WorldWideScience

Sample records for resin intrusion environment

  1. Environment-Sensitive Intrusion Detection

    National Research Council Canada - National Science Library

    Giffin, Jonathan T; Dagon, David; Jha, Somesh; Lee, Wenke; Miller, Barton P

    2006-01-01

    .... We improve the effectiveness of such model-based intrusion detection systems by incorporating into the model knowledge of the environment in which the program runs, and by increasing the accuracy...

  2. Resin intrusion into the primary circuit of NPP Jaslovske Bohunice V-1

    International Nuclear Information System (INIS)

    Grezdo, O.; Mraz, V.

    2005-01-01

    During the refueling at the first unit of Bohunice NPP in 2005 a lot of sediment was found on the upper storage rack. This sediment was identification as a filter resin. Resin was found in most of the fuel assemblies, pipes and tanks of the primary circuit and his auxiliary systems. Resin producer and WANO network was contacted in order to get information about similar events. Management of Bohunice NPP made a decision that primary circuit, fuel assemblies and auxiliary systems have to be cleaned. Subsequent cleaning extended outage by 31 days. This paper summarizes causes, existing consequences and corrective actions. Accent was put on the hydraulic characteristics of the primary circuit measurement, power distribution core monitoring and the primary circuit water quality verification (Authors)

  3. An Analysis of Security System for Intrusion in Smartphone Environment

    Directory of Open Access Journals (Sweden)

    Maya Louk

    2014-01-01

    Full Text Available There are many malware applications in Smartphone. Smartphone’s users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a MDTN process is possible and will be enabled for Smartphone environment. (b The methods are shown to be an advanced security for private sensitive data of the Smartphone user.

  4. A Dynamic Intrusion Detection System Based on Multivariate Hotelling's T2 Statistics Approach for Network Environments.

    Science.gov (United States)

    Sivasamy, Aneetha Avalappampatty; Sundan, Bose

    2015-01-01

    The ever expanding communication requirements in today's world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. Providing effective security protocols for any network environment, therefore, assumes paramount importance. Attempts are made continuously for designing more efficient and dynamic network intrusion detection models. In this work, an approach based on Hotelling's T(2) method, a multivariate statistical analysis technique, has been employed for intrusion detection, especially in network environments. Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling's T(2) statistical model and necessary profiles have been generated based on the T-square distance metrics. With a threshold range obtained using the central limit theorem, observed traffic profiles have been classified either as normal or attack types. Performance of the model, as evaluated through validation and testing using KDD Cup'99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better.

  5. Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment

    Directory of Open Access Journals (Sweden)

    Kai Peng

    2018-01-01

    Full Text Available Fog computing, as the supplement of cloud computing, can provide low-latency services between mobile users and the cloud. However, fog devices may encounter security challenges as a result of the fog nodes being close to the end users and having limited computing ability. Traditional network attacks may destroy the system of fog nodes. Intrusion detection system (IDS is a proactive security protection technology and can be used in the fog environment. Although IDS in tradition network has been well investigated, unfortunately directly using them in the fog environment may be inappropriate. Fog nodes produce massive amounts of data at all times, and, thus, enabling an IDS system over big data in the fog environment is of paramount importance. In this study, we propose an IDS system based on decision tree. Firstly, we propose a preprocessing algorithm to digitize the strings in the given dataset and then normalize the whole data, to ensure the quality of the input data so as to improve the efficiency of detection. Secondly, we use decision tree method for our IDS system, and then we compare this method with Naïve Bayesian method as well as KNN method. Both the 10% dataset and the full dataset are tested. Our proposed method not only completely detects four kinds of attacks but also enables the detection of twenty-two kinds of attacks. The experimental results show that our IDS system is effective and precise. Above all, our IDS system can be used in fog computing environment over big data.

  6. Proposed Network Intrusion Detection System ‎In Cloud Environment Based on Back ‎Propagation Neural Network

    Directory of Open Access Journals (Sweden)

    Shawq Malik Mehibs

    2017-12-01

    Full Text Available Cloud computing is distributed architecture, providing computing facilities and storage resource as a service over the internet. This low-cost service fulfills the basic requirements of users. Because of the open nature and services introduced by cloud computing intruders impersonate legitimate users and misuse cloud resource and services. To detect intruders and suspicious activities in and around the cloud computing environment, intrusion detection system used to discover the illegitimate users and suspicious action by monitors different user activities on the network .this work proposed based back propagation artificial neural network to construct t network intrusion detection in the cloud environment. The proposed module evaluated with kdd99 dataset the experimental results shows promising approach to detect attack with high detection rate and low false alarm rate

  7. A Dynamic Intrusion Detection System Based on Multivariate Hotelling’s T2 Statistics Approach for Network Environments

    Directory of Open Access Journals (Sweden)

    Aneetha Avalappampatty Sivasamy

    2015-01-01

    Full Text Available The ever expanding communication requirements in today’s world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. Providing effective security protocols for any network environment, therefore, assumes paramount importance. Attempts are made continuously for designing more efficient and dynamic network intrusion detection models. In this work, an approach based on Hotelling’s T2 method, a multivariate statistical analysis technique, has been employed for intrusion detection, especially in network environments. Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling’s T2 statistical model and necessary profiles have been generated based on the T-square distance metrics. With a threshold range obtained using the central limit theorem, observed traffic profiles have been classified either as normal or attack types. Performance of the model, as evaluated through validation and testing using KDD Cup’99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better.

  8. The Effect of Storage Environment on Dimensional Changes of Acrylic Resin Post Patterns

    Directory of Open Access Journals (Sweden)

    Abbas Fallahtafti

    2018-03-01

    Full Text Available Introduction: The purpose of this study was to compare dimensional changes of two types of auto polymerizing acrylic resin patterns (APARPs in three different storing environments. Methods: 60 acrylic post and core patterns were made of two types of Duralay acrylic resins (Aria dent, Iran and Reliance, Dental Mfg. Co, USA using a canine model. Then coronal, apical diameter and coronoapical length of patterns were measured. Afterwards, they were divided into two categories of 30 for each type of Duralay acrylic resin type. Each category was divided into three groups of ten randomly to immerse in three storage environments (Deconex®53plus Borer ChemieAG, Switzerland, Unident ® Impre(USF Healthcare S.A, Sweitzerland and water. After one hour, three mentioned values were measured again. Data were analyzed by SPSS20 using t-test, paired t-test and ANOVA. Results: Results showed that there were no statistically difference (p value> 0.05 about all dimensions of auto polymerizing acrylic post and core patterns except apical diameter and coronoapical length of Dental Mfg. Co, USA in Deconex®53 plus. Conclusion: The best environment to store Duralay APARPs with minimal changes was water and for disinfection, Deconex®53plus and Unident ® Imprecan showed acceptable properties with both of Duralay types.

  9. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  10. Review of the intrusive, structural and metamorphic history of the Namaqualand geotraverse and environs

    International Nuclear Information System (INIS)

    Blignault, H.J.; Van Aswegen, G.; Van der Merwe, S.W.

    1981-01-01

    The Namaqualand excursion is concerned with the geologic strata, stratigraphy and metamorhic history of the Namaqualand geotraverse and its environs. The general aim of the project was to decipher the history and interactions of tectonic, metamorphic and magmatic processes. Isotope dating were used to determine the ages of various rock formations

  11. Non-intrusive activity assessment of a vulnerable individual for real living environments

    International Nuclear Information System (INIS)

    Xu, Shaoqiu; Jones, Gordon R

    2008-01-01

    A system for addressing the scale of activity and detecting periods of immobility of a vulnerable individual is described. The system does not invade the privacy of the individual, is robust to ambient changes and is economic in terms of cost and the amount of data captured. The system is based upon the cross-correlation of changes in the chromatic signatures of a limited number of locations in an environment with the outputs from a triggerable infrared sensor. Results are presented to indicate the system performance

  12. Vapor Intrusion

    Science.gov (United States)

    Vapor intrusion occurs when there is a migration of volatile chemicals from contaminated groundwater or soil into an overlying building. Volatile chemicals can emit vapors that may migrate through subsurface soils and into indoor air spaces.

  13. Influence of salivary enzymes and alkaline pH environment on fatigue behavior of resin composites

    NARCIS (Netherlands)

    Mirmohammadi, H.; Kleverlaan, C.J.; Aboushelib, M.N.; Feilzer, A.J.

    2011-01-01

    Purpose: To evaluate the effect of enzymatic activity and alkaline medium on flexural strength and rotary fatigue resistance of direct and indirect resin composite restorative materials. Methods: Three direct resin composite materials Filtek Z100, Filtek Z250 and Filtek Silorane (3M ESPE), and two

  14. Quantification of Potential Arsenic Bioavailability Using Chelating Resins in Spatially Varying Geologic Environments at the Watershed Scale

    Science.gov (United States)

    Lake, G.; Herbert, B. E.; Louchouarn, P.

    2002-12-01

    Elevated concentrations of arsenic and other uranium-associated elements have been observed in surface and ground waters of the Nueces and San Antonio River watersheds, Texas. These watersheds drain the Catahoula formation which is enriched in trace elements including As, V, and U, through natural geochemical weathering over geologic time scales and intensive U mining from the 1960's to the 1980's. Mining activities have potentially impacted groundwater quality through infiltration and lateral migration of mineral-rich plumes generated by rainfall infiltration and leaching of ore bodies and spoil piles, recharge from contaminated rivers and streams, and infiltration from mine pits. The objective of this project is to quantify the potential availability of arsenic in different geologic environments at the watershed scale using chelating resins as infinite sinks. Such information has been identified as a critical need for protecting the agricultural and aquacultural resources, and the ecological quality of the Nueces Estuary system, a designated Estuary of National Significance by the U.S. Congress via the Water Quality Act of 1987. Iron-loaded resin (Dowex M4195) was exposed to spiked and equilibrated soil samples (pond sediment, river sediment, and ephemeral stream sediment) over a ninety day time period. Once removed, the resin was subjected to a 2 M NH4OH stripping procedure where the effluent was analyzed using Graphite Furnace Atomic Adsorption Spectrometry to quantify total As (average 73%\\ sorption ability and 50%\\ recovery). Additionally, the iron resins were subjected to competition studies between arsenate and phosphate and arsenate and vanadate. Preliminary results show there is little change in sorption ability as a result of the presence of the competing ion. The use of refrigeration as a means of storage showed no decreasing effect on stripping recovery of these resins over a 28 days period. Simultaneously the laboratory technique was applied to

  15. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  16. Fracture Toughness Evaluation of Hybrid and Nano-hybrid Resin Composites after Ageing under Acidic Environment

    Directory of Open Access Journals (Sweden)

    Ferooz M

    2015-03-01

    Full Text Available Statement of Problem: Tooth-coloured restorative materials are brittle with the major shortcomings of sensitivity to flaws and defects. Although various mechanical properties of resin composites have been studied, no fracture toughness test data for nano-hybrid composites under acidic condition for a long period of time has been published. Objectives: To compare the fracture toughness (KIc of two types of resin composites under tensile loading and to assess the effect of distilled water and lactic acid on the resistance of the restoratives to fracture after three months of immersion. Materials and Methods: Four resin composites were used: three nanohybrids [EsteliteSigma Quick (Kuraray, Luna (SDI, Paradigm (3M/ESPE] and one hybrid, Rok (SDI. The specimens were prepared using a custom-made polytetrafluorethylene split mould, stored in distilled water (pH 6.8 or 0.01mol/L lactic acid (pH 4 and conditioned at 37°C for 24 hours, 1 or 3 months. They were loaded under tensile stress using a universal testing machine; the maximum load (N to the specimen failure was recorded and the fracture toughness (KIc was calculated. Data were analysed by ANOVA and Tukey’s test using SPSS, version 18. Results: The results of two-way ANOVA did not show a significant combined effect of material, time, and storage medium on fracture toughness (p= 0.056. However, there was a strong interaction between materials and time (p=0.001 when the storage medium were ignored. After 24 h of immersion in distilled water, Paradigm revealed the highest KIc values followed by Rok, Luna and Estelite. Immersion in either distilled water or lactic acid significantly decreased the fracture toughness of almost all materials as time interval increased. Conclusions: Paradigm showed the highest fracture toughness followed by Rok, Luna and Estelite respectively. As time increased, KIc significantly decreased for almost all resin composites except for Luna which showed a slight decrease

  17. Nuclear characteristics of epoxy resin as a space environment neutron shielding

    Energy Technology Data Exchange (ETDEWEB)

    Adeli, Ruhollah [Nuclear Science and Technology Research Institute, Yazd (Iran, Islamic Republic of). Central Iran Research Complex; Shirmardi, Seyed Pezhman [Nuclear Science and Technology Research Institute, Tehran (Iran, Islamic Republic of). Radiation Application Research School; Mazinani, Saideh [Amirkabir Nanotechnology Research Institute, Tehran (Iran, Islamic Republic of); Ahmadi, Seyed Javad [Nuclear Science and Technology Research Institute, Tehran (Iran, Islamic Republic of). Nuclear Fuel Cycle Research School

    2017-03-15

    In recent years many investigations have been done for choosing applicable light neutron shielding in space environmental applications. In this study, we have considered the neutron radiation-protective characteristics of neat epoxy resin, a thermoplastic polymer material and have compared it with various candidate materials in neutron radiation protection such as Al 6061 alloy and Polyethylene. The aim of this investigation is the effect of type of moderator for fast neutron, notwithstanding neutron absorbers fillers. The nuclear interactions and the effective dose at shields have been studied with the Monte Carlo N-Particle transport code (MCNP), using variance reductions to reduce the relative error. Among the candidates, polymer matrix showed a better performance in attenuating fast neutrons and caused a lower neutron and secondary photon effective dose.

  18. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  19. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  20. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  1. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  2. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  3. Discovering candidate genes that regulate resin canal number in Pinus taeda stems by integrating genetic analysis across environments, ages, and populations

    Energy Technology Data Exchange (ETDEWEB)

    Westbrook, JW; Walker, AR; Neves, LG; Munoz, P; Resende, MFR; Neale, DB; Wegrzyn, JL; Huber, DA; Kirst, M; Davis, JM; Peter, GF

    2014-09-30

    Genetically improving constitutive resin canal development in Pinus stems may enhance the capacity to synthesize terpenes for bark beetle resistance, chemical feedstocks, and biofuels. To discover genes that potentially regulate axial resin canal number (RCN), single nucleotide polymorphisms (SNPs) in 4027 genes were tested for association with RCN in two growth rings and three environments in a complex pedigree of 520 Pinus taeda individuals (CCLONES). The map locations of associated genes were compared with RCN quantitative trait loci (QTLs) in a (P.taedaxPinuselliottii)xP.elliottii pseudo-backcross of 345 full-sibs (BC1). Resin canal number was heritable (h(2)0.12-0.21) and positively genetically correlated with xylem growth (r(g)0.32-0.72) and oleoresin flow (r(g)0.15-0.51). Sixteen well-supported candidate regulators of RCN were discovered in CCLONES, including genes associated across sites and ages, unidirectionally associated with oleoresin flow and xylem growth, and mapped to RCN QTLs in BC1. Breeding is predicted to increase RCN 11% in one generation and could be accelerated with genomic selection at accuracies of 0.45-0.52 across environments. There is significant genetic variation for RCN in loblolly pine, which can be exploited in breeding for elevated terpene content.

  4. Discovering candidate genes that regulate resin canal number in Pinus taeda stems by integrating genetic analysis across environments, ages, and populations.

    Science.gov (United States)

    Westbrook, Jared W; Walker, Alejandro R; Neves, Leandro G; Munoz, Patricio; Resende, Marcio F R; Neale, David B; Wegrzyn, Jill L; Huber, Dudley A; Kirst, Matias; Davis, John M; Peter, Gary F

    2015-01-01

    Genetically improving constitutive resin canal development in Pinus stems may enhance the capacity to synthesize terpenes for bark beetle resistance, chemical feedstocks, and biofuels. To discover genes that potentially regulate axial resin canal number (RCN), single nucleotide polymorphisms (SNPs) in 4027 genes were tested for association with RCN in two growth rings and three environments in a complex pedigree of 520 Pinus taeda individuals (CCLONES). The map locations of associated genes were compared with RCN quantitative trait loci (QTLs) in a (P. taeda × Pinus elliottii) × P. elliottii pseudo-backcross of 345 full-sibs (BC1). Resin canal number was heritable (h(2) ˜ 0.12-0.21) and positively genetically correlated with xylem growth (rg ˜ 0.32-0.72) and oleoresin flow (rg ˜ 0.15-0.51). Sixteen well-supported candidate regulators of RCN were discovered in CCLONES, including genes associated across sites and ages, unidirectionally associated with oleoresin flow and xylem growth, and mapped to RCN QTLs in BC1. Breeding is predicted to increase RCN 11% in one generation and could be accelerated with genomic selection at accuracies of 0.45-0.52 across environments. There is significant genetic variation for RCN in loblolly pine, which can be exploited in breeding for elevated terpene content. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  5. Ghost Forest Rising: A Hyperspectral Approach to Assessing Vegetation Health and Tree Die-Off in Response to Saltwater Intrusion in a Coastal Environment

    Science.gov (United States)

    Lightning, L.; Jass, T. L.; McGirt, A.; Emanuel, R. E.

    2016-12-01

    In coastal areas, saltwater intrusion is a natural occurrence that can affect the quality of groundwater and surface water. Saltwater intrusion can also affect the health of vegetation that depends on fresh water. We studied the effects of saltwater on vegetation with particular focus on loblolly pine trees (Pinus taeda). Our study took place on the Albemarle-Pamlico Peninsula (APP), a 6,000 km2 region of North Carolina's Outer Coastal Plain surrounded on three sides by estuarine coastline. Years of local, anecdotal observations suggest that stands of dead pine trees known as "Ghost Forest," are spreading along coastal waterways. We investigated the health of pine trees in this region to explore potential links between saltwater intrusion and die-off, particularly where artificial ditches and canals allow saltwater to flow deep into the interior of the peninsula. Using a handheld spectroradiometer, we collected hyperspectral reflectance data in visible and near infrared wavebands (350-1000 nm) from more than 100 individual canopy and leaf samples across the APP. We accompanied these measurements with GPS coordinates, measurements of tree height and circumference, distances from nearby waterways, and specific conductance measurements (as a salinity proxy) of these waters. We used reflectance spectra to calculate the Normalized Difference Vegetation Index (NDVI), the Red-Green Index (RGI), and site-specific indices to determine the health of particular trees and canopies. Using this information in conjunction with ancillary data, we explored the correlations between the health of vegetation and the salinity of nearby water sources.

  6. Computer Intrusions and Attacks.

    Science.gov (United States)

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  7. Long-term degradation of resin-based cements in substances present in the oral environment: influence of activation mode

    Directory of Open Access Journals (Sweden)

    Eduardo Moreira da SILVA

    2013-06-01

    Full Text Available Indirect restorations in contact with free gingival margins or principally within the gingival sulcus, where the presence of organic acids produced by oral biofilm is higher, may present faster degradation of the resin-based cement pellicle. Objectives To investigate the degradation of four resin-based cements: Rely X ARC (R, Variolink II (V, Enforce (E and All Cem (A, after immersion in distilled water (DW, lactic acid (LA and artificial saliva (AS and to analyze the influence of the activation mode on this response. Material and Methods Two activation modes were evaluated: chemical (Ch and dual (D. In the dual activation, a two-millimeter thick ceramic disk (IPS Empress System was interposed between the specimen and light-curing unit tip. Specimens were desiccated, immersed in distilled water, artificial saliva and lactic acid 0.1 M at 37°C for 180 days, weighed daily for the first 7 days, and after 14, 21, 28, 90 and 180 days and were desiccated again. Sorption and solubility (µg/mm 3 were calculated based on ISO 4049. The data were submitted to multifactor analysis of variance (MANOVA and Tukey's HSD test for media comparisons (α=0.05. Results Sorption was higher after immersion in LA (pD (p<0.05. The lowest solubility was presented by R (p<0.05. Conclusions Lactic acid increased the degradation of resin-based cements. Moreover, the physical component of activation, i.e., light-activation, contributed to a low degradation of resin-based cements.

  8. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  9. Oceanic thermohaline intrusions: theory

    Science.gov (United States)

    Ruddick, Barry; Kerr, Oliver

    2003-03-01

    This is a review of theories governing growth and evolution of thermohaline intrusive motions. We discuss theories based on eddy coefficients and salt finger flux ratios and also on molecular Fickian diffusion, drawing relationships and parallels where possible. We discuss linear theories of various physical configurations, effects of rotation and shear, and nonlinear theories. A key requirement for such theories to become quantitatively correct is the development and field testing of relationships between double-diffusive fluxes and average vertical gradients of temperature and salinity. While we have some ideas about the functional dependencies and rough observational constraints on the magnitudes of such flux/gradient relationships, many questions will not be answered until usable ‘flux laws’ exist. Furthermore, numerical experiments on double-diffusive intrusions are currently feasible, but will have more quantitative meaning when fluxes are parameterised with such laws. We conclude that more work needs to be done in at least two areas. Firstly, tests of linear theory against observations should continue, particularly to discover the extent to which linear theories actually explain the genesis of intrusions. Secondly, theoretical studies are needed on the nonlinear effects that control the evolution and finite amplitude state of intrusions, since these determine the lateral fluxes of salt, heat, and momentum.

  10. Intrusion detection: systems and models

    Science.gov (United States)

    Sherif, J. S.; Dearmond, T. G.

    2002-01-01

    This paper puts forward a review of state of the art and state of the applicability of intrusion detection systems, and models. The paper also presents a classfication of literature pertaining to intrusion detection.

  11. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  12. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    protection in the United States. AFIT-ENG-13-M-49 NETWORK INTRUSION DATASET ASSESSMENT THESIS Presented to the Faculty Department of Electrical and...conclusions as to its use as a benchmark dataset vary: Cho et al. [10] recommend not using the KDD99 dataset at all, while Engen et al. [16] suggest that...more care be taken in interpretation of results, but recommend continued use. As discussed by Engen et al. [16], researchers continue to use the KDD99

  13. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  14. An automatically tuning intrusion detection system.

    Science.gov (United States)

    Yu, Zhenwei; Tsai, Jeffrey J P; Weigert, Thomas

    2007-04-01

    An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been deployed for intrusion detection. An IDS is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. In this paper, an automatically tuning IDS (ATIDS) is presented. The proposed system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered. The system is evaluated using the KDDCup'99 intrusion detection dataset. Experimental results show that the system achieves up to 35% improvement in terms of misclassification cost when compared with a system lacking the tuning feature. If only 10% false predictions are used to tune the model, the system still achieves about 30% improvement. Moreover, when tuning is not delayed too long, the system can achieve about 20% improvement, with only 1.3% of the false predictions used to tune the model. The results of the experiments show that a practical system can be built based on ATIDS: system operators can focus on verification of predictions with low confidence, as only those predictions determined to be false will be used to tune the detection model.

  15. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  16. Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning

    Directory of Open Access Journals (Sweden)

    Indah Yulia Prafitaning Tiyas

    2014-06-01

    Full Text Available Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system. We need a reliable network security system that is resistant to a variety of attacks against the system. Therefore, Intrusion Detection System (IDS required to overcome the problems of intrusions. Many researches have been done on intrusion detection using classification methods. Classification methodshave high precision, but it takes efforts to determine an appropriate classification model to the classification problem. In this paper, we propose a new reinforced approach to detect intrusion with On-line Clustering using Reinforcement Learning. Reinforcement Learning is a new paradigm in machine learning which involves interaction with the environment.It works with reward and punishment mechanism to achieve solution. We apply the Reinforcement Learning to the intrusion detection problem with considering competitive learning using Pursuit Reinforcement Competitive Learning (PRCL. Based on the experimental result, PRCL can detect intrusions in real time with high accuracy (99.816% for DoS, 95.015% for Probe, 94.731% for R2L and 99.373% for U2R and high speed (44 ms.The proposed approach can help network administrators to detect intrusion, so the computer network security systembecome reliable. Keywords: Intrusion Detection System, On-Line Clustering, Reinforcement Learning, Unsupervised Learning.

  17. Plastic casting resin poisoning

    Science.gov (United States)

    Epoxy poisoning; Resin poisoning ... Epoxy and resin can be poisonous if they are swallowed or their fumes are breathed in. ... Plastic casting resins are found in various plastic casting resin products.

  18. Resin composites

    DEFF Research Database (Denmark)

    Benetti, Ana Raquel; Peutzfeldt, Anne; Lussi, Adrian

    2014-01-01

    OBJECTIVE: To investigate how the modulus of elasticity of resin composites influences marginal quality in restorations submitted to thermocyclic and mechanical loading. METHODS: Charisma, Filtek Supreme XTE and Grandio were selected as they were found to possess different moduli of elasticity...... of resin composite (p=0.81) on the quality of dentine margins was observed, before or after loading. Deterioration of all margins was evident after loading (p....008). CONCLUSIONS: The resin composite with the highest modulus of elasticity resulted in the highest number of gap-free enamel margins but with an increased incidence of paramarginal enamel fractures. CLINICAL SIGNIFICANCE: The results from this study suggest that the marginal quality of restorations can...

  19. Wireless Intrusion Detection

    Science.gov (United States)

    2007-03-01

    LEO with Belkin/ Libra spoofing N or m al iz ed O cc ur re nc es Frequency Error (kHz) Figure 3-8 Frequency error Distributions...0.40 0.45 Linksys/CIAMPIAJ1 Linksys/LEO with Belkin/ Libra spoofing N or m al iz ed O cc ur re nc es Received Power (dBm) Figure 3-10...Belkin/ Libra spoofing N or m al iz ed O cc ur re nc es Rise-Time (samples) Figure 3-12 Packet Rise-Time Distributions During Intrusion

  20. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  1. Long-Term Durability of Basalt Fiber-Reinforced Polymer (BFRP Sheets and the Epoxy Resin Matrix under a Wet–Dry Cyclic Condition in a Chloride-Containing Environment

    Directory of Open Access Journals (Sweden)

    Zhongyu Lu

    2017-11-01

    Full Text Available Basalt fiber-reinforced polymer (BFRP composites are receiving increasing attention as they represent a low-cost green source of raw materials. FRP composites have to face harsh environments, such as chloride ions in coastal marine environments or cold regions with salt deicing. The resistance of FRPs subjected to the above environments is critical for the safe design and application of BFRP composites. In the present paper, the long-term durability of BFRP sheets and the epoxy resin matrix in a wet–dry cyclic environment containing chloride ions was studied. The specimens of the BFRP sheet and epoxy resin matrix were exposed to alternative conditions of 8-h immersion in 3.5% NaCl solution at 40 °C and 16-h drying at 25 °C and 60% relative humidity (RH. The specimens were removed from the exposure chamber at the end of the 180th, 270th and 360th cycles of exposure and were analyzed for degradation with tensile tests, scanning electron microscopy (SEM and void volume fractions. It was found that the tensile modulus of the BFRP sheet increased by 3.4%, and the tensile strength and ultimate strain decreased by 45% and 65%, respectively, after the 360th cycle of exposure. For the epoxy resin matrix, the tensile strength, tensile modulus and ultimate strain decreased by 27.8%, 3.2% and 64.8% after the 360th cycle of exposure, respectively. The results indicated that the degradation of the BFRP sheet was dominated by the damage of the interface between the basalt fiber and epoxy resin matrix. In addition, salt precipitate accelerated the fiber–matrix interfacial debonding, and hydrolysis of the epoxy resin matrix resulted in many voids, which accelerated the degradation of the BFRP sheet.

  2. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non......-intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results...

  3. 40 CFR 414.50 - Applicability; description of the thermosetting resins subcategory.

    Science.gov (United States)

    2010-07-01

    ... listed below. Product groups are indicated with an asterisk (*). *Alkyd Resins Dicyanodiamide Resin... thermosetting resins subcategory. 414.50 Section 414.50 Protection of Environment ENVIRONMENTAL PROTECTION... Thermosetting Resins § 414.50 Applicability; description of the thermosetting resins subcategory. The provisions...

  4. Motion effects on intrusion development

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Holmes, E.A.; Becker, E.S.

    2010-01-01

    Analogue studies on intrusion development have found that visuospatial tasks performed during the encoding of aversive information reduce subsequent intrusion development. However, these studies cannot rule out a physical explanation in terms of simple movement. In the current study we addressed

  5. Passive intrusion detection system

    Science.gov (United States)

    Laue, E. G. (Inventor)

    1980-01-01

    An intrusion detection system is described in which crystal oscillators are used to provide a frequency which varies as a function of fluctuations of a particular environmental property of the atmosphere, e.g., humidity, in the protected volume. The system is based on the discovery that the frequency of an oscillator whose crystal is humidity sensitive, varies at a frequency or rate which is within a known frequency band, due to the entry of an intruder into the protected volume. The variable frequency is converted into a voltage which is then filtered by a filtering arrangement which permits only voltage variations at frequencies within the known frequency band to activate an alarm, while inhibiting the alarm activation when the voltage frequency is below or above the known frequency band.

  6. Review: Resin Composite Filling

    OpenAIRE

    Desmond Ng; Jimmy C. M. Hsiao; Keith C. T. Tong; Harry Kim; Yanjie Mai; Keith H. S. Chan

    2010-01-01

    The leading cause of oral pain and tooth loss is from caries and their treatment include restoration using amalgam, resin, porcelain and gold, endodontic therapy and extraction. Resin composite restorations have grown popular over the last half a century because it can take shades more similar to enamel. Here, we discuss the history and use of resin, comparison between amalgam and resin, clinical procedures involved and finishing and polishing techniques for resin restoration. Although resin ...

  7. Noble gas systematics of the Skaergaard intrusion

    Science.gov (United States)

    Horton, F.; Farley, K. A.; Taylor, H. P.

    2017-12-01

    The noble gas isotopic compositions of olivines from the Skaergaard layered mafic intrusion in Greenland reveal that magmas readily exchange noble gases with their environment after emplacement. Although Skaergaard magmas are thought to have derived from the upper mantle, all of the olivine separates we analyzed have 3He/4He ratios less than that of the upper mantle ( 8 Ra, where Ra = 3He/4He of the atmosphere, 1.39 x 10-6). This suggests that crustal and/or atmospheric noble gases have contaminated all Skaergaard magmas to some extent. We obtained the highest 3He/4He ratios ( 2 Ra) from olivines found in the lowermost exposed layers of the intrusion away from the margins. Excess radiogenic 4He (indicated by Raatmospheric isotopic compositions, but higher relative helium abundances than the atmosphere. We suggest that post-crystallization hydrothermal circulation introduced atmosphere-derived noble gases into uppermost layers of the intrusion. Such high temperature exchanges of volatiles between plutons and their immediate surroundings may help explain why so few mantle-derived rocks retain mantle-like noble gas signatures.

  8. Work zone intrusion alarm effectiveness.

    Science.gov (United States)

    2010-09-01

    16. Abstract : The New Jersey Department of Transportation (NJDOT) commissioned a study to evaluate how : effective a work zone safety device known as the SonoBlaster! Work Zone Intrusion Alarm would be : in protecting maintenance workers fro...

  9. Resin Characterization

    Science.gov (United States)

    2015-06-01

    to see plastic deformation of the surface. 8.1.4.3 Density: Density using the Archimedes principle (ASTM D 792). 8.1.4.4 Density as a Function of...the cure and postcure, quickly cool the sample to 0 °C or lower the temperature to quench the reaction, and then ramp the temperature at 5 °C/min to...prepared by pouring 10 g of resin into a 30-mL screw-cap scintillation vial and adding appropriate amounts of initiator, catalyst, and inhibitor

  10. Persistent organic pollutants monitoring in marine coastal environment using beached plastic resin pellets and effective risk communication via International Pellet Watch (IPW) as a tool.

    Science.gov (United States)

    Yeo, B. G. M.; Takada, H.; Hosoda, J.

    2014-12-01

    International Pellet Watch (IPW) is an ongoing global monitoring of persistent organic pollutants (POPs) using preproduction plastic resin pellets. These pellets are easily collected and transported allowing the general public worldwide to get involved. Thus, risk communication toward the pellet collectors is a significant part of IPW to ensure continuous effort and interest. The pellet samples were analyzed for polychlorinated biphenyl (PCBs), dichlorodiphenyltrichloroethane and degradation products (DDTs), and hexachlorocyclohexanes (HCHs). Additional pollutants such as polycyclic aromatic hydrocarbons (PAHs) and Hopanes were also analyzed for some samples. Analytical results showed distinct patterns with high concentrations (Pesticide DDTs instead were found to be higher in developing countries such as Brazil and Vietnam (> 500ng/g-pellet). These countries may still be using DDTs as a vector control mostly to combat malaria. High concentrations of DDTs were also found in Greece, China and Australia (> 100ng/g-pellet) suggesting the possibility of illegal usage as pesticide or anti fouling paint. HCHs concentrations were mostly low due to its low retention in the environment. However, high HCHs concentrations were mostly found in the southern hemisphere. Very high concentration of PAHs in pellet samples can be utilized for early identification of recent oil pollution. High PAHs concentration in Tauranga, New Zealand was found to be caused by local oil spill. Hopanes in pellets can be used for source identification of oil pollution. Global mapping and comparison among IPW data can be used to provide better explanations to IPW volunteers by sorting concentrations into pollution categories. Communication reports are tailor written based on the volunteers familiarity to IPW's issues, educational background, occupation and their potential to further spread awareness. Based on feedbacks, the volunteers were grateful to receive reports of their samples felt personally

  11. An immunological approach to intrusion detection

    OpenAIRE

    Watkins, A.

    2000-01-01

    This paper presents an examination of intrusion detection schemes. It discusses\\ud traditional views of intrusion detection, and examines the more novel, but perhaps more\\ud effective, approach to intrusion detection as modeled on the human immune system. The\\ud discussion looks at some of the implications raised by intrusion detection research for\\ud information security in general.

  12. 40 CFR Table 7 to Subpart Wwww of... - Options Allowing Use of the Same Resin Across Different Operations That Use the Same Resin Type

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 12 2010-07-01 2010-07-01 true Options Allowing Use of the Same Resin Across Different Operations That Use the Same Resin Type 7 Table 7 to Subpart WWWW of Part 63 Protection... Part 63—Options Allowing Use of the Same Resin Across Different Operations That Use the Same Resin Type...

  13. 40 CFR 721.5908 - Modified phenolic resin (generic).

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Modified phenolic resin (generic). 721... Substances § 721.5908 Modified phenolic resin (generic). (a) Chemical substance and significant new uses subject to reporting. (1) The chemical substance identified generically as modified phenolic resin (PMN P...

  14. 40 CFR 721.2673 - Aromatic epoxide resin (generic).

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Aromatic epoxide resin (generic). 721... Substances § 721.2673 Aromatic epoxide resin (generic). (a) Chemical substance and significant new uses subject to reporting. (1) The chemical substance identified generically as aromatic epoxide resin (PMN P...

  15. 40 CFR 721.9499 - Modified silicone resin.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Modified silicone resin. 721.9499... Substances § 721.9499 Modified silicone resin. (a) Chemical substance and significant new uses subject to reporting. (1) The chemical substance identified generically as a modified silicone resin (PMN P-96-1649) is...

  16. 40 CFR 721.4380 - Modified hydrocarbon resin.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Modified hydrocarbon resin. 721.4380... Substances § 721.4380 Modified hydrocarbon resin. (a) Chemical substance and significant new uses subject to reporting. (1) The chemical substance identified generically as a modified hydrocarbon resin (P-91-1418) is...

  17. 40 CFR 721.5905 - Modified phenolic resin (generic).

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Modified phenolic resin (generic). 721... Substances § 721.5905 Modified phenolic resin (generic). (a) Chemical substance and significant new uses subject to reporting. (1) The chemical substance identified generically as a modified phenolic resin (PMN...

  18. 40 CFR 721.5762 - Aromatic aldehyde phenolic resin (generic).

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Aromatic aldehyde phenolic resin... Specific Chemical Substances § 721.5762 Aromatic aldehyde phenolic resin (generic). (a) Chemical substance... aromatic aldehyde phenolic resin (PMN P-01-573) is subject to reporting under this section for the...

  19. 40 CFR 721.3135 - Phosphorous modified epoxy resin (generic).

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Phosphorous modified epoxy resin... Specific Chemical Substances § 721.3135 Phosphorous modified epoxy resin (generic). (a) Chemical substance... phosphorous modified epoxy resin (PMNs P-00-992 and P-01-471) is subject to reporting under this section for...

  20. 40 CFR 721.2752 - Epoxy resin containing phosphorus (generic).

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Epoxy resin containing phosphorus... Specific Chemical Substances § 721.2752 Epoxy resin containing phosphorus (generic). (a) Chemical substance... epoxy resin containing phosphorus (PMN P-00-912) is subject to reporting under this section for the...

  1. 40 CFR 721.2755 - Cycloaliphatic epoxy resin (generic).

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Cycloaliphatic epoxy resin (generic... Substances § 721.2755 Cycloaliphatic epoxy resin (generic). (a) Chemical substance and significant new uses subject to reporting. (1) The chemical substance identified generically as cycloaliphatic epoxy resin (PMN...

  2. Immobilization of spent resin with epoxy resin

    International Nuclear Information System (INIS)

    Gultom, O.; Suryanto; Sayogo; Ramdan

    1997-01-01

    immobilization of spent resin using epoxy resin has been conducted. The spent resin was mixtured with epoxy resin in variation of concentration, i.e., 30, 40, 50, 60, 70 weight percent of spent resin. The mixture were pour into the plastic tube, with a diameter of 40 mm and height of 40 mm. The density, compressive strength and leaching rate were respectively measured by quanta chrome, paul weber apparatus and gamma spectrometer. The results showed that the increasing of waste concentration would be decreased the compressive strength, and increased density by immobilized waste. The leaching rate of 137 Cs from waste product was not detected in experiment (author)

  3. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  4. An investigation of potential neural correlates of intrusive retrieval of distressing memories.

    Science.gov (United States)

    Battaglini, Eva; Liddell, Belinda J; Das, Pritha; Malhi, Gin S; Felmingham, Kim; Bryant, Richard A

    2018-03-01

    Despite the prevalence of intrusive memories across psychological disorders, little is known about the neural networks that underpin this form of memory. This study used functional magnetic resonance imaging (fMRI) to identify neural circuits associated with the retrieval of intrusive memories. Participants with moderate levels of anxiety (N = 30) underwent a cold pressor task to induce a physiological stress response, after which they viewed 10 neutral and 10 negative film clips. In a method designed to induce intrusive memories, participants then completed an fMRI scan in which they viewed short (2 s) depictions of neutral components from the original film clips. There were no significant differences in activations during intrusion and non-intrusion responses. Exploratory analyses comparing intrusive responses to neutral stimuli found the insula, inferior frontal gyrus, precuneus, right cerebellum and bilateral supplementary motor area were uniquely activated during experience of intrusions (compared to the neutral cue baseline), whereas no significant activations were in response to negative scenes that did not trigger intrusions. This study did not compare the different neural processes implicated in intrusive and intentional emotional memories. The limited intrusions that could be elicited in the scanning environment restricted the number of trials that could be employed. Although no differences in neural activations were observed between intrusive and non-intrusive responses, the observation of precuneus involvement is consistent with models that propose that intrusive memories are impacted by the extent to which there is contextual integration of the relevant memories. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. 40 CFR 63.5728 - What standards must I meet for closed molding resin operations?

    Science.gov (United States)

    2010-07-01

    ... molding resin operations? 63.5728 Section 63.5728 Protection of Environment ENVIRONMENTAL PROTECTION... Standards for Closed Molding Resin Operations § 63.5728 What standards must I meet for closed molding resin operations? (a) If a resin application operation meets the definition of closed molding specified in § 63...

