WorldWideScience

Sample records for seismic intrusion detector

  1. Seismic intrusion detector system

    Science.gov (United States)

    Hawk, Hervey L.; Hawley, James G.; Portlock, John M.; Scheibner, James E.

    1976-01-01

    A system for monitoring man-associated seismic movements within a control area including a geophone for generating an electrical signal in response to seismic movement, a bandpass amplifier and threshold detector for eliminating unwanted signals, pulse counting system for counting and storing the number of seismic movements within the area, and a monitoring system operable on command having a variable frequency oscillator generating an audio frequency signal proportional to the number of said seismic movements.

  2. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  3. Acoustic emission intrusion detector

    International Nuclear Information System (INIS)

    Carver, D.W.; Whittaker, J.W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal

  4. A Nuisance Alarm Data System for evaluation of intrusion detectors

    International Nuclear Information System (INIS)

    Ream, W.K.

    1990-01-01

    A Nuisance Alarm Data System (NADS) was developed to gather long-term background alarm data on exterior intrusion detectors as part of their evaluation. Since nuisance alarms play an important part in the selection of intrusion detectors for use at Department of Energy (DOE) facilities, an economical and reliable way to monitor and record these alarms was needed. NADS consists of an IBM personal computer and printer along with other commercial units to communicate with the detectors, to gather weather data, and to record video for assessment. Each alarm, its assessment, and the weather conditions occurring at alarm time are placed into a data base that is used in the evaluation of the detector. The operating software is written in Turbo Pascal for easy maintenance and modification. A portable system, based on the NADS design, has been built and shipped to other DOE locations to do on-site alarm monitoring. This has been valuable for the comparison of different detectors in the on-site environment and for testing new detectors when the appropriate conditions do not exist or cannot be simulated at the Exterior Intrusion Detection Testbed

  5. On the relation between crustal deformation and seismicity during the 2012-2014 magmatic intrusions in El Hierro island.

    Science.gov (United States)

    Domínguez Cerdeña, Itahiza; García-Cañada, Laura; Ángeles Benito Saz, María; Del Fresno, Carmen

    2017-04-01

    The last volcanic eruption in the Canary Islands took place in 2011 less than 2 km offshore El Hierro island, after 3 months of measuring surface deformation (up to 5 cm) and locating more than 10 000 earthquakes. In the two years following the end of the submarine eruption on 5 March 2012, six deep magmatic intrusions were recorded beneath the island. Despite the short time duration of these intrusions, these events have been more energetic that the 2011 pre-eruptive intrusive event but none of them ended in a new eruption. These post-eruptive reactivations are some of the few examples in the world of well monitored magmatic intrusions related with monogenetic volcanism. In order to understand these processes we have analyzed the geodetic and seismic data with different techniques. First, we did a joint hypocentral relocation of the six seismic swarms, including more than 6 300 events, to analyze the relative distribution of the earthquakes from different intrusions. The uncertainties of the earthquakes relocations was reduced to an average value of 300 m. New earthquakes' distribution shows the alignments of the different intrusions and a temporal migration of the events to larger depths. Moreover, we show the results of the ground deformation using GPS data from the network installed on the island (for each of the six intrusive events) and their inversion considering spherical models. In most of the intrusions the optimal source model was shallower and southern than the corresponding seismicity hypocenters. The intruded magma volume ranges from 0.02 to 0.13 km3. Finally, we also computed the b value from the Gutenberg Richter equation by means of a bootstrap method. The spatial and temporal evolution of the b value for the seismicity show a clear correlation with the temporal evolution of the crustal deformation. The six magma intrusions can be grouped, depending on their location, in three pairs each one associated with each of the three active rifts of El

  6. Seismic restraint means for radiation detector

    International Nuclear Information System (INIS)

    Underwood, R.H.; Todt, W.H.

    1983-01-01

    Seismic restraint means are provided for mounting an elongated, generally cylindrical nuclear radiation detector within a tubular thimble in a nuclear reactor monitor system. The restraint means permits longitudinal movement of the radiation detector into and out of the thimble. Each restraint means comprises a split clamp ring and a plurality of symmetrically spaced support arms pivotally mounted on the clamp ring. Each support arm has spring bias means and thimble contact means eg insulating rollers whereby the contact means engage the thimble with a constant predetermined force which minimizes seismic vibration action on the radiation detector. (author)

  7. Protrusive intrusion, dehydration and polymorphism in minerals as possible reason of seismic activity, relation between ophiolite belts and seismic zonation of the territory of Armenia

    Science.gov (United States)

    Harutyunyan, A. V.; Petrosyan, H. M.

