rheological characterizations are carried out on several addition polyimide resins and graphite reinforced prepregs, including those based on PMR-15, LARC 160 (AP 22), LARC 160 (Curithane 103) and V378A. The use of a high range torque transducer with a Rheometrics mechanical spectrometer allows rheological data to be generated on prepreg materials as well as neat resins. The use of prepreg samples instead of neat resins eliminates the need for preimidization of the samples and the data correlates well with processing behavior found in the shop. Rheological characterization of the resins and prepregs finds significant differences not readily detected by conventional chemical characterization techniques.

  20. U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland

    DEFF Research Database (Denmark)

    Þórarinsson, Sigurjón Böðvar; Holm, Paul Martin; Tappe, Sebatstian

    2016-01-01

    Several major tholeiitic (e.g. the Skaergaard intrusion) and alkaline (e.g. the Kangerlussuaq Syenite) intrusive complexes of the North Atlantic Large Igneous Province are exposed along the Kangerlussuaq Fjord in East Greenland. The Kærven Complex forms a satellite intrusion to the Kangerlussuaq ...

  1. Ion chromatography for the analysis of salt splitting capacities of cation and anion resin in premixed resin sample

    International Nuclear Information System (INIS)

    Ghosh, Satinath; Kumar, Rakesh; Tripathy, M.K.; Dhole, K.; Sharma, R.S.; Varde, P.V.

    2017-01-01

    Mixed bed ion exchange resin is commonly used in various plants including nuclear reactors for the purpose of fine polishing. The analysis of ion exchange capacities of cation and anion resin in resin mixture is therefore an agenda in the context of purchasing of premixed resin from the manufacturer. An ion chromatographic method for assaying ion exchange capacities of pure as well as mixed resin has been optimized. The proposed method in contrast to the conventional ASTM method has been found to be quite encouraging to consider it as an alternate method for the analysis of premixed resin. (author)

  2. Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks

    Science.gov (United States)

    Hortos, William S.

    2007-09-01

    A wireless ad hoc sensor network is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. The nodes are severely resource-constrained, with limited processing, memory and power capacities and must operate cooperatively to fulfill a common mission in typically unattended modes. In a wireless sensor network (WSN), each sensor at a node can observe locally some underlying physical phenomenon and sends a quantized version of the observation to sink (destination) nodes via wireless links. Since the wireless medium can be easily eavesdropped, links can be compromised by intrusion attacks from nodes that may mount denial-of-service attacks or insert spurious information into routing packets, leading to routing loops, long timeouts, impersonation, and node exhaustion. A cross-layer design based on protocol-layer interactions is proposed for detection and identification of various intrusion attacks on WSN operation. A feature set is formed from selected cross-layer parameters of the WSN protocol to detect and identify security threats due to intrusion attacks. A separate protocol is not constructed from the cross-layer design; instead, security attributes and quantified trust levels at and among nodes established during data exchanges complement customary WSN metrics of energy usage, reliability, route availability, and end-to-end quality-of-service (QoS) provisioning. Statistical pattern recognition algorithms are applied that use observed feature-set patterns observed during network operations, viewed as security audit logs. These algorithms provide the "best" network global performance in the presence of various intrusion attacks. A set of mobile (software) agents distributed at the nodes implement the algorithms, by moving among the layers involved in the network response at each active node

  3. Ponderosa pine resin defenses and growth: metrics matter.

    Science.gov (United States)

    Hood, Sharon; Sala, Anna

    2015-11-01

    Bark beetles (Coleoptera: Curculionidae, Scolytinae) cause widespread tree mortality in coniferous forests worldwide. Constitutive and induced host defenses are important factors in an individual tree's ability to survive an attack and in bottom-up regulation of bark beetle population dynamics, yet quantifying defense levels is often difficult. For example, in Pinus spp., resin flow is important for resistance to bark beetles but is extremely variable among individuals and within a season. While resin is produced and stored in resin ducts, the specific resin duct metrics that best correlate with resin flow remain unclear. The ability and timing of some pine species to produce induced resin is also not well understood. We investigated (i) the relationships between ponderosa pine (Pinus ponderosa Lawson & C. Lawson) resin flow and axial resin duct characteristics, tree growth and physiological variables, and (ii) if mechanical wounding induces ponderosa pine resin flow and resin ducts in the absence of bark beetles. Resin flow increased later in the growing season under moderate water stress and was highest in faster growing trees. The best predictors of resin flow were nonstandardized measures of resin ducts, resin duct size and total resin duct area, both of which increased with tree growth. However, while faster growing trees tended to produce more resin, models of resin flow using only tree growth were not statistically significant. Further, the standardized measures of resin ducts, density and duct area relative to xylem area, decreased with tree growth rate, indicating that slower growing trees invested more in resin duct defenses per unit area of radial growth, despite a tendency to produce less resin overall. We also found that mechanical wounding induced ponderosa pine defenses, but this response was slow. Resin flow increased after 28 days, and resin duct production did not increase until the following year. These slow induced responses may allow

  4. A two-stage flow-based intrusion detection model for next-generation networks.

    Science.gov (United States)

    Umer, Muhammad Fahad; Sher, Muhammad; Bi, Yaxin

    2018-01-01

    The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results.

  5. Deep Seawater Intrusion Enhanced by Geothermal Through Deep Faults in Xinzhou Geothermal Field in Guangdong, China

    Science.gov (United States)

    Lu, G.; Ou, H.; Hu, B. X.; Wang, X.

    2017-12-01

    This study investigates abnormal sea water intrusion from deep depth, riding an inland-ward deep groundwater flow, which is enhanced by deep faults and geothermal processes. The study site Xinzhou geothermal field is 20 km from the coast line. It is in southern China's Guangdong coast, a part of China's long coastal geothermal belt. The geothermal water is salty, having fueled an speculation that it was ancient sea water retained. However, the perpetual "pumping" of the self-flowing outflow of geothermal waters might alter the deep underground flow to favor large-scale or long distant sea water intrusion. We studied geochemical characteristics of the geothermal water and found it as a mixture of the sea water with rain water or pore water, with no indication of dilution involved. And we conducted numerical studies of the buoyancy-driven geothermal flow in the deep ground and find that deep down in thousand meters there is favorable hydraulic gradient favoring inland-ward groundwater flow, allowing seawater intrude inland for an unusually long tens of kilometers in a granitic groundwater flow system. This work formed the first in understanding geo-environment for deep ground water flow.

  6. Influence of the Three Gorges Project on saltwater intrusion in the Yangtze River Estuary

    Science.gov (United States)

    An, Qiang; Wu, Yanqing; Taylor, Shauna; Zhao, Bin

    2009-02-01

    The Three Gorges Project (TGP) is a transcentury project that has aroused world attention. It is expected that the flow velocity and runoff of the Yangtze River will be changed after the project has been accomplished. Consequently, however, the ecological environment in the Yangtze River Basin, particularly in the estuary region, will be affected. Salinity intrusion into the Yangtze River estuary, in general, is mostly affected by the Yangtze River discharge and its external tidal level. This paper focuses on examining the influence of changes in runoff on salinity value. The question, to which should be paid attention is: how is the interaction between changes in runoff of the Yangtze River and salinity distribution in the Yangtze River estuary, China? In this research, a three-dimensional model has been used to identify the effects of runoff change on salinity distribution. The drawn conclusion is that the change of salinity is influenced by discharge variation. Positive and negative impacts of TGP would both turn up but in different period. In sum, TGP is in favor of restraining saltwater intrusion. Nevertheless a suitable method should be found to resolve its negative influences.

  7. Immobilisation of ion exchange resins in cement

    International Nuclear Information System (INIS)

    Howard, C.G.; Jolliffe, C.B.; Lee, D.J.

    1990-02-01

    Over the last seven years, Low Oxidation State Metal Ion reagents (LOMI) have been used to decontaminate the 100 MW(e) Steam Generating Heavy Water Ractor (SGHWR) at Winfrith. The use of these reagents has resulted in a dilute ionic solution containing activation products which are produced by corrosion of metallic components in the reactor. It has been demonstrated that the amount of activity in the solution can be reduced using organic ion exchanger resins. These resins consist of a cross linked polystyrene with sulphonic acid or quaternary ammonium function groups and can be successfully immobilised in blended cement systems. The formulation which has been developed is produced from a 9 to 1 blend of ground granulated blast furnace slag (BFS) and ordinary Portland cement (OPC) containing 28% ion exchange resin in the water saturated form. If 6% Microsilica is added to the blended cement the waste loading can be increased to 36 w/o. (author)

  8. Thermosetting resins for nuclear track detection

    International Nuclear Information System (INIS)

    Fujii, M.; Yokota, R.

    1986-01-01

    Several new thermosetting resins with a three dimensional network structure similar to that of CR-39 were polymerized to study their characteristics as nuclear track detectors. The comparison of the molecular structures of these resins gives us an important clue to develop highly sensitive polymeric track detectors. For example, butanediol bis allylcarbonate (BuAC) shows the sensitivity about ten times higher than diallyl and adipate (DAA). This suggests the carbonate groups in the BuAC molecule provide a much higher sensitivity than the ester groups in the DAA. During the course of this study, thermosetting resins with good etching properties and various sensitivities have been developed. Though the sensitivity of DAA is low, it will be useful for observations of ultra heavy cosmic rays and heavily ionizing particles at low energies. (author)

  9. Aging in CTBN modified epoxy resin stocks

    International Nuclear Information System (INIS)

    Creed, K.E. Jr.