  6. Intrusion of beach-disposed dredger spoil into the Mhlathuze ...

    African Journals Online (AJOL)

    Sediment intrusion and its impact on the beds of the seagrass Zostera capensis in the estuary were monitored from 1996 to 1999. Fine sediment did enter the estuary from the marine environment and was deposited mainly in its lower reaches, where its settling on the leaves of Zostera resulted in a major die-back. However ...

  7. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  8. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    present technique. The present technique may be useful for monitoring refractive indices of active chemical solutions which was not possible with intrusive-type FO sensors. 2. Sensor principle. For a circular beam of light with cross-sectional area A, incident at an angle θi on the surface of a second medium, the power ...

  9. Non-Intrusive Appliance Recognition

    NARCIS (Netherlands)

    Hoogsteen, G; Hoogsteen, Gerwin; Krist, J.O.; Bakker, Vincent; Smit, Gerardus Johannes Maria

    2012-01-01

    Energy conservation becomes more important nowadays. The use of smart meters and, in the near future, smart appliances, are the key to achieve reduction in energy consumption. This research proposes a non-intrusive appliance monitor and recognition system for implementation on an embedded system.

  10. Occurrence of seawater intrusion overshoot

    NARCIS (Netherlands)

    Morgan, L.K.; Bakker, M.; Werner, A.D.

    2015-01-01

    A number of numerical modeling studies of transient sea level rise (SLR) and seawater intrusion (SI) in flux-controlled aquifer systems have reported an overshoot phenomenon, whereby the freshwater-saltwater interface temporarily extends further inland than the eventual steady state position.

  11. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor is demonstrated in this communication. The working principle of the sensor is based on intensity modulation of the back-reflected light when output light from an optical fibre end focusses onto air–medium interface. The change in the refractive index ...

  12. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  13. Computer Network Equipment for Intrusion Detection Research

    National Research Council Canada - National Science Library

    Ye, Nong

    2000-01-01

    .... To test the process model, the system-level intrusion detection techniques and the working prototype of the intrusion detection system, a set of computer and network equipment has been purchased...

  14. Disinfection of denture base acrylic resin.

    Science.gov (United States)

    Lin, J J; Cameron, S M; Runyan, D A; Craft, D W

    1999-02-01

    During repair or adjustments of acrylic resin removable complete and partial dentures, particles of the acrylic resin from the interior of the prosthesis may expose dental personnel to microbial health hazards if the prosthesis has not been thoroughly disinfected. This study investigates the efficacy of a commercially prepared microbial disinfectant (Alcide) on the external and internal surfaces of acrylic resins. Four groups of acrylic resin were incubated in an experimental model to simulate the oral environment over time. Specimens were treated in 2 groups, disinfected and not disinfected, and then further grouped by breaking and not breaking. Analysis was performed with microbial colony counts, SEM, and statistical analyses. Viable microorganisms still remain on the internal and external surfaces of treated resins. Chlorine dioxide reduces, but does not eliminate, viable microorganisms on these dental prostheses.

  15. Review: Resin Composite Filling

    Directory of Open Access Journals (Sweden)

    Desmond Ng

    2010-02-01

    Full Text Available The leading cause of oral pain and tooth loss is from caries and their treatment include restoration using amalgam, resin, porcelain and gold, endodontic therapy and extraction. Resin composite restorations have grown popular over the last half a century because it can take shades more similar to enamel. Here, we discuss the history and use of resin, comparison between amalgam and resin, clinical procedures involved and finishing and polishing techniques for resin restoration. Although resin composite has aesthetic advantages over amalgam, one of the major disadvantage include polymerization shrinkage and future research is needed on reaction kinetics and viscoelastic behaviour to minimize shrinkage stress.

  16. Review: Resin Composite Filling

    Science.gov (United States)

    Chan, Keith H. S.; Mai, Yanjie; Kim, Harry; Tong, Keith C. T.; Ng, Desmond; Hsiao, Jimmy C. M.

    2010-01-01

    The leading cause of oral pain and tooth loss is from caries and their treatment include restoration using amalgam, resin, porcelain and gold, endodontic therapy and extraction. Resin composite restorations have grown popular over the last half a century because it can take shades more similar to enamel. Here, we discuss the history and use of resin, comparison between amalgam and resin, clinical procedures involved and finishing and polishing techniques for resin restoration. Although resin composite has aesthetic advantages over amalgam, one of the major disadvantage include polymerization shrinkage and future research is needed on reaction kinetics and viscoelastic behaviour to minimize shrinkage stress.

  17. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  18. Recent advances in vapor intrusion site investigations.

    Science.gov (United States)

    McHugh, Thomas; Loll, Per; Eklund, Bart

    2017-12-15

    Our understanding of vapor intrusion has evolved rapidly since the discovery of the first high profile vapor intrusion sites in the late 1990s and early 2000s. Research efforts and field investigations have improved our understanding of vapor intrusion processes including the role of preferential pathways and natural barriers to vapor intrusion. This review paper addresses recent developments in the regulatory framework and conceptual model for vapor intrusion. In addition, a number of innovative investigation methods are discussed. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  19. Resin-Powder Dispenser

    Science.gov (United States)

    Standfield, Clarence E.

    1994-01-01

    Resin-powder dispenser used at NASA's Langley Research Center for processing of composite-material prepregs. Dispenser evenly distributes powder (resin polymer and other matrix materials in powder form) onto wet uncured prepregs. Provides versatility in distribution of solid resin in prepreg operation. Used wherever there is requirement for even, continuous distribution of small amount of powder.

  20. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  1. Passive intrusion detection in wireless networks by exploiting clustering-based learning

    Science.gov (United States)

    Yang, Jie; Chen, Yingying; Desai, Sachi; Quoraishee, Shafik

    2010-04-01

    The large-scale wireless sensing data collected from wireless networks can be used for detecting intruders (e.g., enemies in tactical fields), and further facilitating real-time situation awareness in Army's networkcentric warfare applications such as intrusion detection, battlefield protection and emergency evacuation. In this work, we focus on exploiting Received Signal Strength (RSS) obtained from the existing wireless infrastructures for performing intrusion detection when the intruders or objects do not carry any radio devices. This is also known as passive intrusion detection. Passive intrusion detection based on the RSS data is an attractive approach as it reuses the existing wireless environmental data without requiring a specialized infrastructure. We propose a clustering-based learning mechanism for passive intrusion detection in wireless networks. Specifically, our detection scheme utilizes the clustering method to analyze the changes of RSS, caused by intrusions, at multiple devices to diagnose the presence of intrusions collaboratively. Our experimental results using an IEEE 802.15.4 (Zigbee) network in a real office environment show that our clustering-based learning can effectively detect the presence of intrusions.

  2. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  3. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  4. Moisture diffusion parameter characteristics for epoxy composites and neat resins

    Science.gov (United States)

    Long, E. R., Jr.

    1979-01-01

    The moisture absorption characteristics of two graphite/epoxy composites and their corresponding cured neat resins were studied in high humidity and water immersion environments at elevated temperatures. Moisture absorption parameters, such as equilibrium moisture content and diffusion coefficient derived from data taken on samples exposed to high humidity and water soak environments, were compared. Composite swelling in a water immersion environment was measured. Tensile strengths of cured neat resin were measured as a function of their equilibrium moisture content after exposure to different moisture environments. The effects of intermittent moderate tensile loads on the moisture absorption parameters of composite and cured neat resin samples were determined.

  5. Sulfide intrusion and detoxification in Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2014-01-01

    Sulfide intrusion in seagrasses represents a global threat to seagrasses. In contrast seegrasses grow in hostile sediments, where they are constantly exposed to sulfide intrusion. Little is known about the strategies to survive sulfide intrusion, if there are detoxification mechanisms and sulfur...... indicating a possible role of sulfide in the sulfur nutrition beside the detoxification function. Our results suggest different adaptations of Z. marina to reduced sediments and sulfide intrusion ranging from bacterial and chemical reoxidation of sulfide to sulfate to incorporation of sulfide into organic...

  6. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  7. Intrusion Detection System for Applications using Linux Containers

    OpenAIRE

    Abed, Amr S.; Clancy, Charles; Levy, David S.

    2016-01-01

    Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical operational requirement. This paper introduces a real-time host-based intrusion detection system that can be used to passively detect malfeasance against applications within Linux containers running in a standalone or in a cloud multi-tenancy environment. The demonstrated ...

  8. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  9. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  10. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...

  11. Traumatic intrusions as 'worse case scenario's'.

    Science.gov (United States)

    Merckelbach, H; Muris, P; Horselenberg, R; Rassin, E

    1998-11-01

    While some clinicians assume that traumatic intrusions are historically accurate revisualizations of traumatic incidents, others have suggested that these types of intrusions may represent a worse case scenario (i.e. exaggerated) version of the trauma. To explore this issue, a survey was conducted among undergraduate students (N = 189). Of the 69 respondents who had been the victim of or witness to a relatively recent trauma, 15 (22%) reported an exaggerated perception of the traumatic incident. Exaggerated intrusions were found to have more flashback qualities and tended to have a higher frequency than 'realistic' intrusions. These findings are well in line with the idea that intrusions are not necessarily veridical copies of traumatic events.

  12. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  13. Abstracting massive data for lightweight intrusion detection in computer networks

    KAUST Repository

    Wang, Wei

    2016-10-15

    Anomaly intrusion detection in big data environments calls for lightweight models that are able to achieve real-time performance during detection. Abstracting audit data provides a solution to improve the efficiency of data processing in intrusion detection. Data abstraction refers to abstract or extract the most relevant information from the massive dataset. In this work, we propose three strategies of data abstraction, namely, exemplar extraction, attribute selection and attribute abstraction. We first propose an effective method called exemplar extraction to extract representative subsets from the original massive data prior to building the detection models. Two clustering algorithms, Affinity Propagation (AP) and traditional . k-means, are employed to find the exemplars from the audit data. . k-Nearest Neighbor (k-NN), Principal Component Analysis (PCA) and one-class Support Vector Machine (SVM) are used for the detection. We then employ another two strategies, attribute selection and attribute extraction, to abstract audit data for anomaly intrusion detection. Two http streams collected from a real computing environment as well as the KDD\\'99 benchmark data set are used to validate these three strategies of data abstraction. The comprehensive experimental results show that while all the three strategies improve the detection efficiency, the AP-based exemplar extraction achieves the best performance of data abstraction.

  14. A New Method for Intrusion Detection using Manifold Learning Algorithm

    OpenAIRE

    Guoping Hou; Xuan Ma; Yuelei Zhang

    2013-01-01

    Computer and network security has received and will still receive much attention. Any unexpected intrusion will damage the network. It is therefore imperative to detect the network intrusion to ensure the normal operation of the internet. There are many studies in the intrusion detection and intrusion patter recognition. The artificial neural network (ANN) has proven to be powerful for the intrusion detection. However, very little work has discussed the optimization of the input intrusion fea...

  15. 40 CFR 721.5380 - Mixed alkyl phenolic novolak resin (generic).

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Mixed alkyl phenolic novolak resin... Specific Chemical Substances § 721.5380 Mixed alkyl phenolic novolak resin (generic). (a) Chemical... as mixed alkyl phenolic novolak resin (PMN P-98-718) is subject to reporting under this section for...

  16. An artificial bioindicator system for network intrusion detection.

    Science.gov (United States)

    Blum, Christian; Lozano, José A; Davidson, Pedro Pinacho

    2015-01-01

    An artificial bioindicator system is developed in order to solve a network intrusion detection problem. The system, inspired by an ecological approach to biological immune systems, evolves a population of agents that learn to survive in their environment. An adaptation process allows the transformation of the agent population into a bioindicator that is capable of reacting to system anomalies. Two characteristics stand out in our proposal. On the one hand, it is able to discover new, previously unseen attacks, and on the other hand, contrary to most of the existing systems for network intrusion detection, it does not need any previous training. We experimentally compare our proposal with three state-of-the-art algorithms and show that it outperforms the competing approaches on widely used benchmark data.

  17. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  18. The Sonju Lake layered intrusion, northeast Minnesota: Internal structure and emplacement history inferred from magnetic fabrics

    Science.gov (United States)

    Maes, S.M.; Tikoff, B.; Ferre, E.C.; Brown, P.E.; Miller, J.D.

    2007-01-01

    The Sonju Lake intrusion (SLI), in northeastern Minnesota, is a layered mafic complex of Keweenawan age (1096.1 ?? 0.8 Ma) related to the Midcontinent rift. The cumulate paragenesis of the intrusion is recognized as broadly similar to the Skaergaard intrusion, a classic example of closed-system differentiation of a tholeiitic mafic magma. The SLI represents nearly closed-system differentiation through bottom-up fractional crystallization. Geochemical studies have identified the presence of a stratabound, 50-100 m thick zone anomalously enriched in Au + PGE. Similar to the PGE reefs of the Skaergaard intrusion, this PGE-enriched zone is hosted within oxide gabbro cumulates, about two-third of the way up from the base of the intrusion. We present a petrofabric study using the anisotropy of magnetic susceptibility (AMS) to investigate the emplacement and flow patterns within the Sonju Lake intrusion. Petrographic and electron microprobe studies, combined with AMS and hysteresis measurements indicate the primary source of the magnetic signal is pseudo-single domain (PSD) magnetite or titanomagnetite. Low field AMS was measured at 32 sites within the Sonju Lake intrusion, which provided information about primary igneous fabrics. The magnetic fabrics in the layered series of the Sonju Lake intrusion are consistent with sub-horizontal to inclined emplacement of the intrusion and show evidence that the cumulate layers were deposited in a dynamic environment. Well-aligned magnetic lineations, consistently plunging shallowly toward the southwest, indicate the source of the magma is a vertical sill-like feeder, presumably located beneath the Finland granite. The Finland granite acted as a density trap for the Sonju Lake magmas, forcing lateral flow of magma to the northeast. The strongly oblate magnetic shape fabrics indicate the shallowly dipping planar fabrics were enhanced by compaction of the crystal mush. ?? 2007 Elsevier B.V. All rights reserved.

  19. Environment

    DEFF Research Database (Denmark)

    Valentini, Chiara

    2017-01-01

    The term environment refers to the internal and external context in which organizations operate. For some scholars, environment is defined as an arrangement of political, economic, social and cultural factors existing in a given context that have an impact on organizational processes and structures....... For others, environment is a generic term describing a large variety of stakeholders and how these interact and act upon organizations. Organizations and their environment are mutually interdependent and organizational communications are highly affected by the environment. This entry examines the origin...... and development of organization-environment interdependence, the nature of the concept of environment and its relevance for communication scholarships and activities....

  20. The evolution of Interior Intrusion Detection Technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  1. The evolution of interior intrusion detection technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combination developed when commercial sensors were unavailable and the future application of expert systems. 5 refs

  2. The evolution of interior intrusion detection technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-01-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the U.S. Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). The authors also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  3. Reduction of polyester resin shrinkage by means of epoxy resin

    International Nuclear Information System (INIS)

    Pietrzak, M.; Brzostowski, A.

    1981-01-01

    An attempt was made to decrease the shrinkage of unsaturated polyester resin, taking place during radiation-induced curing, by the addition of epoxy resin. In order to combine chemically both resins, the epoxy component was modified with cinnamic and acrylic acids. A composition of 90 parts of polyester resin, 10 parts of epoxy resin modified with cinnamic acid, and 150 parts of a silica filler showed a volume shrinkage of 1.2%. (author)

  4. Intrusion Detection Systems with Live Knowledge System

    Science.gov (United States)

    2016-05-31

    AFRL-AFOSR-JP-TR-2016-0058 Intrusion Detection Systems with Live Knowledge System Byeong Ho Kang UNIVERSITY OF TASMANIA Final Report 05/31/2016...COVERED (From - To) 20 May 2015 to 19 May 2016 4. TITLE AND SUBTITLE Intrusion Detection Systems with Live Knowledge System 5a.  CONTRACT NUMBER 5b...298 10/26/2016https://livelink.ebs.afrl.af.mil/livelink/llisapi.dll Final Report for AOARD Grant FA2386-15-1-4061 “ Intrusion Detection Systems with

  5. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    is known about the strategies of seagrasses to survive sulfide intrusion, their potential detoxification mechanisms and sulfur nutrition in general. By a global review of sulfide intrusion, coupled with a series of field studies and in situ experiments we elucidate sulfide intrusion and different...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  6. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  7. Alpha intrusion on ovenight polysomnogram

    Directory of Open Access Journals (Sweden)

    Nahapetian R

    2014-06-01

    Full Text Available No abstract available. Article truncated after 150 words. A 30 year-old Army veteran with a past medical history significant for chronic lumbar back pain stemming from a fall-from-height injury sustained in 2006 was referred to the sleep laboratory for evaluation of chronic fatigue and excessive daytime hypersomnolence. His Epworth sleepiness scale score was 16. He denied a history of snoring and witnessed apnea. Body Mass Index (BMI was 25.7 kg/m2. His main sleep related complaints were frequent nocturnal arousals, poor sleep quality, un-refreshing sleep, prolonged latency to sleep onset, and nightmares. An In-lab attended diagnostic polysomnogram was performed. Sleep efficiency was reduced (73% and overall arousal index was not significantly elevated (3.2 events/hour. The sleep study showed rapid eye movement (REM related sleep disordered breathing that did not meet diagnostic criteria for sleep apnea. There was no evidence for period limb movement disorder. However, the study was significant for alpha wave intrusion in stage N2 non-REM and stage ...

  8. Diversity matters: how bees benefit from different resin sources.

    Science.gov (United States)

    Drescher, Nora; Wallace, Helen M; Katouli, Mohammad; Massaro, Carmelina F; Leonhardt, Sara Diana

    2014-12-01

    Biodiverse environments provide a variety of resources that can be exploited by consumers. While many studies revealed a positive correlation between biodiversity and consumer biomass and richness, only few studies have investigated how resource diversity affects single consumers. To better understand whether a single consumer species benefits from diverse resources, we tested how the protective function of a defensive plant resource (i.e. resin exploited by social bees) varied among different sources and target organisms (predators, parasites and pathogens). To assess synergistic effects, resins from different plant genera were tested separately and in combination. We found that resin diversity is beneficial for bees, with its functional properties depending on the target organisms, type and composition of resin. Different resins showed different effects, and mixtures were more effective than some of the single resins (functional complementarity). We conclude that resins of different plant species target different organisms and act synergistically where combined. Bees that rely on resin for protection benefit more when they have access to diverse resin sources. Loss of biodiversity may in turn destabilize consumer populations due to restricted access to a variety of resources.

  9. Resin composite repair: Quantitative microleakage evaluation of resin-resin and resin-tooth interfaces with different surface treatments

    OpenAIRE

    Celik, Cigdem; Cehreli, Sevi Burcak; Arhun, Neslihan

    2015-01-01

    Objective: The aim was to evaluate the effect of different adhesive systems and surface treatments on the integrity of resin-resin and resin-tooth interfaces after partial removal of preexisting resin composites using quantitative image analysis for microleakage testing protocol. Materials and Methods: A total of 80 human molar teeth were restored with either of the resin composites (Filtek Z250/GrandioSO) occlusally. The teeth were thermocycled (1000?). Mesial and distal 1/3 parts of the res...

  10. Perimeter intrusion detection and assessment system

    Energy Technology Data Exchange (ETDEWEB)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-01-01

    The key elements of the system considered at a materials storage site are intrusion sensors, alarm assessment, and system control and display. Three papers discussing each of these topics are compiled. They are abstracted individually. (JSR)

  11. Intrusion Detection Architecture Utilizing Graphics Processors

    Directory of Open Access Journals (Sweden)

    Branislav Madoš

    2012-12-01

    Full Text Available With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS. Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.

  12. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  13. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  14. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  15. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  16. The neural representation of intrusive thoughts

    Science.gov (United States)

    Schmiedek, Florian; Brose, Annette; Schott, Björn H.; Lindenberger, Ulman; Lövden, Martin

    2013-01-01

    Based on the philosophical notion that language embodies thought we investigated whether a habitual tendency for intrusive thought that younger and older participants report over a period of 100 sessions, spread out over about 6 months, is associated with brain regions related to language production. In favour of this hypothesis, we found that individual differences in habitual intrusive thoughts are correlated with activity in the left inferior frontal gyrus (IFG, Broca’s area) as well as the cingulate cortex (CC) during a two-choice reaction-time task in fMRI. Participants who habitually tended to experience intrusive thoughts showed greater activity during task-free (baseline) compared to task periods in brain regions involved in language production. Task performance was unrelated to individual differences in intrusive thoughts. We conclude that intrusive thoughts may be represented in a language-like format and that individuals reporting a habitually higher tendency for intrusive thoughts may have stronger and more habitual inner speech processes. PMID:22563007

  17. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-04-19

    -chemical environment and seepage water alteration by reaction with intruded basalt. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the waste package pallet. The results of this model report will be used in TSPA for several parameters including (1) temperature of magma (used for the temperature of the waste form after an intrusion) (2) temperature increase in Zone 2 due to intrusion to evaluate impact to Zone 2 waste packages; (3) effects of exsolved gases reaching Zone 2 to evaluate impact to Zone 2 waste packages; and (4) pH and ionic strength of water reacted with basalt to be used in conjunction with ''Dissolved Concentration Limits of Radioactive Elements'' (BSC 2003 [DIRS: 163152]) to determine solubility of spent fuel within the basalt. Ionic strength will also be used in conjunction with ''Waste Form and In-Drift Colloids-Associated Radionuclide Concentrations: Abstraction and Summary'' (BSC 2003 [DIRS: 166845]) for stability of colloids.

  18. Environment

    Science.gov (United States)

    2005-01-01

    biodiversity. Consequently, the major environmental challenges facing us in the 21st century include: global climate change , energy, population and food...technological prowess, and security interests. Challenges Global Climate Change – Evidence shows that our environment and the global climate ... urbanization will continue to pressure the regional environment . Although most countries have environmental protection ministries or agencies, a lack of

  19. Innovative methods to reduce salt water intrusion in harbours

    Science.gov (United States)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  20. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  1. Method for removing contaminants from plastic resin

    Science.gov (United States)

    Bohnert, George W [Harrisonville, MO; Hand, Thomas E [Lee's Summit, MO; DeLaurentiis, Gary M [Jamestown, CA

    2008-12-09

    A resin recycling method that produces essentially contaminant-free synthetic resin material in an environmentally safe and economical manner. The method includes receiving the resin in container form. The containers are then ground into resin particles. The particles are exposed to a solvent, the solvent contacting the resin particles and substantially removing contaminants on the resin particles. After separating the particles and the resin, a solvent removing agent is used to remove any residual solvent remaining on the resin particles after separation.

  2. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  3. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  4. Contact allergy to epoxy resin

    DEFF Research Database (Denmark)

    Bangsgaard, Nannie; Thyssen, Jacob Pontoppidan; Menné, Torkil

    2012-01-01

    to epoxy resin remained stable over the study period. Of the patients with an epoxy resin-positive patch test, 71% returned a questionnaire; 95 patients had worked with epoxy resin in the occupational setting, and, of these, one-third did not use protective gloves and only 50.5% (48) had participated...

  5. Development of a High-Throughput Ion-Exchange Resin Characterization Workflow.

    Science.gov (United States)

    Liu, Chun; Dermody, Daniel; Harris, Keith; Boomgaard, Thomas; Sweeney, Jeff; Gisch, Daryl; Goltz, Bob

    2017-06-12

    A novel high-throughout (HTR) ion-exchange (IEX) resin workflow has been developed for characterizing ion exchange equilibrium of commercial and experimental IEX resins against a range of different applications where water environment differs from site to site. Because of its much higher throughput, design of experiment (DOE) methodology can be easily applied for studying the effects of multiple factors on resin performance. Two case studies will be presented to illustrate the efficacy of the combined HTR workflow and DOE method. In case study one, a series of anion exchange resins have been screened for selective removal of NO 3 - and NO 2 - in water environments consisting of multiple other anions, varied pH, and ionic strength. The response surface model (RSM) is developed to statistically correlate the resin performance with the water composition and predict the best resin candidate. In case study two, the same HTR workflow and DOE method have been applied for screening different cation exchange resins in terms of the selective removal of Mg 2+ , Ca 2+ , and Ba 2+ from high total dissolved salt (TDS) water. A master DOE model including all of the cation exchange resins is created to predict divalent cation removal by different IEX resins under specific conditions, from which the best resin candidates can be identified. The successful adoption of HTR workflow and DOE method for studying the ion exchange of IEX resins can significantly reduce the resources and time to address industry and application needs.

  6. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  7. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  8. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  9. Features extraction algorithm about typical railway perimeter intrusion event

    Science.gov (United States)

    Zhou, Jieyun; Wang, Chaodong; Liu, Lihai

    2017-10-01

    Research purposes: Optical fiber vibration sensing system has been widely used in the oil, gas, frontier defence, prison and power industries. But, there are few reports about the application in railway defence. That is because the surrounding environment is complicated and there are many challenges to be overcomed in the optical fiber vibration sensing system application. For example, how to eliminate the effects of vibration caused by train, the natural environments such as wind and rain and how to identify and classify the intrusion events. In order to solve these problems, the feature signals of these events should be extracted firstly. Research conclusions: (1) In optical fiber vibration sensing system based on Sagnac interferometer, the peak-to-peak value, peak-to-average ratio, standard deviation, zero-crossing rate, short-term energy and kurtosis may serve as feature signals. (2) The feature signals of resting state, climbing concrete fence, breaking barbed wire, knocking concrete fence and rainstorm have been extracted, which shows significant difference among each other. (3) The research conclusions can be used in the identification and classification of intrusion events.

  10. A Process Engineering Approach to the Development and Integration of Intrusion Detection Techniques

    National Research Council Canada - National Science Library

    Ye, Nong

    2001-01-01

    ...) investigate system-level intrusion detection techniques for the fusion and correlation of local information about intrusions, based on the integration infrastructure for intrusion detection; and (3...

  11. A Process Engineering Approach to the Development and Integration of Intrusion Detection Techniques

    National Research Council Canada - National Science Library

    Ye, Nong

    2002-01-01

    ...) investigate system-level intrusion detection techniques for the fusion and correlation of local information about intrusions, based on the integration infrastructure for intrusion detection; and (3...

  12. Enhancement of adhesion between resin coating materials and resin cements.

    Science.gov (United States)

    Udo, Tomoaki; Nikaido, Toru; Ikeda, Masaomi; Weerasinghe, Dinesh S; Harada, Naoko; Foxton, Richard M; Tagami, Junji

    2007-07-01

    Resin coating technique is a unique method that improves the dentin bond strength of resin cements in indirect restorations. However, the weak link of a specimen bonded using the resin coating technique was reported to be the bonded interface between the resin coating material and resin cement. The purpose of this study, therefore, was to enhance the bonding performance between a resin coating material and a resin cement. Two light-cured flowable composites, Protect Liner F and Clearfil Flow FX, were used as coating materials, and two dual-cure composite materials, Panavia F 2.0 and Clearfil DC Core Automix, were used as resin cements. The ultimate tensile strength of each material and the microtensile bond strengths of the bonded specimens of resin coating material and resin cement were measured using a crosshead speed of 1.0 mm/min. Three-way ANOVA (p=0.05) revealed that the highest microtensile bond strength was obtained using a combination of Clearfil Flow FX and Clearfil DC Core Automix, and when the surface of the coating material was treated with ED Primer II. It was strongly suggested that materials with a higher ultimate tensile strength, when used in both resin coating and cementation, could enhance the bond strength between the two.

  13. A Survey of Visualization Tools Assessed for Anomaly-Based Intrusion Detection Analysis

    Science.gov (United States)

    2014-04-01

    known set behaviors and detected intrusions (5). Host-based was the first IDS ever designed to audit information provided by a mainframe (6). It...performed its audit locally or on separate machines (6). A shift in computing from mainframe environments to distributed workstation networks was the

  14. Resin impregnation process for producing a resin-fiber composite

    Science.gov (United States)

    Palmer, Raymond J. (Inventor); Moore, William E. (Inventor)

    1994-01-01

    Process for vacuum impregnation of a dry fiber reinforcement with a curable resin to produce a resin-fiber composite, by drawing a vacuum to permit flow of curable liquid resin into and through a fiber reinforcement to impregnate same and curing the resin-impregnated fiber reinforcement at a sufficient temperature and pressure to effect final curing. Both vacuum and positive pressure, e.g. autoclave pressure, are applied to the dry fiber reinforcement prior to application of heat and prior to any resin flow to compact the dry fiber reinforcement, and produce a resin-fiber composite of reduced weight, thickness and resin content, and improved mechanical properties. Preferably both a vacuum and positive pressure, e.g. autoclave pressure, are also applied during final curing.

  15. Intrusive memories of hallucinations and delusions in traumatized intensive care patients: An interview study.

    Science.gov (United States)

    Wade, Dorothy M; Brewin, Chris R; Howell, David C J; White, Emily; Mythen, Michael G; Weinman, John A

    2015-09-01

    Psychological morbidity, including post-traumatic stress disorder (PTSD), is common in survivors of intensive care. Intrusive memories of trauma are important symptoms of PTSD. Research has not established which aspects of intensive care are most traumatizing; invasive medical procedures, fear of dying from life-threatening illness or injury, or effects of psychoactive drugs, including hallucinations and delusions. Our study aimed to investigate the roots of post-intensive care trauma by interviewing survivors with symptoms of PTSD. Were their intrusive memories primarily of real events or hallucinations and delusions from intensive care? Interview study as part of a mixed-methods investigation of psychological outcomes post-intensive care. We used purposive sampling to identify patients with intrusive memories of intensive care unit. Detailed interviews were conducted to investigate the nature and content of post-intensive care memories. Intrusive memories were categorized as factual, hallucinatory/delusional, or uncertain. Thematic saturation was achieved after 17 interviews. Approximately 70% (12/17) of patients had hallucinatory/delusional intrusive memories of intensive care, while 12% (2/17) had factual but no hallucinatory/delusional memories; 18% (3) were uncertain whether memories were factual or hallucinatory/delusional. Further analysis suggested that 88% of all patients had hallucinatory/delusional intrusive memories. The content of intrusive memories commonly merged realistic events (involving intensive care staff, environment, medical procedures and unpleasant physical experiences) with delusions and frightening hallucinations. We found that patients in this in-depth study were more traumatized by frightening hallucinations/delusions than real events, suggesting they may have post-psychosis PTSD, rather than classic PTSD. Interventions are needed to diagnose and treat intensive care hallucinations/delusions, or minimize effects, to prevent PTSD.

  16. Animal intrusion status report for fiscal year 1990

    International Nuclear Information System (INIS)

    Landeen, D.S.

    1991-03-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion work conducted by Westinghouse Hanford Company in fiscal year 1990 regarding small mammals and water infiltration. An animal intrusion lysimeter facility was constructed and installed in fiscal year 1988. The facility consists of two outer boxes buried at grade that serve as receptacles for six animal intrusion lysimeters. Small burrowing mammals common to the Hanford Site environs are introduced over a 3- to 4-month period. Supplemental precipitation is added to three of the lysimeters with a rainulator at a rate equivalent to a 100-year storm. Soil moisture samples are taken before and after each test, and soil moisture measurements are also taken with a hydroprobe during the test period. During fiscal year 1990, tests three and four were completed and test five was initiated. Results of test three (summer treatment), which used Townsend ground squirrels and pocket gophers, indicated that the additional 1.5 inches of precipitation that was added with the rainulator was lost during this test. The plots that did not receive any additional precipitation all lost water (5 to 6 percent). Results from test four (winter treatment), which used pocket gophers and pocket mice, indicated that all of the lysimeters except one gained water. The two control lysimeters (rainulator plots and nonrainulator lysimeters with no animals) gained more water than their corresponding animal burrow lysimeters. 4 refs., 9 figs., 3 tabs

  17. Web Defacement and Intrusion Monitoring Tool: WDIMT

    CSIR Research Space (South Africa)

    Masango, Mfundo G

    2017-09-01

    Full Text Available at altering the content of the web pages or to make the website inactive. This paper proposes a Web Defacement and Intrusion Monitoring Tool, that could be a possible solution to the rapid identification of altered or deleted web pages. The proposed tool...

  18. Chemical Observations of a Polar Vortex Intrusion

    Science.gov (United States)

    Schoeberl, M. R.; Kawa, S. R.; Douglass, A. R.; McGee, T. J.; Browell, E.; Waters, J.; Livesey, N.; Read, W.; Froidevaux, L.

    2006-01-01

    An intrusion of vortex edge air in D the interior of the Arctic polar vortex was observed on the January 31,2005 flight of the NASA DC-8 aircraft. This intrusion was identified as anomalously high values of ozone by the AROTAL and DIAL lidars. Our analysis shows that this intrusion formed when a blocking feature near Iceland collapsed, allowing edge air to sweep into the vortex interior. along the DC-8 flight track also shows the intrusion in both ozone and HNO3. Polar Stratospheric Clouds (PSCs) were observed by the DIAL lidar on the DC-8. The spatial variability of the PSCs can be explained using MLS HNO3 and H2O observations and meteorological analysis temperatures. We also estimate vortex denitrification using the relationship between N2O and HNO3. Reverse domain fill back trajectory calculations are used to focus on the features in the MLS data. The trajectory results improve the agreement between lidar measured ozone and MLS ozone and also improve the agreement between the HNO3 measurements PSC locations. The back trajectory calculations allow us to compute the local denitrification rate and reduction of HCl within the filament. We estimate a denitrification rate of about lO%/day after exposure to below PSC formation temperature. Analysis of Aura MLS observations made

  19. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  20. Investigation of Seawater Intrusion into Coastal Groundwater ...

    African Journals Online (AJOL)

    ADOWIE PERE

    https://dx.doi.org/10.4314/jasem.v21i2.18. Key words: Escravos, Vertical electrical sounding, Saltwater Intrusion, freshwater lenses, Aquifer, groundwater. Globally groundwater contributes a greater percentage of water usage in domestic, irrigation of agricultural farms and industrial purposes. Though groundwater is not the ...

  1. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  2. Biodegradation of acrylic based resins: A review.

    Science.gov (United States)

    Bettencourt, Ana F; Neves, Cristina B; de Almeida, Marise S; Pinheiro, Lídia M; Oliveira, Sofia Arantes e; Lopes, Luís P; Castro, Matilde F

    2010-05-01

    The development of different types of materials with application in dentistry is an area of intense growth and research, due to its importance in oral health. Among the different materials there are the acrylic based resins that have been extensively used either in restorations or in dentures. The objective of this manuscript was to review the acrylic based resins biodegradation phenomena. Specific attention was given to the causes and consequences of materials degradation under the oral environment. Information from scientific full papers, reviews or abstracts published from 1963 to date were included in the review. Published material was searched in dental literature using general and specialist databases, like the PubMED database. Published studies regarding the description of biodegradation mechanisms, in vitro and in vivo release experiments and cell based studies conducted on acrylic based resins or their components were evaluated. Studies related to the effect of biodegradation on the physical and mechanical properties of the materials were also analyzed. Different factors such as saliva characteristics, chewing or thermal and chemical dietary changes may be responsible for the biodegradation of acrylic based resins. Release of potential toxic compounds from the material and change on their physical and mechanical properties are the major consequences of biodegradation. Increasing concern arises from potential toxic effects of biodegradation products under clinical application thus justifying an intensive research in this area. 2010 Academy of Dental Materials. Published by Elsevier Ltd. All rights reserved.

  3. Vapor Intrusion Characterization Report (Revision 1.0)

    Science.gov (United States)

    Vapor Intrusion Characterization Report (Revision 1) - February 5, 2015: This report, which was approved by the EPA on February 18, 2015, documents the results from implementation of the Final Vapor Intrusion Characterization Work Plan.

  4. On the Feasibility of Intrusion Detection Inside Workstation Disks

    National Research Council Canada - National Science Library

    Griffin, John L; Pennington, Adam; Bucy, John S; Choundappan, Deepa; Muralidharan, Nithya; Ganger, Gregory R

    2003-01-01

    Storage-based intrusion detection systems (IDSs) can be valuable tools in monitoring for and notifying administrators of malicious software executing on a host computer, including many common intrusion tool kits...

  5. How stratospheric are deep stratospheric intrusions?

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2014-09-01

    Full Text Available Preliminary attempts of quantifying the stratospheric ozone contribution in the observations at the Zugspitze summit (2962 m a.s.l. next to Garmisch-Partenkirchen in the German Alps had yielded an approximate doubling of the stratospheric fraction of the Zugspitze ozone during the time period 1978 to 2004. These investigations had been based on data filtering by using low relative humidity (RH and elevated 7Be as the criteria for selecting half-hour intervals of ozone data representative of stratospheric intrusion air. To quantify the residual stratospheric component in stratospherically influenced air masses, however, the mixing of tropospheric air into the stratospheric intrusion layers must be taken into account. In fact, the dewpoint mirror instrument at the Zugspitze summit station rarely registers RH values lower than 10% in stratospheric air intrusions. Since 2007 a programme of routine lidar sounding of ozone, water vapour and aerosol has been conducted in the Garmisch-Partenkirchen area. The lidar results demonstrate that the intrusion layers are drier by roughly one order of magnitude than indicated in the in situ measurements. Even in thin layers RH values clearly below 1% have frequently been observed. These thin, undiluted layers present an important challenge for atmospheric modelling. Although the ozone values never reach values typical of the lower-stratosphere it becomes, thus, obvious that, without strong wind shear or convective processes, mixing of stratospheric and tropospheric air must be very slow in most of the free troposphere. As a consequence, the analysis the Zugspitze data can be assumed to be more reliable than anticipated. Finally, the concentrations of Zugspitze carbon monoxide rarely drop inside intrusion layers and normally stay clearly above full stratospheric values. This indicates that most of the CO, and thus the intrusion air mass, originates in the shallow "mixing layer" around the thermal tropopause. The

  6. LIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios; Krontiris, Ioannis; Dimitriou, Tassos

    2008-01-01

    Wireless sensor networks are vulnerable to adversaries as they are frequently deployed in open and unattended environments. Preventive mechanisms can be applied to protect them from an assortment of attacks. However, more sophisticated methods, like intrusion detection systems, are needed...... to achieve a more autonomic and complete defense mechanism, even against attacks that have not been anticipated in advance. In this paper, we present a lightweight intrusion detection system, called LIDeA, designed for wireless sensor networks. LIDeA is based on a distributed architecture, in which nodes...... overhear their neighboring nodes and collaborate with each other in order to successfully detect an intrusion. We show how such a system can be implemented in TinyOS, which components and interfaces are needed, and what is the resulting overhead imposed....

  7. Thermal effects of water intrusion in hydrophobic nanoporous materials.

    Science.gov (United States)

    Karbowiak, Thomas; Paulin, Christian; Ballandras, Anthony; Weber, Guy; Bellat, Jean-Pierre

    2009-07-29

    Liquid water intrusion in hydrophobic nanoporous silicalite-1, a pure siliceous zeolite, in isothermal conditions under high pressure produces an endothermic effect. After intrusion, confined water in zeolite pores is in a different state from that of the liquid bulk water. Such forced intrusion also chemically modifies the material and tends to render it slightly more hydrophilic.