    2010-05-01

    In the basis of multiple geological and geophysical data, also on the results of investigations seismic and density properties of rocks at high termobaric conditions, we proposed the petrophisical section and model of evolution of Earth crust of the territory of Armenia. On the proposed model the following interrelated problems are debated: forming of ophiolite belts and volcanic centers, genesis of hydrocarbons by organic and inorganic ways, and also reasons of originating of seismic centers. The reasons of originating of seismic centers in different depths of Earth crust, are miscellaneous. According to the model of Earth crust evolution the ophiolite belts are formed due to permanent protrusive intrusion of serpentinized masses from the foot of the crust (35-50km) into upper horizons. It is natural to assume, that the permanent intrusion of serpentinizd masses through deep faults has drastically occurred accompanying with seismic shakings. This process encourages the development of deep faults. The protrusive intrusion of serpentinized masse accompanied with partial dehydration of serpentinites and serpentinized ultrabasites and new mineral formation. The processes was accompanied also with drastic change of seismic waves and volumes up to 30%. Experiments at high termobaric conditions show, that some minerals undergone polymorphous transformations, accompanied with phase change and drastic change of rocks volume. Particularly plastic calcite, included in the composition of metamorphic rocks to run into the cracks expends and diversifies them. The process described cause some general effects similar to those of the process of dilatancy. Therefore, the protrusive intrusion of serpentinized masses into upper horizons, it dehydrations and polymorphous transformations in different minerals, may be cause of geo-dynamic processes at different depths of Earth crust. It may be assumed, that those processes permanently occur nowadays as well. Comparing the maps of

  8. On the physical links between the dynamics of the Izu Islands 2000 dike intrusions and the statistics of the induced seismicity

    Science.gov (United States)

    Passarelli, Luigi; Rivalta, Eleonora; Simone, Cesca; Aoki, Yosuke

    2014-05-01

    The emplacement of magma-filled dikes often induce abundant seismicity in the surrounding host rocks. Most of the earthquakes are thought to occur close to the propagating tip (or edges, in 3D) of the dike, where stresses are concentrated. The resulting seismicity often appears as a swarm, controlled mainly by dike-induced stresses and stressing rate and by other factors, such as the background stressing rate, tectonic setting, regional stresses and tectonic history. The spatial distribution and focal mechanisms of the seismicity bear information on the interaction of the dike stress field and the tectonic setting of the area. The seismicity accompanying the intrusion of a dike is usually characterized by weak events, for which it is difficult to calculate the focal mechanisms. Therefore, only for a few well-recorded dike intrusions a catalog of focal mechanisms, allowing to perform a robust statistical analysis, is available. The 2000 dike intrusion at Miyakejima is in this sense an outstanding case, as about 18000 seismic events were recorded in a time span of three months. This seismic swarm was one of the most energetic ever recorded with five M>6 earthquakes. For this swarm a catalog of 1500 focal mechanisms is avalable (NIED, Japan). We perform a clustering analysis of the focal mechanism solutions, in order to infer the most frequent focal mechanism features prior to the intrusion (pre-diking period) and during the co-diking period. As previously suggested, we find that the dike stress field modified substantially the pre-existing seismicity pattern, by shadowing some non-optimally oriented strike-slip structures and increasing seismic rate on optimally oriented strike-slip tectonic structures. Alongside, during the co-diking period a large number of normal and oblique-normal faulting were observed. These events cannot be explained within the tectonics of the intrusion area. We suggest they are directly generated by the intense stress field induced at the

  9. Newtonian-noise cancellation in large-scale interferometric GW detectors using seismic tiltmeters

    International Nuclear Information System (INIS)