    1979-01-01

    The cause of degradation in the glass transition temperature (T/sub G/) of a partially crystallized polymer was investigated. Sample epoxy resin filled capacitors were cured at 90 0 C for 24 hours, then stored at room atmospheric conditions. These showed typical degradation in T/sub G/ after storage for one month. One set of epoxy resin castings was stored at room atmosphere and another set was stored in a dry box at 0% relative humidity and 27 0 C. The samples at room atmospheric conditions showed typical degradation in T/sub G/, while the T/sub G/ for those stored in the dry box increased. Further tests were then made on epoxy resin castings at various curing temperatures and times at both room atmosphere and 0% humidity. Resulting data indicated that absorption of moisture during storage was the predominant cause of T/sub G/ degradation, with stress relaxation another, though smaller, contributing factor

  10. Restoration of traumatized teeth with resin composites

    DEFF Research Database (Denmark)

    Pallesen, Ulla; van Dijken, Jan WV

    2018-01-01

    For a long time, the primary choice for initial restoration of a crown-fractured front tooth has been resin composite material. The restoration can in most cases be performed immediately after injury if there is no sign of periodontal injury. The method’s adhesive character is conservative to tooth...... present an aesthetic problem due to exposure of un-aesthetic crown-margins. The invasive permanent crown restorations are therefore often not suc-cessful on a long-term scale. On the other hand, a conservative direct restoration of an extensively fractured incisor crown with resin composite may......-structure and with minimal risk of pulpal complication. In addition, it offers an aesthetic solution to the patient immediately after an injury, which may bring a little comfort in a sad situation. The resin composite build-up is often changed or repaired a couple of times, before the tooth is restored with a porcelain...

  11. Comparative study of resin sealant and resin modified glass ionomer as pit and fissure sealant

    Directory of Open Access Journals (Sweden)

    Shirin Malek

    2017-02-01

    Full Text Available The purpose of the present study was to compare the marginal integrity of resin modified glass ionomer cement with that of resin sealant, in vitro. Forty artificial pit and fissure cavities were prepared in occlusal surface of extracted premolar teeth by using ¼ round carbide bur. Cavities were condensed with artificial organic debris followed by cleaning with prophylaxis pumice brush and paste and then separated into two treatment groups. In Group A, 15 fissure cavities were sealed by resin sealant and in Group B, 15 fissure cavities were sealed by resin modified glass ionomer sealant. These specimens were subjected to thermo-cycling followed by dye penetration test. The remaining 5 cavities from each group were analyzed for debris score by the SEM. The results of the microleakage test showed that the efficacy of preventing microleakage of samples sealed by resin modified glass ionomer sealant was higher than the samples sealed by resin sealant. However, no significant differences were found. It can be concluded that use of resin modified glass ionomer sealant is a good alternative for sealing pits and fissures.

  12. Microshear bond strength of composite resins to enamel and porcelain substrates utilizing unfilled versus filled resins.

    Science.gov (United States)

    Najafi-Abrandabadi, Ahmad; Najafi-Abrandabadi, Siamak; Ghasemi, Amir; Kotick, Philip G

    2014-11-01

    Failures such as marginal discoloration and composite chipping are still the problems of tooth-colored restorations on the substrate of enamel and porcelain, which some of these problems are consequently as a result of failures in the bonding layer. Using filled resin has been recently introduced to increase the bond strength of this layer. The aim of this study was to compare the microshear bond strength (μ-SBS) of composite resins to enamel incubated in periods of 24 h and 9 months and porcelain with unfilled resin and flowable composites (filled resin). In this in vitro study, two groups of 75 enamel samples with different storage times (24 h and 9 months) and a group of 75 porcelain samples were used. They were divided into 5 experimental groups of 15 samples in each. Composite cylinders in tygon tubes were bonded on the surface of acid-etched enamel and pretreated porcelain. Wave, Wave MV, Wave HV, Grandioflow and Margin Bond were used as bonding agents. The μ-SBS was measured at the speed of 1.0 mm/min. The bond strengths were analyzed with one-way analysis of variance (ANOVA) test followed by Tukey test. P composites (filled resins) can be used instead of unfilled resins in bonding composite resins to enamel and porcelain substrates.

  13. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  14. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  15. Biphenyl liquid crystalline epoxy resin as a low-shrinkage resin-based dental restorative nanocomposite.

    Science.gov (United States)

    Hsu, Sheng-Hao; Chen, Rung-Shu; Chang, Yuan-Ling; Chen, Min-Huey; Cheng, Kuo-Chung; Su, Wei-Fang

    2012-11-01

    Low-shrinkage resin-based photocurable liquid crystalline epoxy nanocomposite has been investigated with regard to its application as a dental restoration material. The nanocomposite consists of an organic matrix and an inorganic reinforcing filler. The organic matrix is made of liquid crystalline biphenyl epoxy resin (BP), an epoxy resin consisting of cyclohexylmethyl-3,4-epoxycyclohexanecarboxylate (ECH), the photoinitiator 4-octylphenyl phenyliodonium hexafluoroantimonate and the photosensitizer champhorquinone. The inorganic filler is silica nanoparticles (∼70-100 nm). The nanoparticles were modified by an epoxy silane of γ-glycidoxypropyltrimethoxysilane to be compatible with the organic matrix and to chemically bond with the organic matrix after photo curing. By incorporating the BP liquid crystalline (LC) epoxy resin into conventional ECH epoxy resin, the nanocomposite has improved hardness, flexural modulus, water absorption and coefficient of thermal expansion. Although the incorporation of silica filler may dilute the reinforcing effect of crystalline BP, a high silica filler content (∼42 vol.%) was found to increase the physical and chemical properties of the nanocomposite due to the formation of unique microstructures. The microstructure of nanoparticle embedded layers was observed in the nanocomposite using scanning and transmission electron microscopy. This unique microstructure indicates that the crystalline BP and nanoparticles support each other and result in outstanding mechanical properties. The crystalline BP in the LC epoxy resin-based nanocomposite was partially melted during exothermic photopolymerization, and the resin expanded via an order-to-disorder transition. Thus, the post-gelation shrinkage of the LC epoxy resin-based nanocomposite is greatly reduced, ∼50.6% less than in commercialized methacrylate resin-based composites. This LC epoxy nanocomposite demonstrates good physical and chemical properties and good biocompatibility

  16. 76 FR 8774 - Granular Polytetrafluoroethylene Resin From Japan

    Science.gov (United States)

    2011-02-15

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 731-TA-386 (Third Review)] Granular Polytetrafluoroethylene Resin From Japan AGENCY: United States International Trade Commission. ACTION: Termination of five... revocation of the antidumping duty order on granular polytetrafluoroethylene resin from Japan would be likely...

  17. Development of amino resin for paint formulation: Copolymerization ...

    African Journals Online (AJOL)

    SERVER

    2007-06-18

    Jun 18, 2007 ... IR spectroscopy and macro phase separation techniques. At a given TEA ... form aldehyde emission from urea formaldehyde resin through one step ..... of resin molecules (Barminas and Osemeahon, 2007;. Sekaran et al.

  18. Composite resin fillings and inlays: An 11-year evaluation

    DEFF Research Database (Denmark)

    Pallesen, U.; Qvist, V.

    2003-01-01

    Clinical trial, composite resin, direct restorations, indirect restorations, long-term behaviour, posterior teeth......Clinical trial, composite resin, direct restorations, indirect restorations, long-term behaviour, posterior teeth...

  19. Rapid viscosity measurements of powdered thermosetting resins

    Science.gov (United States)

    Price, H. L.; Burks, H. D.; Dalal, S. K.

    1978-01-01

    A rapid and inexpensive method of obtaining processing-related data on powdered thermosetting resins has been investigated. The method involved viscosity measurements obtained with a small specimen (less than 100 mg) parallel plate plastometer. A data acquisition and reduction system was developed which provided a value of viscosity and strain rate about 12-13 second intervals during a test. The effects of specimen compaction pressure and reduction of adhesion between specimen and parallel plates were examined. The plastometer was used to measure some processing-related viscosity changes of an addition polyimide resin, including changes caused by pre-test heat treatment, test temperature, and strain rate.

  20. Thermal behavior of halogenated imidebismaleimide resins

    International Nuclear Information System (INIS)

    Mohammad, A.; Al-Halim, N.Z.

    1995-01-01

    Several new poly-halogenated malecimides, bismaleimides and therir copoly resins were synthessised thermally from their corresponding amic acids. The synthesis was accomplished by two way method (amic acid-polimide) instead of the well-known three way method (amic acid-imide-polyimide). Thermal characterization of monomers and their cured resins was achieved using differential thermal analysis (DTA), dynamic thermogravimetric analysis (TGA) and isothermal gravimetric analysis (IGA). The effect of halogen substituent, especially in the ortho postion, is clear in the imidization proces, while polymerization proceeds almost equally in all systems. Thermal properties of homo and copolymers were correlated with their chemical structures. (author). 15 refs., 4

  1. Understanding of the color in composite resin

    Directory of Open Access Journals (Sweden)

    Jeong-Won Park

    2011-07-01

    Full Text Available In clinic, esthetic restoration of a defective natural tooth with composite resin is challenging procedure and needs complete understanding of the color of tooth itself and materials used. The optical characteristics of the composites are different because the chemical compositions and microstructures are not same. This review provided basic knowledge of the color and the color measurement devices, and analyze the color of the natural tooth. Further, the accuracy of the shade tab, color of the composite resins before and after curing, effect of the water, food and bleaching agent, and translucency, opalescence, and fluorescence effects were evaluated.

  2. Mechanical properties and environmental effects of epoxy resins in the neat state and in composites

    International Nuclear Information System (INIS)

    Yang, C.M.P.

    1984-01-01

    The dynamic mechanical properties of graphite fiber reinforced, epoxy matrix composite laminates subjected to loading perpendicular to the plane of lamination and of neat epoxy resin are reported. The centrosymmetric deformation (CSD) test geometry provides an accurate and convenient test mode for the study of the viscoelastic behavior of very stiff graphite-epoxy laminates. It is found that the in-phase and out-of-phase stiffness superpose to form master curves covering a frequency range of 12 decades. By a suitable scaling procedure of the master curves, it is found that the in-phase stiffness has the same shape and the out-of-phase has the same dispersion for all laminates irrespective of the stacking sequence. The dispersion characteristics of in-situ and neat resin epoxy were nearly identical, but with the neat resin having a lower glass-transition temperature. The graphite/epoxy composites and neat resin epoxy have been shown to be sensitive to hygrothermal environment. For postcured specimens the plasticization and inhomogeneous swelling effects due to the moisture absorbed are found to be reversible, in the sense that the initially dry properties of the laminate are recovered after redrying the wet specimen. On the other hand, for as cured specimens, the plasticization and inhomogeneous swelling effects are found to be irreversible under the same hygrothermal environment

  3. Study on the Novel Dicyanate Ester Resin Containing Naphthalene Unit

    Institute of Scientific and Technical Information of China (English)

    Hong Qiang YAN; Hong Yun PENG; Li JI; Guo Rong QI

    2004-01-01

    The novel dicyanate ester resin containing naphthalene unit (DNCY) was synthesized, and characterized by FT-IR, 1H-NMR, 13C-NMR and elemental analysis (EA).The thermal properties of DNCY resin was studied by thermal degradation analysis at a heating rate of 10 (C /min-1 in N2 and air. The DNCY resin exhibited better thermal and thermal-oxidative stability than bisphenol A dicyanate (BACY) resin.