  8. A comparative study to determine strength of autopolymerizing acrylic resin and autopolymerizing composite resin influenced by temperature during polymerization: An In Vitro study

    Directory of Open Access Journals (Sweden)

    Anuj Chhabra

    2017-01-01

    Full Text Available Aim: Temporary coverage of a prepared tooth is an important step during various stages of the fixed dental prosthesis. Provisional restorations should satisfy proper mechanical requirements to resist functional and nonfunctional loads. A few studies are carried out regarding the comparison of the effect of curing environment, air and water, on mechanical properties of autopolymerizing acrylic and composite resin. Hence, the aim of this study was to compare the transverse strength of autopolymerizing acrylic resin and autopolymerizing composite resin as influenced by the temperature of air and water during polymerization. Materials and Methods: Samples of autopolymerizing acrylic resin and composite resin were prepared by mixing as per manufacturer's instructions and were placed in a preformed stainless steel mold. The mold containing the material was placed under different controlled conditions of water temperature and air at room temperature. Polymerized samples were then tested for transverse strength using an Instron universal testing machine. Results: Alteration of curing condition during polymerization revealed a significant effect on the transverse strength. The transverse strength of acrylic resin specimens cured at 60°C and composite resin specimens cured at 80°C was highest. Polymerizing the resin in cold water at 10°C reduced the mechanical strength. Conclusions: Polymerization of the resin in hot water greatly increased its mechanical properties. The method of placing resin restoration in hot water during polymerization may be useful for improving the mechanical requirements and obtaining long-lasting performance.

  9. A Retroactive-Burst Framework for Automated Intrusion Response System

    Directory of Open Access Journals (Sweden)

    Alireza Shameli-Sendi

    2013-01-01

    Full Text Available The aim of this paper is to present an adaptive and cost-sensitive model to prevent security intrusions. In most automated intrusion response systems, response selection is performed locally based on current threat without using the knowledge of attacks history. Another challenge is that a group of responses are applied without any feedback mechanism to measure the response effect. We address these problems through retroactive-burst execution of responses and a Response Coordinator (RC mechanism, the main contributions of this work. The retroactive-burst execution consists of several burst executions of responses with, at the end of each burst, a mechanism for measuring the effectiveness of the applied responses by the risk assessment component. The appropriate combination of responses must be considered for each burst execution to mitigate the progress of the attack without necessarily running the next round of responses, because of the impact on legitimate users. In the proposed model, there is a multilevel response mechanism. To indicate which level is appropriate to apply based on the retroactive-burst execution, we get help from a Response Coordinator mechanism. The applied responses can improve the health of Applications, Kernel, Local Services, Network Services, and Physical Status. Based on these indexes, the RC gives a general overview of an attacker’s goal in a distributed environment.

  10. Flame Retardant Epoxy Resins

    Science.gov (United States)

    Thompson, C. M.; Smith, J. G., Jr.; Connell, J. W.; Hergenrother, P. M.; Lyon, R. E.

    2004-01-01

    As part of a program to develop fire resistant exterior composite structures for future subsonic commercial aircraft, flame retardant epoxy resins are under investigation. Epoxies and their curing agents (aromatic diamines) containing phosphorus were synthesized and used to prepare epoxy formulations. Phosphorus was incorporated within the backbone of the epoxy resin and not used as an additive. The resulting cured epoxies were characterized by thermogravimetric analysis, propane torch test, elemental analysis and microscale combustion calorimetry. Several formulations showed excellent flame retardation with phosphorous contents as low as 1.5% by weight. The fracture toughness of plaques of several cured formulations was determined on single-edge notched bend specimens. The chemistry and properties of these new epoxy formulations are discussed.

  11. Bismaleimide Copolymer Matrix Resins

    Science.gov (United States)

    Parker, John A.; Heimbuch, Alvin H.; Hsu, Ming-Ta S.; Chen, Timothy S.

    1987-01-01

    Graphite composites, prepared from 1:1 copolymer of two new bismaleimides based on N,N'-m-phenylene-bis(m-amino-benzamide) structure have mechanical properties superior to those prepared from other bismaleimide-type resins. New heat-resistant composites replace metal in some structural applications. Monomers used to form copolymers with superior mechanical properties prepared by reaction of MMAB with maleic or citraconic anhydride.

  12. System for removing contaminants from plastic resin

    Science.gov (United States)

    Bohnert, George W.; Hand, Thomas E.; DeLaurentiis, Gary M.

    2010-11-23

    A resin recycling system that produces essentially contaminant-free synthetic resin material in an environmentally safe and economical manner. The system includes receiving the resin in container form. A grinder grinds the containers into resin particles. The particles are exposed to a solvent in one or more solvent wash vessels, the solvent contacting the resin particles and substantially removing contaminants on the resin particles. A separator is used to separate the resin particles and the solvent. The resin particles are then placed in solvent removing element where they are exposed to a solvent removing agent which removes any residual solvent remaining on the resin particles after separation.

  13. Paramagnetic epoxy resin

    Directory of Open Access Journals (Sweden)

    E. C. Vazquez Barreiro

    2017-01-01

    Full Text Available This work illustrates that macrocycles can be used as crosslinking agents for curing epoxy resins, provided that they have appropriate organic functionalities. As macrocycles can complex metal ions in their structure, this curing reaction allows for the introduction of that metal ion into the resin network. As a result, some characteristic physical properties of the metallomacrocycle could be transferred to the new material. The bisphenol A diglycidyl ether (BADGE, n = 0 and hemin (a protoporphyrin IX containing the Fe(III ion, and an additional chloride ligand have been chosen. The new material has been characterized by differential scanning calorimetry (DSC, thermogravimetric analysis (TGA, Fourier Transform Infrared (FT-IR, Nuclear Magnetic Resonance (NMR, Transmission Electron Microscopy (TEM, and magnetic susceptibility measurements. Fe(III remains in the high-spin state during the curing process and, consequently, the final material exhibits the magnetic characteristics of hemin. The loss of the chlorine atom ligand during the cure of the resin allows that Fe(III can act as Lewis acid, catalyzing the crosslinking reactions. At high BADGE n = 0/hemin ratios, the formation of ether and ester bonds occurs simultaneously during the process.

  14. Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures

    OpenAIRE

    Xing, Xinyu; Dang, Jianxun; Han, Richard; Liu, Xue; Mishra, Shivakant

    2010-01-01

    Video chat systems such as Chatroulette have become increasingly popular as a way to meet and converse one-on-one via video and audio with other users online in an open and interactive manner. At the same time, security and privacy concerns inherent in such communication have been little explored. This paper presents one of the first investigations of the privacy threats found in such video chat systems, identifying three such threats, namely de-anonymization attacks, phishing attacks, and ma...

  15. Acoustic Environment Simulation Study; Acoustic Intrusion Sensor Performance.

    Science.gov (United States)

    1983-01-01

    generation of transients. 10,000. 13. Software for stastistical record keeping. 7,500. Note that no allowance is made here for additional racks or backplanes...sAcoustic Instrusion Sensor Performance Date Jan 83 I 0.1. TERMINOLOGY ATSA APPLIED TIME SERIES ANALYSIS, R. K. Otnes and L. Enochson, Wiley Interscience...verif- ication of the procedures. The terminology used in this report is essentially the same as that in APPLIED TIME SERIES ANALYSIS, VOLUME I, by Robert

  16. Spatial distribution of volatile compounds in epoxy resins for composites

    International Nuclear Information System (INIS)

    Grayson, M.A.; Wolf, C.J.

    1982-01-01

    Precision abrasion mass spectrometry (PAMS) was used to determine the quantitative distribution profile of water in three epoxy resin systems: tetraglycidyl diaminodiphenyl methane (TGDDM) cured with dicyandiamide (DICY), diglycidyl ether of bisphenol A (DGEBA) cured with DICY, and TGDDM cured with diaminodiphenyl sulfone (DDS). The first two resin systems also contain an epoxy cresol novolac. Specimens of the three resins were exposed to a humid environment for 4 to 2000 hours. The water distribution was determined immediately following environmental exposure. Distribution profiles of oxygen, carbon dioxide, and dichloromethane were also measured in the specimens. A brief description of the PAMS apparatus and a discussion of the distribution profiles of the sorbed gases in the three epoxy resin systems as a function of exposure time are given

  17. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  18. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  19. The Development of Agent Information for Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Bambang Sugiantoro

    2017-10-01

    Full Text Available As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has been gradually developed. Agent-based approach for intrusion detection system has developed from single to multi agent, and later developed mobile agents in order to increase system's capability to face with a more complex challenge and change. A number of studies had been identified that mobile agent can reduce network traffic, however the study related to intrusion detection using static and mobile agent for finding intruder has not been fully achieved.Keywords:  Information, Intrusion, mobile, networks

  20. Environment

    International Nuclear Information System (INIS)

    McIntyre, A.D.; Turnbull, R.G.H.

    1992-01-01

    The development of the hydrocarbon resources of the North Sea has resulted in both offshore and onshore environmental repercussions, involving the existing physical attributes of the sea and seabed, the coastline and adjoining land. The social and economic repercussions of the industry were equally widespread. The dramatic and speedy impact of the exploration and exploitation of the northern North Sea resources in the early 1970s, on the physical resources of Scotland was quickly realised together with the concern that any environmental and social damage to the physical and social fabric should be kept to a minimum. To this end, a wide range of research and other activities by central and local government, and other interested agencies was undertaken to extend existing knowledge on the marine and terrestrial environments that might be affected by the oil and gas industry. The outcome of these activities is summarized in this paper. The topics covered include a survey of the marine ecosystems of the North Sea, the fishing industry, the impact of oil pollution on seabirds and fish stocks, the ecology of the Scottish coastline and the impact of the petroleum industry on a selection of particular sites. (author)

  1. Distributed fiber optic moisture intrusion sensing system

    Science.gov (United States)

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  2. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and....../or liquid immiscibility. Forty-eight whole rock samples from well-constrained stratigraphic levels in the intrusion were crushed, powdered and dissolved, followed by iron separation by ion chromatography. Purified solutions were analyzed by MC- ICPMS in high-resolution mode using the sample-std bracket...

  3. A simplified approach to true molar intrusion

    Directory of Open Access Journals (Sweden)

    Flieger Stefanie

    2012-11-01

    Full Text Available Abstract Background Orthodontic management of anterior open bites is a demanding task for orthodontists. Molar intrusion as a primary means of open bite correction entails the need for appropriate anchorage. Orthodontic mini implants can provide the required mechanical support. The suggested procedure aims to reduce the risk of complications such as root damage or soft tissue irritations while minimizing overall complexity. Methods Three female patients aged 14, 18 and 19 years who decided against a surgical correction were treated with a device consisting of mini implants in the palatal slope, a palatal bar and intrusion cantilevers. Results In all three patients, an open bite reduction of more than a millimeter occurred within four months. An anterior overbite of 2 mm or more could be established within 6 to 9 months. Conclusions The method presented in this article enables the practitioner to use mini implants in an easily accessible insertion site. A lab-side procedure is optional but not required.

  4. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  5. Intrusion Learning: An Overview of an Emergent Discipline

    Directory of Open Access Journals (Sweden)

    Tony Bailetti

    2016-02-01

    Full Text Available The purpose of this article is to provide a definition of intrusion learning, identify its distinctive aspects, and provide recommendations for advancing intrusion learning as a practice domain. The authors define intrusion learning as the collection of online network algorithms that learn from and monitor streaming network data resulting in effective intrusion-detection methods for enabling the security and resiliency of enterprise systems. The network algorithms build on advances in cyber-defensive and cyber-offensive capabilities. Intrusion learning is an emerging domain that draws from machine learning, intrusion detection, and streaming network data. Intrusion learning offers to significantly enhance enterprise security and resiliency through augmented perimeter defense and may mitigate increasing threats facing enterprise perimeter protection. The article will be of interest to researchers, sponsors, and entrepreneurs interested in enhancing enterprise security and resiliency.

  6. Biokompatibilitas Gelas Ionomer Modifikasi Resin

    OpenAIRE

    Rotua Lestari M

    2008-01-01

    Saat ini banyak berkembang material baru dalam dunia kedokteran gigi diantaranya adalah Gelas ionomer modifikasi resin yang dikembangkan untuk mengatasi kekurangan-kekurangan dari gelas ionomer konvensional. Adanya penambahan monomer resin daIam bentuk 2-hydroxyethylmetacylate (HEMA) telah meningkatkan kekuatan dari bahan ini. Gelas ionomer modifikasi resin mempunyai sifat-sifat fisis dan mekanis yang lebih baik dibandingkan dengan gelas ionomer konvensional. Gelas ionomer modifikasi ...

  7. Perimeter intrusion detection and assessment system

    Energy Technology Data Exchange (ETDEWEB)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed.

  8. INTRUSIVE MARKETING METHODS A CONTEMPORARY CONSUMER PERSPECTIVE

    OpenAIRE

    Owais, Faizan

    2008-01-01

    Is marketing practice destroying the faith of consumers? It may be argued that marketing practice over recent years has taken a more direct approach that appears intrusive and manipulative to consumers. The marketing activities we see today are a desperate attempt to grab consumer attention in any way possible and it is all spelling out bad news for marketing. Marketers have been faced with many challenges, with markets at saturation point, competitiveness is on the rise and marketers are...

  9. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  10. WIPP performance assessment: impacts of human intrusion

    International Nuclear Information System (INIS)

    Anderson, D.R.; Hunter, R.L.; Bertram-Howery, S.G.; Lappin, A.R.

    1989-01-01

    The Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico is a research and development facility that may become the USA's first and only mined geologic repository for transuranic waste. Human intrusion into the WIPP repository after closure has been shown by preliminary sensitivity analyses and calculations of consequences to be an important, and perhaps the most important, factor in long-term repository performance

  11. Intrusion detection using pattern recognition methods

    Science.gov (United States)

    Jiang, Nan; Yu, Li

    2007-09-01

    Today, cyber attacks such as worms, scanning, active attackers are pervasive in Internet. A number of security approaches are proposed to address this problem, among which the intrusion detection system (IDS) appears to be one of the major and most effective solutions for defending against malicious users. Essentially, intrusion detection problem can be generalized as a classification problem, whose goal is to distinguish normal behaviors and anomalies. There are many well-known pattern recognition algorithms for classification purpose. In this paper we describe the details of applying pattern recognition methods to the intrusion detection research field. Experimenting on the KDDCUP 99 data set, we first use information gain metric to reduce the dimensionality of the original feature space. Two supervised methods, the support vector machine as well as the multi-layer neural network have been tested and the results display high detection rate and low false alarm rate, which is promising for real world applications. In addition, three unsupervised methods, Single-Linkage, K-Means, and CLIQUE, are also implemented and evaluated in the paper. The low computational complexity reveals their application in initial data reduction process.

  12. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  13. Late Neoproterozoic layered mafic intrusion of arc-affinity in the Arabian-Nubian Shield: A case study from the Shahira layered mafic intrusion, southern Sinai, Egypt

    Energy Technology Data Exchange (ETDEWEB)

    Azer, M.K.; Obeid, M.A.; Gahalan, H.A.

    2016-07-01

    The Shahira Layered Mafic Intrusion (SLMI), which belongs to the late Neoproterozoic plutonic rocks of the Arabian-Nubian Shield, is the largest layered mafic intrusion in southern Sinai. Field relations indicate that it is younger than the surrounding metamorphic rocks and older than the post-orogenic granites. Based on variation in mineral paragenesis and chemical composition, the SLMI is distinguished into pyroxene-hornblende gabbro, hornblende gabbro and diorite lithologies. The outer zone of the mafic intrusion is characterized by fine-grained rocks (chilled margin gabbroic facies), with typical subophitic and/or microgranular textures. Different rock units from the mafic intrusion show gradational boundaries in between. They show some indications of low grade metamorphism, where primary minerals are transformed into secondary ones. Geochemically, the Shahira layered mafic intrusion is characterized by enrichment in LILE relative to HFSE (e.g. Nb, P, Zr, Ti, Y), and LREE relative to HREE [(La/Lu)n= 4.75–8.58], with subalkaline characters. It has geochemical characteristics of pre-collisional arc-type environment. The geochemical signature of the investigated gabbros indicates partial melting of mantle wedge in a volcanic-arc setting, being followed by fractional crystallization and crustal contamination. Fractional crystallization processes played a vital role during emplacement of the Shahira intrusion and evolution of its mafic and intermediate rock units. The initial magma was evolved through crystallization of hornblende which was caused by slight increasing of H2O in the magma after crystallization of liquidus olivine, pyroxene and Ca-rich plagioclase. The gabbroic rocks crystallized at pressures between 4.5 and 6.9kbar (~15–20km depth). Whereas, the diorites yielded the lowest crystallization pressure between 1.0 to 4.4Kbar (<10km depth). Temperature was estimated by several geothermometers, which yielded crystallization temperatures ranging from 835

  14. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  15. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    CERN Document Server

    INSPIRE-00416173; Kebschull, Udo

    2015-01-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machin...

  16. Urea-formaldehyde resins: production, application, and testing

    Science.gov (United States)

    Nuryawan, A.; Risnasari, I.; Sucipto, T.; Heri Iswanto, A.; Rosmala Dewi, R.

    2017-07-01

    Urea-formaldehyde (UF) resin, one of the most important formaldehyde resin adhesives, is a polymeric condensation product of formaldehyde with urea, and being widely used for the manufacture of wood-based composite panels, such as plywood, particleboard, and fiberboard. In spite of its benefits such as fast curing, good performance in the panels (colorless), and lower cost; formaldehyde emission (FE) originated from either UF resin itself or composite products bonded by UF resins is considered a critical drawback as it affects human health particularly in indoor environment. In order to reduce the FE, lowering formaldehyde/urea (F/U) mole ratio in the synthesis of the UF resin was done. In this study, synthesis of UF resins was carried out following the conventional alkaline-acid two-step reaction with a second addition of urea, resulting in F/U mole ratio around 1.0, namely 0.95; 1.05, and 1.15. The UF resins produced were used as binder for particleboard making. The board was manufactured in the laboratory using shaving type particle of Gmelina wood, 8% UF resin based on oven dry particle, and 1% NH4Cl (20%wt) as hardener for the resin. The target of the thickness was 10 mm and the dimension was 25 cm x 25 cm. The resulted particleboard then was evaluated the physical and the mechanical properties by Japanese Industrial Standard (JIS) A 5908 (2003). Further, the resulted particleboard also was used for the mice cage’s wall in order to mimic the real living environment. After four weeks exposure in the cages, the mice then were evaluated their mucous organs as well as their blood. The experiment results were as follows: 1) It was possible to synthesis UF resins with low F/U mole ratio; 2) However, the particleboard bonded UF resins with low F/U mole ratio showed poor properties, particularly on the thickness swelling and modulus of elasticity; 3) There was no significant differences among the mucous organs of the mice after a month exposure FE originated from

  17. Properties of the Carboxylate ion exchange resins

    International Nuclear Information System (INIS)

    Allard, Bert; Dario, Maarten; Boren, Hans; Torstenfelt, Boerje; Puigdomenech, Ignasi; Johansson, Claes

    2002-09-01

    Weakly acidic, carboxylic resin has been selected, together with strong base anion resins, for water purification at the Forsmark 1 and 2 reactors. For the strong (but not the weak) ion exchange resin the Nuclear Power Inspectorate has given permission to dispose the spent resins in the SFR 1 (the Final Repository for Radioactive Operational Waste). This report gives a review of the carboxylic resins and comes to the conclusion that the resins are very stable and that there should not exist any risks for increased leaching of radionuclides from SFR 1 if these resins are disposed (compared to the strong resins)

  18. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  19. Fossilization History of Fossil Resin from Jambi Province (Sumatra, Indonesia Based on Physico-Chemical Studies

    Directory of Open Access Journals (Sweden)

    Beata Naglik

    2018-03-01

    Full Text Available A unique specimen of fossil resin originating from the Dipterocarpaceae tree family found in Miocene brown coal deposits in Jambi Province (Sumatra, Indonesia was investigated via microscopic observations, microhardness testing and infrared and Raman spectroscopic methods. Its form is rare in nature, being an aggregate of three varieties of resin differing in colour, transparency and internal structure. This suggests the formation of the resins at different stages. Further alteration processes, including fossilization and maturation of the resin in a swamp environment resulted in stepwise aromatization of the cyclohexane ring in steroids and cross-linking through formation of ester bonds as well as carbon–carbon bonds between steroid molecules. The various environmental and geological conditions affecting the formation processes of the resins were recorded in their physico-chemical properties. Additionally, heating conditions accelerated by volcanism were proposed as a factor determining the maturation grade of the resin.

  20. [Acrylic resin removable partial dentures

    NARCIS (Netherlands)

    Baat, C. de; Witter, D.J.; Creugers, N.H.J.

    2011-01-01

    An acrylic resin removable partial denture is distinguished from other types of removable partial dentures by an all-acrylic resin base which is, in principle, solely supported by the edentulous regions of the tooth arch and in the maxilla also by the hard palate. When compared to the other types of

  1. Cure shrinkage in casting resins

    Energy Technology Data Exchange (ETDEWEB)

    Spencer, J. Brock [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-02-01

    A method is described whereby the shrinkage of a casting resin can be determined. Values for the shrinkage of several resin systems in frequent use by Sandia have been measured. A discussion of possible methods for determining the stresses generated by cure shrinkage and thermal contraction is also included.

  2. Characterization and Process Development of Cyanate Ester Resin and Composite

    Energy Technology Data Exchange (ETDEWEB)

    Frame, B.J.

    1998-03-01

    Cyanate ester (or polycyanate) resins offer advantages as composite matrices because of their high thermal stability, low outgassing, low water absorption and radiation resistance. This report describes the results of a processing study to develop high-strength hoop-wound composite by the wet-filament winding method using Toray T1000G carbon fiber and YLA RS-14A polycyanate resin as the constituent materials. Process trials, tests and analyses were conducted in order to gain insight into factors that can affect final properties of the cured cyanate ester resin and its composites. The study shows that the cyanate ester resin has a broad process envelope but that an inert-atmosphere cure is essential for obtaining optimum resin and composite properties. Minimizing moisture exposure prior to cure is also crucial as it affects the T{sub g} of the resin and composite. Recommendations for reducing moisture contact with the resin during wet-winding are presented. High fiber volume fraction ({approximately}80%) composites wound and cured with these methods yielded excellent hoop tensile strengths (660 to 670 ksi average with individual rings failing above 700 ksi), which are believed to be the highest recorded strengths for this class of materials. The measured transverse properties were also exceptional for these high fiber fraction composites. Based on the available data, this cyanate ester resin system and its composites are recommended for space and vacuum applications only. Further testing is required before these materials can be recommended for long term use at elevated temperatures in an ambient air environment. The results of all analyses and tests performed as part of this study are presented as well as baseline process for fabricating thick, stage-cured composites. The manufacture of a 1 in. thick composite cylinder made with this process is also described.

  3. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  4. A methodological framework to assess the environmental and economic effects of injection barriers against seawater intrusion.

    Science.gov (United States)

    Siarkos, Ilias; Latinopoulos, Dionysis; Mallios, Zisis; Latinopoulos, Pericles

    2017-05-15

    Seawater intrusion is responsible for the progressive deterioration of groundwater quality in numerous coastal aquifers worldwide. As a consequence, seawater intrusion may constitute a serious threat to local groundwater resources, as well as to the regional economy of coastal areas. To alleviate these negative effects, a number of well-designed protective measures could be implemented. The implementation of these measures is usually associated with significant benefits for the environment and the local economy. In this perspective, the present study investigates the particular case of constructing injection barriers for controlling seawater intrusion by developing a methodological framework that combines numerical modeling with spatial and cost-benefit analyses. To this task, we introduce a novel approach, which considers the socio-economic aspects of seawater intrusion in the modeling procedure, and at the same time focuses on the spatial and temporal relationships between water salinity and farmers' income. To test the proposed methodology two alternative artificial recharge scenarios - with different volumes of water used for injection - are assessed. According to the results of this analysis, both scenarios are likely to have a positive impact on groundwater quality, as well as, a net economic benefit to local society. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Unconventional applications of conventional intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.; Matter, J.C.

    1983-01-01

    A number of conventional intrusion detection sensors exists for the detection of persons entering buildings, moving within a given volume, and crossing a perimeter isolation zone. Unconventional applications of some of these sensors have recently been investigated. Some of the applications which are discussed include detection on the edges and tops of buildings, detection in storm sewers, detection on steam and other types of large pipes, and detection of unauthorized movement within secure enclosures. The enclosures can be used around complicated control valves, electrical control panels, emergency generators, etc

  6. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  7. Introduction to gravity currents and intrusions

    CERN Document Server

    Ungarish, Marius

    2009-01-01

    The whole book is well written in a clear and pedagogical general style. … the author has, in my opinion, produced the first comprehensive book entirely devoted to the modeling of gravity currents and intrusions. This book will be particularly useful to graduate and PhD students, as well as to academics and research engineers working in this field. It may be used as a self-consistent document to get a detailed idea of the state of knowledge about a given problem or a guide toward more specialized papers. It is rich with ideas regarding the direction in which further research is warranted. This

  8. Geophysical characterization from Itu intrusive suite

    International Nuclear Information System (INIS)

    Pascholati, M.E.

    1989-01-01

    The integrated use of geophysical, geological, geochemical, petrographical and remote sensing data resulted in a substantial increase in the knowledge of the Itu Intrusive Suite. The main geophysical method was gamma-ray spectrometry together with fluorimetry and autoradiography. Three methods were used for calculation of laboratory gamma-ray spectrometry data. For U, the regression method was the best one. For K and Th, equations system and absolute calibration presented the best results. Surface gamma-ray spectrometry allowed comparison with laboratory data and permitted important contribution to the study of environmental radiation. (author)

  9. Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Su, Chunhua

    2017-01-01

    many kinds of information among sensors, whereas such network is vulnerable to a wide range of attacks, especially insider attacks, due to its natural environment and inherent unreliable transmission. To safeguard its security, intrusion detection systems (IDSs) are widely adopted in a WSN to defend...... against insider attacks through implementing proper trustbased mechanisms. However, in the era of big data, sensors may generate excessive information and data, which could degrade the effectiveness of trust computation. In this paper, we focus on this challenge and propose a way of combining Bayesian......-based trust management with traffic sampling for wireless intrusion detection under a hierarchical structure. In the evaluation, we investigate the performance of our approach in both a simulated and a real network environment. Experimental results demonstrate that packet-based trust management would become...

  10. Intrusion detection in cloud computing based attack patterns and risk assessment

    Directory of Open Access Journals (Sweden)

    Ben Charhi Youssef

    2017-05-01

    Full Text Available This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment methodologies. The aim of our solution is to combine evidences obtained from Intrusion Detection Systems (IDS deployed in a cloud with risk assessment related to each attack pattern. Our approach presents a new qualitative solution for analyzing each symptom, indicator and vulnerability analyzing impact and likelihood of distributed and multi-steps attacks directed to cloud environments. The implementation of this approach will reduce the number of false alerts and will improve the performance of the IDS.

  11. Enhancing Battlemind: Preventing PTSD by Coping with Intrusive Thoughts

    Science.gov (United States)

    2015-09-01

    Training enhancement (not treatment)  Addressing intrusive thoughts (secondary prevention of PTSD ?? decrease distress)  Mindfulness based intervention...AWARD NUMBER: W81XWH-09-1-0535 TITLE: Enhancing BATTLEMIND: Preventing PTSD by Coping with Intrusive Thoughts PRINCIPAL INVESTIGATOR...SUBTITLE 5a. CONTRACT NUMBER W81XWH-09-1-0535 Enhancing BATTLEMIND: Preventing PTSD by Coping With Intrusive Thoughts 5b. GRANT NUMBER 08194004

  12. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  13. Two Issues in Premise Plumbing: Contamination Intrusion at Service Line and Choosing Alternative Plumbing Material

    OpenAIRE

    Lee, Juneseok

    2008-01-01

    Worldwide water distribution infrastructure system is old and deteriorating. A water system with its myriad appurtenances (including pumps and valves and tanks) is susceptible to hydraulic transients resulting in high and low pressure waves alternatively passing through the network. While both low and high pressure events structurally tax the already weak system, there is copious evidence indicating intrusion of contaminants into the drinking water pipes from the pipeâ s exterior environment...

  14. A framework for implementing a Distributed Intrusion Detection System (DIDS) with interoperabilty and information analysis

    OpenAIRE

    Davicino, Pablo; Echaiz, Javier; Ardenghi, Jorge Raúl

    2011-01-01

    Computer Intrusion Detection Systems (IDS) are primarily designed to protect availability, condentiality and integrity of critical information infrastructures. A Distributed IDS (DIDS) consists of several IDS over a large network(s), all of which communicate with each other, with a central server or with a cluster of servers that facilitates advanced network monitoring. In a distributed environment, DIDS are implemented using cooperative intelligent sensors distributed across the network(s). ...

  15. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    Energy Technology Data Exchange (ETDEWEB)

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  16. [Acrylic resin removable partial dentures].

    Science.gov (United States)

    de Baat, C; Witter, D J; Creugers, N H J

    2011-01-01

    An acrylic resin removable partial denture is distinguished from other types of removable partial dentures by an all-acrylic resin base which is, in principle, solely supported by the edentulous regions of the tooth arch and in the maxilla also by the hard palate. When compared to the other types of removable partial dentures, the acrylic resin removable partial denture has 3 favourable aspects: the economic aspect, its aesthetic quality and the ease with which it can be extended and adjusted. Disadvantages are an increased risk of caries developing, gingivitis, periodontal disease, denture stomatitis, alveolar bone reduction, tooth migration, triggering of the gag reflex and damage to the acrylic resin base. Present-day indications are ofa temporary or palliative nature or are motivated by economic factors. Special varieties of the acrylic resin removable partial denture are the spoon denture, the flexible denture fabricated of non-rigid acrylic resin, and the two-piece sectional denture. Furthermore, acrylic resin removable partial dentures can be supplied with clasps or reinforced by fibers or metal wires.

  17. Epoxy resin systems for FGD units

    International Nuclear Information System (INIS)

    Brytus, V.; Puglisi, J.S.

    1984-01-01

    This paper discusses ongoing research work which is directed towards epoxy resins and curing agents which are designed to withstand aggressive environments. This work includes not only a chemical description of the materials involved, but the application testing necessary to verify the usefulness of these systems. It demonstrates that new high performance epoxy systems are superior to those which traditionally come to mind when one thinks epoxy. Finally, it discusses the results of testing designed specifically to screen candidates for use in FGD units

  18. Multi-User Low Intrusive Occupancy Detection

    Directory of Open Access Journals (Sweden)

    Azkario Rizky Pratama

    2018-03-01

    Full Text Available Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS of BLE (Bluetooth Low Energy nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach.

  19. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  20. Estimation of crystallization pressure of granite intrusions

    Science.gov (United States)

    Yang, Xue-Ming

    2017-08-01

    A numerical method is presented to estimate the crystallization pressure of granite intrusions based on two polynomial equations obtained by an analysis of the existing haplogranite ternary phase diagram and associated dataset. The results indicate that the pressure is correlated respectively with normative quartz (Qtz) content and with normative albite (Ab) plus orthoclase (Or) contents of granitic rocks as follows. where P is pressure in MPa, and R denotes correlation coefficient. It is noted that the procedure of normalizing the sum of CIPW norm (quartz, albite, orthoclase) contents to 100% is required before using Eqs. (1) and (2). The difference in pressure calculations between these two equations is ≤ 16 MPa for the range of normative quartz contents from 15 to 40 wt%. An example of how to use these equations to estimate the crystallization pressure of a granite intrusion is also provided to show the validity and convenience of this method. The uncertainty of such pressure estimation is not well known, although it must fall into the uncertainty range of the existing experimental work on pressure constraints. The simplicity of this empirical method is appreciable, although its applicability to natural granitoids needs further test. More experimental work is required to constrain the effects of components, such as CaO, FeO, MgO, F, Cl, CO2, on the granite phase equilibria. These equations, however, can be used for estimating crystallization pressures of water-saturated and quartz-oversaturated granitic systems.

  1. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  2. Chromatography resin support

    Science.gov (United States)

    Dobos, James G.

    2002-01-01

    An apparatus and method of using an improved chromatography resin support is disclosed. The chromatography support platform is provided by a stainless steel hollow cylinder adapted for being inserted into a chromatography column. An exterior wall of the stainless steel cylinder defines a groove for carrying therein an "O"-ring. The upper surface of the stainless steel column is covered by a fine stainless steel mesh welded to the edges of the stainless steel cylinder. When placed upon a receiving ledge defined within a chromatography column, the "O"-ring provides a fluid tight seal with the inner edge wall of the chromatography cylinder. The stainless steel mesh supports the chromatography matrix and provides a back flushable support which is economical and simple to construct.

  3. 21 CFR 872.3140 - Resin applicator.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Resin applicator. 872.3140 Section 872.3140 Food... DEVICES DENTAL DEVICES Prosthetic Devices § 872.3140 Resin applicator. (a) Identification. A resin applicator is a brushlike device intended for use in spreading dental resin on a tooth during application of...

  4. Resin transfer molding for advanced composite primary aircraft structures

    Science.gov (United States)

    Markus, Alan; Palmer, Ray

    1991-01-01

    Resin Transfer Molding (RTM) has been identified by Douglas Aircraft Company (DAC) and industry to be one of the promising processes being developed today which can break the cost barrier of implementing composite primary structures into a commercial aircraft production environment. The RTM process developments and scale-up plans Douglas Aircrart will be conducting under the NASA ACT contract are discussed.

  5. Degradation of dental resin composites during intra-oral wear

    NARCIS (Netherlands)

    Yulianto, Heribertus Dedy Kusuma

    2017-01-01

    Dental resin composites have become an integral part of modern dentistry and used worldwide to restore missing tooth structures, to modify tooth color and anatomical contour, and to enhance aesthetics and function. The dentist should be aware that, the aggressive complexity of the oral environment

  6. Mechanisms of Interactions of Energetic Electrons with Epoxy Resins

    Science.gov (United States)

    Gupta, A.; Coulter, D. R.; Tsay, F. D.; Moacanin, J.

    1982-01-01

    The mechanism of deactivation of energy of excitation in a resin system was investigated on optical excitation as well as excitation by high energy electrons. This mechanism involves formation of excited state complexes, known as exciplexes which have a considerable charge transfer character. This mechanism will be used to develop a degradation model for epoxy matrix materials deployed in a space environment.

  7. Molar Intrusion in Open-bite Adults Using Zygomatic Miniplates.

    Science.gov (United States)

    Marzouk, Eiman S; Abdallah, Essam Mohamed; El-Kenany, Walid A

    2015-01-01

    The aim of this study is to evaluate the skeletal, dental and soft tissue changes that arise after intrusion of the maxillary molars using zygomatic miniplates in adult skeletal anterior open bite patients. In addition to measuring the amount and rate of molar intrusion; with special emphasis on changes in the axial inclination of the intruded molars. The study group was composed of 13 anterior open bite patients (mean age 18 years, 8 months ± 2 years, 2 months) with posterior dentoalveolar excess. Mini-plates were placed in the zygomatic buttress bilaterally. The upper arch was segmentally leveled and a double Trans-Palatal Arch (TPA) was bonded. Closed NiTi coil spring was placed bilaterally between the book of the mini-plate just mesial and distal to the first molar buccal tube applying intrusive force of 450 gper side. Lateral and posteroanterior cephalograms were taken before intrusion (T1: post upper segmental leveling) and after intrusion (T2). Comparison between means before and after the intrusion was done using Wilcoxon Signed Ranks test (WSRT). Mandibular autorotation followed the molar intrusion, SNB and SN-Pog angles significantly increased while the ANB, MP-SN angle and N-S-Gn angle significantly decreased. The mean amount of accomplished molar intrusion was 3.1mm ± 0.74mm, with a rate of 0.36mm per month ± 0.08mm per month and a bite closure of 6.55mm ± 1.83mm. There was no significant buccal tip in the right and left molars upon intrusion. Conclusion: Miniplates zygomatic anchorage can be used effectively for skeletal open bite correction through posterior dento-alveolar intrusion. Intrusion of the posterior teeth with skeletal anchorage induced counterclockwise rotation of the mandible and, as a consequence, corrected the anteroposterior intermaxillary relationship with a dramatic improvement in the facial soft tissue convexity.

  8. Measurement of net nitrogen and phosphorus mineralization in wetland soils using a modification of the resin-core technique

    Science.gov (United States)

    Noe, Gregory B.

    2011-01-01

    A modification of the resin-core method was developed and tested for measuring in situ soil N and P net mineralization rates in wetland soils where temporal variation in bidirectional vertical water movement and saturation can complicate measurement. The modified design includes three mixed-bed ion-exchange resin bags located above and three resin bags located below soil incubating inside a core tube. The two inner resin bags adjacent to the soil capture NH4+, NO3-, and soluble reactive phosphorus (SRP) transported out of the soil during incubation; the two outer resin bags remove inorganic nutrients transported into the modified resin core; and the two middle resin bags serve as quality-control checks on the function of the inner and outer resin bags. Modified resin cores were incubated monthly for a year along the hydrogeomorphic gradient through a floodplain wetland. Only small amounts of NH4+, NO3-, and SRP were found in the two middle resin bags, indicating that the modified resin-core design was effective. Soil moisture and pH inside the modified resin cores typically tracked changes in the surrounding soil abiotic environment. In contrast, use of the closed polyethylene bag method provided substantially different net P and N mineralization rates than modified resin cores and did not track changes in soil moisture or pH. Net ammonification, nitrifi cation, N mineralization, and P mineralization rates measured using modified resin cores varied through space and time associated with hydrologic, geomorphic, and climatic gradients in the floodplain wetland. The modified resin-core technique successfully characterized spatiotemporal variation of net mineralization fluxes in situ and is a viable technique for assessing soil nutrient availability and developing ecosystem budgets.

  9. Towards Reliable Evaluation of Anomaly-Based Intrusion Detection Performance

    Science.gov (United States)

    Viswanathan, Arun

    2012-01-01

    This report describes the results of research into the effects of environment-induced noise on the evaluation process for anomaly detectors in the cyber security domain. This research was conducted during a 10-week summer internship program from the 19th of August, 2012 to the 23rd of August, 2012 at the Jet Propulsion Laboratory in Pasadena, California. The research performed lies within the larger context of the Los Angeles Department of Water and Power (LADWP) Smart Grid cyber security project, a Department of Energy (DoE) funded effort involving the Jet Propulsion Laboratory, California Institute of Technology and the University of Southern California/ Information Sciences Institute. The results of the present effort constitute an important contribution towards building more rigorous evaluation paradigms for anomaly-based intrusion detectors in complex cyber physical systems such as the Smart Grid. Anomaly detection is a key strategy for cyber intrusion detection and operates by identifying deviations from profiles of nominal behavior and are thus conceptually appealing for detecting "novel" attacks. Evaluating the performance of such a detector requires assessing: (a) how well it captures the model of nominal behavior, and (b) how well it detects attacks (deviations from normality). Current evaluation methods produce results that give insufficient insight into the operation of a detector, inevitably resulting in a significantly poor characterization of a detectors performance. In this work, we first describe a preliminary taxonomy of key evaluation constructs that are necessary for establishing rigor in the evaluation regime of an anomaly detector. We then focus on clarifying the impact of the operational environment on the manifestation of attacks in monitored data. We show how dynamic and evolving environments can introduce high variability into the data stream perturbing detector performance. Prior research has focused on understanding the impact of this

  10. Diffusion in composite materials made of thermosetting resins

    International Nuclear Information System (INIS)

    Morin, Bruno.

    1981-03-01

    The embedding process of low and medium level radioactive wastes in thermosetting resins allows their containment in a solid matrix. During storage the risk of circulation of water is possible. The aim of this containment process is to prevent radionuclide migration in environment. Ion migration through membranes of thermosetting resins alone or filler added were measured to evaluate released radioactivity by embedded blocks with time and to compare the different embedding formulas. Water influence on diffusion was taken into account considering that radioactive wastes dispersion is faster in a wet medium than in a dry one [fr

  11. Characterization of selected LDEF polymer matrix resin composite materials

    Science.gov (United States)

    Young, Philip R.; Slemp, Wayne S.; Witte, William G., Jr.; Shen, James Y.