    Harms, Jan; Venkateswara, Krishna

    2016-01-01

    The mitigation of terrestrial gravity noise, also known as Newtonian noise (NN), is one of the foremost challenges to improve low-frequency sensitivity of ground-based gravitational-wave detectors. At frequencies above 1 Hz, it is predicted that gravity noise from seismic surface Rayleigh waves is the dominant contribution to NN in surface detectors, and may still contribute significantly in future underground detectors. Noise cancellation based on a coherent estimate of NN using data from a seismometer array was proposed in the past. In this article, we propose an alternative scheme to cancel NN using a seismic tiltmeter. It is shown that even under pessimistic assumptions concerning the complexity of the seismic field, a single tiltmeter under each test mass of the detector is sufficient to achieve substantial noise cancellation. A technical tiltmeter design is presented to achieve the required sensitivity in the Newtonian-noise frequency band. (paper)

  10. Time-resolved seismic tomography detects magma intrusions at Mount Etna.

    Science.gov (United States)

    Patanè, D; Barberi, G; Cocina, O; De Gori, P; Chiarabba, C

    2006-08-11

    The continuous volcanic and seismic activity at Mount Etna makes this volcano an important laboratory for seismological and geophysical studies. We used repeated three-dimensional tomography to detect variations in elastic parameters during different volcanic cycles, before and during the October 2002-January 2003 flank eruption. Well-defined anomalous low P- to S-wave velocity ratio volumes were revealed. Absent during the pre-eruptive period, the anomalies trace the intrusion of volatile-rich (>/=4 weight percent) basaltic magma, most of which rose up only a few months before the onset of eruption. The observed time changes of velocity anomalies suggest that four-dimensional tomography provides a basis for more efficient volcano monitoring and short- and midterm eruption forecasting of explosive activity.

  11. Integrated circuit for processing a low-frequency signal from a seismic detector

    Energy Technology Data Exchange (ETDEWEB)

    Malashevich, N. I.; Roslyakov, A. S.; Polomoshnov, S. A., E-mail: S.Polomoshnov@tsen.ru; Fedorov, R. A. [Research and Production Complex ' Technological Center' of the Moscow Institute of Electronic Technology (Russian Federation)

    2011-12-15

    Specific features for the detection and processing of a low-frequency signal from a seismic detector are considered in terms of an integrated circuit based on a large matrix crystal of the 5507 series. This integrated circuit is designed for the detection of human movements. The specific features of the information signal, obtained at the output of the seismic detector, and the main characteristics of the integrated circuit and its structure are reported.

  12. Seismic and Gas Analyses Imply Magmatic Intrusion at Iliamna Volcano, Alaska in 2012

    Science.gov (United States)

    Prejean, S. G.; Werner, C. A.; Buurman, H.; Doukas, M. P.; Kelly, P. J.; Kern, C.; Ketner, D.; Stihler, S.; Thurber, C. H.; West, M. E.

    2012-12-01

    In early 2012, Iliamna Volcano, an ice-covered andesitic stratovolcano located in the Cook Inlet region of Alaska, had a vigorous earthquake swarm that included both brittle-failure earthquakes (Mvolume has otherwise been seismically quiet except during a possible magmatic intrusion at Iliamna in 1996, when it sustained a similar swarm (Roman et al., 2004, J. Volc. Geotherm. Res., v. 130, p. 265-284). Analysis of the relative amplitudes between the small low-frequency and located brittle failure events indicates that their sources are geographically separate, with the low-frequency events sourced closer to the fumarolically active summit region, ~4 km north of the brittle failure events. Airborne gas-emission measurements on March 17 revealed emission rates of up to 2000 and 580 tonnes per day (t/d) of CO2 and SO2, respectively, and a molar C/S ratio of 5. Visual observations from the flight revealed unusually vigorous fumarole activity near the summit. Subsequent measurements on June 20 and 22 showed continued high emissions of up to 1190 and 440 t/d of CO2 and SO2, respectively, with a C/S ratio of 4. These emission measurements are similar to those measured during the height of the 1996 unrest episode and are significantly above background measurements between 1998 and August 2011, which were typically below 100 and 60 t/d of CO2 and SO2. Taken together, gas and seismic data suggest that the earthquake swarm was driven by magmatic intrusion. Gas flux rates are consistent with those measured for degassing andesitic magmas in the shallow crust at other Cook Inlet volcanoes. Increased heat and degassing likely caused small low-frequency events in the shallow hydrothermal system near the volcano's summit, and/or may have destabilized the glacier, triggering shallow low-frequency glacial events. This unrest episode demonstrates how magmatic intrusions can cause spatially disparate earthquake swarms in hydrothermal systems and on pre-existing crustal structures.