  4. Modification of Aliphatic Petroleum Resin by Peracetic Acid

    OpenAIRE

    Bondaletov, Vladimir Grigoryevich; Bondaletova, Lyudmila Ivanovna; Hamlenko, A.; Bondaletov, Oleg Vladimirovich; Starovoit, M.

    2014-01-01

    This work demonstrates the possibility of obtaining modified aliphatic resin (PRC5) by means of petroleum resin oxidation by peracetic acid. We have experimentally determined oxidation conditions that lead to producing resin with maximum epoxy and acid numbers. Ratio of "oxidative system: PRC5" is 0.5:1, process duration is 2 hours. The modified resin structure is determined by IR and NMR spectroscopy.

  5. Performances and improvement of copper-hydrazine complexation deoxidising resin

    International Nuclear Information System (INIS)

    Liu Fenfen; Zhang Hao; Sun Haijun; Liu Xiaojie

    2012-01-01

    Copper-hydrazine complexation deoxidising resin is tested to examine its performances including effluent water quality and capacity of deoxidisation. By the means of changing the resin type and regeneration, the deoxidising capacity of the resin can be improved to 13 times more than before. At the same time, physical performances of the resin are also greatly improved while maintaining its velocity of deoxidisation and effluent quality. (authors)

  6. Recovery of tretrachloroaurate through ion exchange with Dowex 11 resin

    International Nuclear Information System (INIS)

    Alguacil, F.J.

    1998-01-01

    The recovery of the tretrachloroaurate complex by the anionic ion exchange resin Dowex 11 has been studied. The kinetics of gold adsorption were dependent of both gold and resin concentrations and temperature. The adsorption isotherm can be described by the expression Q=kC''n. The loaded resin could be eluted by an acidic thiourea solution at 20 degree centigree. After several adsorption-elution cycles there is not any apparent loss in the adsorption properties of the resin. (Author) 6 refs

  7. Management of white spots: resin infiltration technique and microabrasion

    Directory of Open Access Journals (Sweden)

    Jeong-Hye Son

    2011-01-01

    Full Text Available This case report compared the effectiveness of resin infiltration technique (Icon, DMG with microabrasion (Opalustre, Ultradent Products, Inc. in management of white spot lesions. It demonstrates that although neither microabrasion nor resin infiltration technique can remove white spot lesions completely, resin infiltration technique seems to be more effective than microabrasion. Therefore resin infiltration technique can be chosen preferentially for management of white spot lesions and caution should be taken for case selection.

  8. Evaluation of an Experimental Adhesive Resin for Orthodontic Bonding

    Science.gov (United States)

    Durgesh, B. H.; Alkheraif, A. A.; Pavithra, D.; Hashem, M. I.; Alkhudhairy, F.; Elsharawy, M.; Divakar, D. D.; Vallittu, P. K.; Matinlinna, J. P.

    2017-07-01

    The aim of this study was to evaluate in vitro the effect of an experimental adhesive resin for orthodontic bonding by measuring some the chemical and mechanical properties. The resin demonstrated increased values of nanohardness and elastic modulus, but the differences were not significant compared with those for the Transbond XT adhesives. The experimental adhesive resin could be a feasible choice or a substitute for the traditional bis-GMA-based resins used in bonding orthodontic attachments.

  9. Sill intrusion in volcanic calderas: implications for vent opening probability

    Science.gov (United States)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    Calderas show peculiar behaviors with remarkable dynamic processes, which do not often culminate in eruptions. Observations and studies conducted in recent decades have shown that the most common cause of unrest in the calderas is due to magma intrusion; in particular, the intrusion of sills at shallow depths. Monogenic cones, with large areal dispersion, are quite common in the calderas, suggesting that the susceptibility analysis based on geological features, is not strictly suitable for estimating the vent opening probability in calderas. In general, the opening of a new eruptive vent can be regarded as a rock failure process. The stress field in the rocks that surrounds and tops the magmatic reservoirs plays an important role in causing the rock failure and creating the path that magma can follow towards the surface. In this conceptual framework, we approach the problem of getting clues about the probability of vent opening in volcanic calderas through the study of the stress field produced by the intrusion of magma, in particular, by the intrusion of a sill. We simulate the intrusion of a sill free to expand radially, with shape and dimensions which vary with time. The intrusion process is controlled by the elastic response of the rock plate above the sill, which bends because of the intrusion, and by gravity, that drives the magma towards the zones where the thickness of the sill is smaller. We calculated the stress field in the plate rock above the sill. We found that at the bottom of the rock plate above the sill the maximum intensity of tensile stress is concentrated at the front of the sill and spreads radially with it, over time. For this reason, we think that the front of the spreading sill is prone to open for eruptive vents. Even in the central area of the sill the intensity of stress is relatively high, but at the base of the rock plate stress is compressive. Under isothermal conditions, the stress soon reaches its maximum value (time interval

  10. Biological intrusion of low-level-waste trench covers

    Science.gov (United States)

    Hakonson, T. E.; Gladney, E. S.

    The long-term integrity of low-level waste shallow land burialsites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. The need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatment is demonstrated. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and sil overburden depth.

  11. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  12. Use of behavioral biometrics in intrusion detection and online gaming

    Science.gov (United States)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2006-04-01

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

  13. Misuse and intrusion detection at Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1995-04-01

    An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in system audit records, in system vulnerability postures, and in other evidence found through active system testing. Since 1989 we have implemented a misuse and intrusion detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter, or NADIR. NADIR currently audits a Kerberos distributed authentication system, file activity on a mass, storage system, and four Cray supercomputers that run the UNICOS operating system. NADIR summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations, As NADIR is constantly evolving, this paper reports its development to date.

  14. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  15. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  16. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  17. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  18. Thermodynamics of water intrusion in nanoporous hydrophobic solids.

    Science.gov (United States)

    Cailliez, Fabien; Trzpit, Mickael; Soulard, Michel; Demachy, Isabelle; Boutin, Anne; Patarin, Joël; Fuchs, Alain H

    2008-08-28

    We report a joint experimental and molecular simulation study of water intrusion in silicalite-1 and ferrerite zeolites. The main conclusion of this study is that water condensation takes place through a genuine first-order phase transition, provided that the interconnected pores structure is 3-dimensional. In the extreme confinement situation (ferrierite zeolite), condensation takes place through a continuous transition, which is explained by a shift of both the first-order transition line and the critical point with increasing confinement. The present findings are at odds with the common belief that conventional phase transitions cannot take place in microporous solids such as zeolites. The most important features of the intrusion/extrusion process can be understood in terms of equilibrium thermodynamics considerations. We believe that these findings are very general for hydrophobic solids, i.e. for both nonwetting as well as wetting water-solid interface systems.

  19. Medication Adherence using Non-intrusive Wearable Sensors

    Directory of Open Access Journals (Sweden)

    T. H. Lim

    2017-12-01

    Full Text Available Activity recognition approaches have been applied in home ambient systems to monitor the status and well- being of occupant especially for home care systems. With the advancement of embedded wireless sensing devices, various applications have been proposed to monitor user´s activities and maintain a healthy lifestyle. In this paper, we propose and evaluate a Smart Medication Alert and Treatment Electronic Systems (SmartMATES using a non-intrusive wearable activity recognition sensing system to monitor and alert an user for missing medication prescription. Two sensors are used to collect data from the accelerometer and radio transceiver. Based on the data collected, SmartMATES processes the data and generate a model for the various actions including taking medication. We have evaluated the SmartMATES on 9 participants. The results show that the SmartMATES can identify and prevent missing dosage in a less intrusive way than existing mobile application and traditional approaches.

  20. Manipulating recall vantage perspective of intrusive memories in dysphoria.

    Science.gov (United States)

    Williams, Alishia D; Moulds, Michelle L

    2008-10-01

    The current study attempted to experimentally manipulate mode of recall (field, observer perspective) in a sample of mildly dysphoric participants (N=134) who reported a distressing intrusive memory of negative autobiographical event. Specifically, the current study sought to ascertain whether shifting participants into a converse perspective would have differential effects on the reported experience of their memory. Results indicated that shifting participants from a field to an observer perspective resulted in decreased experiential ratings: specifically, reduced distress and vividness. Also, as anticipated, the converse shift in perspective (from observer to field) did not lead to a corresponding increase in experiential ratings, but did result in reduced ratings of observation and a trend was observed for decreased levels of detachment. The findings support the notion that recall perspective has a functional role in the regulation of intrusion-related distress and represents a cognitive avoidance mechanism.

  1. The influence of resin flexural modulus on the magnitude of ceramic strengthening.

    LENUS (Irish Health Repository)

    Fleming, Garry J P

    2012-07-01

    The aim was to determine the magnitude of ceramic resin-strengthening with resin-based materials with varying flexural moduli using a regression technique to assess the theoretical strengthening at a \\'zero\\' resin-coating thickness. The hypothesis tested was that experimentally, increasing resin flexural modulus results in increased resin-strengthening observed at a theoretical \\'zero\\' resin-coating thickness.

  2. An Immune-inspired Adaptive Automated Intrusion Response System Model

    Directory of Open Access Journals (Sweden)

    Ling-xi Peng

    2012-09-01

    Full Text Available An immune-inspired adaptive automated intrusion response system model, named as , is proposed. The descriptions of self, non-self, immunocyte, memory detector, mature detector and immature detector of the network transactions, and the realtime network danger evaluation equations are given. Then, the automated response polices are adaptively performed or adjusted according to the realtime network danger. Thus, not only accurately evaluates the network attacks, but also greatly reduces the response times and response costs.