    1991-01-01

    The characterization of selected graphite fiber reinforced epoxy (934 and 5208) and polysulfone (P1700) matrix resin composite materials which received 5 years and 10 months of exposure to the LEO environment on the Long Duration Exposure Facility is reported. Resin loss and a decrease in mechanical performance as well as dramatic visual effects were observed. However, chemical characterization including infrared, thermal, and selected solution property measurements showed that the molecular structure of the polymeric matrix had not changed significantly in response to this exposure. The potential effect of a silicon-containing molecular contamination of these specimens is addressed.

  12. Bulk-Fill Resin Composites

    DEFF Research Database (Denmark)

    Benetti, Ana Raquel; Havndrup-Pedersen, Cæcilie; Honoré, Daniel

    2015-01-01

    the restorative procedure. The aim of this study, therefore, was to compare the depth of cure, polymerization contraction, and gap formation in bulk-fill resin composites with those of a conventional resin composite. To achieve this, the depth of cure was assessed in accordance with the International Organization...... for Standardization 4049 standard, and the polymerization contraction was determined using the bonded-disc method. The gap formation was measured at the dentin margin of Class II cavities. Five bulk-fill resin composites were investigated: two high-viscosity (Tetric EvoCeram Bulk Fill, SonicFill) and three low......-viscosity (x-tra base, Venus Bulk Fill, SDR) materials. Compared with the conventional resin composite, the high-viscosity bulk-fill materials exhibited only a small increase (but significant for Tetric EvoCeram Bulk Fill) in depth of cure and polymerization contraction, whereas the low-viscosity bulk...

  13. and phenol–formaldehyde resin

    Indian Academy of Sciences (India)

    formaldehyde resin (PFR) modified with tetraethylorthosilicate are investigated in detail. The chemical synthesis of PFR, its modification with nanometer- sized SiO2 particles created by sol–gel method and subsequent coating, enables a preparation of ...

  14. Bending characteristics of resin concretes

    Directory of Open Access Journals (Sweden)

    Ribeiro Maria Cristina Santos

    2003-01-01

    Full Text Available In this research work the influence of composition and curing conditions in bending strength of polyester and epoxy concrete is analyzed. Various mixtures of resin and aggregates were considered in view of an optimal combination. The Taguchi methodology was applied in order to reduce the number of tests, and in order to evaluate the influence of various parameters in concrete properties. This methodology is very useful for the planning of experiments. Test results, analyzed by this methodology, shown that the most significant factors affecting bending strength properties of resin concretes are the type of resin, resin content and charge content. An optimal formulation leading to a maximum bending strength was achieved in terms of material parameters.

  15. Epoxy hydantoins as matrix resins

    Science.gov (United States)

    Weiss, J.

    1983-01-01

    Tensile strength and fracture toughness of castings of the hydantoin resins cured with methylenedianiline are significantly higher than MY 720 control castings. Water absorption of an ethyl, amyl hydantoin formulation is 2.1 percent at equilibrium and Tg's are about 160 C, approximately 15 deg below the final cure temperature. Two series of urethane and ester-extended hydantoin epoxy resins were synthesized to determine the effect of crosslink density and functional groups on properties. Castings cured with methylenedianiline or with hexahydrophthalic anhydride were made from these compounds and evaluated. The glass transition temperatures, tensile strengths and moduli, and fracture toughness values were all much lower than that of the simple hydantoin epoxy resins. Using a methylene bishydantoin epoxy with a more rigid structure gave brittle, low-energy fractures, while a more flexible, ethoxy-extended hydantoin epoxy resin gave a very low Tg.

  16. Salt Intrusion in the Tweed Estuary

    Science.gov (United States)

    Uncles, R. J.; Stephens, J. A.

    1996-09-01

    Results are presented from a 2-week field programme in the Tweed Estuary, U.K. Maximum values of the empirically based Estuarine Richardson Number, Ri E, occurred during neap tides, and minimum values occurred during spring tides. Estimated values of Ri Evaried between 0·3 and 2·3, suggesting the occurrence of partially mixed to stratified conditions, depending on tidal state and freshwater inflow. These relatively large values of Ri Ewere consistent with both observed strong salinity stratification and large salt fluxes due to vertical shear transport. Low values (0·5) values in the halocline. A velocity maximum occurred within the halocline during the early flood. Wave-like spatial oscillations of the halocline occurred on the ebb. The oscillation troughs were situated above deep holes located just down-estuary of the rail and old road bridges. There was an indication that the constricted flow between the bridges' arches resulted in enhanced mixing of near-surface waters and a thickening of the halocline. It is also possible that these wave-like structures were stationary, near-critical internal lee waves, triggered by the deep holes. Trapping of high-salinity waters occurred on the ebb. Saline pools were isolated within a deep hole or deeper section of bed by the falling halocline. When the salt wedge moved further down-estuary, the ' trapped ' waters were subjected to strongly ebbing, overlying freshwater, and were subsequently entrained and flushed. The salinity intrusion was a strong function of spring-neap tidal state and a weaker function of freshwater inflow. The estimated salinity intrusion varied from about 4·7 to 7·6 km during the fieldwork period. The strong dependence on tidal range followed from the comparable lengths of the tidal excursion and salinity intrusion. Long excursion lengths were also partly responsible for the short residence (or flushing) times and their strong dependence on spring-neap tidal state. For typical summer freshwater

  17. Autonomous acoustic/seismic networks for intrusion detection and assessment

    International Nuclear Information System (INIS)

    Swanson, D.C.; Kurtz, P.H.

    1995-01-01

    Passive acoustic and seismic sensors have the unique capability for inexpensive non-line-of-sight (NLOS) detection and identification of vehicle movements as well as human and machine activity. By networking multiple sensor sites, one can use on-site processing to minimize internode communications for data fusion to localize the target of interest. Since all acoustic and seismic sources have characteristic directivity responses to their respective noise signatures, the network also offers the ability to observe and identify these characteristics. However, in many perimeter defense situations, a simple detection is all that's really needed. Therefore, the intelligent sensor processing goal is to reduce the false alarm rate in the presence of significant changes in background noise and the environment. The authors have developed a generic hardware platform for acoustic/seismic detection and environmental characterization. They have also developed adaptive models for predicting target detectability in a dynamic environment for performance prediction of the sensor networks. Initial performance tests of the hardware are very encouraging and the authors expect acoustic/seismic sensor networks and the environmental models to have a wide variety uses in surveillance and intrusion detection

  18. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  19. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  20. Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android

    Science.gov (United States)

    2015-10-01

    ARL-TN-0681 ● OCT 2015 US Army Research Laboratory Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android by...Lightweight Intrusion Detection (ELIDe) to Android by Ken F Yu and Garret S Payer Computational and Information Sciences Directorate, ARL...

  1. Simulation of sea water intrusion in coastal aquifers

    Indian Academy of Sciences (India)

    Seawater intrusion in coastal aquifers is generally three dimensional (3-D) in nature. In the literature, there is a general lack of reported results on 3-D simulations. This paper presents some typical example simulations of 3-D seawater intrusion process for a specified hypothetical study area. The simulation results presented ...

  2. Specification Mining for Intrusion Detection in Networked Control Systems

    NARCIS (Netherlands)

    Caselli, M.; Zambon, Emmanuele; Amann, Johanna; Sommer, Robin; Kargl, Frank

    2016-01-01

    This paper discusses a novel approach to specification-based intrusion detection in the field of networked control systems. Our approach reduces the substantial human effort required to deploy a specification-based intrusion detection system by automating the development of its specification rules.

  3. Statistical decision making for authentication and intrusion detection

    NARCIS (Netherlands)

    Dimitrakakis, C.; Mitrokotsa, A.

    2009-01-01

    User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is scarce or non-existent. We review existing techniques for dealing with this problem and propose alternatives based on a

  4. Numerical modelling of seawater intrusion in Shenzhen (China ...

    Indian Academy of Sciences (India)

    A fairly good fitness between the observed and computed values was obtained by a manual trial-and-error method. ... controlling seawater intrusion in such coastal aquifer systems. 1. Introduction. Seawater intrusion constitutes a ..... reveals that FEFLOW is an effective and robust simulation tool for studying variable-density.

  5. Soft-sensing, non-intrusive multiphase flow meter

    NARCIS (Netherlands)

    Wrobel, K.; Schiferli, W.

    2009-01-01

    For single phase flow meters more and better non-intrusive or even clamp-on meters become available. This allows for a wider use of meters and for easier flow control. As the demand for multiphase meters is increasing, the current aim is to develop a non-intrusive multiphase flow meter. The

  6. Performance Assessment of Network Intrusion-Alert Prediction

    Science.gov (United States)

    2012-09-01

    through honeypots, machines explicitly designated solely to learn the methods used by black-hats to probe and hack a system so that a network...Maintaining access Miscellanous Reverse engineering RFID tools Table 3. BackTrack Intrusion-detection System/Intrusion-prevention System Penetration

  7. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Seawater intrusion in coastal aquifers is generally three dimensional (3-D) in nature. In the literature, there is a general lack of reported results on 3-D simulations. This paper presents some typical example simulations of 3-D seawater intrusion process for a specified hypothetical study area. The simulation results presented ...

  8. Resin glycosides from Porana duclouxii.

    Science.gov (United States)

    Ding, Wen-Bing; Zhang, Dai-Gui; Liu, Chun-Jie; Li, Guan-Hua; Li, You-Zhi

    2014-01-01

    A new intact resin glycoside (3) and two glycosidic acids (1 and 2), all having a common trisaccharide moiety and (11S)-hydroxytetradecanoic acid or (3S,11S)-dihydroxytetradecanoic acid as the aglycone, were obtained from the roots of Porana duclouxii. Their structures were elucidated by spectroscopic analyses and chemical correlations. These compounds represent the first examples of resin glycosides from the genus Porana.

  9. Karakteristik Komposit Resin Berkemampuan Mengalir

    Directory of Open Access Journals (Sweden)

    Bambang Irawan

    2015-10-01

    Full Text Available The use of resin composites as posterior restoratives has markedly increased over the past decade. The patients demand for better esthetics, concerns related to possible mercury toxicity from amalgam and improvements in resin composite materials have significantly contributed the popularity of these materials. Early problems related to composites included excessive wear, less of anatomic form, post operative sensitivity, secondary caries and marginal leakage. Marginal adaptation still remains an unavoidable problem for composite restoration, especially at the gingival wall of cervical or Class II restoration. In an attempt to improve marginal sealing, many techniques and lining materials have been designed. To reduce stress generated by polymerization shrinkage, applying and curing of resin composites in layers is often recommended. Using a thick adhesive layer or low-viscosity resin may, due to its elastic properties, serve as a flexible intermediate layer and compensate for the polymerization stress created in resin composite. Flowable composites were created by retaining the same small particle size of traditional hybrid composite but reducing the filler content and allowing the increased resin to reduce the viscosity of the mixture. Flowable composites were introduced in 1996 as liners, fissure sealants and also in tunnel preparations. They have been suggested for Class I, II, III and V cavity restorations, preventive resin restorations and composite, porcelain and amalgam repairing. Their usage as a liner under high filled resins in posterior restorations has been shown to improve the adaptation of composites and effectively achieve clinically acceptable results. This article attempts to give a broad characteristics of different types of flowable composites. 

  10. Liquid monobenzoxazine based resin system

    Science.gov (United States)

    Tietze, Roger; Nguyen, Yen-Loan; Bryant, Mark

    2014-10-07

    The present invention provides a liquid resin system including a liquid monobenzoxazine monomer and a non-glycidyl epoxy compound, wherein the weight ratio of the monobenzoxazine monomer to the non-glycidyl epoxy compound is in a range of about 25:75 to about 60:40. The liquid resin system exhibits a low viscosity and exceptional stability over an extended period of time making its use in a variety of composite manufacturing methods highly advantageous.

  11. Characteristics of resin floc dispersion of anion and cation exchange resin in precoat filter using powdered ion exchange resin

    Energy Technology Data Exchange (ETDEWEB)

    Adachi, Tetsurou (Nitto Denko Corp., Ibaraki, Osaka (Japan)); Sawa, Toshio; Shindoh, Toshikazu

    1989-09-01

    The filtration performance of mixed filter aid consisting of powdered anion and cation exchange resins used in the precoat filter is closely related to the characteristics of resin floc dispersion. The factors related to resin floc dispersion of anion and cation exchange resin were investigated by measuring the specific settle volume of resin floc as an evaluating index in addition to the measurement of physical, chemical and electrochemical properties of powdered ion exchange resin. The effect of adsorption of iron oxide and polymer electrolyte and of ion exchange were determined. In addition, considered floc dispersion with adsorbing iron oxide, it was assumed that the amount and filling ratio of resin floc were related to summation and multiplication of surface electric charge respectively. An experimental expression was obtained for simulation of the change of specific settle volume of resin floc by particle size, surface area, ion exchange capacity and degree of ionization of the powdered ion exchange resin. (author).

  12. Characteristics of resin floc dispersion of anion and cation exchange resin in precoat filter using powdered ion exchange resin

    International Nuclear Information System (INIS)

    Adachi, Tetsurou; Sawa, Toshio; Shindoh, Toshikazu.

    1989-01-01

    The filtration performance of mixed filter aid consisting of powdered anion and cation exchange resins used in the precoat filter is closely related to the characteristics of resin floc dispersion. The factors related to resin floc dispersion of anion and cation exchange resin were investigated by measuring the specific settle volume of resin floc as an evaluating index in addition to the measurement of physical, chemical and electrochemical properties of powdered ion exchange resin. The effect of adsorption of iron oxide and polymer electrolyte and of ion exchange were determined. In addition, considered floc dispersion with adsorbing iron oxide, it was assumed that the amount and filling ratio of resin floc were related to summation and multiplication of surface electric charge respectively. An experimental expression was obtained for simulation of the change of specific settle volume of resin floc by particle size, surface area, ion exchange capacity and degree of ionization of the powdered ion exchange resin. (author)

  13. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  14. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  15. Network Intrusion Detection with Threat Agent Profiling

    Directory of Open Access Journals (Sweden)

    Tomáš Bajtoš

    2018-01-01

    Full Text Available With the increase in usage of computer systems and computer networks, the problem of intrusion detection in network security has become an important issue. In this paper, we discuss approaches that simplify network administrator’s work. We applied clustering methods for security incident profiling. We consider K-means, PAM, and CLARA clustering algorithms. For this purpose, we used data collected in Warden system from various security tools. We do not aim to differentiate between normal and abnormal network traffic, but we focus on grouping similar threat agents based on attributes of security events. We suggest a case of a fine classification and a case of a coarse classification and discuss advantages of both cases.

  16. USBcat - Towards an Intrusion Surveillance Toolset

    Directory of Open Access Journals (Sweden)

    Chris Chapman

    2014-10-01

    Full Text Available This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by observing the behaviour and communications of the intruder. Subsequently a more complete picture of the attacker's identity, objectives, capabilities, and infiltration could be formulated than is possible with present technologies. This research focused on developing an extensible framework to permit the covert investigation of malware. Additionally, a Universal Serial Bus (USB Mass Storage Device (MSD based covert channel was designed to enable remote command and control of the framework. The work was validated through the design, implementation and testing of a toolset.

  17. Stress, intrusive imagery, and chronic distress

    International Nuclear Information System (INIS)

    Baum, A.

    1990-01-01

    Discusses the nature of stress in the context of problems with its definition and sources of confusion regarding its usefulness and specificity. Stress can be defined as a negative emotional experience accompanied by predictable biochemical, physiological, and behavioral changes that are directed toward adaptation either by manipulating the situation to alter the stressor or by accommodating its effects. Chronic stress is more complex than most definitions suggest and is clearly not limited to situations in which stressors persist for long periods of time. Responses may habituate before a stressor disappears or may persist long beyond the physical presence of the stressor. This latter case, in which chronic stress and associated biobehavioral changes outlast their original cause, is considered in light of research at Three Mile Island and among Vietnam veterans. The role of intrusive images of the stressor or uncontrollable thoughts about it in maintaining stress is explored

  18. Introduction To Intrusion Detection System Review

    Directory of Open Access Journals (Sweden)

    Rajni Tewatia

    2015-05-01

    Full Text Available Abstract Security of a network is always an important issue. With the continuously growing network the basic security such as firewall virus scanner is easily deceived by modern attackers who are experts in using software vulnerabilities to achieve their goals. For preventing such attacks we need even smarter security mechanism which act proactively and intelligently. Intrusion Detection System is the solution of such requirement. Many techniques have been used to implement IDS. These technique basically used in the detector part of IDS such as Neural Network Clustering Pattern Matching Rule Based Fuzzy Logic Genetic Algorithms and many more. To improve the performance of an IDS these approaches may be used in combination to build a hybrid IDS so that benefits of two o more approaches may be combined.

  19. Metallogenic aspects of Itu intrusive suite

    International Nuclear Information System (INIS)

    Amaral, G.; Pascholati, E.M.

    1990-01-01

    The integrated use of geological, geochemical, geophysical and remote sensing data is providing interesting new information on the metallogenic characteristics of the Itu Intrusive Suite. During World War II, up to 1959, a wolframite deposit was mined near the border of the northernmost body (Itupeva Granite). This deposit is formed by greisen veins associated with cassiterite and topaz, clearly linked with later phases of magmatic differentiation. Generally those veins are related to hydrothermal alteration of the granites and the above mentioned shear zone. U, Th and K determinations by field and laboratory gammaspectrometry were used for regional distribution analysis of those elements and its ratios and calculation of radioactivity heat production. In this aspects, the Itupeva Granite is the hottest and presents several anomalies in the Th/U ratio, indicative of late or post magmatic oxidation processes. (author)

  20. Coastal Marsh Monitoring for Persistent Saltwater Intrusion

    Science.gov (United States)

    Hall, Callie M.

    2008-01-01

    This viewgraph presentation reviews NASA's work on the project that supports the Gulf of Mexico Alliance (GOMA) Governors Action Plan to monitor the coastal wetlands for saltwater intrusion. The action items that relate to the task are: (1) Obtain information on projected relative sea level rise, subsidence, and storm vulnerability to help prioritize conservation projects, including restoration, enhancement, and acquisition, and (2) Develop and apply ecosystem models to forecast the habitat structure and succession following hurricane disturbance and changes in ecological functions and services that impact vital socio-economic aspects of coastal systems. The objectives of the program are to provide resource managers with remote sensing products that support ecosystem forecasting models requiring salinity and inundation data. Specifically, the proposed work supports the habitat-switching modules in the Coastal Louisiana Ecosystem Assessment and Restoration (CLEAR) model, which provides scientific evaluation for restoration management.

  1. Poleward intrusion in the northern Galician shelf

    Science.gov (United States)

    Alvarez, I.; Ospina-Alvarez, N.; deCastro, M.; Varela, M.; Gomez-Gesteira, M.; Prego, R.

    2010-05-01

    The evolution of a warm water mass related to the Iberian Poleward Current (IPC) was characterized along the northern Galician shelf in November 2008 by means of Sea Surface Temperature and wind data. It was observed that under upwelling favorable conditions water temperature decreased along the northern coast and a temperature break appeared between Cape Vilano and Cape Ortegal showing a relaxation of the poleward intrusion. The effect of the IPC was also analyzed inside the Northern Galician Rias taking into account the hydrographical and biogeochemical properties measured on November 18. Water driven by the IPC was observed close to the mouth of the rias, around Cape Estaca de Bares, causing a nutrient salts decrease. Inside the rias a slight biological activity was found near surface resulting from fluvial contributions.

  2. Emplacement of sandstone intrusions during contractional tectonics

    Science.gov (United States)

    Palladino, Giuseppe; Grippa, Antonio; Bureau, Denis; Alsop, G. Ian; Hurst, Andrew

    2016-08-01

    Sandstone injections are created by the forceful emplacement of remobilized sand in response to increases in overpressure. However, the contribution provided by horizontal compressive stress to the build-up in overpressure, and the resulting emplacement of sand injection complexes, is still to be substantiated by robust field observations. An opportunity to address this issue occurs in Central California where a large volume of sandstone intrusions record regionally-persistent supra-lithostatic pore-pressure. Detailed fieldwork allows sandstone-filled thrusts to be recognized and, for the first time, permits us to demonstrate that some sandstone intrusions are linked to contractional deformation affecting the western border of the Great Valley Basin. Fluidized sand was extensively injected along thrust surfaces, and also fills local dilatant cavities linked to thrusting. The main aims of this paper are to provide detailed descriptions of the newly recognized syn-tectonic injections, and describe detailed cross-cutting relationships with earlier sandstone injection complexes in the study area. Finally, an evolutionary model consisting of three phases of sand injection is provided. In this model, sand injection is linked to contractional tectonic episodes affecting the western side of the Great Valley Basin during the Early-Middle Cenozoic. This study demonstrates that sand injections, driven by fluid overpressure, may inject along thrusts and folds and thereby overcome stresses associated with regional contractional deformation. It is shown that different generations of sand injection can develop in the same area under the control of different stress regimes, linked to the evolving mountain chain.

  3. Principais métodos de caracterização da porosidade de resinas à base de divinilbenzeno The most important methods for the characterization of porosity of styrene-divinylbenzene based resins

    Directory of Open Access Journals (Sweden)

    Viviane Gomes Teixeira

    2001-12-01

    Full Text Available This paper reviews the most important methods used to characterize the porosity of styrene-divinylbenzene resins. Methods such as adsorption of nitrogen for determination of surface area and mercury intrusion porosimetry for characterization of pore size distribution are related.

  4. On Cyber Attacks and Signature Based Intrusion Detection for MODBUS Based Industrial Control Systems

    Directory of Open Access Journals (Sweden)

    Wei Gao

    2014-03-01

    Full Text Available Industrial control system communication networks are vulnerable to reconnaissance, response injection, command injection, and denial of service attacks.  Such attacks can lead to an inability to monitor and control industrial control systems and can ultimately lead to system failure. This can result in financial loss for control system operators and economic and safety issues for the citizens who use these services.  This paper describes a set of 28 cyber attacks against industrial control systems which use the MODBUS application layer network protocol. The paper also describes a set of standalone and state based intrusion detection system rules which can be used to detect cyber attacks and to store evidence of attacks for post incident analysis. All attacks described in this paper were validated in a laboratory environment. The detection rate of the intrusion detection system rules presented by attack class is also presented.

  5. An intrusion prevention system as a proactive security mechanism in network infrastructure

    Directory of Open Access Journals (Sweden)

    Dulanović Nenad

    2008-01-01

    Full Text Available A properly configured firewall is a good starting point in securing a computer network. However, complex network environments that involve higher number of participants and endpoints require better security infrastructure. Intrusion Detection Systems (IDS, proposed as a solution to perimeter defense, have many open problems and it is clear that better solutions must be found. Due to many unsolved problems associated with IDS, Intrusion Prevention Systems (IPS are introduced. The main idea in IPS is to be proactive. This paper gives an insight of Cobrador Bouncer IPS implementation. System architecture is given and three different Bouncer IPS deployment modes are presented. The Bouncer IPS as a proactive honeypot is also discussed.

  6. Stochastic Optimization for an Analytical Model of Saltwater Intrusion in Coastal Aquifers.

    Science.gov (United States)

    Stratis, Paris N; Karatzas, George P; Papadopoulou, Elena P; Zakynthinaki, Maria S; Saridakis, Yiannis G

    The present study implements a stochastic optimization technique to optimally manage freshwater pumping from coastal aquifers. Our simulations utilize the well-known sharp interface model for saltwater intrusion in coastal aquifers together with its known analytical solution. The objective is to maximize the total volume of freshwater pumped by the wells from the aquifer while, at the same time, protecting the aquifer from saltwater intrusion. In the direction of dealing with this problem in real time, the ALOPEX stochastic optimization method is used, to optimize the pumping rates of the wells, coupled with a penalty-based strategy that keeps the saltwater front at a safe distance from the wells. Several numerical optimization results, that simulate a known real aquifer case, are presented. The results explore the computational performance of the chosen stochastic optimization method as well as its abilities to manage freshwater pumping in real aquifer environments.

  7. Stochastic Optimization for an Analytical Model of Saltwater Intrusion in Coastal Aquifers.

    Directory of Open Access Journals (Sweden)

    Paris N Stratis

    Full Text Available The present study implements a stochastic optimization technique to optimally manage freshwater pumping from coastal aquifers. Our simulations utilize the well-known sharp interface model for saltwater intrusion in coastal aquifers together with its known analytical solution. The objective is to maximize the total volume of freshwater pumped by the wells from the aquifer while, at the same time, protecting the aquifer from saltwater intrusion. In the direction of dealing with this problem in real time, the ALOPEX stochastic optimization method is used, to optimize the pumping rates of the wells, coupled with a penalty-based strategy that keeps the saltwater front at a safe distance from the wells. Several numerical optimization results, that simulate a known real aquifer case, are presented. The results explore the computational performance of the chosen stochastic optimization method as well as its abilities to manage freshwater pumping in real aquifer environments.

  8. A novel interacting multiple model based network intrusion detection scheme

    Science.gov (United States)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  9. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  10. The Experience of Intrusions Scale: a preliminary examination.

    Science.gov (United States)

    Salters-Pedneault, Kristalyn; Vine, Vera; Mills, Mary Alice; Park, Crystal; Litz, Brett T

    2009-01-01

    Intrusive thoughts (i.e., unwelcome, distressing, involuntary thoughts) are prevalent in a variety of clinical conditions and are increasingly a focus of translational research. The goal of this study was to develop and preliminarily examine a brief self-report measure designed to assess clinically relevant aspects of the experience of intrusive thoughts related to a particular target. The Experience of Intrusions Scale (EIS) is a five-item measure that assesses the frequency, unpredictability, and unwantedness of intrusive thoughts, as well as the interference and distress caused by the intrusions, each on a five-point Likert-type scale. Five times over a four-] period, female undergraduates (N=160) completed the EIS in response to intrusive thoughts regarding a film clip depicting a sexual assault. On the first and last days, participants completed the EIS five minutes after watching the clip. In between film clip viewings, participants completed the EIS once per day. The EIS demonstrated good internal consistency, good to excellent test-retest reliability using both immediate post-stimulus and 24-hour time intervals, and convergent validity with two existing measures of intrusive phenomena: the White Bear Suppression Inventory (Wegner & Zanakos, 1994) and the Post-traumatic Stress Disorder Checklist-Civilian Version (Weathers, Litz, Herman, Huska, & Keane, 1993).

  11. The role of stress during memory reactivation on intrusive memories.

    Science.gov (United States)

    Cheung, Jessica; Garber, Benjamin; Bryant, Richard A

    2015-09-01

    Intrusive memories are unwanted recollections that maintain distress in psychological disorders. Increasing evidence suggests that memories that are reactivated through retrieval become temporarily vulnerable to environmental or pharmacological manipulation, including changes in levels of circulating stress hormones. This study investigated the influence of stress during memory reactivation of an emotionally arousing trauma film on subsequent intrusive memories. Three groups of participants (N=63) viewed a trauma film depicting a serious car accident at baseline. Two days later (Time 2), one group received a reactivation induction following a socially evaluated cold pressor test (SECPT; Stress/Reactivation condition), whilst the second group reactivated the memory after a control procedure (Reactivation condition). A third group underwent the SECPT but was not asked to reactivate memory of the trauma film (Stress condition). Two days later (Time 3), all participants received a surprise cued memory recall test and intrusions questionnaire which they completed online. Results showed that those in the Stress/Reactivation group had higher intrusions scores than the other two groups, suggesting that acute stress promotes intrusive memories only when the memory trace is reactivated shortly afterwards. Increased cortisol predicted enhanced intrusive experiences in the Stress/Reactivation condition but not in the other conditions. This pattern of results suggests that acute stress during the reactivation of emotional material impacts on involuntary emotional memories. These findings suggest a possible explanation for the mechanism underlying the maintenance of intrusive memories in clinical disorders. Copyright © 2015 Elsevier Inc. All rights reserved.

  12. An assessment of the radiological impact of human intrusion at the UK Low Level Waste Repository (LLWR) - 59356

    International Nuclear Information System (INIS)

    Hicks, Tim; Baldwin, Tamara; Cummings, Richard; Sumerling, Trevor

    2012-01-01

    The UK Low Level Waste Repository Ltd submitted an Environmental Safety Case for the disposal of low-level waste (LLW) to the Environment Agency on the 1 May 2011. The Environmental Safety Case (ESC) presents a complete case for the environmental safety of the Low Level Waste Repository (LLWR) both during operations and in the long term (Cummings et al, in these proceedings). This includes an assessment of the long-term radiological safety of the facility, including an assessment of the potential consequences of human intrusion at the site. The human intrusion assessment is based on a cautiously realistic approach in defining intrusion cases and parameter values. A range of possible human intrusion events was considered based on present-day technologies and credible future uses of the site. This process resulted in the identification of geotechnical investigations, a housing development and a smallholding as requiring quantitative assessment. A particular feature of the site is that, because of its proximity to the coast and in view of expected global sea-level rise, it is vulnerable to coastal erosion. During such erosion, wastes and engineered barrier materials will be exposed, and could become targets for investigation or recovery. Therefore, human intrusion events have been included that are associated with such activities. A radiological assessment model has been developed to analyse the impacts of potential human intrusion at the site. A key feature of the model is the representation of the spatial layout of the disposal site, including the engineered cap design and the large-scale spatial heterogeneity of radionuclide concentrations within the repository. The model has been used to calculate the radiation dose to intruders and to others following intrusion at different times and at different locations across the site, for the each of the selected intrusion events, considering all relevant exposure modes. Potential doses due to radon and its daughters in

  13. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  14. Resin technologies: construction and staining of resin TMA's.

    Science.gov (United States)

    Howat, William J; Wilson, Susan J

    2010-01-01

    The traditional formaldehyde-fixed paraffin-embedded tissue, and therefore the tissue microarrays created from it, provide good morphology but with a compromised antigenicity when compared to frozen tissue. In contrast, while solving the issue of antigenicity, frozen tissue suffers from a lack of morphology. We have demonstrated that tissue microarrays constructed in glycol methacrylate resin, when combined with a cold acetone fixation step, have been able to combine the superior morphology of resin-embedded sections with the superior antigenicity of frozen tissue for prospectively collected material.

  15. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    International Nuclear Information System (INIS)

    Gomez, Andres; Lara, Camilo; Kebschull, Udo

    2015-01-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machine Learning approach. We plan to implement the proposed framework as a software prototype that will be tested as a component of the ALICE Grid middleware. (paper)

  16. Epoxy Resins in Electron Microscopy

    Science.gov (United States)

    Finck, Henry

    1960-01-01

    A method of embedding biological specimens in araldite 502 (Ciba) has been developed for materials available in the United States. Araldite-embedded tissues are suitable for electron microscopy, but the cutting qualities of the resin necessitates more than routine attention during microtomy. The rather high viscosity of araldite 502 also seems to be an unnecessary handicap. The less viscous epoxy epon 812 (Shell) produces specimens with improved cutting qualities, and has several features—low shrinkage and absence of specimen damage during cure, minimal compression of sections, relative absence of electron beam-induced section damage, etc.—which recommends it as a routine embedding material. The hardness of the cured resin can be easily adjusted by several methods to suit the materials embedded in it. Several problems and advantages of working with sections of epoxy resins are also discussed. PMID:13822825

  17. Process for Molding Nonreinforced (Neat) Resins

    Science.gov (United States)

    Dickerson, G. E.

    1983-01-01

    Void free moldings obtained for neat, condensation, thermosetting resins. Thermally and mechanically treat resin prior to molding to reduce amount of volatiles. With volatiles reduced molding temperature and pressure are applied in way to drive out remaining volatiles during molding.

  18. 21 CFR 172.280 - Terpene resin.

    Science.gov (United States)

    2010-04-01

    ... CONSUMPTION (CONTINUED) FOOD ADDITIVES PERMITTED FOR DIRECT ADDITION TO FOOD FOR HUMAN CONSUMPTION Coatings, Films and Related Substances § 172.280 Terpene resin. The food additive terpene resin may be safely used...

  19. Action of ionizing radiation on epoxy resins

    Energy Technology Data Exchange (ETDEWEB)

    Van de Voorde, M. E.

    1970-12-01

    The resistance of classical and experimental epoxy resins to irradiation was studied. The resistance to irradiation of epoxy resins of diverse compositions as well as the development of resins having a radioresistance that approaches that of certain ceramics are discussed. Sources of irradiation and the techniques of dosimetry used are described. The structures of certain epoxy resins and of hardeners are given. The preparation of these resins and their physical properties is described. The effects of radiation on epoxy resins, as well as conditions of irradiation, and suggested mechanisms for degradation of the irradiated resins are discussed. The relationship between chemical structure of the resins and their physical properties is evaluated. (115 references) (JCB)

  20. Intrusion signature creation via clustering anomalies

    Science.gov (United States)

    Hendry, Gilbert R.; Yang, Shanchieh J.

    2008-03-01

    Current practices for combating cyber attacks typically use Intrusion Detection Systems (IDSs) to detect and block multistage attacks. Because of the speed and impacts of new types of cyber attacks, current IDSs are limited in providing accurate detection while reliably adapting to new attacks. In signature-based IDS systems, this limitation is made apparent by the latency from day zero of an attack to the creation of an appropriate signature. This work hypothesizes that this latency can be shortened by creating signatures via anomaly-based algorithms. A hybrid supervised and unsupervised clustering algorithm is proposed for new signature creation. These new signatures created in real-time would take effect immediately, ideally detecting new attacks. This work first investigates a modified density-based clustering algorithm as an IDS, with its strengths and weaknesses identified. A signature creation algorithm leveraging the summarizing abilities of clustering is investigated. Lessons learned from the supervised signature creation are then leveraged for the development of unsupervised real-time signature classification. Automating signature creation and classification via clustering is demonstrated as satisfactory but with limitations.

  1. A Review of Vapor Intrusion Models

    Science.gov (United States)

    Yao, Yijun; Suuberg, Eric M.

    2013-01-01

    A complete vapor intrusion (VI) model, describing vapor entry of volatile organic chemicals (VOCs) into buildings located on contaminated sites, generally consists of two main parts-one describing vapor transport in the soil and the other its entry into the building. Modeling the soil vapor transport part involves either analytically or numerically solving the equations of vapor advection and diffusion in the subsurface. Contaminant biodegradation must often also be included in this simulation, and can increase the difficulty of obtaining a solution, especially when explicitly considering coupled oxygen transport and consumption. The models of contaminant building entry pathway are often coupled to calculations of indoor air contaminant concentration, and both are influenced by building construction and operational features. The description of entry pathway involves consideration of building foundation characteristics, while calculation of indoor air contaminant levels requires characterization of building enclosed space and air exchange within this. This review summarizes existing VI models, and discusses the limits of current screening tools commonly used in this field. PMID:23360069

  2. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei

    2010-01-01

    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  3. Geochemistry and petrogenesis of the Feshark intrusion (NE Isfahan city

    Directory of Open Access Journals (Sweden)

    Ali Kananian

    2017-11-01

    variations in La/Yb and Tb/Yb ratios, suggesting fractional crystallization. Chondrite-normalized REE patterns (Sun and McDonough, 1989 of all the samples essentially have the same shape with light REE (LREE enrichment, flat high REE (HREE and significant negative Eu anomalies. All of the samples exhibit similar trace element abundance patterns, with enrichment in large ion lithophile elements (LILE and negative anomalies in high field strength elements (HFSE; e.g. Ba, Nb, Ta, P, and Ti compared to primitive mantle (Sun and McDonough, 1989. The enrichment of LILE and LREE relative to the HFSE and HREE along with Nb, Ta, and Ti anomalies display close similarities to those of magmatic arc granites (Pearce et al., 1984 and also negative Nb–Ti anomalies are thought to be related to the fractionation of Ti-bearing phases (titanite, etc.. Moreover, these are the typical features of arc and / or crustal contamination (Kuster and Harms, 1998, while the negative P anomalies should result from apatite fractionation. The increasing of Ba and slightly decreasing Sr with increasing Rb, indicate that plagioclase fractionation plays an important role in the evolution of the studied intrusion. Tectonic environment discrimination diagrams such as Nb vs. Y, Nb vs. Yb+Ta (Pearce et al., 1984 and Th/Yb vs. Ta/Yb (Pearce, 1983 with enrichment in the LILE and LREE relative to HFSE and HREE and negative anomaly in the Nb, Ti and Eu indicate that their initial magma is generated in the subduction zone related to an active continental margin setting. ‏The rocks genesis determining diagrams such as Nb vs. Nb/U (Taylor and McLennan, 1985, Ti vs. Ti/Zr (Rudnick et al. 2000, (La/Smcn vs. Nb/U (Hofmann et al., 1986, and Sr/Y vs. Y (Sun and McDonough, 1989 show that the magma was probably generated by partial melting of amphibolitic continental crust. References He, Y., Zhao, G., Sun, M. and Han, Y., 2009. Petrogenesis and tectonic setting of volcanic rocks in the Xiaoshan and Waifangshan areas along

  4. Vitrification of cesium-contaminated organic ion exchange resin

    International Nuclear Information System (INIS)

    Sargent, T.N. Jr.

    1994-08-01

    Vitrification has been declared by the Environmental Protection Agency (USEPA) as the Best Demonstrated Available Technology (BDAT) for the permanent disposal of high-level radioactive waste. Savannah River Site currently uses a sodium tetraphenylborate (NaTPB) precipitation process to remove Cs-137 from a wastewater solution created from the processing of nuclear fuel. This process has several disadvantages such as the formation of a benzene waste stream. It has been proposed to replace the precipitation process with an ion exchange process using a new resorcinol-formaldehyde resin developed by Savannah River Technical Center (SRTC). Preliminary tests, however, showed that problems such as crust formation and a reduced final glass wasteform exist when the resin is placed in the melter environment. The newly developed stirred melter could be capable of overcoming these problems. This research explored the operational feasibility of using the stirred tank melter to vitrify an organic ion exchange resin. Preliminary tests included crucible studies to determine the reducing potential of the resin and the extent of oxygen consuming reactions and oxygen transfer tests to approximate the extent of oxygen transfer into the molten glass using an impeller and a combination of the impeller and an external oxygen transfer system. These preliminary studies were used as a basis for the final test which was using the stirred tank melter to vitrify nonradioactive cesium loaded organic ion exchange resin. Results from this test included a cesium mass balance, a characterization of the semi-volatile organic compounds present in the off gas as products of incomplete combustion (PIC), a qualitative analysis of other volatile metals, and observations relating to the effect the resin had on the final redox state of the glass

  5. Vitrification of cesium-contaminated organic ion exchange resin

    Energy Technology Data Exchange (ETDEWEB)

    Sargent, Jr., Thomas N. [Clemson Univ., SC (United States)

    1994-08-01

    Vitrification has been declared by the Environmental Protection Agency (USEPA) as the Best Demonstrated Available Technology (BDAT) for the permanent disposal of high-level radioactive waste. Savannah River Site currently uses a sodium tetraphenylborate (NaTPB) precipitation process to remove Cs-137 from a wastewater solution created from the processing of nuclear fuel. This process has several disadvantages such as the formation of a benzene waste stream. It has been proposed to replace the precipitation process with an ion exchange process using a new resorcinol-formaldehyde resin developed by Savannah River Technical Center (SRTC). Preliminary tests, however, showed that problems such as crust formation and a reduced final glass wasteform exist when the resin is placed in the melter environment. The newly developed stirred melter could be capable of overcoming these problems. This research explored the operational feasibility of using the stirred tank melter to vitrify an organic ion exchange resin. Preliminary tests included crucible studies to determine the reducing potential of the resin and the extent of oxygen consuming reactions and oxygen transfer tests to approximate the extent of oxygen transfer into the molten glass using an impeller and a combination of the impeller and an external oxygen transfer system. These preliminary studies were used as a basis for the final test which was using the stirred tank melter to vitrify nonradioactive cesium loaded organic ion exchange resin. Results from this test included a cesium mass balance, a characterization of the semi-volatile organic compounds present in the off gas as products of incomplete combustion (PIC), a qualitative analysis of other volatile metals, and observations relating to the effect the resin had on the final redox state of the glass.