  13. Statistical analysis of laser-interferometric detector Dylkin-1 data and data on seismic activity

    International Nuclear Information System (INIS)

    Kirillov, R S; Bochkarev, V V; Dulkyn, Academy of Sciences of the Republic of Tatarstan (Russian Federation))" data-affiliation=" (Scientific Center of Gravitational-Wave Research Dulkyn, Academy of Sciences of the Republic of Tatarstan (Russian Federation))" >Skochilov, A F

    2014-01-01

    This work presents statistical analysis of data collected from laser interferometric detector ''Dylkin-1'' and nearby seismic stations. The final goal of Dylkin project consists in creating detector of theoretically predicted gravitational waves produced by binary relativistic astrophysical objects. Currently, works are underway to improve sensitivity of detector by 2-3 orders. The goals of this research were to test isolation of detector from noise caused by seismic waves and to find out whether it is sensitive to variations in the gradient of gravitational potential (acceleration of free fall) caused by free Earth oscillations. Noise isolation has been tested by comparing energy of signals during significant seismic events. Sensitivity to variations in acceleration of free fall has been tested by means of cross-spectral analysis

  14. Analysis of the performance capability of an infrared interior intrusion detector

    International Nuclear Information System (INIS)

    Dunn, D.R.

    1977-01-01

    Component performances are required by the LLL assessment procedure for material control and accounting (MC and A) systems. Monitors are an example of an MC and A component whose functions are to process measurements or observations for purposes of detecting abnormalities. This report develops a methodology for characterizing the performance of a class of infrared (IR) interior intrusion monitors or detectors. The methodology is developed around a specific commercial IR detector, the InfrAlarm, manufactured by Barnes Engineering Company (Models 19-124 and 19-115A). Statistical detection models for computing probabilities of detection and false alarms were derived, and the performance capability of the InfrAlarm IR detector was shown using these measures. The results obtained in the performance analysis show that the detection capability of the InfrAlarm is excellent (approx. 1), with very low false alarm rates, for a wide range in target characteristics. These results should be representative and particularly for non-hostile environments

  15. Deconstructing the Assessment of Anomaly-based Intrusion Detectors for Critical Applications

    Energy Technology Data Exchange (ETDEWEB)

    Viswanathan, Arun; Tan, Kymie; Neuman, Clifford

    2013-10-01

    Anomaly detection is a key strategy for cyber intrusion detection because it is conceptually capable of detecting novel attacks. This makes it an appealing defensive technique for environments such as the nation's critical infrastructures that is currently facing increased cyber adversarial activity. When considering deployment within the purview of such critical infrastructures it is imperative that the technology is well understood and reliable, where its performance is benchmarked on the results of principled assessments. This paper works towards such an imperative by analyzing the current state of anomaly detector assessments with a view toward mission critical deployments. We compile a framework of key evaluation constructs that identify how and where current assessment methods may fall short in providing sufficient insight into detector performance characteristics. Within the context of three case studies from literature, we show how error factors that influence the performance of detectors interact with different phases of a canonical evaluation strategy to compromise the integrity of the final results.

  16. A new event detector designed for the Seismic Research Observatories

    Science.gov (United States)

    Murdock, James N.; Hutt, Charles R.

    1983-01-01

    A new short-period event detector has been implemented on the Seismic Research Observatories. For each signal detected, a printed output gives estimates of the time of onset of the signal, direction of the first break, quality of onset, period and maximum amplitude of the signal, and an estimate of the variability of the background noise. On the SRO system, the new algorithm runs ~2.5x faster than the former (power level) detector. This increase in speed is due to the design of the algorithm: all operations can be performed by simple shifts, additions, and comparisons (floating point operations are not required). Even though a narrow-band recursive filter is not used, the algorithm appears to detect events competitively with those algorithms that employ such filters. Tests at Albuquerque Seismological Laboratory on data supplied by Blandford suggest performance commensurate with the on-line detector of the Seismic Data Analysis Center, Alexandria, Virginia.

  17. Lower crustal intrusions beneath the southern Baikal Rift Zone

    DEFF Research Database (Denmark)

    Nielsen, Christoffer; Thybo, Hans

    2009-01-01

    centre. The BEST (Baikal Explosion Seismic Transect) project acquired a 360-km long, deep seismic, refraction/wide-angle reflection profile in 2002 across southern Lake Baikal. The data from this project is used for identification of large-scale crustal structures and modelling of the seismic velocities....../s and 7.9 km/s. We interpret this feature as resulting from mafic to ultra-mafic intrusions in the form of sills. Petrological interpretation of the velocity values suggests that the intrusions are sorted by fractional crystallization into plagioclase-rich low-velocity layers and pyroxene- and olivine...