  3. Assessment of permeation quality of concrete through mercury intrusion porosimetry

    International Nuclear Information System (INIS)

    Kumar, Rakesh; Bhattacharjee, B.

    2004-01-01

    Permeation quality of laboratory cast concrete beams was determined through initial surface absorption test (ISAT). The pore system characteristics of the same concrete beam specimens were determined through mercury intrusion porosimetry (MIP). Data so obtained on the measured initial surface absorption rate of water by concrete and characteristics of pore system of concrete estimated from porosimetry results were used to develop correlations between them. Through these correlations, potential of MIP in assessing the durability quality of concrete in actual structure is demonstrated

  4. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    OpenAIRE

    Dhanalakshmi Krishnan Sadhasivan; Kannapiran Balasubramanian

    2017-01-01

    Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to...

  5. Mass memory formatter subsystem of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-09-01

    The Mass Memory Formatter was developed as part of the Adaptive Intrusion Data System (AIDS) to control a 2.4-megabit mass memory. The data from a Memory Controlled Processor is formatted before it is stored in the memory and reformatted during the readout mode. The data is then transmitted to a NOVA 2 minicomputer-controlled magnetic tape recorder for storage. Techniques and circuits are described

  6. A high-performance renewable thermosetting resin derived from eugenol.

    Science.gov (United States)

    Harvey, Benjamin G; Sahagun, Christopher M; Guenthner, Andrew J; Groshens, Thomas J; Cambrea, Lee R; Reams, Josiah T; Mabry, Joseph M

    2014-07-01

    A renewable bisphenol, 4,4'-(butane-1,4-diyl)bis(2-methoxyphenol), was synthesized on a preparative scale by a solvent-free, Ru-catalyzed olefin metathesis coupling reaction of eugenol followed by hydrogenation. After purification, the bisphenol was converted to a new bis(cyanate) ester by standard techniques. The bisphenol and cyanate ester were characterized rigorously by NMR spectroscopy and single-crystal X-ray diffraction studies. After complete cure, the cyanate ester exhibited thermal stability in excess of 350 °C and a glass transition temperature (Tg ) of 186 °C. As a result of the four-carbon chain between the aromatic rings, the thermoset displayed a water uptake of only 1.8% after a four day immersion in 85 °C water. The wet Tg of the material (167 °C) was only 19 °C lower than the dry Tg , and the material showed no significant degradation as a result of the water treatment. These results suggest that this resin is well suited for maritime environments and provide further evidence that full-performance resins can be generated from sustainable feedstocks. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. Curing reaction of bisphenol-A based benzoxazine with cyanate ester resin and the properties of the cured thermosetting resin

    Directory of Open Access Journals (Sweden)

    H. Kimura

    2011-12-01

    Full Text Available Curing reaction of bisphenol-A based benzoxazine with cyanate ester resin and the properties of the cured thermosetting resin were investigated. The cure behavior of benzoxazine with cyanate ester resin was monitored by model reaction using nuclear magnetic resonance (NMR. As a result of the model reaction, the ring opening reaction of benzoxazine ring and thermal self-cyclotrimerization of cyanate ester group occurred, and then the phenolic hydoroxyl group generated by the ring opening reaction of benzoxazine ring co-reacted with cyanate ester group. The properties of the cured thermosetting resin were estimated by mechanical properties, electrical resistivity, water resistance and heat resistance. The cured thermosetting resin from benzoxazine and cyanate ester resin showed good heat resistance, high electrical resistivity and high water resistance, compared with the cured thermosetting resin from benzoxazine and epoxy resin.

  8. 21 CFR 872.3770 - Temporary crown and bridge resin.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Temporary crown and bridge resin. 872.3770 Section... (CONTINUED) MEDICAL DEVICES DENTAL DEVICES Prosthetic Devices § 872.3770 Temporary crown and bridge resin. (a) Identification. A temporary crown and bridge resin is a device composed of a material, such as...

  9. 21 CFR 872.3300 - Hydrophilic resin coating for dentures.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Hydrophilic resin coating for dentures. 872.3300... (CONTINUED) MEDICAL DEVICES DENTAL DEVICES Prosthetic Devices § 872.3300 Hydrophilic resin coating for dentures. (a) Identification. A hydrophilic resin coating for dentures is a device that consists of a water...

  10. 21 CFR 872.3310 - Coating material for resin fillings.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Coating material for resin fillings. 872.3310... (CONTINUED) MEDICAL DEVICES DENTAL DEVICES Prosthetic Devices § 872.3310 Coating material for resin fillings. (a) Identification. A coating material for resin fillings is a device intended to be applied to the...

  11. 75 FR 67105 - Granular Polytetrafluoroethylene Resin From Italy and Japan

    Science.gov (United States)

    2010-11-01

    ... Polytetrafluoroethylene Resin From Italy and Japan AGENCY: United States International Trade Commission. ACTION... resin from Italy and Japan. SUMMARY: The Commission hereby gives notice that it has instituted reviews... revocation of the antidumping duty orders on granular polytetrafluoroethylene resin from Italy and Japan...

  12. 21 CFR 872.3670 - Resin impression tray material.

    Science.gov (United States)

    2010-04-01

    ... (CONTINUED) MEDICAL DEVICES DENTAL DEVICES Prosthetic Devices § 872.3670 Resin impression tray material. (a) Identification. Resin impression tray material is a device intended for use in a two-step dental mold fabricating... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Resin impression tray material. 872.3670 Section...

  13. 21 CFR 177.2410 - Phenolic resins in molded articles.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 3 2010-04-01 2009-04-01 true Phenolic resins in molded articles. 177.2410... as Components of Articles Intended for Repeated Use § 177.2410 Phenolic resins in molded articles. Phenolic resins identified in this section may be safely used as the food-contact surface of molded...

  14. Evaluation of some anionic exchange resins as potential tablet ...

    African Journals Online (AJOL)

    The effect of resin concentration and compression force on the properties of tablets using the selected resin was investigated. In addition, the disintegrant efficacy of the selected resin in the tablet formulations containing either a basic drug, e.g., dextromethorphan hydrobromide (DMP), or an acidic drug, e.g., diclofenac ...

  15. Development of radiation-curable resin based on natural rubber

    Energy Technology Data Exchange (ETDEWEB)

    Mohd, Dahlan; Harun, Abdul Ghani [Nuclear Energy Unit, Bangi, Selangor (Malaysia)

    1994-12-31

    A new radiation curable resin based on natural rubber has been developed. The resin was based on the reaction between low molecular weight epoxidised natural rubber and acrylic acid. When formulated with reactive monomers and photoinitiator, it solidified upon irradiation with UV light. The resin may find applications in coating for cellulosic-based substrates and pressure-sensitive adhesive.

  16. 21 CFR 177.2430 - Polyether resins, chlorinated.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 3 2010-04-01 2009-04-01 true Polyether resins, chlorinated. 177.2430 Section 177... Components of Articles Intended for Repeated Use § 177.2430 Polyether resins, chlorinated. Chlorinated polyether resins may be safely used as articles or components of articles intended for repeated use in...

  17. Development of radiation-curable resin based on natural rubber

    International Nuclear Information System (INIS)

    Dahlan Mohd; Abdul Ghani Harun

    1993-01-01

    A new radiation curable resin based on natural rubber has been developed. The resin was based on the reaction between low molecular weight epoxidised natural rubber and acrylic acid. When formulated with reactive monomers and photoinitiator, it solidified upon irradiation with UV light. The resin may find applications in coating for cellulosic-based substrates and pressure-sensitive adhesive

  18. Color change of composite resins subjected to accelerated artificial aging

    Directory of Open Access Journals (Sweden)

    Denise Cremonezzi Tornavoi

    2013-01-01

    Conclusions: All composite resins presented unacceptable color changes after 382 h of aging and different composite resins with same hue, presented different colors before being subjected to the aging process (B2 and C2 and after (B2. It was also observed color difference within a group of the same composite resin and same hue.

  19. 21 CFR 872.3820 - Root canal filling resin.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Root canal filling resin. 872.3820 Section 872...) MEDICAL DEVICES DENTAL DEVICES Prosthetic Devices § 872.3820 Root canal filling resin. (a) Identification. A root canal filling resin is a device composed of material, such as methylmethacrylate, intended...

  20. Respon Konsumen pada Mobile Advergames: Intrusiveness dan Irritation

    Directory of Open Access Journals (Sweden)

    Sony Kusumasondjaja

    2016-12-01

    Full Text Available Abstract. Increasing adoption of mobile advergames to deliver marketing messages has not been followed by empirical findings to support its effectiveness. This research attempts to examine the effect of mobile advergames intrusiveness on consumer irritation, attitudes, and purchase intention. This investigation on mobile advergame effectiveness was based on the increasing use of mobile media to deliver marketing messages to consumers from different demographic background. Conceptual framework was developed based on Advertising Avoidance Theory. For data collection, self-administered survey was conducted by adopting purposive sampling involving 213 respondents residing in Surabaya who have had experience in playing mobile game as respondents. Results indicate that intrusiveness positively affects consumer irritation. Consumer irritation negatively affects attitude towards the mobile advergames and attitude towards the advertised product. The better the consumer attitude towards the mobile advergames, the more positive the attitude towards the advertised product. Moreover, the more positive the attitude towards the advertised product, the greater the consumer intention to purchase. Interestingly, consumer attitude toward the mobile advergames has insignificant influence on purchase intention. Findings of the study offer significant contribution to marketing practices using mobile advergames as media placement in their advertising strategy. Keywords: intrusiveness, irritation, mobile advergames, attitude, advertising

  1. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  2. Treatment of Intrusive Suicidal Imagery Using Eye Movements

    Directory of Open Access Journals (Sweden)

    Jaël S. van Bentum

    2017-06-01

    Full Text Available Suicide and suicidal behavior are major public health concerns, and affect 3–9% of the population worldwide. Despite increased efforts for national suicide prevention strategies, there are still few effective interventions available for reducing suicide risk. In this article, we describe various theoretical approaches for suicide ideation and behavior, and propose to examine the possible effectiveness of a new and innovative preventive strategy. A model of suicidal intrusion (mental imagery related to suicide, also referred to as suicidal flash-forwards is presented describing one of the assumed mechanisms in the etiology of suicide and the mechanism of therapeutic change. We provide a brief rationale for an Eye Movement Dual Task (EMDT treatment for suicidal intrusions, describing techniques that can be used to target these suicidal mental images and thoughts to reduce overall behavior. Based on the available empirical evidence for the mechanisms of suicidal intrusions, this approach appears to be a promising new treatment to prevent suicidal behavior as it potentially targets one of the linking pins between suicidal ideation and suicidal actions.