  6. Radiation resistance of epoxy resins and their composistes

    International Nuclear Information System (INIS)

    Sonoda, Katsumi; Hayashi, Osamu; Tanaka, Takao; Hirabayashi, Shoji; Amakawa, Tadashi.

    1984-01-01

    In the electric equipment installed inside containment vessels in nuclear power plants, many epoxy resins have been employed as insulating materials. However, there are very few reports on the investigation of their properties in such environment, specifically under LOCA (Loss-of-Coolant Accident) conditions. This paper investigates on the electrical and mechanical properties of the epoxy resins supposed to be applicable to the actual equipment, by LOCA simulation. The epoxy resins used for the experiment were the following three types: (1) typical epoxy resin, bisphenol A group; (2) novolak group epoxy resins in consideration of improving humidity resistance; and (3) triazine group epoxy resins for the purpose of giving radiation, humidity and heat resistances. The last one includes the composites with Nomex and with laminated mica. After LOCA simulation which is composed of up to 2 MGy irradiation of 60 Co γ-ray at the dose rate of 10 4 Gy/h and the exposure to high temperature saturated steam, the electrical properties of dielectric tangent, insulation breakdown voltage (BDV) and conductivity and the mechanical properties of bending strength and viscoelasticity were measured. In the paper, the experimental results are described in detail. Of these, the triazine group epoxy/Nomex composite did not show swelling, but demonstrated stable radiation resistance. It is excellent in the electrical and mechanical properties, and also shows good dimension-stability. In LOCA simulation, its bending strength was reduced than that for only γ-irradiation of 2 MGy, but still had the residual strength of about 80 %. (Wakatsuki, Y.)

  7. Method for loading resin beds

    International Nuclear Information System (INIS)

    Notz, K.J.; Rainey, R.H.; Greene, C.W.; Shockley, W.E.

    1978-01-01

    An improved method of preparing nuclear reactor fuel by carbonizing a uranium loaded cation exchange resin provided by contacting a H+ loaded resin with a uranyl nitrate solution deficient in nitrate, comprises providing the nitrate deficient solution by a method comprising the steps of reacting in a reaction zone maintained between about 145 to 200 0 C, a first aqueous component comprising a uranyl nitrate solution having a boiling point of at least 145 0 C with a second aqueous component to provide a gaseous phase containing HNO 3 and a reaction product comprising an aqueous uranyl nitrate solution deficient in nitrate

  8. Uranium sorption by tannin resins

    International Nuclear Information System (INIS)

    Olivares Rieumont, S.; Martinez Luzardo, J.; Torres Hernandez, J.; Lima Cazorla, D. de la Rosa.

    1998-01-01

    The sorption of uranium by immobilised Eucalyptus Saligna Sm. and Lysiloma latisiliqua L tannins was investigated. Immobilization condition were analyzed. These resins resulted suitable adsorbent for the concentration of uranium from aqueous systems. The sorption of uranium is pH dependent. At pH 5.5 maximum in sorption capacity is registered. The presence of appreciable amount of sodium chloride do not have any effect on uranium removal. Carbonate and calcium ions in concentrations similar to these that could be found in sea water and other natural water do not decrease the uranium uptake. Tannin resins can be used several times without an appreciable decay of their sorption capacity

  9. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    Directory of Open Access Journals (Sweden)

    S. Ganapathy

    2012-01-01

    Full Text Available Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set.

  10. Intelligent agent-based intrusion detection system using enhanced multiclass SVM.

    Science.gov (United States)

    Ganapathy, S; Yogesh, P; Kannan, A

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set.

  11. Bacterial amplification and in-place carpet drying: implications for category 1 water intrusion restoration.

    Science.gov (United States)

    Holland, Jim; Banta, John; Passmore, Boni; Ayers, Mark; Abbott, Sean P; Cole, Eugene C

    2012-05-01

    The study described in this article investigated whether in-place carpet drying processes resulted in bacterial amplification following water intrusion from a clean water source (category 1) in a residential indoor environment. Bacterial amplification was examined after wetting a 10-year-old carpet and pad that had no history of water intrusion. Three test areas were extracted and dried using industry-recommended procedures for in-place drying and compared to a control area that was not extracted or dried. Results from carpet, pad, and subsurface dust demonstrated that bacterial amplification occurred in all test areas. CFUs of bacteria per gram of carpet surface dust and subsurface dust prior to water intrusion were lower than levels in subsurface dust after in-place drying. The authors' study contributes to information regarding the restoration of water-based carpet damage by professional water damage restoration companies, building maintenance personnel, and housekeeping managers. Results suggest that the appropriate response time for carpet pad salvage is considerably shorter than the current industry recommendation of 72 hours.

  12. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    Science.gov (United States)

    Ganapathy, S.; Yogesh, P.; Kannan, A.

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. PMID:23056036

  13. Simulating the influence of groundwater table fluctuation on vapor intrusion

    Science.gov (United States)

    Huo, J.

    2017-12-01

    The migration of volatile chemicals from groundwater to an overlying building is a commonly existing phenomenon around the world. Due to the distinction of hydrologic conditions among vapor intrusion sites, it is necessary to consider the effect of dominant hydrologic factors in order to obtain a precise site evaluation and a health risk assessment during the screening process. This study mainly discusses the impact of groundwater table fluctuation and other hydrological factors including porosity, permeability and soil moisture on the vapor intrusion transport. A two-dimensional model is configured to inject different typical volatile organic contaminants from EPA's Vapor Intrusion Database. Through quantifying the contaminant vapor concentration attenuation factors under the effect of groundwater table fluctuation, this study provides suggestions for indoor air sample and vapor intrusion assessment.

  14. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  15. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  16. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  17. Intrusion resistant underground structure (IRUS) - safety assessment and licensing

    International Nuclear Information System (INIS)

    Lange, B. A.

    1997-01-01

    This paper describes the safety goals, human exposure scenarios and critical groups, the syvac-nsure performance assessment code, groundwater pathway safety results, and inadvertent human intrusion of the IRUS. 2 tabs

  18. Novel Non-Intrusive Vibration Monitoring System for Turbopumps Project

    Data.gov (United States)

    National Aeronautics and Space Administration — ASRI proposes to develop an advanced and commercially viable Non-Intrusive Vibration Monitoring System (NI-VMS) which can provide effective on-line/off-line engine...

  19. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  20. Slick: An Intrusion Detection System for Virtualized Storage Devices

    NARCIS (Netherlands)

    Bacs, A.; Giuffrida, C.; Grill, B.; Bos, H.J.; Ossowski, Sascha

    2016-01-01

    Cloud computing is rapidly reshaping the server administration landscape. The widespread use of virtualization and the increasingly high server consolidation ratios, in particular, have introduced unprecedented security challenges for users, increasing the exposure to intrusions and opening up new

  1. Information Assurance Intrusion Detection Sensor Database Design: Lessons Learned

    National Research Council Canada - National Science Library

    Spink, Brian

    2001-01-01

    Current architectural trends in information assurance for the DOD focuses on the fusion and correlation of large volumes of data collected across several intrusion detection systems and boundary devices...

  2. How Intrusion Detection Can Improve Software Decoy Applications

    National Research Council Canada - National Science Library

    Monteiro, Valter

    2003-01-01

    This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack...

  3. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against

  4. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  5. Method of removing contaminants from plastic resins

    Energy Technology Data Exchange (ETDEWEB)

    Bohnert, George W. (Harrisonville, MO); Hand, Thomas E. (Lee' s Summit, MO); DeLaurentiis, Gary M. (Jamestown, CA)

    2008-11-18

    A method for removing contaminants from synthetic resin material containers using a first organic solvent system and a second carbon dioxide system. The organic solvent is utilized for removing the contaminants from the synthetic resin material and the carbon dioxide is used to separate any residual organic solvent from the synthetic resin material.

  6. Method of removing contaminants from plastic resins

    Energy Technology Data Exchange (ETDEWEB)

    Bohnert,George W. (Harrisonville, MO); Hand,Thomas E. (Lee' s Summit, MO); Delaurentiis,Gary M. (Jamestown, CA)

    2007-08-07

    A method for removing contaminants from synthetic resin material containers using a first organic solvent system and a second carbon dioxide system. The organic solvent is utilized for removing the contaminants from the synthetic resin material and the carbon dioxide is used to separate any residual organic solvent from the synthetic resin material.

  7. Method for removing contaminants from plastic resin

    Science.gov (United States)

    Bohnert, George W.; Hand, Thomas E.; DeLaurentiis, Gary M.

    2008-12-30

    A method for removing contaminants from synthetic resin material containers using a first organic solvent system and a second carbon dioxide system. The organic solvent is utilized for removing the contaminants from the synthetic resin material and the carbon dioxide is used to separate any residual organic solvent from the synthetic resin material.

  8. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  9. Classification of Intrusion Detection Dataset using machine learning Approaches

    OpenAIRE

    Neethu B

    2012-01-01

    The paper describes about a method of intrusion detection that uses machine learning algorithms. Here we discuss about the combinational use of two machine learning algorithms called Principal Component Analysis and Naive Bayes classifier. The dimensionality of the dataset is reduced by using the principal component analysis and the classification of the dataset in to normal and attack classes is done by using Naïve Bayes Classifier. The experiments were conducted on the intrusion detection d...

  10. Assessment of the Harmfulness of Moulding Sands with Alkyd Resin Subjected to the High Temperature Influence

    Directory of Open Access Journals (Sweden)

    Holtzer M.

    2016-12-01

    Full Text Available Out of moulding sands used in the foundry industry, sands with organic binders deserve a special attention. These binders are based on synthetic resins, which ensure obtaining the proper technological properties and sound castings, however, they negatively influence the environment. These resins in their initial state these resins are not very dangerous for people and for the environment, thus under an influence of high temperatures they generate very harmful products, being the result of their thermal decomposition. Depending on the kind of the applied resin, under an influence of a temperature such compounds as: furfuryl alcohol, formaldehyde, phenol, BTEX group (benzene, toluene, ethylbenzene, xylene, and also polycyclic aromatic hydrocarbons (PAHs can be formed and released.

  11. Intrusion Detection in Control Systems using Sequence Characteristics

    Science.gov (United States)

    Kiuchi, Mai; Onoda, Takashi

    Intrusion detection is considered effective in control systems. Sequences of the control application behavior observed in the communication, such as the order of the control device to be controlled, are important in control systems. However, most intrusion detection systems do not effectively reflect sequences in the application layer into the detection rules. In our previous work, we considered utilizing sequences for intrusion detection in control systems, and demonstrated the usefulness of sequences for intrusion detection. However, manually writing the detection rules for a large system can be difficult, so using machine learning methods becomes feasible. Also, in the case of control systems, there have been very few observed cyber attacks, so we have very little knowledge of the attack data that should be used to train the intrusion detection system. In this paper, we use an approach that combines CRF (Conditional Random Field) considering the sequence of the system, thus able to reflect the characteristics of control system sequences into the intrusion detection system, and also does not need the knowledge of attack data to construct the detection rules.

  12. Saltwater intrusion in coastal regions of North America

    Science.gov (United States)

    Barlow, Paul M.; Reichard, Eric G.

    2010-01-01

    Saltwater has intruded into many of the coastal aquifers of the United States, Mexico, and Canada, but the extent of saltwater intrusion varies widely among localities and hydrogeologic settings. In many instances, the area contaminated by saltwater is limited to small parts of an aquifer and to specific wells and has had little or no effect on overall groundwater supplies; in other instances, saltwater contamination is of regional extent and has resulted in the closure of many groundwater supply wells. The variability of hydrogeologic settings, three-dimensional distribution of saline water, and history of groundwater withdrawals and freshwater drainage has resulted in a variety of modes of saltwater intrusion into coastal aquifers. These include lateral intrusion from the ocean; upward intrusion from deeper, more saline zones of a groundwater system; and downward intrusion from coastal waters. Saltwater contamination also has occurred along open boreholes and within abandoned, improperly constructed, or corroded wells that provide pathways for vertical migration across interconnected aquifers. Communities within the coastal regions of North America are taking actions to manage and prevent saltwater intrusion to ensure a sustainable source of groundwater for the future. These actions can be grouped broadly into scientific monitoring and assessment, engineering techniques, and regulatory approaches.

  13. Non-Intrusive Battery Health Monitoring

    Directory of Open Access Journals (Sweden)

    Gajewski Laurent

    2017-01-01

    Full Text Available The “Non-intrusive battery health monitoring”, developed by Airbus Defence and Space (ADS in cooperation with the CIRIMAT-CNRS laboratory and supported by CNES, aims at providing a diagnosis of the battery ageing in flight, called State of Health (SOH, using only the post-treatment of the battery telemetries. The battery current and voltage telemetries are used by a signal processing tool on ground to characterize and to model the battery at low frequencies which allows monitoring the evolution of its degradation with great accuracy. The frequential behaviour estimation is based on inherent disturbances on the current during the nominal functioning of the battery. For instance, on-board thermal control or equipment consumption generates random disturbances on battery current around an average current. The battery voltage response to these current random disturbances enables to model the low frequency impedance of the battery by a signal processing tool. The re-created impedance is then compared with the evolution model of the low frequencies impedance as a function of the battery ageing to estimate accurately battery degradation. Hence, this method could be applied to satellites which are already in orbit and whose battery telemetries acquisition system fulfils the constraints determined in the study. This innovative method is an improvement of present state-of-the-art and is important to have a more accurate in-flight knowledge of battery ageing which is crucial for mission and operation planning and also for possible satellite mission extension or deorbitation. This method is patented by Airbus Defence and Space and CNES.

  14. Processing ix spent resin waste for C-14 isotope recovery

    International Nuclear Information System (INIS)

    Chang, F. H.; Woodall, K. B.; Sood, S. K.; Vogt, H. K.; Krochmainek, L. S.

    1991-01-01

    A process developed at Ontario Hydro for recovering carbon-14 (C-14) from spent ion exchange resin wastes is described. Carbon-14 is an undesirable by-product of CANDU 1 nuclear reactor operation. It has an extremely long (5730 years) half-life and can cause dosage to inhabitants by contact, inhalation, or through the food cycle via photosynthesis. Release of carbon-14 to the environment must be minimized. Presently, all the C-14 produced in the Moderator and Primary Heat Transport (PHT) systems of the reactor is effectively removed by the respective ion exchange columns, and the spent ion exchange resins are stored in suitably engineered concrete structures. Because of the large volumes of spent resin waste generated each year this method of disposal by long term storage tends to be uneconomical; and may also be unsatisfactory considering the long half-life of the C-14. However, purified C-14 is a valuable commercial product for medical, pharmaceutical, agricultural, and organic chemistry research. Currently, commercial C-14 is made artificially in research reactors by irradiating aluminum nitride targets for 4.5 years. If the C-14 containing resin waste can be used to reduce this unnecessary production of C-14, the total global build-up of this radioactive chemical can be reduced. There is much incentive in removing the C-14 from the resin waste to reduce the volume of C-14 waste, and also in purifying the recovered C-14 to supply the commercial market. The process developed by Ontario Hydro consists of three main steps: C-14 removal from spent resins, enrichment of recovered C-14, and preparation of final product. Components of the process have been successfully tested at Ontario Hydro's Research Division, but the integration of the process is yet to be demonstrated. A pilot scale plant capable of processing 4 m 3 of spent resins annually is being planned for demonstrating the technology. The measured C-14 activity levels on the spent resins ranged from 47

  15. Diterpene resin acids in conifers.

    Science.gov (United States)

    Keeling, Christopher I; Bohlmann, Jörg

    2006-11-01

    Diterpene resin acids are a significant component of conifer oleoresin, which is a viscous mixture of terpenoids present constitutively or inducibly upon herbivore or pathogen attack and comprises one form of chemical resistance to such attacks. This review focuses on the recent discoveries in the chemistry, biosynthesis, molecular biology, regulation, and biology of these compounds in conifers.

  16. Occupational exposure to epoxy resins

    NARCIS (Netherlands)

    Terwoert, J.; Kersting, K.

    2014-01-01

    Products based on epoxy resins as a binder have become popular in various settings, among which the construction industry and in windmill blade production, as a result of their excellent technical properties. However, due to the same properties epoxy products are a notorious cause of allergic skin

  17. Review of the geochemistry and metallogeny of approximately 1.4 Ga granitoid intrusions of the conterminous United States

    Science.gov (United States)

    du Bray, Edward A.; Holm-Denoma, Christopher S.; Lund, Karen; Premo, Wayne R.

    2018-03-27

    primitive, mantle-derived components and evolved, crust-derived components.Each compositional subtype can be ascribed to a relatively unique petrogenetic history. The numerically dominant ferroan, peraluminous granites probably represent low-degree, relatively high-pressure partial melting of preexisting, crust-derived, intermediate-composition granitoids. The moderately numerous, weakly magnesian, peraluminous granites probably reflect similar partial melting but at a higher degree and in a lower pressure environment. In contrast, the ferroan but metaluminous granites may be the result of extensive differentiation of tholeiitic basalt. Finally, the peralkaline igneous rocks at Mountain Pass have compositions potentially derived by differentiation of alkali basalt. The varying alkalic character of each subtype probably reflects polybaric petrogenesis and the corresponding effect of diverse mineral stabilities on ultimate melt compositions. Mantle-derived mafic magma and variably assimilated partial melts of mainly juvenile Paleoproterozoic crustal components are required to generate the relatively low initial strontium (87Sr/86Sr) and distinctive neodymium isotope compositions characteristic of the U.S. 1.4 Ga granitoid intrusions. The characteristics of these intrusions are consistent with crustal melting in an extensional/decompressional, intracratonic setting that was triggered by mantle upwelling and emplacement of tholeiitic basaltic magma at or near the base of the crust. Composite magmas, formed by mingling and mixing mantle components with partial melts of Paleoproterozoic crust, produced variably homogenized storage reservoirs that continued polybaric evolution as intrusions lodged at various crustal depths.

  18. FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems

    OpenAIRE

    Borgohain, Rajdeep

    2012-01-01

    With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics in recent years. This paper gives an overview of the Intrusion Detection System and looks at two major machine learning paradigms used in Intrusion Detection System, Genetic Algorithms and Fuzzy Logic and how to apply them for intrusion dete...

  19. Assessment of Service Life for Regenerative ECLSS Resin Beds

    Science.gov (United States)

    Cloud, Dale L.; Keilich, Maria C.; Polis, Peter C.; Yanczura, Stephen J.

    2013-01-01

    The International Space Station (ISS) Water Processor Assembly (WPA) and Oxygen Generation Assembly (OGA) manage and process water at various levels of cleanliness for multiple purposes. The effluent of theWPA and the influent of the OGA require water at very high levels of purity. The bulk of the water purification that occurs in both systems is performed by consumable activated carbon and ion exchange resin beds. Replacement beds must be available on orbit in order to continue the ISS critical processes of water purification and oxygen generation. Various hurdles exist in order to ensure viable spare resin beds. These include the characteristics of resin beds such as: storage environment, shelf life requirements, microbial growth, and variations in the levels and species of contaminants the beds are required to remove. Careful consideration has been given to match water models, bed capacities and spares traffic models to ensure that spares are always viable. The results of these studies and considerations, in particular, how shelf life requirements affect resin bed life management, are documented in this paper.

  20. Degradation of ion spent resin using the Fenton's reagent

    International Nuclear Information System (INIS)

    Araujo, Leandro Goulart de

    2013-01-01

    The most common method for spent radioactive ion exchange resin treatment is its immobilization in cement, which reduces the radionuclides release into the environment. Although this method is efficient, it increases considerably the final volume of the waste due to the low incorporation capacity. The objective of this work was to develop a degradation method of spent resins arising from the nuclear research reactor located at the Nuclear and Energy Research Institute (IPEN-CNEN/SP), using an Advanced Oxidation Process (AOP) with Fenton's reagents. This method would allow a higher incorporation in cement. Three different resins were evaluated: cationic, anionic and a mixture of both resins. The reactions were conducted varying the catalyst concentration (25, 50, 100 and 150 mM), the volume of hydrogen peroxide (320 to 460 mL), and three different temperatures, 50, 60 and 70 deg C. Degradation of about 98% was achieved using a 50 mM catalyst solution and 330 mL of hydrogen peroxide solution. The most efficient temperature was 60 deg C. (author)

  1. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  2. EDF specifications on nuclear grade resins

    International Nuclear Information System (INIS)

    Mascarenhas, Darren; Gressier, Frederic; Taunier, Stephane; Le-Calvar, Marc; Ranchoux, Gilles; Marteau, Herve; Labed, Veronique

    2012-09-01

    Ion exchange resins are widely used across EDF, especially within the nuclear division for the purification of water. Important applications include primary circuit, secondary circuit and effluent treatment, which require high quality nuclear grade resins to retain the dissolved species, some of which may be radioactive. There is a need for more and more efficient purification in order to decrease worker dose during maintenance but also to decrease volumes of radioactive resin waste. Resin performance is subject to several forms of degradation, including physical, chemical, thermal and radioactive, therefore appropriate resin properties have to be selected to reduce such effects. Work has been done with research institutes, manufacturers and on EDF sites to select these properties, create specifications and to continuously improve on these specifications. An interesting example of research regarding resin performance is the resin degradation under irradiation. Resins used in the CVCS circuit of EDF nuclear power plants are subject to irradiation over their lifetime. A study was carried out on the effects of total integrated doses of 0.1, 1 and 10 MGy on typically used EDF mixed bed resins in a 'mini-CVCS' apparatus to simultaneously test actual primary circuit fluid. The tests confirmed that the resins still perform efficiently after a typical CVCS radiation dose. Certain resins also need additional specifications in order to maintain the integrity of the particular circuits they are used in. Recently, EDF has updated its requirements on these high purity nuclear grade resins, produced generic doctrines for all products and materials used on site which include resins of all grades, and as a result have also updated a guide on recommended resin usage for the French fleet of reactors. An overview of the evolutions will be presented. (authors)

  3. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  4. Modulating state transition and mechanical properties of viscoelastic resins from maize zein through interactions with plasticizers and co-proteins

    NARCIS (Netherlands)

    Erickson, D.P.; Renzetti, S.; Jurgens, A.; Campanella, O.H.; Hamaker, B.R.

    2014-01-01

    Viscoelastic properties have been observed in maize zein above its glass transition temperature; however, current understanding of how these viscoelastic polymers can be further manipulated for optimal performance is limited. Using resins formed via precipitation from aqueous ethanolic environments,

  5. Harmful intrusion detection algorithm of optical fiber pre-warning system based on correlation of orthogonal polarization signals

    Science.gov (United States)

    Bi, Fukun; Feng, Chong; Qu, Hongquan; Zheng, Tong; Wang, Chonglei

    2017-09-01

    At present, advanced researches of optical fiber intrusion measurement are based on the constant false alarm rate (CFAR) algorithm. Although these conventional methods overcome the interference of non-stationary random signals, there are still a large number of false alarms in practical applications. This is because there is no specific study on orthogonal polarization signals of false alarm and intrusion. In order to further reduce false alarms, we analyze the correlation of optical fiber signals using birefringence of single-mode fiber. This paper proposes the harmful intrusion detection algorithm based on the correlation of two orthogonal polarization signals. The proposed method uses correlation coefficient to distinguish false alarms and intrusions, which can decrease false alarms. Experiments on real data, which are collected from the practical environment, demonstrate that the difference in correlation is a robust feature. Furthermore, the results show that the proposed algorithm can reduce the false alarms and ensure the detection performance when it is used in optical fiber pre-warning system (OFPS).

  6. Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks

    Directory of Open Access Journals (Sweden)

    Wenjuan Li

    2018-01-01

    Full Text Available Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN has thus been developed by allowing intrusion detection system (IDS nodes to exchange data with each other. Insider attacks are a great threat for such types of collaborative networks, where an attacker has the authorized access within the network. In literature, a challenge-based trust mechanism is effective at identifying malicious nodes by sending challenges. However, such mechanisms are heavily dependent on two assumptions, which would cause CIDNs to be vulnerable to advanced insider attacks in practice. In this work, we investigate the influence of advanced on–off attacks on challenge-based CIDNs, which can respond truthfully to one IDS node but behave maliciously to another IDS node. To evaluate the attack performance, we have conducted two experiments under a simulated and a real CIDN environment. The obtained results demonstrate that our designed attack is able to compromise the robustness of challenge-based CIDNs in practice; that is, some malicious nodes can behave untruthfully without a timely detection.

  7. Non-occupational contact sensitization to epoxy resin of bisphenol A among general dermatology patients.

    Science.gov (United States)

    Majasuo, Susanna; Liippo, Jussi; Lammintausta, Kaija

    2012-03-01

    Sensitization to epoxy resins often results from occupational exposure in various fields of construction and industry. Non-occupational sensitization sources and environments have remained overlooked. To analyse non-occupational and occupational contact sensitization to epoxy resin of bisphenol A among general dermatology patients. Special attention was paid to patients sensitized from non-occupational sources. During a 10-year period, 6042 general dermatology patients were patch tested with epoxy resin (bisphenol A) in the Dermatology Clinic of Turku University Hospital. The clinical data and the sources of occupational and non-occupational exposure to epoxy resin were analysed in sensitized patients. Epoxy resin sensitization was found in 59 patients. Non-occupational sensitization was found in 21 (35%) patients, whereas the number of occupational cases was 38 (65%). The most common sources of non-occupational epoxy resin sensitization were materials used in domestic renovation and construction projects and in boat repair. Non-occupational sensitization sources account for approximately one-third of epoxy resin sensitization cases, and therefore represent an important risk among hobbies and leisure activities. © 2011 John Wiley & Sons A/S.

  8. Foam, Foam-resin composite and method of making a foam-resin composite

    Science.gov (United States)

    Cranston, John A. (Inventor); MacArthur, Doug E. (Inventor)

    1995-01-01

    This invention relates to a foam, a foam-resin composite and a method of making foam-resin composites. The foam set forth in this invention comprises a urethane modified polyisocyanurate derived from an aromatic amino polyol and a polyether polyol. In addition to the polyisocyanurate foam, the composite of this invention further contains a resin layer, wherein the resin may be epoxy, bismaleimide, or phenolic resin. Such resins generally require cure or post-cure temperatures of at least 350.degree. F.

  9. Environmental Characteristics of Carbonatite and Alkaline Intrusion-related Rare Earth Element (REE) Deposits

    Science.gov (United States)

    Seal, R. R., II; Piatak, N. M.

    2017-12-01

    Carbonatites and alkaline intrusions are important sources of REEs. Environmental risks related to these deposit types have been assessed through literature review and evaluation of the geochemical properties of representative samples of mill tailings and their leachates. The main ore mineral in carbonatite deposits is bastnasite [(Ce,La)(CO3)F], which is found with dolomite and calcite ( 65 %), barite (20 - 25 %), plus a number of minor accessory minerals including sulfides such as galena and pyrite. Generally, alkaline intrusion-related REE deposits either occur in layered complexes or with dikes and veins cutting alkaline intrusions. Such intrusions have a more diverse group of REE ore minerals that include fluorcarbonates, oxides, silicates, and phosphates. Ore also can include minor calcite and iron (Fe), lead (Pb), and zinc (Zn) sulfides. The acid-generating potential of both deposit types is low because of a predominance of carbonate minerals in the carbonatite deposits, the presence of feldspars and minor calcite in alkaline intrusion-related deposits, and to only minor to trace occurrence of potentially acid-generating sulfide minerals. Both deposit types, however, are produced by igneous and hydrothermal processes that enrich high-field strength, incompatible elements, which typically are excluded from common rock-forming minerals. Elements such as yttrium (Y), niobium Nb), zirconium (Zr), hafnium (Hf), tungsten (W), titanium (Ti), tantalum (Ta), scandium (Sc), thorium (Th), and uranium (U) can be characteristic of these deposits and may be of environmental concern. Most of these elements, including the REEs, but with the exception of U, have low solubilities in water at the near-neutral pH values expected around these deposits. Mill tailings from carbonatite deposits can exceed residential soil and sediment criteria for Pb, and leachates from mill tailings can exceed drinking water guidelines for Pb. The greatest environmental challenges, however, are

  10. Intrusão dentária utilizando mini-implantes Orthodontic intrusion with mini-implant anchorage

    Directory of Open Access Journals (Sweden)

    Telma Martins de Araújo

    2008-10-01

    Full Text Available INTRODUÇÃO: dentre os diversos tipos de movimentos dentários induzidos ortodonticamente, o de intrusão é, sem dúvida, um dos mais difíceis de serem conseguidos. A mecânica intrusiva convencional, apesar de viável, é complexa, no que diz respeito ao controle de seus efeitos colaterais. Isso, em grande parte, refere-se à dificuldade em se obter uma ancoragem satisfatória. Neste contexto, os mini-implantes, por oferecerem efetiva ancoragem esquelética, têm se mostrado de extrema valia para os ortodontistas, tornando a intrusão, tanto de dentes anteriores quanto posteriores, um procedimento cada vez mais simples, do ponto de vista mecânico. OBJETIVO: pretende-se, então, neste artigo, descrever e demonstrar, clinicamente, as diversas possibilidades de utilização dos mini-implantes como recurso de ancoragem para o movimento de intrusão.INTRODUCTION: Among all different varieties of orthodontically induced tooth movement, intrusion is, without doubt, one of the most difficult movements to be reached. Conventional intrusive biomechanics, although possible, may lead to undesirable side-effects. These events, in most cases, are related to the difficulty in obtaining an efficient anchorage unit. Then, mini-implants, because of their high success rates of effective skeletal anchorage, are valuable devices to orthodontists, transforming the intrusion movement, both at the anterior and the posterior regions, a more and more uncomplicated biomechanical procedure. AIM: to describe and show, clinically, different ways of using mini-implants as an anchorage system to intrusion movement.

  11. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  12. Seismic signature of active intrusions in mountain chains.

    Science.gov (United States)

    Di Luccio, Francesca; Chiodini, Giovanni; Caliro, Stefano; Cardellini, Carlo; Convertito, Vincenzo; Pino, Nicola Alessandro; Tolomei, Cristiano; Ventura, Guido

    2018-01-01

    Intrusions are a ubiquitous component of mountain chains and testify to the emplacement of magma at depth. Understanding the emplacement and growth mechanisms of intrusions, such as diapiric or dike-like ascent, is critical to constrain the evolution and structure of the crust. Petrological and geological data allow us to reconstruct magma pathways and long-term magma differentiation and assembly processes. However, our ability to detect and reconstruct the short-term dynamics related to active intrusive episodes in mountain chains is embryonic, lacking recognized geophysical signals. We analyze an anomalously deep seismic sequence (maximum magnitude 5) characterized by low-frequency bursts of earthquakes that occurred in 2013 in the Apennine chain in Italy. We provide seismic evidences of fluid involvement in the earthquake nucleation process and identify a thermal anomaly in aquifers where CO 2 of magmatic origin dissolves. We show that the intrusion of dike-like bodies in mountain chains may trigger earthquakes with magnitudes that may be relevant to seismic hazard assessment. These findings provide a new perspective on the emplacement mechanisms of intrusive bodies and the interpretation of the seismicity in mountain chains.

  13. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  14. Orthodontic intrusive movement to reduce infrabony defects in periodontal pacients

    Directory of Open Access Journals (Sweden)

    Aldrieli Regina Ambrósio

    2008-01-01

    Full Text Available The adult tends to be an excellent orthodontic patient, because he/she is motivated and cooperative. Nevertheless, many adult patientspresent periodontal problems. Intrusive movement is usually necessary against an area with infrabony defects, and in order for treatmentto be successful, it is necessary for all related aspects to be well understood. The aim of this study was to discuss the feasibility and efficacy of orthodontic intrusion as a means of reducing infrabony defects caused by periodontal disease. The methodology used was reviewed in the literature, from which articles were selected using the MEDLINE, LILACS and BBO databases. After periodontal treatment and maintenance with suitable bacterial plaque control has been performed, orthodontic treatment with intrusive tooth movement can be performed in case of pathological tooth migration and extrusion. The segmented arch technique is the most indicated for intruding teeth with infrabony defects because it is capable of developing light and continuous forces. Furthermore, although studies did not confirm, they suggested that orthodontic intrusion could lead to the formation of new periodontal support tissue. With a multidisciplinary approach, it is possible to successfully perform intrusion movements in teeth that present infrabony defects, provided that periodontal inflammation has been treated and the patient presents an excellent level of plaque control. Among the benefits of this approach are: better appearance, better access to dental hygiene, restitution of incisal occlusion and reduction in non axial load.

  15. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories

    Science.gov (United States)

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-01-01

    Study Objectives: To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Methods: Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. Results: The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Conclusions: Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. Citation: Kleim B, Wysokowsky J, Schmid N, Seifritz E, Rasch B. Effects of sleep after experimental trauma on intrusive emotional memories. SLEEP 2016;39(12):2125–2132. PMID:27748249

  16. Recovery of freshwater marsh vegetation after a saltwater intrusion event.

    Science.gov (United States)

    Flynn, K M; McKee, K L; Mendelssohn, I A

    1995-07-01

    Greenhouse mesocosms of freshwater marsh vegetation were exposed to a simulated saltwater intrusion event followed by a recovery period during which water levels and interstitial water salinity were adjusted over a range of conditions. Virtually all above-ground vegetation, including the three dominant species, Sagittaria lancifolia L., Leersia oryzoides (L.) Swartz, and Panicum hemitomon Schultes, was killed by the initial saltwater intrusion event. P. hemitomon did not recover, but S. lancifolia and L. oryzoides, as well as many of the other species initially present, exhibited some ability to recover depending on post-saltwater intrusion conditions. Increasingly harsh recovery conditions (for freshwater marsh vegetation), including more reduced soil conditions, higher interstitial salinities, and higher interstitial sulfide concentrations were associated with decreased live above-ground biomass and species richness. The effect of elevated salinity on vegetative recovery became more pronounced under flooded conditions. This experiment illustrates that the response of a freshwater marsh community to the long-term disturbance effect of a transient saltwater intrusion event will be strongly influenced by post-intrusion salinity and water levels.

  17. Diclofenac removal in urine using strong-base anion exchange polymer resins.

    Science.gov (United States)

    Landry, Kelly A; Boyer, Treavor H

    2013-11-01

    One of the major sources of pharmaceuticals in the environment is wastewater effluent of which human urine contributes the majority of pharmaceuticals. Urine source separation has the potential to isolate pharmaceuticals at a higher concentration for efficient removal as well as produce a nutrient byproduct. This research investigated the efficacy of using strong-base anion exchange polymer resins to remove the widely detected and abundant pharmaceutical, diclofenac, from synthetic human urine under fresh and ureolyzed conditions. The majority of experiments were conducted using a strong-base, macroporous, polystyrene resin (Purolite A520E). Ion-exchange followed a two-step removal rate with rapid removal in 1 h and equilibrium removal in 24 h. Diclofenac removal was >90% at a resin dose of 8 mL/L in both fresh and ureolyzed urine. Sorption of diclofenac onto A520E resin was concurrent with desorption of an equivalent amount of chloride, which indicates the ion-exchange mechanism is occurring. The presence of competing ions such as phosphate and citrate did not significantly impact diclofenac removal. Comparisons of three polystyrene resins (A520E, Dowex 22, Dowex Marathon 11) as well as one polyacrylic resin (IRA958) were conducted to determine the major interactions between anion exchange resin and diclofenac. The results showed that polystyrene resins provide the highest level of diclofenac removal due to electrostatic interactions between quaternary ammonium functional groups of resin and carboxylic acid of diclofenac and non-electrostatic interactions between resin matrix and benzene rings of diclofenac. Diclofenac was effectively desorbed from A520E resin using a regeneration solution that contained 4.5% (m/m) NaCl in an equal-volume mixture of methanol and water. The greater regeneration efficiency of the NaCl/methanol-water mixture over the aqueous NaCl solution supports the importance of non-electrostatic interactions between resin matrix and benzene rings

  18. Distress and Recurrence of Intrusive Thoughts in Younger and Older Adults

    Science.gov (United States)

    Magee, Joshua C.; Teachman, Bethany A.

    2011-01-01

    The current study incorporated a lifespan perspective into existing theories of intrusive thoughts to examine age-related differences in the difficulty controlling intrusive thoughts, the distress following intrusive thought recurrences, and the meanings assigned to these recurrences. Younger (N = 51) and older (N = 49) community adults were randomly assigned to suppress (i.e., keep out of mind) or monitor an intrusive thought. Participants rated their positive and negative affect throughout engagement with the intrusive thought, and also rated the meanings they gave to recurrences of their everyday intrusive thoughts. The results demonstrated that older adults tended to perceive greater difficulty with controlling the intrusive thought than younger adults, despite not differing in the actual recurrence of the intrusive thought. With regard to distress, ooHAcrosslder adults experienced steadier levels of positive affect than younger adults throughout engagement with the intrusive thought. However, older adults also reported greater residual negative affect after engaging with the intrusive thought than younger adults. Finally, older and younger adults appeared to assign meanings to recurrences of intrusive thoughts in line with age-relevant concerns. Specifically, older adults were prone to interpret the recurrence of intrusive thoughts as a sign of cognitive decline, but were less likely than younger adults to see intrusive thoughts as a sign of moral failure. Together, these results highlight a range of potential risk and protective factors in older adults for experiencing emotion dysregulation after intrusive thoughts. PMID:21707184

  19. Distress and recurrence of intrusive thoughts in younger and older adults.

    Science.gov (United States)

    Magee, Joshua C; Teachman, Bethany A

    2012-03-01

    The current study incorporated a life span perspective into existing theories of intrusive thoughts to examine age-related differences in the difficulty controlling intrusive thoughts, the distress following intrusive thought recurrences, and the meanings assigned to these recurrences. Younger (N = 51) and older (N = 49) community adults were randomly assigned to suppress (i.e., keep out of mind) or monitor an intrusive thought. Participants rated their positive and negative affect throughout engagement with the intrusive thought, and they also rated the meanings they gave to recurrences of their everyday intrusive thoughts. The results demonstrated that older adults tended to perceive greater difficulty with controlling the intrusive thought than younger adults despite the fact that they did not differ in the actual recurrence of the intrusive thought. With regard to distress, older adults experienced steadier levels of positive affect than younger adults throughout engagement with the intrusive thought. However, older adults also reported greater residual negative affect after engaging with the intrusive thought than younger adults. Finally, older and younger adults appeared to assign meanings to recurrences of intrusive thoughts in line with age-relevant concerns. Specifically, older adults were prone to interpret the recurrence of intrusive thoughts as a sign of cognitive decline, but they were less likely than younger adults to see intrusive thoughts as a sign of moral failure. Together, these results highlight a range of potential risk and protective factors in older adults for experiencing emotion dysregulation after intrusive thoughts.