  18. Hazard Models From Periodic Dike Intrusions at Kı¯lauea Volcano, Hawai`i

    Science.gov (United States)

    Montgomery-Brown, E. K.; Miklius, A.

    2016-12-01

    The persistence and regular recurrence intervals of dike intrusions in the East Rift Zone (ERZ) of Kı¯lauea Volcano lead to the possibility of constructing a time-dependent intrusion hazard model. Dike intrusions are commonly observed in Kı¯lauea Volcano's ERZ and can occur repeatedly in regions that correlate with seismic segments (sections of rift seismicity with persistent definitive lateral boundaries) proposed by Wright and Klein (USGS PP1806, 2014). Five such ERZ intrusions have occurred since 1983 with inferred locations downrift of the bend in Kı¯lauea's ERZ, with the first (1983) being the start of the ongoing ERZ eruption. The ERZ intrusions occur on one of two segments that are spatially coincident with seismic segments: Makaopuhi (1993 and 2007) and Nāpau (1983, 1997, and 2011). During each intrusion, the amount of inferred dike opening was between 2 and 3 meters. The times between ERZ intrusions for same-segment pairs are all close to 14 years: 14.07 (1983-1997), 14.09 (1997-2011), and 13.95 (1993-2007) years, with the Nāpau segment becoming active about 3.5 years after the Makaopuhi segment in each case. Four additional upper ERZ intrusions are also considered here. Dikes in the upper ERZ have much smaller opening ( 10 cm), and have shorter recurrence intervals of 8 years with more variability. The amount of modeled dike opening during each of these events roughly corresponds to the amount of seaward south flank motion and deep rift opening accumulated in the time between events. Additionally, the recurrence interval of 14 years appears to be unaffected by the magma surge of 2003-2007, suggesting that flank motion, rather than magma supply, could be a controlling factor in the timing and periodicity of intrusions. Flank control over the timing of magma intrusions runs counter to the historical research suggesting that dike intrusions at Kı¯lauea are driven by magma overpressure. This relatively free sliding may have resulted from decreased

  19. Lunar Seismic Detector to Advance the Search for Strange Quark Matter

    Science.gov (United States)

    Galitzki, Nicholas B.

    2005-01-01

    Detection of small seismic signals on the Moon are needed to study lunar internal structure and to detect possible signals from Strange Quark m&er transit events. The immediate objective is to create a prototype seismic detector using a tunnel diode oscillator with a variable capacitor attached to a proof mass. The device is designed to operate effectively on the Moon, which requires a low power consumption to operate through lunar night, while preserving sensitivity. The goal is capacitance resolution of better than 1 part in 10' and power consumption of less than 1 watt.

  20. Capability for intrusion detection at nuclear fuel sites

    International Nuclear Information System (INIS)

    1978-03-01

    A safeguards vulnerability assessment was conducted at three separate licensed nuclear processing facilities. Emphasis was placed on: (1) performance of the total intrusion detection system, and (2) vulnerability of the system to compromise by insiders. The security guards were interviewed to evaluate their effectiveness in executing their duties in accordance with the plant's security plan and to assess their knowledge regarding the operation of the security equipment. A review of the training schedule showed that the guards, along with the other plant employees, are required to periodically attend in-plant training sessions. The vulnerability assessments continued with interviews of the personnel responsible for maintaining the security equipment, with discussions of detector false alarm and maintenance problems. The second part of the vulnerability assessments was to evaluate the effectiveness of the intrusion detection systems including the interior and the perimeter sensors, CCTV surveillance devices and the exterior lighting. Two types of perimeter detectors are used at the sites, a fence disturbance sensor and an infrared barrier type detector. Infrared barrier type detectors have a higher probability of detection, especially in conjunction with dedicated CCTV cameras. The exterior lights satisfy the 0.2 footcandle illumination requirement. The interior intrusion detection systems included ultrasonic motion detectors, microwave motion detectors,balanced magnetic switches, and CCTV cameras. Entrance doors to the materials access areas and vital areas are protected with balanced magnetic switches. The interior intrusion detection systems at the three nuclear processing sites are considered satisfactory with the exception of the areas protected with ultrasonic motion detectors

  1. Controlling factors on earthquake swarms associated with magmatic intrusions; constraints from Iceland

    Science.gov (United States)

    Pedersen, R.; Sigmundsson, F.; Einarsson, P.; Brandsdottir, B.; Arnadottir, T.