  3. Active Low Intrusion Hybrid Monitor for Wireless Sensor Networks.

    Science.gov (United States)

    Navia, Marlon; Campelo, Jose C; Bonastre, Alberto; Ors, Rafael; Capella, Juan V; Serrano, Juan J

    2015-09-18

    Several systems have been proposed to monitor wireless sensor networks (WSN). These systems may be active (causing a high degree of intrusion) or passive (low observability inside the nodes). This paper presents the implementation of an active hybrid (hardware and software) monitor with low intrusion. It is based on the addition to the sensor node of a monitor node (hardware part) which, through a standard interface, is able to receive the monitoring information sent by a piece of software executed in the sensor node. The intrusion on time, code, and energy caused in the sensor nodes by the monitor is evaluated as a function of data size and the interface used. Then different interfaces, commonly available in sensor nodes, are evaluated: serial transmission (USART), serial peripheral interface (SPI), and parallel. The proposed hybrid monitor provides highly detailed information, barely disturbed by the measurement tool (interference), about the behavior of the WSN that may be used to evaluate many properties such as performance, dependability, security, etc. Monitor nodes are self-powered and may be removed after the monitoring campaign to be reused in other campaigns and/or WSNs. No other hardware-independent monitoring platforms with such low interference have been found in the literature.

  4. Coplanar capacitance sensors for detecting water intrusion in composite structures

    International Nuclear Information System (INIS)

    Nassr, Amr A; El-Dakhakhni, Wael W; Ahmed, Wael H

    2008-01-01

    Composite materials are becoming more affordable and widely used for retrofitting, rehabilitating and repairing reinforced concrete structures designed and constructed under older specifications. However, the mechanical properties and long-term durability of composite materials may degrade severely in the presence of water intrusion. This study presents a new non-destructive evaluation (NDE) technique for detecting the water intrusion in composite structures by evaluating the dielectric properties of different composite system constituent materials. The variation in the dielectric signatures was employed to design a coplanar capacitance sensor with high sensitivity to detect such defects. An analytical model was used to study the effect of the sensor geometry on the output signal and to optimize sensor design. A finite element model was developed to validate analytical results and to evaluate other sensor design-related parameters. Experimental testing of a concrete specimen wrapped with composite laminate and containing a series of pre-induced water intrusion defects was conducted in order to validate the concept of the new technique. Experimental data showed excellent agreement with the finite element model predictions and confirmed sensor performance

  5. Biological intrusion of low-level-waste trench covers

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Gladney, E.S.

    1981-01-01

    The long-term integrity of low-level waste shallow land burial sites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. Past research on low-level waste shallow land burial methods has emphasized physical (i.e., water infiltration, soil erosion) and chemical (radionuclide leaching) processes that can cause waste site failure and subsequent radionuclide transport. The purpose of this paper is to demonstrate the need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatments. Plants and animals not only can transport radionuclides to the ground surface via root systems and soil excavated from the cover profile by animal burrowing activities, but they modify physical and chemical processes within the cover profile by changing the water infiltration rates, soil erosion rates and chemical composition of the soil. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and soil overburden depth. The rate of biological intrusion through the various barrier materials is being evaluated through the use of activatable stable tracers

  6. Kissing Bug ( spp. Intrusion into Homes: Troublesome Bites and Domiciliation

    Directory of Open Access Journals (Sweden)

    Stephen A. Klotz

    2016-01-01

    Full Text Available Kissing bugs ( Triatoma spp. frequently enter homes and bite human and pet occupants. Bites may lead to severe allergic reactions and, in some cases, death. Kissing bugs are also vectors of Trypanosoma cruzi , the cause of Chagas disease. In general, modern houses in the United States are not conducive to domiciliation of kissing bugs (bugs living out their entire life within the home with the presence of eggs, nymphs, adults, and exuviae. Construction features such as concrete foundations, solid walls and ceilings, window screens, tight thresholds for doors and windows, and other measures impede bug entry into homes, and air conditioning reduces the need for open doors and windows. Where Chagas disease is endemic in Mexico and Central and South America, homes often have thatch roofs, adobe walls, and open doors and windows. We investigated numerous instances of kissing bug intrusions into homes in Southern Arizona, California, and Louisiana and documented the reactions to kissing bug bites. Our work confirms the importance of modern home construction in limiting kissing bug intrusions. Older homes, especially those lacking modern screening, caulking, and weather stripping to reduce air leakage, may be subject to kissing bug intrusions and domiciliation. We describe a community in Southern Arizona where domiciliation of homes by Triatoma recurva is common. We also provide recent data regarding kissing bug bites and allergic reactions to the bites.

  7. Data mining approach to web application intrusions detection

    Science.gov (United States)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  8. Numerical Continuation Methods for Intrusive Uncertainty Quantification Studies

    Energy Technology Data Exchange (ETDEWEB)

    Safta, Cosmin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Najm, Habib N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Phipps, Eric Todd [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-09-01

    Rigorous modeling of engineering systems relies on efficient propagation of uncertainty from input parameters to model outputs. In recent years, there has been substantial development of probabilistic polynomial chaos (PC) Uncertainty Quantification (UQ) methods, enabling studies in expensive computational models. One approach, termed ”intrusive”, involving reformulation of the governing equations, has been found to have superior computational performance compared to non-intrusive sampling-based methods in relevant large-scale problems, particularly in the context of emerging architectures. However, the utility of intrusive methods has been severely limited due to detrimental numerical instabilities associated with strong nonlinear physics. Previous methods for stabilizing these constructions tend to add unacceptably high computational costs, particularly in problems with many uncertain parameters. In order to address these challenges, we propose to adapt and improve numerical continuation methods for the robust time integration of intrusive PC system dynamics. We propose adaptive methods, starting with a small uncertainty for which the model has stable behavior and gradually moving to larger uncertainty where the instabilities are rampant, in a manner that provides a suitable solution.

  9. An Automata Based Intrusion Detection Method for Internet of Things

    Directory of Open Access Journals (Sweden)

    Yulong Fu

    2017-01-01

    Full Text Available Internet of Things (IoT transforms network communication to Machine-to-Machine (M2M basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.

  10. AdaBoost-based algorithm for network intrusion detection.

    Science.gov (United States)

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  11. Gamma radiolysis and post-irradiation leaching of ion exchange resins

    International Nuclear Information System (INIS)

    Traboulsi, A.

    2012-01-01

    The knowledge of the behavior under irradiation and in presence of water of Ion Exchange Resins (IER) is very necessary to predict their impact on the environment during the storage phase and in a possible deep geological disposal. The IER studied are the MB400 mixed bed resin and its 'pure' anionic and cationic components. The experimental strategy used in this work was based on the use of chemometric tools permitting to estimate the effect of the irradiation atmosphere, the dose rate, the absorbed dose and the leaching temperature. The gaseous and water-soluble radiolysis products were analyzed by gas Mass Spectrometry (MS) and Ion Chromatography (IC). The IER generated principally H 2 g, CO 2 g and amines for which quantities depended of the resin nature and the irradiation conditions. The analysis of solid irradiated resins was investigated by Fourier Transformed Infrared (FTIR) and Nuclear Magnetic Resonance ( 13 C NMR) techniques. The last ones revealed structural modifications of the IER solid matrix in function of the experimental conditions. Their behavior in presence of water was studied during 143 days by characterization of the organic matter released after their post-irradiation leaching. The kinetics showed that all the water-soluble components were releasing at the first contact with water. The Total Organic Carbon (TOC) quantity released depends, according to the resin nature, either on the dose, either on the irradiation atmosphere. The dose rate has no effect on the degradation and the leaching of the MB400 resin, which behaved differently than its pure components. (author) [fr

  12. Effects of a chelating resin on metal bioavailability and toxicity to estuarine invertebrates: Divergent results of field and laboratory tests

    International Nuclear Information System (INIS)

    Wilkie, Emma M.; Roach, Anthony C.; Micevska, Tina; Kelaher, Brendan P.; Bishop, Melanie J.

    2010-01-01

    Benthic invertebrates can uptake metals through diffusion of free ion solutes, or ingestion of sediment-bound forms. This study investigated the efficacy of the metal chelating resin SIR 300 TM in adsorbing porewater metals and isolating pathways of metal exposure. A field experiment (Botany Bay, Sydney, Australia) and a laboratory toxicity test each manipulated the availability of porewater metals within contaminated and uncontaminated sediments. It was predicted that within contaminated sediments, the resin would adsorb porewater metals and reduce toxicity to invertebrates, but in uncontaminated sediments, the resin would not significantly affect these variables. Whereas in the laboratory, the resin produced the predicted results, in the field the resin increased porewater metal concentrations of contaminated sediments for at least 34 days and decreased abundances of four macroinvertebrate groups, and richness in all sediments. These contrasting findings highlight the limits of extrapolating the results of laboratory experiments to the field environment. - Laboratory experiments do not predict the effects on porewater metals or macroinvertebrates of adding a chelating resin to metal-contaminated field sediments.