  20. Synthesis of Hydrophobic, Crosslinkable Resins.

    Science.gov (United States)

    1984-12-01

    Bismaleimides have also been crosslinked with radical initiators to produce brittle networks [4].If a damine is added, chain extension and radical crosslinkinq...are produced during cure.The company also produced a similar phenylene based resin, with pendant nitrile groups which could be crosslinked without the...benzenes and tetra substituted cyclopentadienones [881. g. Preparation of poly 1,4 phenylene by nickel (0> catalysed electropolymerisation 1891. Cont’d

  1. Double Vacuum Bag Process for Resin Matrix Composite Manufacturing

    Science.gov (United States)

    Hou, Tan-Hung (Inventor); Jensen, Brian J. (Inventor)

    2007-01-01

    A double vacuum bag molding assembly with improved void management and laminate net shape control which provides a double vacuum enviromnent for use in fabricating composites from prepregs containing air and/or volatiles such as reactive resin matrix composites or composites from solvent containing prepregs with non-reactive resins matrices. By using two vacuum environments during the curing process, a vacuum can be drawn during a B-stage of a two-step cycle without placing the composite under significant relative pressure. During the final cure stage, a significant pressure can be applied by releasing the vacuum in one of the two environments. Inner and outer bags are useful for creating the two vacuum environments with a perforated tool intermediate the two. The composite is placed intermediate a tool plate and a caul plate in the first environment with the inner bag and tool plate defining the first environment. The second environment is characterized by the outer bag which is placed over the inner bag and the tool plate.

  2. Irradiation effects in the storage and disposal of radioactive ion-exchange resins

    International Nuclear Information System (INIS)

    Swyler, K.J.; Dodge, C.E.; Dayal, R.; Weiss, A.J.

    1982-01-01

    Research is under way to characterize the effects of self-irradiation on radwastes which may be generated when organic ion-exchange media are used in water demineralization or decontamination operations at nuclear facilities. External factors affecting the relation between laboratory evaluations and field performance are emphasized. Initial experiments do not yet indicate substantial radiation dose-rate effects on radiolytic gas yields or acid product formation, when (fully swollen) sulfonic acid resins are irradiated in a sealed air environment. At the same time, oxygen gas is removed from the environment of irradiated resins. Interaction between mild steel coupons and acidic species produced in the irradiation induced decomposition of sulfonic acid resin results in irradiation enhanced corrosion. Corrosion rates depend on radiation dose rate, moisture content and resin chemical loading. In some cases, corrosion rates decrease with time, suggesting depletion of acidic species within the resin bed, or a synergistic interaction between resin and corrosion coupon. Implications of these and other results on evaluating field behavior of radwaste containing ion-exchange media are discussed. 4 figures, 2 tables

  3. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    Science.gov (United States)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  4. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  5. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been...... developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...

  6. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  7. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    Science.gov (United States)

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. Physical model simulations of seawater intrusion in unconfined aquifer

    Directory of Open Access Journals (Sweden)

    Tanapol Sriapai

    2012-12-01

    Full Text Available The objective of this study is to simulate the seawater intrusion into unconfined aquifer near shoreline and to assessthe effectiveness of its controlling methods by using scaled-down physical models. The intrusion controlled methods studiedhere include fresh water injection, saltwater extraction, and subsurface barrier. The results indicate that under natural dynamicequilibrium between the recharge of fresh water and the intrusion well agree with the Ghyben-Herzberg mathematical solution.Fresh water pumping from the aquifer notably move the fresh-salt water interface toward the pumping well, depending on thepumping rates and the head differences (h between the aquifer recharge and the salt water level. The fresh water injectionmethod is more favorable than the salt water extraction and subsurface barrier method. The fresh water injection rate of about10% of the usage rate can effectively push the interface toward the shoreline, and keeping the pumping well free of salinity.

  9. Intrusive upwelling in the Central Great Barrier Reef

    Science.gov (United States)

    Benthuysen, Jessica A.; Tonin, Hemerson; Brinkman, Richard; Herzfeld, Michael; Steinberg, Craig

    2016-11-01

    In the Central Great Barrier Reef, the outer continental shelf has an open reef matrix that facilitates the exchange of waters with the Coral Sea. During austral summer, cool water intrudes onto the shelf along the seafloor. Temperature observations reveal cool, bottom intrusions during a 6 year period from the Queensland Integrated Marine Observing System's Palm Passage mooring. A metric is used to identify 64 intrusion events. These intrusions predominantly occur from October to March including the wet season. During an event, the outer-shelf's near-bottom temperature decreases by 1-3°C typically over 1 week. The near-bottom salinity tends to increase, while near-surface changes do not reflect these tendencies. Intrusion events occur predominantly with either weakening equatorward winds or poleward wind bursts. A regional hydrodynamic model for the Great Barrier Reef captures the timing and amplitude of these intrusions. During intrusion events, isotherms tend to uplift over the continental slope and onto the shelf and the East Australian Current intensifies poleward. Over the shelf, a bottom-intensified onshore current coincides with bottom cooling. For numerous events, the model diagnostics reveal that the cross-shelf flow is dominated by the geostrophic contribution. A vertical circulation tilts the isopycnals upward on the southern side of the passage, causing an along-shelf density gradient and geostrophic onshore flow with depth. While wind fluctuations play a major role in controlling the along-shelf currents, model results indicate that a concurrent topographically induced circulation can assist the onshore spread of cool water.

  10. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  11. Evaluation of adhesion of reline resins to the thermoplastic denture base resin for non-metal clasp denture.

    Science.gov (United States)

    Kim, Ji Hye; Choe, Han Cheol; Son, Mee Kyoung

    2014-01-01

    This study aimed to evaluate the tensile and transverse bond strength of chairside reline resins (Tokuyama Rebase II, Mild Rebaron LC) to a thermoplastic acrylic resin (Acrytone) used for non metal clasp denture. The results were compared with those of a conventional heat polymerized acrylic resin (Paladent 20) and a thermoplastic polyamide resin (Biotone). The failure sites were examined by scanning electron microscopy to evaluate the mode of failure. As results, the bond strength of reline resins to a thermoplastic acrylic resin was similar to the value of a conventional heat polymerized acrylic resin. However, thermoplastic polyamide resin showed the lowest value. The results of this study indicated that a thermoplastic acrylic resin for non metal clasps denture allows chairside reline and repair. It was also found that the light-polymerized reline resin had better bond strength than the autopolymerizing reline resin in relining for a conventional heat polymerized acrylic resin and a thermoplastic acrylic resin.

  12. An Approach for Cross-Domain Intrusion Detection

    Science.gov (United States)

    2012-01-01

    supported by open source software (i.e., BASE, snort, PostgreSQL and pgpool-II). Our prototype enables an analyst to view and manipulate network trace data...multilevel (trusted) components, supported by open source software (i.e., BASE, snort, PostgreSQL and pgpool-II). Our prototype enables an analyst to view...component is implemented by the open source object-relational database system PostgreSQL 0). 4.4.3 Intrusion analysis engine The intrusion analysis

  13. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments....

  14. A national inventory of seawater intrusion vulnerability for Australia

    Directory of Open Access Journals (Sweden)

    Leanne K. Morgan

    2015-09-01

    New hydrological insights for the region: The combination of methods identified areas of highest risk to SWI including unconfined aquifers at Derby (WA and Esperance (WA, and confined aquifers at Esperance (WA and Adelaide (SA. The combination of analytic and qualitative approaches offers a more comprehensive and less subjective seawater intrusion characterization than arises from applying the methods in isolation, thereby imparting enhanced confidence in the outcomes. Importantly, active seawater intrusion conditions occur in many of Australia’s confined coastal aquifers, obviating the use of the analytical solution, and suggesting that offshore groundwater resources provide significant contributions to these systems.

  15. An Intrusion Detection System for the Protection of Railway Assets Using Fiber Bragg Grating Sensors

    Directory of Open Access Journals (Sweden)

    Angelo Catalano

    2014-09-01

    Full Text Available We demonstrate the ability of Fiber Bragg Gratings (FBGs sensors to protect large areas from unauthorized activities in railway scenarios such as stations or tunnels. We report on the technological strategy adopted to protect a specific depot, representative of a common scenario for security applications in the railway environment. One of the concerns in the protection of a railway area centers on the presence of rail-tracks, which cannot be obstructed with physical barriers. We propose an integrated optical fiber system composed of FBG strain sensors that can detect human intrusion for protection of the perimeter combined with FBG accelerometer sensors for protection of rail-track access. Several trials were carried out in indoor and outdoor environments. The results demonstrate that FBG strain sensors bonded under a ribbed rubber mat enable the detection of intruder break-in via the pressure induced on the mat, whereas the FBG accelerometers installed under the rails enable the detection of intruders walking close to the railroad tracks via the acoustic surface waves generated by footsteps. Based on a single enabling technology, this integrated system represents a valuable intrusion detection system for railway security and could be integrated with other sensing functionalities in the railway field using fiber optic technology.

  16. Energy Efficient Monitoring for Intrusion Detection in Battery-Powered Wireless Mesh Networks

    KAUST Repository

    Hassanzadeh, Amin

    2011-07-18

    Wireless Mesh Networks (WMN) are easy-to-deploy, low cost solutions for providing networking and internet services in environments with no network infrastructure, e.g., disaster areas and battlefields. Since electric power is not readily available in such environments battery-powered mesh routers, operating in an energy efficient manner, are required. To the best of our knowledge, the impact of energy efficient solutions, e.g., involving duty-cycling, on WMN intrusion detection systems, which require continuous monitoring, remains an open research problem. In this paper we propose that carefully chosen monitoring mesh nodes ensure continuous and complete detection coverage, while allowing non-monitoring mesh nodes to save energy through duty-cycling. We formulate the monitoring node selection problem as an optimization problem and propose distributed and centralized solutions for it, with different tradeoffs. Through extensive simulations and a proof-of-concept hardware/software implementation we demonstrate that our solutions extend the WMN lifetime by 8%, while ensuring, at the minimum, a 97% intrusion detection rate.

  17. An intrusion detection system for the protection of railway assets using Fiber Bragg Grating sensors.

    Science.gov (United States)

    Catalano, Angelo; Bruno, Francesco Antonio; Pisco, Marco; Cutolo, Antonello; Cusano, Andrea

    2014-09-29

    We demonstrate the ability of Fiber Bragg Gratings (FBGs) sensors to protect large areas from unauthorized activities in railway scenarios such as stations or tunnels. We report on the technological strategy adopted to protect a specific depot, representative of a common scenario for security applications in the railway environment. One of the concerns in the protection of a railway area centers on the presence of rail-tracks, which cannot be obstructed with physical barriers. We propose an integrated optical fiber system composed of FBG strain sensors that can detect human intrusion for protection of the perimeter combined with FBG accelerometer sensors for protection of rail-track access. Several trials were carried out in indoor and outdoor environments. The results demonstrate that FBG strain sensors bonded under a ribbed rubber mat enable the detection of intruder break-in via the pressure induced on the mat, whereas the FBG accelerometers installed under the rails enable the detection of intruders walking close to the railroad tracks via the acoustic surface waves generated by footsteps. Based on a single enabling technology, this integrated system represents a valuable intrusion detection system for railway security and could be integrated with other sensing functionalities in the railway field using fiber optic technology.

  18. Resin selection criteria for tough composite structures

    Science.gov (United States)

    Chamis, C. C.; Smith, G. T.

    1983-01-01

    Resin selection criteria are derived using a structured methodology consisting of an upward integrated mechanistic theory and its inverse (top-down structured theory). These criteria are expressed in a "criteria selection space" which are used to identify resin bulk properties for improved composite "toughness". The resin selection criteria correlate with a variety of experimental data including laminate strength, elevated temperature effects and impact resistance.

  19. Solidifying power station resins and sludges

    International Nuclear Information System (INIS)

    Willis, A.S.D.; Haigh, C.P.

    1984-01-01

    Radioactive ion exchange resins and sludges arise at nuclear power stations from various operations associated with effluent treatment and liquid waste management. As the result of an intensive development programme, the Central Electricity Generating Board (CEGB) has designed a process to convert power station resins and sludges into a shielded, packaged solid monolithic form suitable for final disposal. Research and development, the generic CEGB sludge/resin conditioning plant and the CEGB Active Waste Project are described. (U.K.)

  20. Volumetric polymerization shrinkage of contemporary composite resins

    OpenAIRE

    Nagem Filho, Halim; Nagem, Haline Drumond; Francisconi, Paulo Afonso Silveira; Franco, Eduardo Batista; Mondelli, Rafael Francisco Lia; Coutinho, Kennedy Queiroz

    2007-01-01

    The polymerization shrinkage of composite resins may affect negatively the clinical outcome of the restoration. Extensive research has been carried out to develop new formulations of composite resins in order to provide good handling characteristics and some dimensional stability during polymerization. The purpose of this study was to analyze, in vitro, the magnitude of the volumetric polymerization shrinkage of 7 contemporary composite resins (Definite, Suprafill, SureFil, Filtek Z250, Fill ...

  1. Porous Ceramic Spheres from Ion Exchange Resin

    Science.gov (United States)

    Dynys, Fred

    2005-01-01

    A commercial cation ion exchange resin, cross-linked polystyrene, has been successfully used as a template to fabricate 20 to 50 micron porous ceramic spheres. Ion exchange resins have dual template capabilities. Pore architecture of the ceramic spheres can be altered by changing the template pattern. Templating can be achieved by utilizing the internal porous structure or the external surface of the resin beads. Synthesis methods and chemical/physical characteristics of the ceramic spheres will be reported.

  2. Bond strength of resin-resin interfaces contaminated with saliva and submitted to different surface treatments

    OpenAIRE

    Furuse, Adilson Yoshio; Cunha, Leonardo Fernandes da; Benetti, Ana Raquel; Mondelli, José

    2007-01-01

    The purpose of this study was to investigate the effect of different surface treatments on shear bond strength of saliva-contaminated resin-resin interfaces. Flat resin surfaces were fabricated. In the control group, no contamination or surface treatment was performed. The resin surfaces of the experimental groups were contaminated with saliva and air-dried, and then submitted to: (G1) rinsing with water and drying; (G2) application of an adhesive system; (G3) rinsing and drying, abrasion wit...

  3. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  4. Novel silica-based ion exchange resin

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    Eichrom`s highly successful Diphonixo resin resembles a conventional ion exchange resin in its use of sulfonic acid ligands on a styrene- divinylbenzene matrix. Diphonix resin exhibits rapid exchange kinetics that allow economical operation of ion exchange systems. Unlike conventional resins, Diphonix resin contains chelating ligands that are diphosphonic acid groups that recognize and remove the targeted metals and reject the more common elements such as sodium, calcium and magnesium. This latter property makes Diphonix ideal for many industrial scale applications, including those involving waste treatment. For treatment of low-level, transuranic (TRU) and high- level radioactive wastes, Diphonix`s polystyrene backbone hinders its application due to radiolytic stability of the carbon-hydrogen bonds and lack of compatibility with expected vitrification schemes. Polystyrene-based Diphonix is approximately 60% carbon- hydrogen. In response to an identified need within the Department of Energy for a resin with the positive attributes of Diphonix that also exhibits greater radiolytic stability and final waste form compatibility, Eichrom has successfully developed a new, silica-based resin version of Diphonix. Target application for this new resin is for use in environmental restoration and waste management situations involving the processing of low-level, transuranic and high-level radioactive wastes. The resin can also be used for processing liquid mixed waste (waste that contains low level radioactivity and hazardous constituents) including mixed wastes contaminated with organic compounds. Silica-based Diphonix is only 10% carbon-hydrogen, with the bulk of the matrix silica.

  5. Microbiological study of water-softener resins.

    Science.gov (United States)

    Stamm, J M; Engelhard, W E; Parsons, J E

    1969-09-01

    Microbial identification using effluents backflushed from exhausted urban and rural tank resins and cleaned resins containing the sulfonated copolymer of styrene and divinylbenzene (SDB) were completed, along with microbial assessment of the concentrated stock salt brine. Forty-four different bacterial and fungal genera were identified. Extensive biochemical and animal virulence tests completed on one of the six bacterial salt brine isolates indicated a pathogenic staphylococcal strain. The retention of Staphylococcus aureus, a Flavobacterium sp, and Escherichia coli B bacteriophage was demonstrated both by using the nonexhausted sodium-regenerated resin and by using the same resin exchanged with different mono-, di-, and trivalent cations. Effluent counts completed after bacterial seepage through the resins indicated the Pb(++) exchanged resin removed 55% of the bacteria; Na(+), Fe(++), and Al(+++) removed 31 to 36% and Ca(++) and Cu(++) removed about 10 to 15%. Seventy per cent or more of the bacteriophage was removed by Fe(++), Cu(++), and Al(+++), whereas the Ca(++) and Na(++) cations removed 25 to 31%. Over a 77-day period, nonsterile tap water was passed through bacterial seeded and uninoculated SDB (Na) resin columns. Effluent and resin elution counts demonstrated the growth and survival of 2 different bacteria per column. Increased bacterial retention, survival, and multiplication occurred concomitantly with accumulation of organic and inorganic materials and the Ca(++) and Mg(++) cations from the tap water. Furthermore, microbial elution from resin particles taken from column depths of 1, 8, and 16 cm indicated a bacterial diminution with increasing depths.

  6. Heat-cured Acrylic Resin versus Light-activated Resin: A Patient ...

    African Journals Online (AJOL)

    Context: Although light-activated resins (Eclipse) have been reported to possess superior physical and mechanical properties compared with the heat-cured acrylic resins (Lucitone-199), a few studies have compared overdentures with a locator attachment constructed from heat-cured acrylic resins with those constructed ...

  7. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  8. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  9. Preventing Point-of-Sale System Intrusions

    Science.gov (United States)

    2014-06-01

    hours, some point-of-sale system vendors install a remote desktop environment (RDE) product on the business’s point-of-sale system. Many hackers...who target point-of-sale systems begin by gathering a list 8 of common network ports associated with well-known remote desktop products . For...acquiring and analyzing the Windows Registry hives from the live machine, are particularly useful for analyzing compromised Windows based point-of

  10. Comparison of Cashew Nut Shell Liquid (CNS ) Resin with ...

    African Journals Online (AJOL)

    synthetic) resin. Compressive and tensile strength tests conducted proved that composites developed with cashew nut shell liquid (CNSL) resin were comparable to those developed with polyester resin. In the results, CNSL has an ultimate ...

  11. Research and development for decontamination system of spent resin in Hanbit Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Sung, Gi Hong [Dept. of Nuclear Engineering, Chosun University, Gwangju (Korea, Republic of)

    2015-12-15

    When reactor coolant leaks occur due to cracks of a steam generator tube, radioactive materials contained in the primary cooling water in nuclear power plant are forced out toward the secondary systems. At this time the secondary water purification resin in the ion exchange resin tower of the steam generator blowdown system is contaminated by the radioactivity of the leaked radioactive materials, so we pack this in special containers and store temporarily because we could not dispose it by ourselves. If steam generator tube leakage occurs, it produces contaminated spent resins annually about 5,000-7,000 liters. This may increase the amount of nuclear waste productions, a disposal working cost and a unit price of generating electricity in the plant. For this reasons, it is required to develop a decontamination process technique for reducing the radioactive level of these resins enough to handle by the self-disposal method. In this research, First, Investigated the structure and properties of the ion exchange resin used in a steam generator blowdown system. Second, Checked for a occurrence status of contaminated spent resin and a disposal technology. Third, identified the chemical characteristics of the waste radionuclides of the spent resin, and examined ionic bonding and separation mechanism of radioactive nuclear species and a spent resin. Finally, we carried out the decontamination experiment using chemicals, ultrasound, microbubbles, supercritical carbon dioxide to process these spent resin. In the case of the spent resin decontamination method using chemicals, the higher the concentration of the drug decontamination efficiency was higher. In the ultrasound method, foreign matter of the spent resin was removed and was found that the level of radioactivity is below of the MDA. In the microbubbles method, we found that the concentration of the radioactivity decreased after the experiment, so it can be used to the decontamination process of the spent resin. In

  12. Resin composite for sealing and its use in a solar cell. Fushiyo jushi soseibutsu oyobi sore wo mochiita taiyo denchi

    Energy Technology Data Exchange (ETDEWEB)

    Toma, H.; Mimura, T.; Takehara, N.

    1994-01-28

    This invention presents resin composites for sealing of a solar cell composed of a hardening resin and a thermoplastic resin which has a number average molecular weight larger than that of the hardening resin and is soluble in the hardening resin, and the invention affords a solar cell to endure a long-term stable operation and to give a good performance. The hardening resin includes unsaturated polyester resin, phenolic resin, alkyd resin, unsaturated acrylic resin, epoxy resin, polyurethane resin, melamine resin, diallyl phthalate resin, their oligomers and their modifications. The thermoplastic resin includes saturated polyester resin, phenolic resin, acrylic resin, styrene resin, epoxy resin, polyurethane resin, polyvinyl acetate resin, polyvinyl chloride resin, polyvinyl alcohol resin, polyacetal resin, their modifications and their copolymer resin. 2 figs., 3 tabs.

  13. Curing kinetics of alkyd/melamine resin mixtures

    OpenAIRE

    Jovičić Mirjana C.; Radičević Radmila Ž.

    2009-01-01

    Alkyd resins are the most popular and useful synthetic resins applied as the binder in protective coatings. Frequently they are not used alone but are modified with other synthetic resins in the manufacture of the coatings. An alkyd/melamine resin mixture is the usual composition for the preparation of coating called 'baking enamel' and it is cured through functional groups of resins at high temperatures. In this paper, curing kinetics of alkyd resins based on castor oil and dehydrated castor...

  14. Geophysical study of saline water intrusion in Lagos municipality

    African Journals Online (AJOL)

    aghomotsegin

    Saline water intrusion presently constitutes serious concerns in the Lagos municipality just like many other coastal cities, thus necessitating its intervallic study. The present study involving 52 borehole logs (consisting of natural gamma and electrical resistivity components) was aimed at delineating intruded and vulnerable ...

  15. Intrusion detection systems: complement to firewall security system ...

    African Journals Online (AJOL)

    Intrusion detection systems: complement to firewall security system. ... Information Impact: Journal of Information and Knowledge Management. Journal Home ... If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

  16. Numerical modelling of seawater intrusion in Shenzhen (China ...

    Indian Academy of Sciences (India)

    1. Introduction. Seawater intrusion constitutes a prominent hydro- logical problem in many coastal areas of the world. It is generally defined as the encroachment of saline water into fresh groundwater domains in coastal aquifer settings (Werner and Simmons 2008). This phenomenon will occur when the natural equilib-.

  17. Intrusive Thoughts: A Primary Variable in Breakup Distress

    Science.gov (United States)

    Field, Tiffany; Diego, Miguel; Pelaez, Martha; Deeds, Osvelia; Delgado, Jeannette

    2013-01-01

    University students who were high versus low on breakup distress scores were given self-report measures to assess their intrusive thoughts about the romantic breakup and their somatic symptoms that followed the breakup as well as their extracurricular activities and social support that might alleviate their breakup distress. In a regression…

  18. Depressed mood mediates the relationship between rumination and intrusions

    NARCIS (Netherlands)

    Smets, Jorien; Luyckx, Koen; Wessel, Ineke; Raes, Filip

    2012-01-01

    Research suggests that rumination is a causal factor for intrusive memories. These are disturbing autobiographical memories that pop into one's mind involuntarily, spontaneously, and repetitively. A three-wave longitudinal study was conducted to replicate this finding and to test whether one route

  19. Sensitivity analysis on parameters and processes affecting vapor intrusion risk

    NARCIS (Netherlands)

    Picone, S.; Valstar, J.R.; Gaans, van P.; Grotenhuis, J.T.C.; Rijnaarts, H.H.M.

    2012-01-01

    A one-dimensional numerical model was developed and used to identify the key processes controlling vapor intrusion risks by means of a sensitivity analysis. The model simulates the fate of a dissolved volatile organic compound present below the ventilated crawl space of a house. In contrast to the

  20. Fast Content-Based Packet Handling for Intrusion Detection

    National Research Council Canada - National Science Library

    Fisk, Mike

    2001-01-01

    ... use of Royer-Moore currently used in the popular intrusion detection platform Snort. We then measure the actual performance of several search algorithms on actual packet traces and rulesets. Our results provide lessons on the structuring of content-based handlers.

  1. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  2. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    2016-08-26

    Aug 26, 2016 ... A multisensor-based IDS enables identification of the intrusion patterns semantically by correlating the events and context information provided by multiple sensors. ... R Bhargavi1 V Vaidehi1. Department of Information Technology, Madras Institute of Technology, Anna University, Chennai 600 044, India ...

  3. A bagging approach to network intrusion detection | Adetunmbi ...

    African Journals Online (AJOL)

    The presences of these flaws make a secured system a mirage for now, hence the need for intrusion detection system. In this paper, an ensemble approach – Bagging was used on five different machine learning techniques to improve accuracy of classifiers. Machine learning seeks for methods of extracting hidden pattern ...

  4. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    user

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and. February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  5. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  6. Attenuating fearful memories: effect of cued extinction on intrusions.

    Science.gov (United States)

    Marks, Elizabeth H; Zoellner, Lori A

    2014-12-01

    Exposure-based therapies for posttraumatic stress disorder are thought to reduce intrusive memories through extinction processes. Methods that enhance extinction may translate to improved treatment. Rat research suggests retrieving a memory via a conditioned stimulus (CS) cue, and then modifying the retrieved memory within a specific reconsolidation window may enhance extinction. In humans, studies (e.g., Kindt & Soeter, 2013; Schiller et al., 2010) using basic learning paradigms show discrepant findings. Using a distressing film paradigm, participants (N = 148) completed fear acquisition and extinction. At extinction, they were randomized to 1 of 3 groups: CS cue within reconsolidation window, CS cue outside window, or non-CS cue within window. Intrusions were assessed 24 hr after extinction. Participants receiving the CS cue and completing extinction within the reconsolidation window had more intrusions (M = 2.40, SD = 2.54) than those cued outside (M = 1.65, SD = 1.70) or those receiving a non-CS cue (M = 1.24, SD = 1.26), F(2, 145) = 4.52, p = .01, d = 0.55. Consistent with the reconsolidation hypothesis, presenting a CS cue does appear to activate a specific period of time during which a memory can be updated. However, the CS cue caused increased, rather than decreased, frequency of intrusions. Understanding parameters of preextinction cueing may help us better understand reconsolidation as a potential memory updating mechanism.

  7. Petrography of some altered intrusive rocks from the Lower Benue ...

    African Journals Online (AJOL)

    Petrography of some altered intrusive rocks from the Lower Benue Trough, Nigeria. Smart C Obiora, Alphonso C Umeji. Abstract. No Abstract. Journal of Mining and Geology 2005, Vol 41(1): 1-9. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  8. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  9. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    the Earth that includes accretion and dispersal of supercontinents, viz., Columbia (Rogers and. Santosh 2002; Zhao et al 2004) and Rodinia. Keywords. Chhattisgarh Supergroup; Singhora Group; diabasic intrusive; geochemistry and age. J. Earth Syst. Sci. 120, No. 2, April 2011, pp. 223–236 c Indian Academy of Sciences.

  10. Saltwater Intrusion Simulation in Heterogeneous Aquifer Using Lattice Boltzmann Method

    Science.gov (United States)

    Servan-Camas, B.; Tsai, F. T.

    2006-12-01

    This study develops a saltwater intrusion simulation model using a lattice Boltzmann method (LBM) in a two- dimensional coastal confined aquifer. The saltwater intrusion phenomenon is described by density-varied groundwater flow and mass transport equations, where a freshwater-saltwater mixing zone is considered. Although primarily developed using the mesoscopic approach to solve macroscopic fluid dynamic problems (e.g. Navier-Stoke equation), LBM is able to be adopted to solve physical-based diffusion-type governing equations as for the groundwater flow and mass transport equations. The challenge of using LBM in saltwater intrusion modeling is to recover hydraulic conductivity heterogeneity. In this study, the Darcy equation and the advection-dispersion equation (ADE) are recovered in the lattice Boltzmann modeling. Specifically, the hydraulic conductivity heterogeneity is represented by the speed of sound in LBM. Under the consideration on the steady-state groundwater flow due to low storativity, in each time step the flow problem is modified to be a Poisson equation and solved by LBM. Nevertheless, the groundwater flow is still a time-marching problem with spatial-temporal variation in salinity concentration as well as density. The Henry problem is used to compare the LBM results against the Henry analytic solution and SUTRA result. Also, we show that LBM is capable of handling the Dirichlet, Neumann, and Cauchy concentration boundary conditions at the sea side. Finally, we compare the saltwater intrusion results using LBM in the Henry problem when heterogeneous hydraulic conductivity is considered.

  11. Extension by faulting, stretching and magma intrusion in Ethiopia

    Science.gov (United States)

    Bastow, I. D.; Keir, D.

    2012-12-01

    The 2001-2004 Ethiopia Afar Geoscientific Lithospheric Experiment showed that high seismic wavespeed, dense, mafic crustal intrusions exist beneath many zones of Quaternary magmatism in the Main Ethiopian rift, and that crustal thinning is minimal. From these observations, a consensus quickly emerged that extension presently occurs not by ductile stretching and brittle faulting but by magma intrusion. Striking InSAR images and accompanying seismic data from the 2005 Afar diking episode provided further compelling evidence in support of the magma assisted rifting hypothesis. Patterns of mantle seismic anisotropy, constrained by a combination of body and surface-wave analysis showed that melt intrusion likely also plays an important role in accommodating extension at greater depths in the extending plate. Evidence from further north in Afar, however, where crustal thickness decreases abruptly into the Danakil Depression, is not so easily explained by the magma assisted rifting hypothesis. Subsidence of the newly forming margin towards and below sea level, and eruption of voluminous basalt flows, is likely the result of late-stage thinning of the heavily intruded, weakened plate just before the onset of seafloor spreading. Faulting, stretching and magma intrusion are thus each important, but at different times during breakup. Combining, not isolating, these mechanisms of strain in new rifting models and appreciating how plate strength varies during rifting is essential in developing a clearer understanding of the incomplete geological record that documents continental breakup over time.

  12. Saltwater Intrusion Appraisal of Shallow Aquifer in Burutu Area of ...

    African Journals Online (AJOL)

    The abandonment of shallow boreholes is presumed to have been caused by saltwater intrusion from the ocean. ... The evidence revealed by the 2D electrical resistivity tomography investigation combined with geochemistry of groundwater from literature suggested that abandonment of shallow boreholes are probably not ...

  13. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    2Department of Civil Engineering, Indian Institute of Technology, Kanpur. 208 016, India. e-mail: adas wrpm@yahoo.com; bithin@iitk.ac.in. MS received 1 March 1999; revised 9 April 2001. Abstract. Seawater intrusion in coastal aquifers is generally three dimensional. (3-D) in nature. In the literature, there is a general lack ...

  14. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    2008-01-01

    We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying a new method for anomaly detection on the

  15. SSHCure: A Flow-Based SSH Intrusion Detection System

    NARCIS (Netherlands)

    Hellemons, Laurens; Hendriks, Luuk; Hendriks, Luuk; Hofstede, R.J.; Sperotto, Anna; Sadre, R.; Pras, Aiko

    SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity. Most existing network intrusion detection systems designed for this purpose rely on the

  16. Poseidon: A 2-tier Anomaly-based Intrusion Detection System

    NARCIS (Netherlands)

    Bolzoni, D.; Zambon, Emmanuele; Etalle, Sandro; Hartel, Pieter H.

    2005-01-01

    We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection

  17. An Overview of IP Flow-Based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Schaffrath, Gregor; Sadre, R.; Morariu, Cristian; Pras, Aiko; Stiller, Burkhard

    2010-01-01

    Intrusion detection is an important area of research. Traditionally, the approach taken to find attacks is to inspect the contents of every packet. However, packet inspection cannot easily be performed at high-speeds. Therefore, researchers and operators started investigating alternative approaches,

  18. A Labeled Data Set For Flow-based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Sadre, R.; van Vliet, Frank; Pras, Aiko; Nunzi, Giorgio; Scoglio, Caterina; Li, Xing

    2009-01-01

    Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field, benchmarking of flow-based IDS is still an open issue. In this paper, we propose the first publicly available, labeled data set

  19. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    1Department of Civil Engineering, Regional Engineering College, Durgapur. 713 209, India. 2Department of Civil Engineering, Indian Institute of Technology, Kanpur. 208 016, India. e-mail: adas wrpm@yahoo.com; bithin@iitk.ac.in. MS received 1 March 1999; revised 9 April 2001. Abstract. Seawater intrusion in coastal ...

  20. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories.

    Science.gov (United States)

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-12-01

    To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. © 2016 Associated Professional Sleep Societies, LLC.

  1. Intrusion detection for the solution of security problems

    International Nuclear Information System (INIS)

    Buchmueller, R.

    1982-01-01

    Constantly growing security problems in public as well as private sectors can no longer be solved without the use of modern intrusion detection systems. BBC, as general contractor, offers the system solutions to fully meet these problems. These solutions include analysis of the site to be protected, installation, commissioning and maintenance of the security system. (orig.) [de

  2. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science; Volume 120; Issue 2. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora Group, Chhattisgarh ... Zr, Y and Nb ternary diagrams plot in the fields of within plate basalt. Selected HFSE ratios indicate a non-plume source with crustal assimilation/sediment mixing.

  3. Groundwater quality degradation due to salt water intrusion in ...

    African Journals Online (AJOL)

    Saltwater intrusion problems are widespread where there are over pumping of groundwater from coastal aquifers. Water samples were collected from production boreholes in Zanzibar municipality and analyzed for salinity indication parameters comprising of chloride, electrical conductivity, total dissolved salts and ...

  4. Brief exercise enhances intrusive memories of traumatic stimuli.

    Science.gov (United States)

    Keyan, Dharani; Bryant, Richard A

    2017-05-01

    Brief physical exercise enhances memories for neutral events, and recently has been shown to modulate fear learning in animals. To date there is no evidence pertaining to the impact of exercise on emotional memories in humans. Accordingly, this study investigated the role of brief exercise in the development of emotional intrusive memories. Forty-nine university students (18-29year olds) viewed a car accident film depicting accident and injury, and were then randomly assigned to engage in either 10min of intense exercise or easy walking. Two days following the experiment participants were assessed for both intrusive memories of the film and intentional recall of film details. Results indicated that participants in the exercise relative to the walking condition reported more intrusive memories, but not voluntarily recalled memories, of the car accident film two days later. These findings are consistent with recent evidence of exercise-induced emotional learning in animals, and point to the potential for physical activity to contribute to the development of intrusions in the context of encoding emotionally-laden information. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. Pre-Stressor Interference Control and Intrusive Memories

    NARCIS (Netherlands)

    Verwoerd, J.; Wessel, I.; De Jong, P.J.; Nieuwenhuis, Maurice; Huntjens, R.J.C.

    Although intrusive imagery is a common response in the aftermath of a stressful or traumatic event, only a minority of trauma victims show persistent re-experiencing and related psychopathology. Individual differences in pre-trauma executive control possibly play a critical role. Therefore, this

  6. Climate Change and Saltwater Intrusion along the Eastern ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Eastern Mediterranean is highly vulnerable to saltwater intrusion into the freshwater aquifers along its coasts. The degradation of these aquifers would result in serious socioeconomic consequence to people living there. This project will investigate how climate change is affecting the salinity of coastal aquifers at several ...

  7. Geophysical study of saline water intrusion in Lagos municipality ...

    African Journals Online (AJOL)

    Saline water intrusion presently constitutes serious concerns in the Lagos municipality just like many other coastal cities, thus necessitating its intervallic study. The present study involving 52 borehole logs (consisting of natural gamma and electrical resistivity components) was aimed at delineating intruded and vulnerable ...

  8. Intrusion detection systems: complement to firewall security system ...

    African Journals Online (AJOL)

    The main purpose with firewall is to protect against unauthorized external attacks but it will normally leave the network unprotected from internal attacks or intrusions. Fire walls and access control have been the most important components used in order to secure network and its resources. They work to prevent attacks from ...

  9. Tracking salinity intrusions in a coastal forested freshwater wetland system

    Science.gov (United States)

    Anand D. Jayakaran; Thomas M. Williams; William H. Conner

    2016-01-01

    Coastal forested freshwater wetlands are sentinel sites for salinity intrusions associated with large, tidally influenced, storm-driven or drought-induced incursions of estuarine waters into freshwater ecosystems. These incursions may also be exacerbated by rising sea levels associated with climate change.

  10. Melanite garnet-bearing nepheline syenite minor intrusion in ...

    Indian Academy of Sciences (India)

    (Chattopadhyay and Hashmi 1984; Maitra 1992;. Srivastava et al 2005; Srivastava ... Keywords. Melanite garnet; nepheline syenite minor intrusion; Mesozoic magmatism; Mawpyut complex; Meghalaya plateau. J. Earth Syst. Sci. 120, No. 6, December 2011, pp. ... dated 110–120 Ma (Coffin et al 2002; Srivastava et al 2005).

  11. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  12. Microstructure in hardened cement pastes measured by mercury intrusion porosimetry and low temperature microcalorimetry

    DEFF Research Database (Denmark)

    Hansen, Kurt Kielsgaard; Baroghel, V.B.; Künzel, H.M.

    1996-01-01

    , image analysis, mercury intrusion porosimetry and low temperature microcalorimetry.The present paper is dealing with cumulated pore size distributions measured by mercury intrusion porosimetry (MIP) from two laboratories (LCPC, IBP) and low temperature microcalorimetry (CAL) from one laboratory (BKM...

  13. Why do close partners snoop? Predictors of intrusive behavior in newlywed couples

    NARCIS (Netherlands)

    Vinkers, C. D. W.; Finkenauer, C.; Hawk, S. T.

    2011-01-01

    Existing research shows that intrusive behavior has detrimental consequences for relationships. Surprisingly, little is known about why close relationship partners snoop. This study examined why romantic partners engage in intrusive behavior among newlywed couples in the Netherlands. As predicted,

  14. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    Science.gov (United States)

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...

  15. Report: Lack of Final Guidance on Vapor Intrusion Impedes Efforts to Address Indoor Air Risks

    Science.gov (United States)

    Report #10-P-0042, December 14, 2009. EPA’s efforts to protect human health at sites where vapor intrusion risks may occur have been impeded by the lack of final Agency guidance on vapor intrusion risks.

  16. Input to Resin Column Structural Analysis if Autocatalytic Resin Reaction Occurs in HB-Line Phase II

    Energy Technology Data Exchange (ETDEWEB)

    Hallman, D.F.

    2001-07-10

    Solutions of plutonium in nitric acid are purified and concentrated using anion resin prior to precipitation. There have been instances of resin column explosions caused by autocatalytic reactions of anion resins in nitric acid within the DOE complex

  17. Gold Loading on Ion Exchange Resins in Non-Ammoniacal Resin-Solution Systems

    Directory of Open Access Journals (Sweden)

    Abrar Muslim

    2010-12-01

    Full Text Available The loading of gold using strong base anion exchange resin in non-ammoniac resin-solution (NARS systems has been studied. The loading of gold onto ion exchange resins is affected by polythionate concentration, and trithionate can be used as the baseline in the system. The results also show that resin capacity on gold loading increases due to the increase in the equilibrium thiosulfate concentration in the NARS system. Gold loading performances show the need of optimization the equilibrium concentrations of thiosulfate in the NARS system. Keywords: equilibrium, gold loading, resin capacity, thiosulfate, trithionate

  18. Polyimide Resins Resist Extreme Temperatures

    Science.gov (United States)

    2009-01-01

    Spacecraft and aerospace engines share a common threat: high temperature. The temperatures experienced during atmospheric reentry can reach over 2,000 F, and the temperatures in rocket engines can reach well over 5,000 F. To combat the high temperatures in aerospace applications, Dr. Ruth Pater of Langley Research Center developed RP-46, a polyimide resin capable of withstanding the most brutal temperatures. The composite material can push the service temperature to the limits of organic materials. Designed as an environmentally friendly alternative to other high-temperature resins, the RP-46 polyimide resin system was awarded a 1992 "R&D 100" award, named a "2001 NASA Technology of the Year," and later, due to its success as a spinoff technology, "2004 NASA Commercial Invention of the Year." The technology s commercial success also led to its winning the Langley s "Paul F. Holloway Technology Transfer Award" as well as "Richard T. Whitcom Aerospace Technology Transfer Award" both for 2004. RP-46 is relatively inexpensive and it can be readily processed for use as an adhesive, composite, resin molding, coating, foam, or film. Its composite materials can be used in temperatures ranging from minus 150 F to 2,300 F. No other organic materials are known to be capable of such wide range and extreme high-temperature applications. In addition to answering the call for environmentally conscious high-temperature materials, RP-46 provides a slew of additional advantages: It is extremely lightweight (less than half the weight of aluminum), chemical and moisture resistant, strong, and flexible. Pater also developed a similar technology, RP-50, using many of the same methods she used with RP-46, and very similar in composition to RP-46 in terms of its thermal capacity and chemical construction, but it has different applications, as this material is a coating as opposed to a buildable composite. A NASA license for use of this material outside of the Space Agency as well as

  19. The solidification of spent resin

    International Nuclear Information System (INIS)

    Shiao, S. J.; Tsai, C. M.; Shyu, Y. H.