    2005-12-01

    Intrusion of magma into the Earth's crust is frequently associated with seismic activity, often occurring as distinct earthquake swarms. Understanding the nature of these swarms is important for evaluating crisis situations in volcanic areas. However, there often seem to be little correlation between the amount of seismic energy release, the spatial extent of the volume of rock affected by the stress perturbations, and the volume of magma on the move, which complicates the immediate risk evaluation. A number of factors may influence the evolution of a magmatically induced seismic swarm and the resulting seismic energy release. A number of factors need to be evaluated in each individual case. These are, in random order: the crustal thickness, presence/absence of a crustal magma chamber, geothermal gradient, magmatic flow rate/stressing rate, intrusion volume, depth of intrusion, tectonic setting of the intruded area, regional stresses and tectonic history. Based on three case studies, where seismic swarm activities have been confirmed through deformation measurements to be related to magmatic movements, we attempt to evaluate the relative importance of the assumed controlling factors. All case examples are located within Iceland, but in different tectonic settings. 1. The Hengill triple junction, situated where two extensional plate boundaries join a transform zone. The area experienced a period of unusually persistent earthquake activity from 1994 to 1999, contemporaneously with ground uplift at a rate of 1-2 cm/yr. The uplift was modeled as a response to magma injection at about 7 km depth. 2. The Eyjafjallajokull volcano, situated in a volcanic flank zone where extensional fractures are only poorly developed. Two minor seismic swarms, in 1994 and 1999; were associated with a cumulative surface uplift of more than 35 cm. The two uplift events were modeled as sill intrusions at depths of 4.5 to 6.5 km. 3. The Krafla rift segment, forming part of an extensional

  2. Evaluation of of μ-controller PIR Intrusion Detector | Eludire | West ...

    African Journals Online (AJOL)

    When there is intrusion, a piezo speaker beeps and also a visual indicator with light emitting diode blinks to indicate intrusion. For security, cost effectiveness and access control to certain areas of homes, offices and industries this system is a better replacement to human surveillance needed around our valuable goods and ...

  3. Using the Moon As A Low-Noise Seismic Detector For Strange Quark Nuggets

    Science.gov (United States)

    Banerdt, W. Bruce; Chui, Talso; Griggs, Cornelius E.; Herrin, Eugene T.; Nakamura, Yosio; Paik, Ho Jung; Penanen, Konstantin; Rosenbaum, Doris; Teplitz, Vigdor L.; Young, Joseph

    2006-01-01

    Strange quark matter made of up, down and strange quarks has been postulated by Witten [1]. Strange quark matter would be nearly charge neutral and would have density of nuclear matter (10(exp 14) gm/cu cm). Witten also suggested that nuggets of strange quark matter, or strange quark nuggets (SQNs), could have formed shortly after the Big Bang, and that they would be viable candidates for cold dark matter. As suggested by de Rujula and Glashow [2], an SQN may pass through a celestial body releasing detectable seismic energy along a straight line. The Moon, being much quieter seismically than the Earth, would be a favorable place to search for such events. We review previous searches for SQNs to illustrate the parameter space explored by using the Moon as a low-noise detector of SQNs. We also discuss possible detection schemes using a single seismometer, and using an International Lunar Seismic Network.

  4. Smart container UWB sensor system for situational awareness of intrusion alarms

    Science.gov (United States)

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.; Leach, Jr., Richard R.; Vigars, Mark L.