  13. Effects of a chelating resin on metal bioavailability and toxicity to estuarine invertebrates: Divergent results of field and laboratory tests

    Energy Technology Data Exchange (ETDEWEB)

    Wilkie, Emma M., E-mail: ewilkie@bio.mq.edu.a [Department of Environmental Sciences, University of Technology Sydney, Broadway, NSW 2007 (Australia); Ecotoxicology and Environmental Contaminants Section, Department of Environment and Climate Change, Lidcombe, NSW 1825 (Australia); Roach, Anthony C. [Ecotoxicology and Environmental Contaminants Section, Department of Environment and Climate Change, Lidcombe, NSW 1825 (Australia); Micevska, Tina [Centre for Environmental Contaminants Research, CSIRO Land and Water, Menai, NSW 2234 (Australia); Kelaher, Brendan P.; Bishop, Melanie J. [Department of Environmental Sciences, University of Technology Sydney, Broadway, NSW 2007 (Australia)

    2010-05-15

    Benthic invertebrates can uptake metals through diffusion of free ion solutes, or ingestion of sediment-bound forms. This study investigated the efficacy of the metal chelating resin SIR 300{sup TM} in adsorbing porewater metals and isolating pathways of metal exposure. A field experiment (Botany Bay, Sydney, Australia) and a laboratory toxicity test each manipulated the availability of porewater metals within contaminated and uncontaminated sediments. It was predicted that within contaminated sediments, the resin would adsorb porewater metals and reduce toxicity to invertebrates, but in uncontaminated sediments, the resin would not significantly affect these variables. Whereas in the laboratory, the resin produced the predicted results, in the field the resin increased porewater metal concentrations of contaminated sediments for at least 34 days and decreased abundances of four macroinvertebrate groups, and richness in all sediments. These contrasting findings highlight the limits of extrapolating the results of laboratory experiments to the field environment. - Laboratory experiments do not predict the effects on porewater metals or macroinvertebrates of adding a chelating resin to metal-contaminated field sediments.

  14. Resin Flow in Fiber Preformed by Vacuum Assisted Resin Transfer Molding with Flexible Tools

    Directory of Open Access Journals (Sweden)

    M.M. Shokrieh

    2008-12-01

    Full Text Available Vacuum assisted resin transfer molding, as a sub-branch of RTM is a method of manufacturing composite specimens. Considering the industrial development of this method, different modified techniques are designed to improve its performance. Among these techniques, using a half flexible mold is regarded as an important method. In this work, dominant equations of resin flow through the mold in polar coordinates are solved analytically. Based on this approach, closed-form solutions have been presented for different parameters such as thickness variation of preformed fiber, resin pressure, resin velocity and fiber volume fraction as functions of two variables, namely, time and the distance from injection port. After verification of the approach employed in this work, the results are presented. Important parameters influencing the quality and the rate production are studied in detail.

  15. 21 CFR 177.1555 - Polyarylate resins.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 3 2010-04-01 2009-04-01 true Polyarylate resins. 177.1555 Section 177.1555 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) FOOD FOR... in contact with all foods except beverages containing more than 8 volume percent ethanol under...

  16. Microbial treatment of ion exchange resins

    International Nuclear Information System (INIS)

    Kouznetsov, A.; Kniazev, O.

    2001-01-01

    A bioavailability of ion exchange resins to a microbial destruction as one of the alternative methods of compacting used ionites from the nuclear fuel manufacturing cycle enterprises has been investigated. The bio-destruction was studied after a preliminary chemical treatment or without it. A sensitivity of the ion exchange resins (including highly acidic cationite KU-2-8) to the microbial destruction by heterotrophic and chemo-litho-trophic microorganisms under aerobic conditions was shown in principle. The biodegradation of the original polymer is possible in the presence of the water soluble fraction of the resin obtained after its treatment by Fenton reagent and accelerated in the presence of Mn-ions in optimal concentration 1-2 g of Mn per liter of medium. Thus, the process of bio-destruction of ionite polymer by heterotrophic microorganisms can be compared with the bio-destruction of lignin or humic substances. The optimum parameters of bio-destruction and microorganisms used must be different for resins with different functional groups. (authors)

  17. [Resin-bonded fixed partial dentures

    NARCIS (Netherlands)

    Kreulen, C.M.; Creugers, N.H.J.

    2013-01-01

    A resin-bonded fixed partial denture is a prosthetic construction which can replace I or several teeth in an occlusal system and which comprises a pontic element which is adhesively attached to 1 or more abutment teeth. To compensate for the limited shear strength of the adhesive layer, the Jixed

  18. Studies on chemoviscosity modeling for thermosetting resins

    Science.gov (United States)

    Bai, J. M.; Hou, T. H.; Tiwari, S. N.

    1987-01-01

    A new analytical model for simulating chemoviscosity of thermosetting resins has been formulated. The model is developed by modifying the well-established Williams-Landel-Ferry (WLF) theory in polymer rheology for thermoplastic materials. By introducing a relationship between the glass transition temperature Tg(t) and the degree of cure alpha(t) of the resin system under cure, the WLF theory can be modified to account for the factor of reaction time. Temperature dependent functions of the modified WLF theory constants C sub 1 (t) and C sub 2 (t) were determined from the isothermal cure data. Theoretical predictions of the model for the resin under dynamic heating cure cycles were shown to compare favorably with the experimental data. This work represents progress toward establishing a chemoviscosity model which is capable of not only describing viscosity profiles accurately under various cure cycles, but also correlating viscosity data to the changes of physical properties associated with the structural transformation of the thermosetting resin systems during cure.

  19. 21 CFR 177.1585 - Polyestercarbonate resins.

    Science.gov (United States)

    2010-04-01

    .... Polyestercarbonate resins may be safely used as articles or components of articles intended for use in producing.... Copies are available from the Office of Premarket Approval, Center for Food Safety and Applied Nutrition... examined at the Center for Food Safety and Applied Nutrition's Library, Food and Drug Administration, 5100...

  20. Effect of Resin Extract from Commiphora swynnertonii

    African Journals Online (AJOL)

    Dr Olaleye

    of Commiphora swynnertonii resin on biochemical parameters in rats was investigated. Sixty rats were ... significantly elevated protein and albumin levels but had no significant effect on bilirubin and all the liver enzymes in the rats. These findings are ... hypoglycemic and hypolipidemic effects against high fat diet- induced ...

  1. Evaluation of resins for use in brachytherapy

    Energy Technology Data Exchange (ETDEWEB)

    Carvalho, Luiz Claudio F.M. Garcia; Ferraz, Wilmar Barbosa; Chrcanovic, Bruno Ramos; Santos, Ana Maria M., E-mail: ferrazw@cdtn.b, E-mail: amms@cdtn.b [Centro de Desenvolvimento da Tecnologia Nuclear (CDTN/CNEN-MG), Belo Horizonte, MG (Brazil)

    2011-07-01

    Brachytherapy is an advanced cancer treatment where radioactive seeds or sources are placed near or directly into the tumor thus reducing the radiation exposure in the surrounding healthy tissues. Prostate cancer can be treated with interstitial brachytherapy in initial stage of the disease in which tiny radioactive seeds with cylindrical geometry are used. Several kinds of seeds have been developed in order to obtain a better dose distribution around them and with a lower cost manufacturing. These seeds consist of an encapsulation, a radionuclide carrier, and X-ray marker. Among the materials that have potential for innovation in the construction of seeds, biocompatible resins appear as an important option. In this paper, we present some characterization results with Fourier transform infrared spectroscopic (FTIR) and ultraviolet-visible spectroscopy (UV-vis) performed on two types of resins in which curing temperatures for each one were varied as also the results of coatings with these resins under titanium substrates. Interactions of these resins in contact with the simulated body fluid were evaluated by atomic force microscopy, scanning electron microscopy, and energy dispersive X-ray spectroscopy. (author)

  2. Contextual memory, psychosis-proneness, and the experience of intrusive imagery.

    Science.gov (United States)

    Glazer, Daniel A; Mason, Oliver; King, John A; Brewin, Chris R

    2013-01-01

    This study tested the hypothesis that the presence and characteristics of naturally occurring involuntary imagery would be related to poorer context-dependent spatial memory and higher levels of proneness to psychotic experiences. Poorer contextual memory was also predicted to be associated with a greater sense of "nowness". Participants completed a virtual environment task that assessed contextual memory through responses that required allocentric and egocentric processing of virtual stimuli. Two questionnaires assessing predisposition to psychotic experiences were employed. Finally, participants completed an interview that required details of recent, naturally occurring involuntary images. Reports of involuntary imagery were associated with greater proneness to psychotic experiences but not with memory. In those participants who reported imagery, however, poorer memory performance was associated with more vivid and detailed intrusive imagery. Poorer contextual memory was specifically associated with a greater sense of "nowness". Possible links between contextual memory and proneness to psychosis are discussed.

  3. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware

    Energy Technology Data Exchange (ETDEWEB)

    Tierney, Brian L; Vallentin, Matthias; Sommer, Robin; Lee, Jason; Leres, Craig; Paxson, Vern; Tierney, Brian

    2007-09-19

    In this work we present a NIDS cluster as a scalable solution for realizing high-performance, stateful network intrusion detection on commodity hardware. The design addresses three challenges: (i) distributing traffic evenly across an extensible set of analysis nodes in a fashion that minimizes the communication required for coordination, (ii) adapting the NIDS's operation to support coordinating its low-level analysis rather than just aggregating alerts; and (iii) validating that the cluster produces sound results. Prototypes of our NIDS cluster now operate at the Lawrence Berkeley National Laboratory and the University of California at Berkeley. In both environments the clusters greatly enhance the power of the network security monitoring.