    1991-01-01

    A quasi-steady apparatus was applied to measure the thermal conductivity of solids ranging in size for 0.3 to 200 L, and temperature distributions in the solids were recorded during the curing, and theoretical equation for conduction in a cylindrical form with uniform energy generation was established to define the thermal state of reaction. The heat of reaction calculated from the theoretical equation with experimental values for the maximum temperature and thermal conductivity agrees very well with the data reported. The relationships among heat of reaction and amount of curing agent, retardant, loading of spent resin, and water were established

  20. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  1. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  2. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  3. Saltwater Intrusion Through Submerged Caves due to the Venturi Effect

    Science.gov (United States)

    Khazmutdinova, K.; Nof, D.

    2016-12-01

    Saltwater intrusion into freshwater sources is a concern in coastal areas. In order to reduce the intrusion of seawater the physical mechanisms that allow this to occur must be understood. This study presents an approach to quantify saltwater intrusion in karstic coastal aquifers due to the presence of submerged caves. Many water-filled caves have variable tunnel cross-sections and often have narrow connections between two otherwise large tunnels. Generally, the diameter of these restrictions is 1 - 2 m and the flow speed within them is approximately 1 - 5 m/s. Main cave tunnels can be 10 - 20 times bigger than restrictions, and have flow speeds ranging anywhere between 0.5 cm/s and 20 cm/s. According to Bernoulli's theorem, in order to balance high velocities within a restriction, the pressure has to drop as the water flow passes through a narrow tunnel. This is expected to influence the height to which a deeper saline aquifer can penetrate in conduits connecting the narrow restriction and saltwater. For sufficiently small restrictions, saline water can invade the freshwater tunnel. The intrusion of saltwater from a deeper, saline aquifer into a fresh groundwater system due to the Venturi effect in submerged caves was computed, and an analytical and a qualitative model that captures saltwater intrusion into a fresh aquifer was developed. Using Bernoulli's theorem, we show that depths from which the saline water can be drawn into the freshwater tunnel reach up to 450 m depending on the difference in the density between fresh and saltwater. The velocity of the saline upward flow is estimated to be 1.4 m/s using the parameters for Wakulla Spring, a first order magnitude spring in Florida, with a saltwater interface 180 m below the spring cave system.

  4. A new physical barrier system for seawater intrusion control

    Science.gov (United States)

    Abdoulhalik, Antoifi; Ahmed, Ashraf; Hamill, G. A.

    2017-06-01

    The construction of subsurface physical barriers is one of various methods used to control seawater intrusion (SWI) in coastal aquifers. This study proposes the mixed physical barrier (MPB) as a new barrier system for seawater intrusion control, which combines an impermeable cutoff wall and a semi-permeable subsurface dam. The effect of the traditionally-used physical barriers on transient saltwater wedge dynamics was first explored for various hydraulic gradients, and the workability of the MPB was thereafter thoroughly analysed. A newly developed automated image analysis based on light-concentration conversion was used in the experiments, which were completed in a porous media tank. The numerical code SEAWAT was used to assess the consistency of the experimental data and examine the sensitivity of the performance of the barriers to various key parameters. The results show that the MPB induced a visible lifting of the dense saline flux upward towards the outlet by the light freshwater. This saltwater lifting mechanism, observed for the first time, induced significant reduction to the saline water intrusion length. The use of the MPB yielded up to 62% and 42% more reduction of the saltwater intrusion length than the semi-permeable dam and the cutoff wall, respectively. The performance achieved by the MPB with a wall depth of 40% of the aquifer thickness was greater than that of a single cutoff wall with a penetration depth of 90% of the aquifer thickness (about 13% extra reduction). This means that the MPB could produce better seawater intrusion reduction than the traditionally used barriers at even lower cost.

  5. Detection of stratospheric ozone intrusions by windprofiler radars.

    Science.gov (United States)

    Hocking, W K; Carey-Smith, T; Tarasick, D W; Argall, P S; Strong, K; Rochon, Y; Zawadzki, I; Taylor, P A

    2007-11-08

    Stratospheric ozone attenuates harmful ultraviolet radiation and protects the Earth's biosphere. Ozone is also of fundamental importance for the chemistry of the lowermost part of the atmosphere, the troposphere. At ground level, ozone is an important by-product of anthropogenic pollution, damaging forests and crops, and negatively affecting human health. Ozone is critical to the chemical and thermal balance of the troposphere because, via the formation of hydroxyl radicals, it controls the capacity of tropospheric air to oxidize and remove other pollutants. Moreover, ozone is an important greenhouse gas, particularly in the upper troposphere. Although photochemistry in the lower troposphere is the major source of tropospheric ozone, the stratosphere-troposphere transport of ozone is important to the overall climatology, budget and long-term trends of tropospheric ozone. Stratospheric intrusion events, however, are still poorly understood. Here we introduce the use of modern windprofiler radars to assist in such transport investigations. By hourly monitoring the radar-derived tropopause height in combination with a series of frequent ozonesonde balloon launches, we find numerous intrusions of ozone from the stratosphere into the troposphere in southeastern Canada. On some occasions, ozone is dispersed at altitudes of two to four kilometres, but on other occasions it reaches the ground, where it can dominate the ozone density variability. We observe rapid changes in radar tropopause height immediately preceding these intrusion events. Such changes therefore serve as a valuable diagnostic for the occurrence of ozone intrusion events. Our studies emphasize the impact that stratospheric ozone can have on tropospheric ozone, and show that windprofiler data can be used to infer the possibility of ozone intrusions, as well as better represent tropopause motions in association with stratosphere-troposphere transport.

  6. Comparison of Cashew Nut Shell Liquid (CNS Resin with Polyester Resin in Composite Development

    Directory of Open Access Journals (Sweden)

    C. C. Ugoamadi

    2013-12-01

    Full Text Available Natural resins can compete effectively with the synthetic ones in composite development. In this research, cashew nuts were picked and processed for the extraction of the resin content. The resin (natural resin so obtained was mixed with cobalt amine (accelerator, methyl ethyl ketone peroxide (catalyst to develop two sets of composite specimens – specimens without fibres and specimens reinforced with glass fibres. This method of sample specimen development was repeated with polyester (synthetic resin. Compressive and tensile strength tests conducted proved that composites developed with cashew nut shell liquid (CNSL resin were comparable to those developed with polyester resin. In the results, CNSL has an ultimate compressive strength of 55MPa compared to that of polyester resin with an ultimate strength of 68MPa. The result of tensile strength proved cashew nut shell liquid resin (with ultimate strength of 44MPa to be better than polyester resin with 39MPa as ultimate tensile strength. This means that natural resins could be a better substitute for the synthetic ones when the required quantities of fibers (reinforcements and fillers are used in the fibre-reinforced plastic composite developments.

  7. Bond strength of resin-resin interfaces contaminated with saliva and submitted to different surface treatments.

    Science.gov (United States)

    Furuse, Adilson Yoshio; da Cunha, Leonardo Fernandes; Benetti, Ana Raquel; Mondelli, José

    2007-12-01

    The purpose of this study was to investigate the effect of different surface treatments on shear bond strength of saliva-contaminated resin-resin interfaces. Flat resin surfaces were fabricated. In the control group, no contamination or surface treatment was performed. The resin surfaces of the experimental groups were contaminated with saliva and air-dried, and then submitted to: (G1) rinsing with water and drying; (G2) application of an adhesive system; (G3) rinsing and drying, abrasion with finishing disks, etching and application of adhesive system; (G4) rinsing and drying, etching, application of silane and adhesive system. Resin cylinders were placed over the treated surfaces. The specimens were stored in water or ethanol. Shear bond strength tests were performed and the mode of failure was evaluated. Data were submitted to two-way ANOVA and Dunnett T3 test. Contamination of resin-resin interfaces with saliva significantly reduced shear strength, especially after prolonged storage (presin increments.

  8. resin as polymer-supported synthesis support

    Indian Academy of Sciences (India)

    Administrator

    dichloro-5,6-dicyano- benzoqunone ... ports used most widely in SPOS are Merrifield resin .... (2 × 10 mL). The resin was dried at 50°C for one hour to give white beads. IR (KBr): 3108, 3312 cm–1. 1H-NMR (500 MHz, CDCl3): δ 7⋅13 (br s, PS), 7⋅01.

  9. [Delayed asthma bronchiale due to epoxy resin].

    Science.gov (United States)

    Authried, Georg; Al-Asadi, Haifaa; Møller, Ulla; Sherson, David Lee

    2013-10-28

    Epoxy resin is a low molecular weight agent, which can cause both acute and delayed allergic reactions. However, it is known causing skin reactions with direct or airborne contact. Rarely it can cause airway reactions like asthma bronchiale. We describe a case of a windmill worker who developed delayed asthma bronchiale due to airborne contact with epoxy resin.

  10. Epoxidation of linseed oil-Alkyd resins

    International Nuclear Information System (INIS)

    Motawie, A.M.; Ismail, E.A.; Mazroua, A.M.; Abd EI Aziem, M.S.; Ramadan, A.M.

    2004-01-01

    Three types of different linseed oil-alkyd resin ( Alk (I), Alk (II), and Alk (III) ) were prepared with the calculated amounts of mono glycerides and adipic acid (1:1, 1:2, and 2:1 Eq.Wt) respectively via monoglyceride method. The obtained alkyd resins were epoxidized via reaction with the calculated quantities of peracetic acid, which was prepared by the reaction of acetic anhydride with H 2 O 2 . Epoxidation occurred with the ratio (1: 1, 1 :3, and 1:6 Eq. Wt) of alkyd to peracetic acid. The effect of reaction time on the epoxy group content was measured during the epoxidation process. The prepared alkyd resins were analyzed by IR and H 1 NMR. The metal coated film properties of epoxidized alkyd resins were compared with those of unmodified alkyd resins. It was observed that the coating films of epoxidized alkyd resins have better in drying properties, hardness, adhesion, impact and flexibility than those of un epoxidized alkyd resins. The flammability properties of the paper coated films for the prepared brominated epoxidized alkyd resins were found to be fire retardant

  11. Facile synthesis of hypercrosslinked resins via chloromethylation ...

    Indian Academy of Sciences (India)

    A sort of non-polystyrene type hypercrosslinked resin was firstly synthesized through chloromethylation of simple aryl molecules (benzene, toluene, naphthalene, diphenyl), succedent continuous Friedel–Crafts alkylation polymerization and post-crosslinking reaction. The chemical and porous structures of these novel resins ...

  12. Analysis of the microstructure and mechanical performance of composite resins after accelerated artificial aging.

    Science.gov (United States)

    De Oliveira Daltoé, M; Lepri, C Penazzo; Wiezel, J Guilherme G; Tornavoi, D Cremonezzi; Agnelli, J A Marcondes; Reis, A Cândido Dos

    2013-03-01

    Researches that assess the behavior of dental materials are important for scientific and industrial development especially when they are tested under conditions that simulate the oral environment, so this work analyzed the compressive strength and microstructure of three composite resins subjected to accelerated artificial aging (AAA). Three composites resins of 3M (P90, P60 and Z100) were analyzed and were obtained 16 specimens for each type (N.=48). Half of each type were subjected to UV-C system AAA and then were analyzed the surfaces of three aged specimens and three not aged of each type through the scanning electron microscope (SEM). After, eight specimens of each resin, aged and not aged, were subjected to compression test. After statistical analysis of compressive strength values, it was found that there was difference between groups (α resin specimens aged P60 presented lower values of compressive strength statistically significant when compared to the not subject to the AAA. For the other composite resins, there was no difference, regardless of aging, a fact confirmed by SEM. The results showed that the AAA influenced the compressive strength of the resin aged P60; confirmed by surface analysis by SEM, which showed greater structural disarrangement on surface material.

  13. Aspects of bonding between resin luting cements and glass ceramic materials.

    Science.gov (United States)

    Tian, Tian; Tsoi, James Kit-Hon; Matinlinna, Jukka P; Burrow, Michael F

    2014-07-01

    The bonding interface of glass ceramics and resin luting cements plays an important role in the long-term durability of ceramic restorations. The purpose of this systematic review is to discuss the various factors involved with the bond between glass ceramics and resin luting cements. An electronic Pubmed, Medline and Embase search was conducted to obtain laboratory studies on resin-ceramic bonding published in English and Chinese between 1972 and 2012. Eighty-three articles were included in this review. Various factors that have a possible impact on the bond between glass ceramics and resin cements were discussed, including ceramic type, ceramic crystal structure, resin luting cements, light curing, surface treatments, and laboratory test methodology. Resin-ceramic bonding has been improved substantially in the past few years. Hydrofluoric acid (HF) etching followed by silanizaiton has become the most widely accepted surface treatment for glass ceramics. However, further studies need to be undertaken to improve surface preparations without HF because of its toxicity. Laboratory test methods are also required to better simulate the actual oral environment for more clinically compatible testing. Copyright © 2014 Academy of Dental Materials. Published by Elsevier Ltd. All rights reserved.

  14. 10 CFR 63.321 - Individual protection standard for human intrusion.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Individual protection standard for human intrusion. 63.321... Standards Human Intrusion Standard § 63.321 Individual protection standard for human intrusion. (a) DOE must determine the earliest time after disposal that the waste package would degrade sufficiently that a human...

  15. Physical Properties of Synthetic Resin Materials

    Science.gov (United States)

    Fishbein, Meyer

    1939-01-01

    A study was made to determine the physical properties of synthetic resins having paper, canvas, and linen reinforcements, and of laminated wood impregnated with a resin varnish. The results show that commercial resins have moduli of elasticity that are too low for structural considerations. Nevertheless, there do exist plastics that have favorable mechanical properties and, with further development, it should be possible to produce resin products that compare favorably with the light-metal alloys. The results obtained from tests on Compound 1840, resin-impregnated wood, show that this material can stand on its own merit by virtue of a compressive strength four times that of the natural wood. This increase in compressive strength was accomplished with an increase of density to a value slightly below three times the normal value and corrected one of the most serious defects of the natural product.

  16. Electrodialytic decontamination of spent ion exchange resins

    International Nuclear Information System (INIS)

    Nott, B.R.

    1982-01-01

    Development of a novel electrodialytic decontamination process for the selective removal of radioactive Cs from spent ion exchange resins containing large amounts of Li is described. The process involves passage of a dc electric current through a bed of the spent ion exchange resin in a specially designed electrodialytic cell. The radiocesium so removed from a volume of the spent resin is concentrated onto a much smaller volume of a Cs selective sorbent to achieve a significant radioactive waste volume reduction. Technical feasibility of the electrodialytic resin decontamination process has been demonstrated on a bench scale with a batch of simulated spent ion exchange resin and using potassium cobalt ferrocyanide as the Cs selective sorbent. A volume reduction factor between 10 and 17 has been estimated. The process appears to be economically attractive. Improvements in process economics can be expected from optimization of the process. Other possible applications of the EDRD process have been identified

  17. Embedding of reactor wastes in plastic resins

    International Nuclear Information System (INIS)

    1979-01-01

    STEAG Kernenergie GmbH is so far the only firm commercially to condition radioactive bead ion exchange resins by embedding in polystyrene resins. The objective of the work reported here was to study and develop methods for immobilization of other reactor wastes in plastic resins. Comparison studies on high quality cement however showed favourable results for cement with respect to process safety and economy. For this reason STEAG interrupted its work in the field of resin embedding after about one year. The work carried out during this period is surveyed in this report, which includes a comprehensive literature study on reactor wastes and their solidification in plastic resins as well as on regulations with regard to radioactive waste disposal in the member states of the European Communities

  18. Solidification of ion exchange resin wastes

    International Nuclear Information System (INIS)

    1982-08-01

    Solidification media investigated included portland type I, portland type III and high alumina cements, a proprietary gypsum-based polymer modified cement, and a vinyl ester-styrene thermosetting plastic. Samples formulated with hydraulic cement were analyzed to investigate the effects of resin type, resin loading, waste-to-cement ratio, and water-to-cement ratio. The solidification of cation resin wastes with portland cement was characterized by excessive swelling and cracking of waste forms, both after curing and during immersion testing. Mixed bed resin waste formulations were limited by their cation component. Additives to improve the mechanical properties of portland cement-ion exchange resin waste forms were evaluated. High alumina cement formulations dislayed a resistance to deterioration of mechanical integrity during immersion testing, thus providing a significant advantage over portland cements for the solidification of resin wastes. Properties of cement-ion exchange resin waste forms were examined. An experiment was conducted to study the leachability of 137 Cs, 85 Sr, and 60 Co from resins modified in portland type III and high alumina cements. The cumulative 137 Cs fraction release was at least an order of magnitude greater than that of either 85 Sr or 60 Co. Release rates of 137 Cs in high alumina cement were greater than those in portland III cement by a factor of two.Compressive strength and leach testing were conducted for resin wastes solidified with polymer-modified gypsum based cement. 137 Cs, 85 Sr, and 60 Co fraction releases were about one, two and three orders of magnitude higher, respectively, than in equivalent portland type III cement formulations. As much as 28.6 wt % dry ion exchange resin was successfully solidified using vinyl ester-styrene compared with a maximum of 25 wt % in both portland and gypsum-based cement

  19. Influence of the Three Gorges Project on saltwater intrusion in the Yangtze River Estuary

    Science.gov (United States)

    An, Qiang; Wu, Yanqing; Taylor, Shauna; Zhao, Bin

    2009-02-01

    The Three Gorges Project (TGP) is a transcentury project that has aroused world attention. It is expected that the flow velocity and runoff of the Yangtze River will be changed after the project has been accomplished. Consequently, however, the ecological environment in the Yangtze River Basin, particularly in the estuary region, will be affected. Salinity intrusion into the Yangtze River estuary, in general, is mostly affected by the Yangtze River discharge and its external tidal level. This paper focuses on examining the influence of changes in runoff on salinity value. The question, to which should be paid attention is: how is the interaction between changes in runoff of the Yangtze River and salinity distribution in the Yangtze River estuary, China? In this research, a three-dimensional model has been used to identify the effects of runoff change on salinity distribution. The drawn conclusion is that the change of salinity is influenced by discharge variation. Positive and negative impacts of TGP would both turn up but in different period. In sum, TGP is in favor of restraining saltwater intrusion. Nevertheless a suitable method should be found to resolve its negative influences.

  20. Deep Seawater Intrusion Enhanced by Geothermal Through Deep Faults in Xinzhou Geothermal Field in Guangdong, China

    Science.gov (United States)

    Lu, G.; Ou, H.; Hu, B. X.; Wang, X.

    2017-12-01

    This study investigates abnormal sea water intrusion from deep depth, riding an inland-ward deep groundwater flow, which is enhanced by deep faults and geothermal processes. The study site Xinzhou geothermal field is 20 km from the coast line. It is in southern China's Guangdong coast, a part of China's long coastal geothermal belt. The geothermal water is salty, having fueled an speculation that it was ancient sea water retained. However, the perpetual "pumping" of the self-flowing outflow of geothermal waters might alter the deep underground flow to favor large-scale or long distant sea water intrusion. We studied geochemical characteristics of the geothermal water and found it as a mixture of the sea water with rain water or pore water, with no indication of dilution involved. And we conducted numerical studies of the buoyancy-driven geothermal flow in the deep ground and find that deep down in thousand meters there is favorable hydraulic gradient favoring inland-ward groundwater flow, allowing seawater intrude inland for an unusually long tens of kilometers in a granitic groundwater flow system. This work formed the first in understanding geo-environment for deep ground water flow.

  1. A two-stage flow-based intrusion detection model for next-generation networks.

    Science.gov (United States)

    Umer, Muhammad Fahad; Sher, Muhammad; Bi, Yaxin

    2018-01-01

    The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results.

  2. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  3. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  4. Evaluation of Resin-Resin Interface in Direct Composite Restoration Repair

    Science.gov (United States)

    Stoleriu, S.; Andrian, S.; Pancu, G.; Nica, I.; Iovan, G.

    2017-06-01

    The aim of this study was to evaluate the resin-resin interface when a universal bonding agent was used in two different strategies in direct restoration repair. Two composite resins (a micro-filled hybrid and a nano-filled hybrid) as old restorations that have to be repair, a universal bonding agent and a micro-filled hybrid composite resin (different then that aged) as new material for repair were chosen for the study. Non-aged samples were used as control and aged samples were used as study groups. The universal bonding agent was applied in etch-and-rinse and in self-etch strategies. The interface between old and new composite resins was evaluated by SEM and the microleakage was assessed by scoring the dye penetration. Very good adaptation of the two different composite resins placed in direct contact in non-aged samples was recorded. No gaps or defects were visible and strong resin-resin contact was observed. After aging, enlargement of resin-resin junction were observed in most of the samples and a increased dye penetration was recorded irrespective of the strategy (etch-and-rinse or self-etch) used for bonding agent application.

  5. Bond strength of a chairside autopolymerizing reline resin to injection-molded thermoplastic denture base resins.

    Science.gov (United States)

    Hamanaka, Ippei; Shimizu, Hiroshi; Takahashi, Yutaka

    2017-01-01

    This study evaluated the shear bond strength of a chairside autopolymerizing reline resin to injection-molded thermoplastic denture base resins. Four kinds of injection-molded thermoplastic resins (two polyamides, a polyethylene terephthalate copolymer and a polycarbonate) and PMMA, as a control, were tested. The eight types of surface treatment: ((1) no treatment, (2) air abrasion, (3) dichloromethane, (4) ethyl acetate, (5) 4-META/MMA-TBB resin, (6) air abrasion and 4-META/MMA-TBB resin, (7) tribochemical silica coating, and (8) tribochemical silica coating and 4-META/MMA-TBB resin) were applied to each specimen. The chairside autopolymerizing reline resins were bonded to disks of the injection-molded thermoplastic denture base resins. All of the specimens were immersed in water for 4 months and then thermocycled for 10,000 cycles in water between 5 and 55°C. The shear bond strengths were determined. The shear bond strengths of the two polyamides treated using air abrasion, dichloromethane and ethyl acetate and no treatment were exceedingly low. The greatest bond strength was recorded for the polyethylene terephthalate copolymer specimens treated with tribochemical silica coating and 4-META/MMA-TBB resin (22.5MPa). The bond strengths of the other injection-molded thermoplastic denture base resins increased using 4-META/MMA-TBB resin. Tribochemical silica coating and 4-META/MMA-TBB resin were the most effective surface treatments among all denture base resins tested. Copyright © 2016 Japan Prosthodontic Society. Published by Elsevier Ltd. All rights reserved.

  6. Repeated cortisol administration does not reduce intrusive memories - A double blind placebo controlled experimental study.

    Science.gov (United States)

    Graebener, Alexandra Heike; Michael, Tanja; Holz, Elena; Lass-Hennemann, Johanna

    2017-11-01

    PTSD is a severe mental disorder, which may develop after exposure to traumatic events and is characterized by intrusive memories. Intrusions are sudden brief sensory memories of the traumatic event, that cause immense distress and impairment in every day functioning. Thus, the reduction of intrusive memories is one of the main aims of PTSD therapy. Recently, the glucocorticoid cortisol has been proposed as a pharmacological option to reduce intrusive memories, because cortisol is known to have memory retrieval inhibiting effects. However, the research on the effects of cortisol administration on intrusive memories is not conclusive. The aim of the present study was to examine if repeated cortisol administration inhibits intrusions and recognition memory in an experimental study using the trauma film paradigm. In a randomized double-blind placebo controlled design participants were exposed to a traumatic film (known to induce intrusions in healthy participants) and received either a low dose of cortisol (20mg) or placebo on the three days following "trauma exposure". Intrusive memories were assessed with an Electronic Diary and an Intrusion Triggering Task. Furthermore, we assessed explicit memory for the traumatic film clip with a recognition test. Contrary to our predictions, the cortisol group did not report fewer intrusions than the placebo group nor did it show diminished performance on the recognition test. Our results show that sole cortisol administration after a traumatic experience cannot reduce intrusive re-experiencing. Copyright © 2017 Elsevier B.V. and ECNP. All rights reserved.

  7. Mineralogy of fossil resins in Northern Eurasia

    Science.gov (United States)

    Bogdasarov, M. A.

    2007-12-01

    The investigation is focused on identification and origin of fossil resins from the Cretaceous, Tertiary, and Quaternary sediments of Northern Eurasia on the basis of detailed study of their physical and chemical characteristics: morphology; size; mass; density; optical, mechanical, and thermal properties; chemical composition; etc. The composition of amorphous organic minerals with polymeric structure, fossil resins included, is studied with IR spectrometry, the EPR method, derivatography at low heating rates, XRD, chemical analysis, emission spectrometry, etc. The results of investigation summarized for the Baltic-Dnieper, North Siberian, and Far East amber-bearing provinces show some similarity of fossil resins in combination with specific features inherent to each province. Resins from the Baltic-Dnieper province should be termed as amber (succinite). Their variety is the most characteristic of Northern and Eastern Europe. Amber-like fossil resins from the North Siberian and Far East provinces are irrelevant to succinite. They usually occur as brittle resins, namely, retinite and gedanite, without jewelry value. Viscous fossil resin rumänite with an expected high economic value occurs in the Far East, on the shore of Sakhalin Island.

  8. Investigation of fossil resins and amber

    Directory of Open Access Journals (Sweden)

    E.Yu. Makarova

    2017-05-01

    Full Text Available Fossil resins and amber are a product of lithogenesis of resinous substances of higher plants – resinite. These components of plants, like other lipoid ingredients (suberins, coutines, sporinins, natural rubbers are resistant to microbial action, so they are well preserved in bacterial processing of organic matter in the stages of sedimento- and diagenesis, and are well diagnosed in microscopic studies. They occur in a rather wide age range of sedimentary rocks. The amber of the Baltic region of the Eocene age is most fully studied. The article presents the results of a study of the collection of fossil resins and amber from various regions of the world. Samples were studied microscopically; carbon isotope analysis, infrared spectroscopy (IR spectroscopy were performed. The most informative analysis of high-molecular polymeric compounds is IR spectroscopy. It was found that in the analyzed samples of fossil resins of different ages, aromatic compounds are not observed, most of which are first volatilized in fossilization processes. The possibility of influencing the group composition of amber and amber-like resins for sedimentation, diagenesis and catagenesis is discussed. The IR spectra of fossil and modern resin conifers are compared. Using the IR spectroscopy method, an attempt was made to identify the botanical origin of fossil resins.

  9. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  10. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  11. Non-intrusive Load Disaggregation Based on Kernel Density Estimation

    Science.gov (United States)

    Sen, Wang; Dongsheng, Yang; Chuchen, Guo; Shengxian, Du

    2017-05-01

    Aiming at the problem of high cost and difficult implementation of high frequency non-intrusive load decomposition method, this paper proposes a new method based on kernel density estimation(KDE) for low frequency NILM (Non-intrusive load monitoring). The method establishes power reference model of electricity load in different working conditions and appliance’s possible combinations first, then probability distribution is calculated as appliances features by kernel density estimation. After that, target power data is divided by step changes, whose distributions will be compared with reference models, and the most similar reference model will be chosen as the decomposed consequence. The proposed approach was tested with data from the GREEND public data set, it showed better performance in terms of energy disaggregation accuracy compared with many traditional NILM approaches. Our results show good performance which can achieve more than 93% accuracy in simulation.

  12. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  13. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  14. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Science.gov (United States)

    Cho, Eung Jun; Hong, Choong Seon; Lee, Sungwon; Jeon, Seokhee

    2013-01-01

    The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  15. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  16. Melamine-modified urea formaldehyde resin for bonding particleboards

    Science.gov (United States)

    Chung-Yun Hse; Feng Fu; Hui Pan

    2008-01-01

    For the development of a cost-effective melamine-modified urea formaldehyde resin (MUF), the study evaluated the effects of reaction pH and melamine content on resin properties and bond performance of the MUF resin adhesive systems. Eight resins, each with three replicates, were prepared in a factorial experiment that included two formulation variables: two reaction...

  17. Traumatic resin ducts as indicators of bark beetle outbreaks

    Science.gov (United States)

    R. Justin DeRose; Matthew F. Bekker; James N. Long

    2017-01-01

    The formation of traumatic resin ducts (TRDs) represents an important induced defense in woody plants that enhances oleoresin production and flow in response to environmental perturbations. In some genera (Pinus), resin ducts are copious and conspicuous; however, in others (Picea), resin ducts are relatively rare. The occurrence and strength of resin ducts, in...

  18. Men’s stranger intrusions : rethinking street harassment.

    OpenAIRE

    Vera-Gray, F.

    2016-01-01

    Women's experiences of intrusive men in public space, popularly termed ‘street harassment’, are the most understudied yet commonly experienced forms of violence against women. Despite acknowledgement of its importance, an explicit debate on naming – with an exploration of how language creates both openings and restrictions of what can be said – is yet to be had in the literature. This paper begins this conversation, detailing the benefits and challenges in current terminology, and exploring t...

  19. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    OpenAIRE

    Krishnan Sadhasivan, Dhanalakshmi; Balasubramanian, Kannapiran

    2017-01-01

    Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to...

  20. Research on chronicles correlation based network intrusion detection techniques

    International Nuclear Information System (INIS)

    Han Zhengping; Jin Yan; Chen Taiwei; Xu Rongsheng

    2007-01-01

    According to some problems existed in network intrusion detection technique, such as alerts overwhelming, false-positives and lack of alert description, this paper introduces chronicle correlation method to alert events analysis by some correlative examples. With designed chronicle recognition language, portscan's alerts can be reduced, false-positives in buffer overflow's alerts can be detected, and NetBios DCERPC attack's alerts semantics can be improved. (authors)

  1. Animal intrusion status report for fiscal year 1989

    Energy Technology Data Exchange (ETDEWEB)

    Landeen, D.S.

    1990-08-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion tasks that were conducted by Westinghouse Hanford Company in fiscal years 1988 and 1989 with respect to small mammals and water infiltration. 2 refs., 8 figs., 6 tabs.

  2. Intrusion of anterior teeth to improve smile esthetics.

    Science.gov (United States)

    Chandrasekharan, Deepak; Balaji, S M

    2010-03-01

    A gummy smile is probably one of the most common causes of an unaesthetic smile. Causes include overeruption of maxillary anterior teeth and maxillary vertical excess. Intrusion of maxillary anterior teeth with Orthodontics and Le forte I superior repositioning may form a part of the solution. Of late the use of micro implants have improved the smile esthetics of borderline surgical cases by allowing the Orthodontist to intrude teeth more than what was possible with conventional Orthodontics.

  3. Mass memory formatter subsystem of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-09-01

    The Mass Memory Formatter was developed as part of the Adaptive Intrusion Data System (AIDS) to control a 2.4-megabit mass memory. The data from a Memory Controlled Processor is formatted before it is stored in the memory and reformatted during the readout mode. The data is then transmitted to a NOVA 2 minicomputer-controlled magnetic tape recorder for storage. Techniques and circuits are described

  4. Mechanisms of extrusion and intrusion formation in fatigued crystalline materials

    Czech Academy of Sciences Publication Activity Database

    Polák, Jaroslav; Man, Jiří

    2014-01-01

    Roč. 596, FEB (2014), s. 15-24 ISSN 0921-5093 R&D Projects: GA ČR(CZ) GAP108/10/2371; GA ČR(CZ) GA13-23652S Institutional support: RVO:68081723 Keywords : Fatigue * Extrusion * Intrusion * Persistent slip band * Fatigue crack initiation Subject RIV: JL - Materials Fatigue, Friction Mechanics Impact factor: 2.567, year: 2014

  5. Data mining approach to web application intrusions detection

    Science.gov (United States)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  6. Treatment of Intrusive Suicidal Imagery Using Eye Movements

    Directory of Open Access Journals (Sweden)

    Jaël S. van Bentum

    2017-06-01

    Full Text Available Suicide and suicidal behavior are major public health concerns, and affect 3–9% of the population worldwide. Despite increased efforts for national suicide prevention strategies, there are still few effective interventions available for reducing suicide risk. In this article, we describe various theoretical approaches for suicide ideation and behavior, and propose to examine the possible effectiveness of a new and innovative preventive strategy. A model of suicidal intrusion (mental imagery related to suicide, also referred to as suicidal flash-forwards is presented describing one of the assumed mechanisms in the etiology of suicide and the mechanism of therapeutic change. We provide a brief rationale for an Eye Movement Dual Task (EMDT treatment for suicidal intrusions, describing techniques that can be used to target these suicidal mental images and thoughts to reduce overall behavior. Based on the available empirical evidence for the mechanisms of suicidal intrusions, this approach appears to be a promising new treatment to prevent suicidal behavior as it potentially targets one of the linking pins between suicidal ideation and suicidal actions.

  7. Kissing Bug ( spp. Intrusion into Homes: Troublesome Bites and Domiciliation

    Directory of Open Access Journals (Sweden)

    Stephen A. Klotz

    2016-01-01

    Full Text Available Kissing bugs ( Triatoma spp. frequently enter homes and bite human and pet occupants. Bites may lead to severe allergic reactions and, in some cases, death. Kissing bugs are also vectors of Trypanosoma cruzi , the cause of Chagas disease. In general, modern houses in the United States are not conducive to domiciliation of kissing bugs (bugs living out their entire life within the home with the presence of eggs, nymphs, adults, and exuviae. Construction features such as concrete foundations, solid walls and ceilings, window screens, tight thresholds for doors and windows, and other measures impede bug entry into homes, and air conditioning reduces the need for open doors and windows. Where Chagas disease is endemic in Mexico and Central and South America, homes often have thatch roofs, adobe walls, and open doors and windows. We investigated numerous instances of kissing bug intrusions into homes in Southern Arizona, California, and Louisiana and documented the reactions to kissing bug bites. Our work confirms the importance of modern home construction in limiting kissing bug intrusions. Older homes, especially those lacking modern screening, caulking, and weather stripping to reduce air leakage, may be subject to kissing bug intrusions and domiciliation. We describe a community in Southern Arizona where domiciliation of homes by Triatoma recurva is common. We also provide recent data regarding kissing bug bites and allergic reactions to the bites.

  8. Respon Konsumen pada Mobile Advergames: Intrusiveness dan Irritation

    Directory of Open Access Journals (Sweden)

    Sony Kusumasondjaja

    2016-12-01

    Full Text Available Abstract. Increasing adoption of mobile advergames to deliver marketing messages has not been followed by empirical findings to support its effectiveness. This research attempts to examine the effect of mobile advergames intrusiveness on consumer irritation, attitudes, and purchase intention. This investigation on mobile advergame effectiveness was based on the increasing use of mobile media to deliver marketing messages to consumers from different demographic background. Conceptual framework was developed based on Advertising Avoidance Theory. For data collection, self-administered survey was conducted by adopting purposive sampling involving 213 respondents residing in Surabaya who have had experience in playing mobile game as respondents. Results indicate that intrusiveness positively affects consumer irritation. Consumer irritation negatively affects attitude towards the mobile advergames and attitude towards the advertised product. The better the consumer attitude towards the mobile advergames, the more positive the attitude towards the advertised product. Moreover, the more positive the attitude towards the advertised product, the greater the consumer intention to purchase. Interestingly, consumer attitude toward the mobile advergames has insignificant influence on purchase intention. Findings of the study offer significant contribution to marketing practices using mobile advergames as media placement in their advertising strategy. Keywords: intrusiveness, irritation, mobile advergames, attitude, advertising

  9. Data Mining Usage in Corporate Information Security: Intrusion Detection Applications

    Directory of Open Access Journals (Sweden)

    Al Quhtani Masoud

    2017-03-01

    Full Text Available Background: The globalization era has brought with it the development of high technology, and therefore new methods of preserving and storing data. New data storing techniques ensure data are stored for longer periods of time, more efficiently and with a higher quality, but also with a higher data abuse risk. Objective: The goal of the paper is to provide a review of the data mining applications for the purpose of corporate information security, and intrusion detection in particular. Methods/approach: The review was conducted using the systematic analysis of the previously published papers on the usage of data mining in the field of corporate information security. Results: This paper demonstrates that the use of data mining applications is extremely useful and has a great importance for establishing corporate information security. Data mining applications are directly related to issues of intrusion detection and privacy protection. Conclusions: The most important fact that can be specified based on this study is that corporations can establish a sustainable and efficient data mining system that will ensure privacy and successful protection against unwanted intrusions.

  10. Intrusive imagery in people with a specific phobia of vomiting.

    Science.gov (United States)

    Price, Katy; Veale, David; Brewin, Chris R

    2012-03-01

    AND OBJECTIVES: Specific phobia of vomiting (SPOV) is a chronic, pervasive and debilitating disorder which is clinically regarded as difficult to treat. Research into its development, maintenance and treatment has been limited. This study explored the prevalence and characteristics of intrusive mental imagery in people with SPOV. It investigated the relationship between presence of imagery and severity of phobia. Thirty-six participants meeting DSM-IV criteria for SPOV were recruited from online support groups and outpatient clinics. A semi-structured quantitative interview was administered. Twenty-nine (81%) participants reported multi-sensory intrusive imagery of adult (52%) and childhood memories (31%) and worst case scenarios ("flashforwards") of vomiting (17%). Extent of imagery was significantly related to severity of phobia. Participants primarily fearing others vomiting had less severe phobic symptoms. No control group was used and a heterogeneous sample of clinical and community participants was recruited. Correlational data comparing extent of imagery with severity of SPOV symptoms were derived from as yet unvalidated measures. Intrusive mental imagery is a clinically important feature of SPOV and may contribute to its maintenance. Causality needs to be demonstrated. Copyright © 2011 Elsevier Ltd. All rights reserved.

  11. Dimensionality reduction using Principal Component Analysis for network intrusion detection

    Directory of Open Access Journals (Sweden)

    K. Keerthi Vasan

    2016-09-01

    Full Text Available Intrusion detection is the identification of malicious activities in a given network by analyzing its traffic. Data mining techniques used for this analysis study the traffic traces and identify hostile flows in the traffic. Dimensionality reduction in data mining focuses on representing data with minimum number of dimensions such that its properties are not lost and hence reducing the underlying complexity in processing the data. Principal Component Analysis (PCA is one of the prominent dimensionality reduction techniques widely used in network traffic analysis. In this paper, we focus on the efficiency of PCA for intrusion detection and determine its Reduction Ratio (RR, ideal number of Principal Components needed for intrusion detection and the impact of noisy data on PCA. We carried out experiments with PCA using various classifier algorithms on two benchmark datasets namely, KDD CUP and UNB ISCX. Experiments show that the first 10 Principal Components are effective for classification. The classification accuracy for 10 Principal Components is about 99.7% and 98.8%, nearly same as the accuracy obtained using original 41 features for KDD and 28 features for ISCX, respectively.