    2013-06-11

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability may also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system

  5. A feasibility study on the expected seismic AVA signatures of deep fractured geothermal reservoirs in an intrusive basement

    International Nuclear Information System (INIS)

    Aleardi, Mattia; Mazzotti, Alfredo

    2014-01-01

    The deep geothermal reservoirs in the Larderello-Travale field (southern Tuscany) are found in intensively fractured portions of intrusive/metamorphic rocks. Therefore, the geothermal exploration has been in search of possible fracture signatures that could be retrieved from the analysis of geophysical data. In the present work we assess the feasibility of finding seismic markers in the pre-stack domain which may pinpoint fractured levels. Thanks to the availability of data from boreholes that ENEL GreenPower drilled in the deep intrusive basement of this geothermal field, we derived the expected amplitude versus angle (AVA) responses of the vapour reservoirs found in some intensely, but very localized, fractured volumes within the massive rocks. The information we have available limit us to build 1D elastic and isotropic models only and thus anisotropy effects related to the presence of fractures cannot be properly modelled. We analysed the velocities and the density logs pertaining to three wells which reached five deep fractured zones in the basement. The AVA response of the fractured intervals is modelled downscaling the log data to seismic scale and comparing the analytical AVA response (computed with the Aki and Richards approximation) and the AVA extracted from a synthetic common mid point (calculated making use of a reflectivity algorithm). The results show that the amplitude of the reflections from the fractured level is characterized by negative values at vertical incidence and by decreasing absolute amplitudes with the increase of the source to receiver offset. This contrasts with many observations from hydrocarbon exploration in clastic reservoirs where gas-sand reflections often exhibit negative amplitudes at short offsets but increasing absolute amplitudes for increasing source to receiver offsets. Thereby, some common AVA attributes considered in silicoclastic lithologies would lead to erroneous fracture localization. For this reason we propose a

  6. Integration of 2D and 3D reflection seismic data with deep boreholes in the Kevitsa Ni-Cu-PGE deposit, northern Finland

    Science.gov (United States)

    Koivisto, Emilia; Malehmir, Alireza; Voipio, Teemu; Wijns, Chris

    2013-04-01

    Kevitsa is a large disseminated sulphide Ni-Cu-PGE deposit hosted by the Kevitsa mafic-ultramafic intrusion in northern Finland and dated as about 2.06 Ga old. The Geological Survey of Finland first discovered the Kevitsa deposit in 1987. Open pit mining by Kevitsa Mining Oy/First Quantum Minerals Ltd. commenced in June 2012. The final pit depth is planned to be 550-600 m. The estimated ore reserves of the Kevitsa intrusion are about 240 million tones (using a nickel cut-off grade of 0.1%). The expected life-of-mine is 20-30 years. More than 400 hundred holes have been drilled in the Kevitsa area, but most are concentrated close to the known deposit and do not provide a comprehensive understanding of the extent of the intrusion. The basal contact of the intrusion is penetrated by only about 30 drill holes, most of which are shallow. A better knowledge of the geometry of the intrusion would provide a framework for near-mine and deep exploration in the area. An exact knowledge on the basal contact of the intrusion would also provide an exploration target for the contact-type mineralization that is often more massive and richer in Ni-Cu. In December 2007, a series of 2D reflection seismic profiles was acquired in the Kevitsa area. It consisted of four connected survey lines between 6 and 11 km long. In 2010, the initial positive results of the 2D seismic survey led Kevitsa Mining Oy/First Quantum Minerals Ltd. to initiate a 3D reflection seismic survey. The 3D seismic survey is limited to the closer vicinity of the known deposit, while the 2D seismic survey was designed to provide a more regional view of the Kevitsa intrusive complex. The main aims of the 2D and 3D seismic surveys were to delineate the shape and extent of the ore-bearing Kevitsa intrusion and the geometry of some of the host rock and surrounding units, and extract information about the larger-scale structures and structures important for mine-planning purposes. The 2D and 3D seismic data were used to

  7. Volcano-tectonic earthquakes: A new tool for estimating intrusive volumes and forecasting eruptions

    Science.gov (United States)