  4. Aspects of cold intrusions over Greece during autumn

    Science.gov (United States)

    Mita, Constantina; Marinaki, Aggeliki; Zeini, Konstantina; Konstantara, Metaxia

    2010-05-01

    This study is focused on the description of atmospheric disturbances that caused intense cold intrusions over Greece during autumn for a period of 25 years (1982-2006). The study was based on data analysis from the meteorological station network of the Hellenic National Meteorological Service (HNMS) and the European Centre for Medium Range Weather Forecasts (ECMWF). Initially, the days with temperature at the isobaric surface of 850 hPa less or equal to the mean temperature for the 10-day period the day under investigation belongs to are isolated, composing a new confined data set which was further used. An event of intense cold intrusion is identified based on a subjective set of criteria, considering the temperature decrease at the level of 850 hPa and its duration. In particular, the criteria that were used to identify a cold intrusion were: temperature variation between two successive days at the isobaric level of 850 hPa being equal or greater than 50 C at least once during the event and duration of the event of at least two successive days with continuous temperature decrease. Additionally, the synoptic analysis of the atmospheric disturbances involved using weather charts from ECMWF, revealed that all cases were related to low pressure systems at the level of 500 hPa, accompanied by cold air masses. Moreover, a methodology proposed to classify the cold intrusions based on general circulation characteristics of the atmosphere, resulted in seven major categories. More than half of the events belong in two categories, originated northwest of the greater Greek area (Greece and parts of neighbouring countries), between 400 and 600 N. Further analysis indicated that the frequency of events increases from September to November and the majority of the events lasted two to three days. Additionally, the non-parametric Mann-Kendall test was used for the investigation of the statistical significance of the trends appearing in the results. The tests revealed that over

  5. ANALYSIS OF VENTING OF A RESIN SLURRY

    Energy Technology Data Exchange (ETDEWEB)

    Laurinat, J.; Hensel, S.

    2012-03-27

    A resin slurry venting analysis was conducted to address safety issues associated with overpressurization of ion exchange columns used in the Purex process at the Savannah River Site (SRS). If flow to these columns were inadvertently interrupted, an exothermic runaway reaction could occur between the ion exchange resin and the nitric acid used in the feed stream. The nitric acid-resin reaction generates significant quantities of noncondensable gases, which would pressurize the column. To prevent the column from rupturing during such events, rupture disks are installed on the column vent lines. The venting analysis models accelerating rate calorimeter (ARC) tests and data from tests that were performed in a vented test vessel with a rupture disk. The tests showed that the pressure inside the test vessel continued to increase after the rupture disk opened, though at a slower rate than prior to the rupture. Calculated maximum discharge rates for the resin venting tests exceeded the measured rates of gas generation, so the vent size was sufficient to relieve the pressure in the test vessel if the vent flow rate was constant. The increase in the vessel pressure is modeled as a transient phenomenon associated with expansion of the resin slurry/gas mixture upon rupture of the disk. It is postulated that the maximum pressure at the end of this expansion is limited by energy minimization to approximately 1.5 times the rupture disk burst pressure. The magnitude of this pressure increase is consistent with the measured pressure transients. The results of this analysis demonstrate the need to allow for a margin between the design pressure and the rupture disk burst pressure in similar applications.

  6. Incineration of ion exchange resins using concentric burners

    International Nuclear Information System (INIS)

    Fukasawa, T.; Chino, K.; Kawamura, F.; Kuriyama, O.; Yusa, H.

    1985-01-01

    A new incineration method, using concentric burners, is studied to reduce the volume of spent ion exchange resins generated from nuclear power plants. Resins are ejected into the center of a propane-oxygen flame and burned within it. The flame length is theoretically evaluated by the diffusion-dominant model. By reforming the burner shape, flame length can be reduced by one-half. The decomposition ratio decreases with larger resin diameters due to the loss of unburned resin from the flame. A flame guide tube is adapted to increase resin holding time in the flame, which improves the decomposition ratio to over 98 wt%

  7. Method for curing alkyd resin compositions by applying ionizing radiation

    International Nuclear Information System (INIS)

    Watanabe, T.; Murata, K.; Maruyama, T.

    1975-01-01

    An alkyd resin composition is prepared by dissolving a polymerizable alkyd resin having from 10 to 50 percent of oil length into a vinyl monomer. The polymerizable alkyd resin is obtained by a half-esterification reaction of an acid anhydride having a polymerizable unsaturated group and an alkyd resin modified with conjugated unsaturated oil having at least one reactive hydroxyl group per one molecule. The alkyd resin composition thus obtained is coated on an article, and ionizing radiation is applied on the article to cure the coated film thereon. (U.S.)

  8. Method for detecting resin leakage in LWR coolant

    International Nuclear Information System (INIS)

    Girard, J.E.

    1988-05-01

    Resin leakage from condensate polishing units can result in steam generator corrosion. This report describes the development of a resin leakage detection method based in analyzing the organic breakdown products released from resin on heating. The breakdown products are analyzed using high performance liquid chromatography (HPLC) with fluorescence detection. Some of the organic products formed have been identified. A design for a resin monitoring unit, suitable for incorporation into the IONTRAC system, is presented. Theoretically, detection of ppB levels of resin by processing about one liter of water, is possible

  9. Method of burning ion-exchange resin contaminated with radioactivity

    International Nuclear Information System (INIS)

    Suzuki, Shigenori.

    1986-01-01

    Purpose: To process spent ion exchange resins to reduce their volume, without increasing the load on a off-gas system and in a stable state and at the same time not leaving any uncombusted portions. Method: The water slurries of the ion exchange resins contaminated with radioactive materials is dehydrated or dry combusted to reduce the water content. A binder is then added to solidify the ion exchange resin. The solidified ion exchange resins are then combusted in a furnace. This prevents the ion exchange resin from being dispersed by air and combustion gases. Furthermore, the solidified ion exchange resins in the form of small pellets burn from the surface inwards. Moreover the binder is carbonized by the combustion heat and promotes combustion to convert the ion exchange resins into a solid mass, making sure that no uncombusted portion is left. (Takahashi, M.)

  10. Commercial Ion Exchange Resin Vitrification in Borosilicate Glass

    International Nuclear Information System (INIS)

    Cicero-Herman, C.A.; Workman, P.; Poole, K.; Erich, D.; Harden, J.

    1998-05-01

    Bench-scale studies were performed to determine the feasibility of vitrification treatment of six resins representative of those used in the commercial nuclear industry. Each resin was successfully immobilized using the same proprietary borosilicate glass formulation. Waste loadings varied from 38 to 70 g of resin/100 g of glass produced depending on the particular resin, with volume reductions of 28 percent to 68 percent. The bench-scale results were used to perform a melter demonstration with one of the resins at the Clemson Environmental Technologies Laboratory (CETL). The resin used was a weakly acidic meth acrylic cation exchange resin. The vitrification process utilized represented a approximately 64 percent volume reduction. Glass characterization, radionuclide retention, offgas analyses, and system compatibility results will be discussed in this paper

  11. Intrusion of Magmatic Bodies Into the Continental Crust: 3-D Numerical Models

    Science.gov (United States)

    Gorczyk, Weronika; Vogt, Katharina

    2018-03-01

    Magma intrusion is a major material transfer process in the Earth's continental crust. Yet the mechanical behavior of the intruding magma and its host are a matter of debate. In this study we present a series of numerical thermomechanical simulations on magma emplacement in 3-D. Our results demonstrate the response of the continental crust to magma intrusion. We observe change in intrusion geometries between dikes, cone sheets, sills, plutons, ponds, funnels, finger-shaped and stock-like intrusions, and injection time. The rheology and temperature of the host are the main controlling factors in the transition between these different modes of intrusion. Viscous deformation in the warm and deep crust favors host rock displacement and plutons at the crust-mantle boundary forming deep-seated plutons or magma ponds in the lower to middle crust. Brittle deformation in the cool and shallow crust induces cone-shaped fractures in the host rock and enables emplacement of finger- or stock-like intrusions at shallow or intermediate depth. Here the passage of magmatic and hydrothermal fluids from the intrusion through the fracture pattern may result in the formation of ore deposits. A combination of viscous and brittle deformation forms funnel-shaped intrusions in the middle crust. Intrusion of low-density magma may more over result in T-shaped intrusions in cross section with magma sheets at the surface.

  12. Comparison of Mechanical Properties of Resin Composites with Resin Modified Glass Ionomers

    Directory of Open Access Journals (Sweden)

    Taha NA

    2015-06-01

    Full Text Available Statement of Problem: There are controversial reports regarding physical and mechanical properties of resin composites and glass ionomer cements. Some revealed higher strength and hardness for resin composites while others showed a comparable value for glass ionomer cements. Evaluation of mechanical properties of different types of resin composites in comparison with resin modified glass ionomers is not widely studied. Objectives: To measure and compare the flexural strength and Vickers hardness of three resin composites and two resins modified glass ionomer cements before and after ageing. Materials and Methods: Three resin composites, i.e. Filtek Supreme XTE (3M ESPE, Ice (SDI, Gradia (GC, and two resins modified glass ionomers, i.e. Fuji II LC (GC and Riva Light Cure (SDI, were selected. Ten barshaped specimens were prepared for each material and cured using LED curing light. After 24 hours storage in distilled water at 37oC, the specimens were randomly divided into two equal groups (n=5. The first group was tested as a baseline and the second group was restored at 37oC for another 29 days. Flexural strength was performed by four-point bending test using universal testing machine at crosshead speed of 0.5mm/min, and the maximum load at failure was recorded. The specimen’s halves were used for evaluating Vickers hardness, using a Digital Hardness Tester (300 g/15 sec and the Vickers hardness number (VHN was recorded. Data were analyzed using one-way analysis of variance (ANOVA, Tukey’s and student’s t-test. Results: After 24 hours of immersion, the highest hardness number was found for Filtek Supreme and Ice and the highest flexural strength was obtained for Gradia. After 30 days of storage, hardness of Fuji II LC and Gradia showed a significant decrease; flexural strength of Ice and Fuji II LC revealed a significant increase while Gradia and Filtek Supreme showed a significant decrease. Conclusions: Resin modified glass ionomers showed

  13. [Physical properties of resins for veneer crown. (Part 1) Bending strength of thermosetting methacrylic resins (author's transl)].

    Science.gov (United States)

    Kashiwada, T

    1979-01-01

    The physical properties of thermosetting methacrylic resins contain a kind or more than two kinds of cross linking agents were investigated. Knoop hardness and bending strength after drying, water sorption and thermal cycling were listed in table 4 and 5. Hydrophilic resins absorbed water about 3 times as much as hydrophobic resins. The materials contain a small amount of hydrophobic cross linking agents in MMA indicate comparatively excellent properties after drying, water sorption and thermal cycling. Knoop hardness of resins generally reduced by water sorption, especially in the case of the resin contains a large amount of triethylene glycol dimethacrylate.