  12. Coplanar capacitance sensors for detecting water intrusion in composite structures

    International Nuclear Information System (INIS)

    Nassr, Amr A; El-Dakhakhni, Wael W; Ahmed, Wael H

    2008-01-01

    Composite materials are becoming more affordable and widely used for retrofitting, rehabilitating and repairing reinforced concrete structures designed and constructed under older specifications. However, the mechanical properties and long-term durability of composite materials may degrade severely in the presence of water intrusion. This study presents a new non-destructive evaluation (NDE) technique for detecting the water intrusion in composite structures by evaluating the dielectric properties of different composite system constituent materials. The variation in the dielectric signatures was employed to design a coplanar capacitance sensor with high sensitivity to detect such defects. An analytical model was used to study the effect of the sensor geometry on the output signal and to optimize sensor design. A finite element model was developed to validate analytical results and to evaluate other sensor design-related parameters. Experimental testing of a concrete specimen wrapped with composite laminate and containing a series of pre-induced water intrusion defects was conducted in order to validate the concept of the new technique. Experimental data showed excellent agreement with the finite element model predictions and confirmed sensor performance

  13. AdaBoost-based algorithm for network intrusion detection.

    Science.gov (United States)

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  14. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  15. An Automata Based Intrusion Detection Method for Internet of Things

    Directory of Open Access Journals (Sweden)

    Yulong Fu

    2017-01-01

    Full Text Available Internet of Things (IoT transforms network communication to Machine-to-Machine (M2M basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.

  16. Reduction of saltwater intrusion by modifying hydraulic conductivity

    Science.gov (United States)

    Strack, O. D. L.; Stoeckl, L.; Damm, K.; Houben, G.; Ausk, B. K.; de Lange, W. J.

    2016-09-01

    We present an approach for reducing saltwater intrusion in coastal aquifers by artificially reducing the hydraulic conductivity in the upper part of selected areas by using a precipitate. We apply a previously presented analytical approach to develop formulas useful for the design of artificial barriers. Equations for the location of the tip of the saltwater wedge are presented and verified through a sand-tank experiment. The analysis is capable of computing discharges exactly, but requires the Dupuit-Forchheimer approximation to compute points of the interface between flowing fresh and stationary saltwater. We consider a vertical coastline and boundaries in the freshwater zone of either given discharge or given head. We demonstrate in the paper that reduction of the hydraulic conductivity in the upper part of a coastal aquifer will result in a decrease of saltwater intrusion, and present analytic expressions that can be used for design purposes. The previously presented analytical approach can be applied to design systems to reduce saltwater intrusion caused by pumping inland from the zone that contains saline groundwater.

  17. Effects of recharge wells and flow barriers on seawater intrusion.

    Science.gov (United States)

    Luyun, Roger; Momii, Kazuro; Nakagawa, Kei

    2011-01-01

    The installation of recharge wells and subsurface flow barriers are among several strategies proposed to control seawater intrusion on coastal groundwater systems. In this study, we performed laboratory-scale experiments and numerical simulations to determine the effects of the location and application of recharge wells, and of the location and penetration depth of flow barriers, on controlling seawater intrusion in unconfined coastal aquifers. We also compared the experimental results with existing analytical solutions. Our results showed that more effective saltwater repulsion is achieved when the recharge water is injected at the toe of the saltwater wedge. Point injection yields about the same repulsion compared with line injection from a screened well for the same recharge rate. Results for flow barriers showed that more effective saltwater repulsion is achieved with deeper barrier penetration and with barriers located closer to the coast. When the flow barrier is installed inland from the original toe position however, saltwater intrusion increases with deeper barrier penetration. Saltwater repulsion due to flow barrier installation was found to be linearly related to horizontal barrier location and a polynomial function of the barrier penetration depth. Copyright © 2010 The Author(s). Journal compilation © 2010 National Ground Water Association.

  18. 40 CFR 721.9480 - Resorcinol, formaldehyde substituted carbomonocycle resin (generic).

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Resorcinol, formaldehyde substituted... New Uses for Specific Chemical Substances § 721.9480 Resorcinol, formaldehyde substituted... chemical substance identified generically as resorcinol, formaldehyde substituted carbomonocycle resin (PMN...

  19. Properties of a nanodielectric cryogenic resin

    Energy Technology Data Exchange (ETDEWEB)

    Polyzos, Georgios [ORNL; Tuncer, Enis [ORNL; Sauers, Isidor [ORNL; More, Karren Leslie [ORNL

    2010-01-01

    Physical properties of a nanodielectric composed of in situ synthesized titanium dioxide (TiO{sub 2}) nanoparticles ({le} 5 nm in diameter) and a cryogenic resin are reported. The dielectric losses were reduced by a factor of 2 in the nanocomposite, indicating that the presence of small TiO{sub 2} nanoparticles restricted the mobility of the polymer chains. Dielectric breakdown data of the nanodielectric was distributed over a narrower range than that of the unfilled resin. The nanodielectric had 1.56 times higher 1% breakdown probability than the resin, yielding 0.64 times thinner insulation thickness for the same voltage level, which is beneficial in high voltage engineering.

  20. SEM and elemental analysis of composite resins

    International Nuclear Information System (INIS)

    Hosoda, H.; Yamada, T.; Inokoshi, S.

    1990-01-01

    Twenty-four chemically cured, 21 light-cured anterior, three light-cured anterior/posterior, and 18 light-cured posterior composite resins were examined using scanning electron microscopy, and the elemental composition of their filler particles was analyzed with an energy dispersive electron probe microanalyzer. According to the results obtained, the composite resins were divided into five groups (traditional, microfilled type, submicrofilled type, hybrid type, and semihybrid), with two additional hypothetical categories (microfilled and hybrid). Characteristics of each type were described with clinical indications for selective guidance of respective composite resins for clinical use

  1. In-depth disinfection of acrylic resins.

    Science.gov (United States)

    Chau, V B; Saunders, T R; Pimsler, M; Elfring, D R

    1995-09-01

    This study demonstrated that bacteria penetrate three kinds of dental acrylic resin after a short time period. Samples of acrylic resin were contaminated with a variety of bacteria and were then placed in three different disinfecting solutions as directed by the manufacturers. After the specific dilution and immersion time, cultures were made from the resin samples. The only effective disinfectant was a 0.525% solution of sodium hypochlorite at a 10-minute immersion. It disinfected not only the surfaces but also the bacteria that penetrated the surfaces to a depth of 3 mm.

  2. Immobilisation of ion exchange resins in cement

    International Nuclear Information System (INIS)

    Howard, C.G.; Jolliffe, C.B.; Lee, D.J.

    1990-09-01

    The removal of activity from spent decontaminating solutions eg LOMI can be achieved using organic ion exchange resins. These resins can be successfully immobilised in cement based matrices. The optimum cement system contained 10% ordinary Portland cement 84% gg blast furnace slag, 6% microsilica with a water cement ratio of 0.5 and a dry resin loading of 36% with respect to total weight. This formulation was successfully scaled up to 200 litres giving a product with acceptable compressive strength, dimensional stability and elastic modulus. Storage of samples under water appears to have no detrimental effects on the product's properties. (author)

  3. Cobalt Ions Improve the Strength of Epoxy Resins

    Science.gov (United States)

    Stoakley, D. M.; St. Clair, A. K.

    1986-01-01

    Technique developed for improving mechanical strength of epoxy resins by adding cobalt ions in form of tris(acetylacetonato)cobalt (III) complex. Solid cast disks prepared from cobalt ion-containing epoxy resins tested for flexural strength and stiffness. Incorporation of cobalt ions into epoxies increased flexural strength of resins by 10 to 95 percent. Suitable resins for this technique include any liquid or solid TGMDA resins. Improved epoxy formulation proves useful as composite matrix resin, adhesive, or casting resin for applications on commercial and advanced aircraft.

  4. Petrogenesis of the ∼500 Ma Fushui mafic intrusion and Early Paleozoic tectonic evolution of the Northern Qinling Belt, Central China

    Science.gov (United States)

    Shi, Yu; Pei, Xiaoli; Castillo, Paterno R.; Liu, Xijun; Ding, Haihong; Guo, Zhichao

    2017-06-01

    The Fushui mafic intrusion in the Qinling orogenic belt (QOB) is composed of meta-gabbro, meta-gabbro-diorite, diorite, and syenite. Most of these rocks are metamorphosed under the upper greenschist facies to lower amphibolite facies metamorphism. Zircon separates from eight samples have LA-ICP-MS U-Pb ages of 497-501 Ma which are taken to be the emplacement age of magmas that formed the Fushui intrusion. Most of the zircon grains exhibit negative εHf values, correspond to TDM2 model ages of late Paleoproterozoic-early Mesoproterozoic or Neoproterozoic and suggest that the mafic rocks were most probably derived from mafic melts produced by partial melting of a previously metasomatized lithospheric mantle. The intrusion is not extensively contaminated by crustal materials and most chemical compositions of rocks are not modified during the greenschist to amphibolite-facies metamorhism. Rocks from the intrusion have primitive mantle-normalized trace element patterns with significant enrichment in light-REE and large ion lithophile elements (LILE) and depletion in high field-strength elements (HFSE). On the basis of the trace element contents, the Fushui intrusion was derived from parental magmas generated by <10% partial melting of both phlogopite-lherzolite and garnet-lherzolite mantle sources. These sources are best interpreted to be in a subduction-related arc environment and have been modified by fluids released from a subducting slab. The formation of the Fushui intrusion was related to the subduction of the Paleotethyan Shangdan oceanic lithosphere at ∼500 Ma.

  5. Shear bond strength of an autopolymerizing repair resin to injection-molded thermoplastic denture base resins.

    Science.gov (United States)

    Hamanaka, Ippei; Shimizu, Hiroshi; Takahashi, Yutaka

    2013-09-01

    This study investigated the shear bond strength of an autopolymerizing repair resin to injection-molded thermoplastic denture base resins. Four injection-molded thermoplastic resins (two polyamides, a polyethylene terephthalate copolymer and a polycarbonate) were used in this study. The specimens were divided into eight groups according to the type of surface treatment given: (1) no treatment, (2) air abrasion with alumina, (3) dichloromethane, (4) ethyl acetate, (5) 4-META/MMA-TBB resin, (6) alumina and 4-META/MMA-TBB resin, (7) tribochemical silica coating or (8) tribochemical silica coating and 4-META/MMA-TBB resin. Half of the specimens in groups 1, 5, 6 and 8 were thermocycled for 10,000 cycles in water between 5-55°C with a dwell time of 1 min at each temperature. The shear bond strengths were determined. The shear bond strengths to the two polyamides treated with alumina, dichloromethane and ethyl acetate and no treatment were very low. The greatest post-thermocycling bond strengths to polyamides were recorded for the specimens treated with tribochemical silica coating and 4-META/MMA-TBB resin (PA12: 16.4 MPa, PACM12: 17.5 MPa). The greatest post-thermocycling bond strengths to polyethylene terephthalate copolymer and polycarbonate were recorded for the treatment with alumina and 4-META/MMA-TBB resin (22.7 MPa, 20.8 MPa). Polyamide was exceedingly difficult to bond to an autopolymerizing repair resin; the shear bond strength improved using tribochemical silica coating followed by the application of 4-META/MMA-TBB resin. Both polyethylene terephthalate copolymer and polycarbonate were originally easy to bond to an autopolymerizing repair resin. However, with 4-META/MMA-TBB resin, the bond was more secure.

  6. Magnetic ion-exchange resin treatment: Impact of water type and resin use

    OpenAIRE

    Mergen, Maxime Rodolphe Denis; Jefferson, Bruce; Parsons, Simon A.; Jarvis, Peter

    2008-01-01

    Three raw waters of fundamentally different natural organic matter (NOM) character were treated by magnetic resin using a bench-scale method designed to mimic how the resin is used in continuous operation. Increasing water hydrophobicity resulted in reduced dissolved organic carbon (DOC) removal with removal of 56%, 33% and 25% for waters containing 21%, 50% and 75% hydrophobic NOM, respectively. Study of consecutive resin uses showed that the NOM in the hydrophobic water ha...

  7. 5-year clinical performance of resin composite versus resin modified glass ionomer restorative system in non-carious cervical lesions

    DEFF Research Database (Denmark)

    Franco, Eduardo Batista; Benetti, Ana Raquel; Ishikiriama, Sérgio Kiyoshi

    2006-01-01

    To comparatively assess the 5-year clinical performance of a 1-bottle adhesive and resin composite system with a resin-modified glass ionomer restorative in non-carious cervical lesions.......To comparatively assess the 5-year clinical performance of a 1-bottle adhesive and resin composite system with a resin-modified glass ionomer restorative in non-carious cervical lesions....

  8. 21 CFR 175.380 - Xylene-formaldehyde resins condensed with 4,4′-isopropylidenediphenol-epichlorohydrin epoxy resins.

    Science.gov (United States)

    2010-04-01

    ...-isopropylidenediphenol-epichlorohydrin epoxy resins. 175.380 Section 175.380 Food and Drugs FOOD AND DRUG ADMINISTRATION... Xylene-formaldehyde resins condensed with 4,4′-isopropylidenediphenol-epichlorohydrin epoxy resins. The...′-isopropylidenediphenol-epichlorohydrin epoxy resins, to which may have been added certain optional adjuvant substances...

  9. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware

    Energy Technology Data Exchange (ETDEWEB)

    Tierney, Brian L; Vallentin, Matthias; Sommer, Robin; Lee, Jason; Leres, Craig; Paxson, Vern; Tierney, Brian

    2007-09-19

    In this work we present a NIDS cluster as a scalable solution for realizing high-performance, stateful network intrusion detection on commodity hardware. The design addresses three challenges: (i) distributing traffic evenly across an extensible set of analysis nodes in a fashion that minimizes the communication required for coordination, (ii) adapting the NIDS's operation to support coordinating its low-level analysis rather than just aggregating alerts; and (iii) validating that the cluster produces sound results. Prototypes of our NIDS cluster now operate at the Lawrence Berkeley National Laboratory and the University of California at Berkeley. In both environments the clusters greatly enhance the power of the network security monitoring.

  10. The strengthening of resin cemented dental ceramic materials

    OpenAIRE

    Hooi, Paul

    2013-01-01

    The aim of the current investigation was to advance the understanding of the mechanism of resin-strengthening conferred to dental ceramic materials by resin-based composite materials. The investigation is presented as a series of manuscripts. In the first study (Manuscript 3.1), dental porcelain disc-shaped specimens were resin-coated with three resin-based composite materials with different flexural moduli at discrete resin thicknesses. The discs were loaded to failure in a biaxial flexure t...

  11. Pengaruh Sifat-Sifat Fisik Resin Akrilik Terhadap Basis Protesa

    OpenAIRE

    Amriani Syahfitri

    2008-01-01

    Saat ini resin akrilik banyak digunakan secara umum untuk konstruksi gigi tiruan. Sebagai bahan basis prothesa, penggunaan resin akrilik terutama resin heat cured adalah yang paling sering digunakan selain bernilai estetis, juga lebih ekonomis. Pada prothesa yang ideal memerlukan suatu basis yang kuat, Syarat- syarat basis protesa tidak semuanya dapat dipenuhi oleh basis resin akrilik. Sifat-sifat fisik resin akrilik mempunyai pengaruh terhadap basis protesa. Untuk menghindari k...

  12. Resin Flow Analysis in the Injection Cycle of a Resin Transfer Molded Radome

    Science.gov (United States)

    Golestanian, Hossein; Poursina, Mehrdad

    2007-04-01

    Resin flow analysis in the injection cycle of an RTM process was investigated. Fiberglass and carbon fiber mats were used as reinforcements with EPON 826 epoxy resin. Numerical models were developed in ANSYS finite element software to simulate resin flow behavior into a mold of conical shape. Resin flow into the woven fiber mats is modeled as flow through porous media. The injection time for fiberglass/epoxy composite is found to be 4407 seconds. Required injection time for the carbon/epoxy composite is 27022 seconds. Higher injection time for carbon/epoxy part is due to lower permeability value of the carbon fibers compared to glass fiber mat.

  13. Dental repair material: a resin-modified glass-ionomer bioactive ionic resin-based composite.

    Science.gov (United States)

    Croll, Theodore P; Berg, Joel H; Donly, Kevin J

    2015-01-01

    This report documents treatment and repair of three carious teeth that were restored with a new dental repair material that features the characteristics of both resin-modified glass-ionomer restorative cement (RMGI) and resin-based composite (RBC). The restorative products presented are reported by the manufacturer to be the first bioactive dental materials with an ionic resin matrix, a shock-absorbing resin component, and bioactive fillers that mimic the physical and chemical properties of natural teeth. The restorative material and base/liner, which feature three hardening mechanisms, could prove to be a notable advancement in the adhesive dentistry restorative materials continuum.

  14. Nanosilica Modification of Elastomer-Modified VARTM Epoxy Resins for Improved Resin and Composite Toughness

    National Research Council Canada - National Science Library

    Robinette, Jason; Bujanda, Andres; DeSchepper, Daniel; Dibelka, Jessica; Costanzo, Philip; Jensen, Robert; McKnight, Steven

    2007-01-01

    Recent publications have reported a synergy between rubber and silica in modified epoxy resins that results in significantly improved fracture toughness without reductions in other material properties...

  15. Aspects of cold intrusions over Greece during autumn

    Science.gov (United States)

    Mita, Constantina; Marinaki, Aggeliki; Zeini, Konstantina; Konstantara, Metaxia

    2010-05-01

    This study is focused on the description of atmospheric disturbances that caused intense cold intrusions over Greece during autumn for a period of 25 years (1982-2006). The study was based on data analysis from the meteorological station network of the Hellenic National Meteorological Service (HNMS) and the European Centre for Medium Range Weather Forecasts (ECMWF). Initially, the days with temperature at the isobaric surface of 850 hPa less or equal to the mean temperature for the 10-day period the day under investigation belongs to are isolated, composing a new confined data set which was further used. An event of intense cold intrusion is identified based on a subjective set of criteria, considering the temperature decrease at the level of 850 hPa and its duration. In particular, the criteria that were used to identify a cold intrusion were: temperature variation between two successive days at the isobaric level of 850 hPa being equal or greater than 50 C at least once during the event and duration of the event of at least two successive days with continuous temperature decrease. Additionally, the synoptic analysis of the atmospheric disturbances involved using weather charts from ECMWF, revealed that all cases were related to low pressure systems at the level of 500 hPa, accompanied by cold air masses. Moreover, a methodology proposed to classify the cold intrusions based on general circulation characteristics of the atmosphere, resulted in seven major categories. More than half of the events belong in two categories, originated northwest of the greater Greek area (Greece and parts of neighbouring countries), between 400 and 600 N. Further analysis indicated that the frequency of events increases from September to November and the majority of the events lasted two to three days. Additionally, the non-parametric Mann-Kendall test was used for the investigation of the statistical significance of the trends appearing in the results. The tests revealed that over

  16. Synthesis of improved phenolic and polyester resins

    Science.gov (United States)

    Delano, C. B.

    1980-01-01

    Thirty-seven cured phenolic resin compositions were prepared and tested for their ability to provide improved char residues and moisture resistance over state of the art epoxy resin composite matrices. Cyanate, epoxy novolac and vinyl ester resins were investigated. Char promoter additives were found to increase the anaerobic char yield at 800 C of epoxy novolacs and vinyl esters. Moisture resistant cyanate and vinyl ester compositions were investigated as composite matrices with Thornel 300 graphite fiber. A cyanate composite matrix provided state of the art composite mechanical properties before and after humidity exposure and an anaerobic char yield of 46 percent at 800 C. The outstanding moisture resistance of the matrix was not completely realized in the composite. Vinyl ester resins showed promise as candidates for improved composite matrix systems.

  17. Posterior bulk-filled resin composite restorations.

    DEFF Research Database (Denmark)

    van Dijken, Jan WV; Pallesen, Ulla

    2016-01-01

    Purpose/aim: To evaluate in a randomized controlled study the 5-year clinical durability of a flowable resin composite bulk-fill technique in Class I and Class II restorations. Materials and methods: 38 pairs Class I and 62 pairs Class II restorations were placed in 44 male and 42 female (mean age...... 52.4 years). Each patient received at least two, as similar as possible, extended Class I or Class II restorations. In all cavities, a 1-step self-etch adhesive (Xeno V+) was applied. Randomized, one of the cavities of each pair received the flowable bulk-filled resin composite (SDR), in increments...... up to 4mm as needed to fill the cavity 2mm short of the occlusal cavosurface. The occlusal part was completed with the nano-hybrid resin composite (Ceram X mono+). In the other cavity, the resin composite-only (Ceram X mono+) was placed in 2mm increments. The restorations were evaluated using...

  18. 21 CFR 177.1380 - Fluorocarbon resins.

    Science.gov (United States)

    2010-04-01

    ...) Chlorotrifluoroethylene-1,1-difluoroethylene-tetrafluoroethylene co-polymer resins produced by copolymerization of..., Extrusion, and Coating Materials,” which is incorporated by reference in accordance with 5 U.S.C. 552(a) and...

  19. Liquid Resins With Low VOC Emissions

    National Research Council Canada - National Science Library

    LaScala, John J; Sands, James M; Palmese, Guiseppe R

    2004-01-01

    .... The polymer properties were similar to that of commercial resins, including Tg greater than 120 C, flex strength greater than 100 MPa, modulus of approximately 3 GPa, and fracture toughness greater than 200 J/m2...

  20. 21 CFR 177.1655 - Polysulfone resins.

    Science.gov (United States)

    2010-04-01

    ... by osmotic pressure in monochlorobenzene; or (2) 1,1′-Sulfonylbis[4-chlorobenzene] polymer with 4,4... determined by osmotic pressure in dimethylformamide. (b) The basic polysulfone resins identified in paragraph...

  1. Influence of the silica fillers on the ageing of epoxy resins under irradiations

    International Nuclear Information System (INIS)

    Benard, F.

    2004-01-01

    Various studies were carried out on the ageing of epoxy resins under irradiations. In all cases, pure polymers were studied. The aim of our work managed by the CEA and the CNRS consists on studying the part of fillers and particularly the part of silica on ageing process under electron beam irradiations. Because of their wide use in industrial applications and especially in nuclear environment, the DGEBA-TETA resins (Diglycidylether of Bisphenol A - Triethylenetetramine) were chosen. Those epoxy resins are difficult to analyse because of their insolubility. Some pure and nano-metric silica filled chemical models which chemical structure very close to the one the DGEBA/TETA resin were synthesized and analysed with classical methods in organic chemistry. A major phenomenon of rupture of the C-O and C-N chemical bonds with creation of phenolic extremities, methylketone extremities, of primary and tertiary amines and notably enamine functions were revealed by the analyses. The quantitative 1 H and 13 C NMR analyses revealed the screen effect due to the silica and the reactions between the chemical species created by the irradiations and the silica surface. Thermic and thermodynamic analyses of the different epoxy resins in function of the irradiation dose and of the kind of silica showed the decrease of the glass transition temperature, of the relaxation temperature and of the crosslink density confirming the major phenomenon of bond ruptures during irradiations. With silica, the decrease of the crosslink density is slowed. This phenomenon can be explained with interactions between the nano-metric silica surface and the epoxy resin offsetting the effect of the chain rupture on the resin mechanical properties. The 13 C solid state NMR analyses confirmed the choice of the chemical models and permitted to detect the chemical species created by the irradiations. The analyse of the polarization transfers with 13 C CP-MAS NMR spectroscopy revealed the stiffening of the nano

  2. Volumetric polymerization shrinkage of contemporary composite resins

    Directory of Open Access Journals (Sweden)

    Halim Nagem Filho

    2007-10-01

    Full Text Available The polymerization shrinkage of composite resins may affect negatively the clinical outcome of the restoration. Extensive research has been carried out to develop new formulations of composite resins in order to provide good handling characteristics and some dimensional stability during polymerization. The purpose of this study was to analyze, in vitro, the magnitude of the volumetric polymerization shrinkage of 7 contemporary composite resins (Definite, Suprafill, SureFil, Filtek Z250, Fill Magic, Alert, and Solitaire to determine whether there are differences among these materials. The tests were conducted with precision of 0.1 mg. The volumetric shrinkage was measured by hydrostatic weighing before and after polymerization and calculated by known mathematical equations. One-way ANOVA (a or = 0.05 was used to determine statistically significant differences in volumetric shrinkage among the tested composite resins. Suprafill (1.87±0.01 and Definite (1.89±0.01 shrank significantly less than the other composite resins. SureFil (2.01±0.06, Filtek Z250 (1.99±0.03, and Fill Magic (2.02±0.02 presented intermediate levels of polymerization shrinkage. Alert and Solitaire presented the highest degree of polymerization shrinkage. Knowing the polymerization shrinkage rates of the commercially available composite resins, the dentist would be able to choose between using composite resins with lower polymerization shrinkage rates or adopting technical or operational procedures to minimize the adverse effects deriving from resin contraction during light-activation.

  3. Cycloaliphatic epoxide resins for cationic UV - cure

    International Nuclear Information System (INIS)

    Verschueren, K.; Balwant Kaur

    1999-01-01

    This paper introduces the cyclo - aliphatic epoxide resins used for the various applications of radiation curing and their comparison with acrylate chemistry. Radiation curable coatings and inks are pre - dominantly based on acrylate chemistry but over the last few years, cationic chemistry has emerged successfully with the unique properties inherent with cyclo - aliphatic epoxide ring structures. Wide variety of cationic resins and diluents, the formulation techniques to achieve the desired properties greatly contributes to the advancement of UV - curing technology

  4. Damage evolution in a filled epoxy resin

    International Nuclear Information System (INIS)

    Depoorter, Nicolas; Coutellier, Daniel; Muzic, Markus; Berg-Pollack, Antje; Cai Ye; Zimmermann, Andre

    2006-01-01

    A method is proposed for studying damage evolution in a filled epoxy resin submitted to low-cycle fatigue loading. Transmission electron microscopy analysis was performed, which indicates a damage mechanism that corresponds well to the decreasing slope of the stress-strain hysteresis observed in strain-controlled fatigue experiments. Also, the suggested damage model appears to be suitable for the simulation of strain-controlled cyclic tests and fits the damage evolution of the filled epoxy resin fairly well [de

  5. Mushy magma processes in the Tuolumne intrusive complex, Sierra Nevada, California

    Science.gov (United States)

    Memeti, V.; Paterson, S. R.

    2012-12-01

    Debates continue on the nature of volcanic-plutonic connections and the mechanisms of derivation of large volcanic eruptions, which require large volumes of magma to be readily available within a short period of time. Our focus to understand these magma plumbing systems has been to study the nature of their mid-to upper crustal sections, such as the 1,000 km2, 95-85 Ma old Tuolumne intrusive complex in the Sierra Nevada, California, USA. The Tuolumne intrusive complex is a great example where the magma mush model nicely explains observations derived from several datasets. These data suggest that a magma mush body was present and may have been quite extensive especially at times when the Tuolumne intrusive complex was undergoing waxing periods of magmatism (increased magma input), which alternated with waning periods of magmatism (decreased magma addition) and thus a smaller mush body, essentially mimicking in style periodic flare-ups and lulls at the arc scale. During waxing stages, magma erosion and mixing were the dominant processes, whereas waning stages allowed mush domains to continue to undergo fractional crystallization creating additional compositional variations. Over time, the imprint left behind by previous waxing and waning stages was partly overprinted, but individual crystals successfully recorded the compositions of these earlier magmas. Waxing periods in the Tuolumne intrusive complex during which large magma mush bodies formed are supported by the following evidence: 1) Hybrid units and gradational contacts are commonly present between major Tuolumne units. 2) CA-TIMS U/Pb zircon geochronology data demonstrate that antecrystic zircon recycling took place unidirectional from the oldest, marginal unit toward the younger, interior parts of the intrusion, where increasing zircon age spread encompasses the entire age range of the Tuolumne. 3) The younger, interior units also show an increasing scatter and complexity in geochemical element and isotope

  6. Study by dynamic light scattering of an o/w emulsion of an epoxi resin dispersed in water by means of a triblock copolymer of type PEO-PPO-PEO

    International Nuclear Information System (INIS)

    Uscanga, E. H.; Rio, J. M. del; Avendano-Gomez, J. R.

    2009-01-01

    The curing epoxy resins are widely used in various fields of chemical industry, such as adhesives, automotive, coatings, etc. The process operation consisting of flow and mixing of epoxy resins become difficult due to their high viscosity. One solution is to dissolve the epoxy resin in volatile organic solvents (VOS) such as toluene, xylene or benzene. However, the use of VOS is not only expensive but harmful to the environment. (Author)

  7. The use of airborne electromagnetic for efficient mapping of salt water intrusion and outflow to the sea

    DEFF Research Database (Denmark)

    Auken, Esben; Kirkegaard, Casper; Ribeiro, Joana

    2010-01-01

    Airborne electromagnetic (AEM) is an efficient tool for mapping groundwater resources in sedimentary environments. AEM delivers a very high data coverage and results in high-resolution electrical images of the subsurface. In particular the time domain methods (TEM) are well suited for mapping o0f...... moment than frequency domain methods (FEM). We discuss the advantages of using airborne systems in coastal area for understanding of saltwater intrusion problems. Examples are shown from surveys at the vest cost of Holland and in Denmark....

  8. Dynamic Mechanical Properties and Thermal Effect of an Epoxy Resin Composite, Encapsulation's Element of a New Electronic Component

    Science.gov (United States)

    Rmili, W.; Deffarges, M. P.; Chalon, F.; Ma, Z.; Leroy, R.

    2013-11-01

    Epoxy resin is used in many industrial applications principally in the microelectronic field to protect integrated circuits. However, these components are subject to various environments such as moisture and thermal fluctuations during packaging. Consequently, mechanical, physical and chemical properties of the resin can be affected. For an epoxy resin composite designed for a future application, an evaluation of the relevant properties was carried out using a dynamic mechanical analyzer and a thermogravimetric analysis (TGA) instrument. The surface morphology was investigated using scanning electron microscopy to examine the impact of post-cured treatment through evolution of the rigidity and of the glass transition temperature. Subsequently, a temperature classification was proposed to define the temperature limit for safe use of the material. Finally, temperature degradation was observed and confirmed by TGA tests. Results from all of these analyses bring understanding to the phenomenon of thermal degradation and its influence on the stability of the epoxy resin composite.

  9. Technical assessment of NOx generation from vitrification process of spent ion-exchange resin

    International Nuclear Information System (INIS)

    Park, S. C.; Yang, K. H.; Kim, H. S.; Lu, C. S.; Lee, K. H.; Hwnag, T. W.; Shin, S. W.

    2001-01-01

    When the radioactive spent ion-exchange resin is being treated in vitrification system, due to the nitrogen in the anion exchange resin media and the nitrogen in air inleaked to the system, the nitrogen oxide (NOx) is generated from both glass melter and the second combustion chamber among the unit-processes in the vitrification plant. The NOx is very hazardous to environment and to human health the emission limit of NOx is regulated very severely. In this study, the NOx generation characteristics are technically analyzed based on the demonstration-test resultes conducted recently by burning simulated spent resin. When burning 30kg/h of simulated resin in CCM under 50% of excess the theoretically needed, the NOx was measured as between 3000 ∼ 3500ppm after 1h of transient test period. And when only the propane is burning in PCC without resin burning in CCM, the concentration of NOx exceeded the detectable limit(4000 ppm) of PGA. The former and the latter were considered as the fuel NOx and the thermal NOx respectively

  10. Saturated Resin Ectopic Regeneration by Non-Thermal Dielectric Barrier Discharge Plasma

    Directory of Open Access Journals (Sweden)

    Chunjing Hao

    2017-11-01

    Full Text Available Textile dyes are some of the most refractory organic compounds in the environment due to their complex and various structure. An integrated resin adsorption/Dielectric Barrier Discharge (DBD plasma regeneration was proposed to treat the indigo carmine solution. It is the first time to report ectopic regeneration of the saturated resins by non-thermal Dielectric Barrier Discharge. The adsorption/desorption efficiency, surface functional groups, structural properties, regeneration efficiency, and the intermediate products between gas and liquid phase before and after treatment were investigated. The results showed that DBD plasma could maintain the efficient adsorption performance of resins while degrading the indigo carmine adsorbed by resins. The degradation rate of indigo carmine reached 88% and the regeneration efficiency (RE can be maintained above 85% after multi-successive regeneration cycles. The indigo carmine contaminants were decomposed by a variety of reactive radicals leading to fracture of exocyclic C=C bond, which could cause decoloration of dye solution. Based on above results, a possible degradation pathway for the indigo carmine by resin adsorption/DBD plasma treatment was proposed.

  11. Imide modified epoxy matrix resins

    Science.gov (United States)

    Scola, D. A.

    1984-01-01

    The results of a program designed to develop tough imide modified epoxy resins cured by bisimide amine (BIA) hardeners are described. State-of-the-art epoxides MY720 and DER383 were used, and four bismide amines were evaluated. These were the BIA's derived from the 6F anhydride (4,4'-(hexafluoroisopropylidene) bis(phthalic anhydride) and the diamines 3,3'-diaminodiphynyl sulfone, 4,4'-oxygianiline, 4,4'-methylene dianiline, and 1,12-dodecane diamine. A key intermediate, designated 6F anhydride, is required for the synthesis of the bisimide amines. Reaction parameters to synthesize a precursor to the 6F anhydride (6FHC) in high yields were investigated. The catalyst trifluoromethane sulfonic acid was studied. Although small scale runs yielded the 6FHC in 50 percent yield, efforts to ranslate these results to a larger scale synthesis gave the 6FHC in only 9 percent yield. Results show that the concept of using bisimide amine as curing agents to improve the toughness properties of epoxies is valid.

  12. Resin elasticity and the strengthening of all-ceramic restorations.

    Science.gov (United States)

    Addison, O; Marquis, P M; Fleming, G J P

    2007-06-01

    Resin luting of all-ceramic restorations results in increased performance; however, the strengthening mechanism and the role of the mechanical properties of the resin are not fully understood. The hypothesis tested is that ceramic strength enhancement is dependent on the elastic modulus of the resin. Three-point flexural moduli of a flowable, luting, and hybrid composite resin were characterized. Two hundred forty porcelain discs were air-abraded. One group acted as a control, and 3 additional groups were coated with 120 +/- 20 microm of each resin prior to bi-axial flexure testing. All resins significantly increased in mean strength, and the associated strength increase was related to the elastic modulus of the resin (R(2) = 0.9885), so the hypothesis was accepted. The combination of Poisson constraint and the creation of a resin-inter-penetrating layer sensitive to the elastic modulus of the resin may provide an explanation of the strengthening mechanism.

  13. Effect of resin coating on dentin bonding of resin cement in Class II cavities.

    Science.gov (United States)

    Sultana, Shamim; Nikaido, Toru; Matin, Khairul; Ogata, Miwako; Foxton, Richard M; Tagami, Junji

    2007-07-01

    This study was designed to evaluate the efficacy of resin coating on the regional microtensile bond strength (MTBS) of a resin cement to the dentin walls of Class II cavities. Twenty mesio-occlusal cavities were prepared in human molars. In 10 cavities, a resin coating consisting of a self-etching primer bonding system, Clearfil SE Bond, and a low-viscosity microfilled resin, Protect Liner F, was applied. The other 10 teeth served as a non-coating group. After impression taking and temporization, they were kept in water for one day. Composite inlays were then cemented with a dual-cure resin cement, Panavia F 2.0, and stored in water for one day. Thereafter, MTBSs were measured. Two-way ANOVA (p=0.05) revealed that the MTBS of resin cement to dentin was influenced by resin coating, but not by regional difference. In conclusion, application of a resin coating to the dentin surface significantly improved the MTBS in indirect restorations.

  14. Bond strength of resin-resin interfaces contaminated with saliva and submitted to different surface treatments

    Directory of Open Access Journals (Sweden)

    Adilson Yoshio Furuse

    2007-12-01

    Full Text Available The purpose of this study was to investigate the effect of different surface treatments on shear bond strength of saliva-contaminated resin-resin interfaces. Flat resin surfaces were fabricated. In the control group, no contamination or surface treatment was performed. The resin surfaces of the experimental groups were contaminated with saliva and air-dried, and then submitted to: (G1 rinsing with water and drying; (G2 application of an adhesive system; (G3 rinsing and drying, abrasion with finishing disks, etching and application of adhesive system; (G4 rinsing and drying, etching, application of silane and adhesive system. Resin cylinders were placed over the treated surfaces. The specimens were stored in water or ethanol. Shear bond strength tests were performed and the mode of failure was evaluated. Data were submitted to two-way ANOVA and Dunnett T3 test. Contamination of resin-resin interfaces with saliva significantly reduced shear strength, especially after prolonged storage (p<0.05. Similar values to the original bond strength were obtained after abrasion and application of adhesive (G3 or etching and application of silane and adhesive (G4. If contamination occurs, a surface treatment is required to guarantee an adequate interaction between the resin increments.

  15. Bond strength of resin-resin interfaces contaminated with saliva and submitted to different surface treatments

    DEFF Research Database (Denmark)

    Furuse, Adilson Yoshio; da Cunha, Leonardo Fernandes; Benetti, Ana Raquel

    2007-01-01

    of silane and adhesive system. Resin cylinders were placed over the treated surfaces. The specimens were stored in water or ethanol. Shear bond strength tests were performed and the mode of failure was evaluated. Data were submitted to two-way ANOVA and Dunnett T3 test. Contamination of resin...

  16. The assessment of human intrusion into underground repositories for radioactive waste Volume 1: Main report

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Asthon, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  17. The assessment of human intrusion into underground repositories for radioactive waste Volume 2: Appendices

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Ashton, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  18. Review on assessment methodology for human intrusion into a repository for radioactive waste

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility

  19. DUNDRUM Restriction-Intrusion of Liberty Ladders (DRILL) Audit Toolkit

    LENUS (Irish Health Repository)

    Kennedy, Harry G

    2011-09-01

    This series of rating \\'ladders\\' is intended to allow a quantitative and qualitative analysis of the use of restrictive and intrusive interventions as part of the therapeutic management of violence and aggression in psychiatric hospital settings. This is an evolving handbook. The ladders are currently organised to facilitate a behavioural analysis. Context, antecedents, behaviour, interventions, consequences are conceptualised as a series of events organised in temporal sequence so that causes, interactions and effects can be considered. The complexity of analysis possible is limited by the statistical power of the numbers of cases and events available. \\r\

  20. Network Intrusion Detection System – A Novel Approach

    Directory of Open Access Journals (Sweden)

    Krish Pillai

    2013-08-01

    Full Text Available Network intrusion starts off with a series of unsuccessful breakin attempts and results eventually with the permanent or transient failure of an authentication or authorization system. Due to the current complexity of authentication systems, clandestine attempts at intrusion generally take considerable time before the system gets compromised or damaging change is affected to the system giving administrators a window of opportunity to proactively detect and prevent intrusion. Therefore maintaining a high level of sensitivity to abnormal access patterns is a very effective way of preventing possible break-ins. Under normal circumstances, gross errors on the part of the user can cause authentication and authorization failures on all systems. A normal distribution of failed attempts should be tolerated while abnormal attempts should be recognized as such and flagged. But one cannot manage what one cannot measure. This paper proposes a method that can efficiently quantify the behaviour of users on a network so that transient changes in usage can be detected, categorized based on severity, and closely investigated for possible intrusion. The author proposes the identification of patterns in protocol usage within a network to categorize it for surveillance. Statistical anomaly detection, under which category this approach falls, generally uses simple statistical tests such as mean and standard deviation to detect behavioural changes. The author proposes a novel approach using spectral density as opposed to using time domain data, allowing a clear separation or access patterns based on periodicity. Once a spectral profile has been identified for network, deviations from this profile can be used as an indication of a destabilized or compromised network. Spectral analysis of access patterns is done using the Fast Fourier Transform (FFT, which can be computed in Θ(N log N operations. The paper justifies the use of this approach and presents preliminary