  14. Development and application of high performance resins for crud removal

    International Nuclear Information System (INIS)

    Deguchi, Tatsuya; Izumi, Takeshi; Hagiwara, Masahiro

    1998-01-01

    The development of crud removal technology has started with the finding of the resin aging effect that an old ion exchange resin, aged by long year of use in the condensate demineralizer, had an enhanced crud removal capability. It was confirmed that some physical properties such as specific surface area and water retention capacity were increased due to degradation caused by long year of contact with active oxygens in the condensate water. So, it was speculated that those degradation in the resin matrix enhanced the adsorption of crud particulate onto the resin surface, hence the crud removal capability. Based on this, crud removal resin with greater surface area was first developed. This resin has shown an excellent crud removal efficiency in an actual power plant, and the crud iron concentration in the condensate effluent was drastically reduced by this application. However, the cross-linkage of the cation resin had to be lowered in a delicate manner for that specific purpose, and this has caused higher organic leachables from the resin, and the sulfate level in the reactor was raised accordingly. Our major goals, therefore, has been to develop a crud resin of as little organic leachables as possible with keeping the original crud removal efficiency. It was revealed through the evaluation of the first generation crud resin and its improved version installed in the actual condensate demineralizers that there was a good correlation between crud removal efficiency and organic leaching rate. The bast one among a number of developmental resins has shown the organic leaching rate of 1/10 of that of the original crud resin (ETR-C), and the crud removal efficiency of 90%. So far as we understand, the resin was considered to have the best overall balance between crud removal and leaching characteristics. The result of six month evaluation of this developmental resin, ETR-C3, in one vessel of condensate demineralizer of a power plant will be presented. (J.P.N.)

  15. Chemical Analysis of the Resinous Exudate Isolated from Heliotropium taltalense and Evaluation of the Antioxidant Activity of the Phenolics Components and the Resin in Homogeneous and Heterogeneous Systems

    Directory of Open Access Journals (Sweden)

    René Torres

    2009-06-01

    Full Text Available H. taltalense (Phil. Johnst. (Heliotropiaceae is an endemic species of the northern coast of Chile that produces a resinous exudate that covers its foliar surface and stems. Its chemical composition was analyzed for the first time, and two aromatic geranyl derivatives: filifolinol and filifolinyl senecionate and three flavonoids – naringenin, 3-O-methylgalangin and 7-O-methyleriodictiol – were isolated. The antioxidant activity of the flavonoids and the resinous exudates was carried out by measuring the 1,1-diphenyl-2-picrylhydrazyl (DPPH bleaching effect in ethanolic solution and in sodium dodecyl sulfate (SDS micelles. The influence of the reaction medium was analyzed. The initial velocity reactions for the pure compounds and for the extract were higher in SDS media than in ethanolic solution. The velocity of reaction observed was interpreted in terms of the reaction medium environment in the micelle.

  16. Chemical analysis of the resinous exudate isolated from Heliotropium taltalense and evaluation of the antioxidant activity of the phenolics components and the resin in homogeneous and heterogeneous systems.

    Science.gov (United States)

    Modak, Brenda; Rojas, Macarena; Torres, René

    2009-06-02

    H. taltalense (Phil.) Johnst. (Heliotropiaceae) is an endemic species of the northern coast of Chile that produces a resinous exudate that covers its foliar surface and stems. Its chemical composition was analyzed for the first time, and two aromatic geranyl derivatives: filifolinol and filifolinyl senecionate and three flavonoids - naringenin, 3-O-methylgalangin and 7-O-methyleriodictiol - were isolated. The antioxidant activity of the flavonoids and the resinous exudates was carried out by measuring the 1,1-diphenyl-2-picrylhydrazyl (DPPH) bleaching effect in ethanolic solution and in sodium dodecyl sulfate (SDS) micelles. The influence of the reaction medium was analyzed. The initial velocity reactions for the pure compounds and for the extract were higher in SDS media than in ethanolic solution. The velocity of reaction observed was interpreted in terms of the reaction medium environment in the micelle.

  17. Characteristics of floc formation of anion and cation exchange resin in precoat filter using powdered ion exchange resin

    International Nuclear Information System (INIS)

    Adachi, Tetsurou; Sawa, Toshio; Shindoh, Toshikazu.

    1989-01-01

    The filtration performance of mixed filter aid consisting of powdered anion and cation exchange resins used in the precoat filter is closely related to the characteristics of floc formation. The physical, chemical and electrochemical properties of powdered ion exchange resin were measured and the factors related to floc formation of anion and cation exchange resin were investigated by measuring the specific settle volume of resin floc as an evaluating index. It was found that these factors were mixing ratio, nature of resins and particle size of resins. In addition, it was assumed on the bases of these results that the amount of resin floc was related to sum of the surface electric charges of both resins. The filling ratio of resin floc was related to their product by multiplication and an experimental expression was obtained. The specific settle volume of resin floc could then be simulated by particle size, surface area, ion exchange capacity and degree of ionization of the powdered ion exchange resin. (author)

  18. Characteristics of floc formation of anion and cation exchange resin in precoat filter using powdered ion exchange resin

    Energy Technology Data Exchange (ETDEWEB)

    Adachi, Tetsurou (Nitto Denko Corp., Ibaraki, Osaka (Japan)); Sawa, Toshio; Shindoh, Toshikazu

    1989-09-01

    The filtration performance of mixed filter aid consisting of powdered anion and cation exchange resins used in the precoat filter is closely related to the characteristics of floc formation. The physical, chemical and electrochemical properties of powdered ion exchange resin were measured and the factors related to floc formation of anion and cation exchange resin were investigated by measuring the specific settle volume of resin floc as an evaluating index. It was found that these factors were mixing ratio, nature of resins and particle size of resins. In addition, it was assumed on the bases of these results that the amount of resin floc was related to sum of the surface electric charges of both resins. The filling ratio of resin floc was related to their product by multiplication and an experimental expression was obtained. The specific settle volume of resin floc could then be simulated by particle size, surface area, ion exchange capacity and degree of ionization of the powdered ion exchange resin. (author).

  19. Nanomechanical properties of dental resin-composites.

    Science.gov (United States)

    El-Safty, S; Akhtar, R; Silikas, N; Watts, D C

    2012-12-01

    To determine by nanoindentation the hardness and elastic modulus of resin-composites, including a series with systematically varied filler loading, plus other representative materials that fall into the categories of flowable, bulk-fill and conventional nano-hybrid types. Ten dental resin-composites: three flowable, three bulk-fill and four conventional were investigated using nanoindentation. Disc specimens (15mm×2mm) were prepared from each material using a metallic mold. Specimens were irradiated in the mold at top and bottom surfaces in multiple overlapping points (40s each) with light curing unit at 650mW/cm(2). Specimens were then mounted in 3cm diameter phenolic ring forms and embedded in a self-curing polystyrene resin. After grinding and polishing, specimens were stored in distilled water at 37°C for 7 days. Specimens were investigated using an Agilent Technologies XP nanoindenter equipped with a Berkovich diamond tip (100nm radius). Each specimen was loaded at one loading rate and three different unloading rates (at room temperature) with thirty indentations, per unloading rate. The maximum load applied by the nanoindenter to examine the specimens was 10mN. Dependent on the type of the resin-composite material, the mean values ranged from 0.73GPa to 1.60GPa for nanohardness and from 14.44GPa to 24.07GPa for elastic modulus. There was a significant positive non-linear correlation between elastic modulus and nanohardness (r(2)=0.88). Nonlinear regression revealed a significant positive correlation (r(2)=0.62) between elastic moduli and filler loading and a non-significant correlation (r(2)=0.50) between nanohardness and filler loading of the studied materials. Varying the unloading rates showed no consistent effect on the elastic modulus and nanohardness of the studied materials. For a specific resin matrix, both elastic moduli and nanohardness correlated positively with filler loading. For the resin-composites investigated, the group-average elastic

  20. Study on the pyrolysis of phenol-formaldehyde (PF) resin and modified PF resin

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Jigang, E-mail: wangjigang@seu.edu.cn [Jiangsu Key Laboratory of Advanced Metallic Materials, School of Materials Science and Engineering, Southeast University, Nanjing 211189 (China); Jiang, Haiyun [Jiangsu Key Laboratory of Advanced Metallic Materials, School of Materials Science and Engineering, Southeast University, Nanjing 211189 (China); School of Materials Science and Engineering, Southeast University, Nanjing Institute of Technology, Nanjing 210013 (China); Jiang, Nan [Institute of Theoretical and Computational Chemistry, Nanjing University, Nanjing 210093 (China)

    2009-12-10

    The pyrolysis of pure phenol-formaldehyde (PF) resin and boron carbide (B{sub 4}C) modified PF resin was investigated by using thermogravimetry (TG) and pyrolysis gas-chromatography-mass-spectrometry (PY-GC/MS). Scanning electron microscope (SEM) and Fourier transform infrared (FT-IR) spectroscopy were also employed to investigate the micro-structural evolution. It was shown from the TG analysis that the char residues of pure PF resin were 62.9 and 60.5% after being pyrolyzed at 700 and 1000 {sup o}C, respectively. The degradation and failure of the resin matrix were mainly resulted from the release of volatiles. The phenol and its methyl derivates took a large proportion in the amount of volatiles. In comparison with the pure PF resin, the char residues of B{sub 4}C modified PF resin were obviously higher, with the values of 71.9 and 68.4% at 700 and 1000 {sup o}C, respectively. Due to the oxidation-reduction reactions between B{sub 4}C additive and oxygen-containing volatiles including CO and H{sub 2}O, partial carbon and oxygen elements in the volatiles remained in the resin matrix in the forms of amorphous carbon and B{sub 2}O{sub 3}, respectively. The results of SEM and FT-IR characterization demonstrated the occurrence of the modification, and the amorphous carbon existed in the form of reticular substance. In addition, the amount of the released phenol and its methyl derivates was also decreased drastically due to the formation of borate.