    White, Randall; McCausland, Wendy

    2016-01-01

    We present data on 136 high-frequency earthquakes and swarms, termed volcano-tectonic (VT) seismicity, which preceded 111 eruptions at 83 volcanoes, plus data on VT swarms that preceded intrusions at 21 other volcanoes. We find that VT seismicity is usually the earliest reported seismic precursor for eruptions at volcanoes that have been dormant for decades or more, and precedes eruptions of all magma types from basaltic to rhyolitic and all explosivities from VEI 0 to ultraplinian VEI 6 at such previously long-dormant volcanoes. Because large eruptions occur most commonly during resumption of activity at long-dormant volcanoes, VT seismicity is an important precursor for the Earth's most dangerous eruptions. VT seismicity precedes all explosive eruptions of VEI ≥ 5 and most if not all VEI 4 eruptions in our data set. Surprisingly we find that the VT seismicity originates at distal locations on tectonic fault structures at distances of one or two to tens of kilometers laterally from the site of the eventual eruption, and rarely if ever starts beneath the eruption site itself. The distal VT swarms generally occur at depths almost equal to the horizontal distance of the swarm from the summit out to about 15 km distance, beyond which hypocenter depths level out. We summarize several important characteristics of this distal VT seismicity including: swarm-like nature, onset days to years prior to the beginning of magmatic eruptions, peaking of activity at the time of the initial eruption whether phreatic or magmatic, and large non-double couple component to focal mechanisms. Most importantly we show that the intruded magma volume can be simply estimated from the cumulative seismic moment of the VT seismicity from: Log10 V = 0.77 Log ΣMoment - 5.32, with volume, V, in cubic meters and seismic moment in Newton meters. Because the cumulative seismic moment can be approximated from the size of just the few largest events, and is quite insensitive to precise locations

  8. An Immune-inspired Adaptive Automated Intrusion Response System Model

    Directory of Open Access Journals (Sweden)

    Ling-xi Peng

    2012-09-01

    Full Text Available An immune-inspired adaptive automated intrusion response system model, named as , is proposed. The descriptions of self, non-self, immunocyte, memory detector, mature detector and immature detector of the network transactions, and the realtime network danger evaluation equations are given. Then, the automated response polices are adaptively performed or adjusted according to the realtime network danger. Thus, not only accurately evaluates the network attacks, but also greatly reduces the response times and response costs.

  9. Acoustic emission intrusion detector

    International Nuclear Information System (INIS)

    Carver, D.W.

    1978-01-01

    In order to improve the security of handling special nuclear materials at the Oak Ridge Y-12 Plant, a sensitive acoustic emission detector has been developed that will detect forcible entry through block or tile walls, concrete floors, or concrete/steel vault walls. A small, low-powered processor was designed to convert the output from a sensitive, crystal-type acoustic transducer to an alarm relay signal for use with a supervised alarm loop. The unit may be used to detect forcible entry through concrete, steel, block, tile, and/or glass

  10. A study on the intrusion model by physical modeling

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jung Yul; Kim, Yoo Sung; Hyun, Hye Ja [Korea Inst. of Geology Mining and Materials, Taejon (Korea, Republic of)

    1995-12-01

    In physical modeling, the actual phenomena of seismic wave propagation are directly measured like field survey and furthermore the structure and physical properties of subsurface can be known. So the measured datasets from physical modeling can be very desirable as input data to test the efficiency of various inversion algorithms. An underground structure formed by intrusion, which can be often seen in seismic section for oil exploration, is investigated by physical modeling. The model is characterized by various types of layer boundaries with steep dip angle. Therefore, this physical modeling data are very available not only to interpret seismic sections for oil exploration as a case history, but also to develop data processing techniques and estimate the capability of software such as migration, full waveform inversion. (author). 5 refs., 18 figs.

  11. Broad accommodation of rift-related extension recorded by dyke intrusion in Saudi Arabia

    KAUST Repository

    Pallister, John S.

    2010-09-26

    The extensive harrat lava province of Arabia formed during the past 30 million years in response to Red Sea rifting and mantle upwelling. The area was regarded as seismically quiet, but between April and June 2009 a swarm of more than 30,000 earthquakes struck one of the lava fields in the province, Harrat Lunayyir, northwest Saudi Arabia. Concerned that larger damaging earthquakes might occur, the Saudi Arabian government evacuated 40,000 people from the region. Here we use geologic, geodetic and seismic data to show that the earthquake swarm resulted from magmatic dyke intrusion. We document a surface fault rupture that is 8 km long with 91 cm of offset. Surface deformation is best modelled by the shallow intrusion of a north-west trending dyke that is about 10 km long. Seismic waves generated during the earthquakes exhibit overlapping very low- and high-frequency components. We interpret the low frequencies to represent intrusion of magma and the high frequencies to represent fracturing of the crystalline basement rocks. Rather than extension being accommodated entirely by the central Red Sea rift axis, we suggest that the broad deformation observed in Harrat Lunayyir indicates that rift margins can remain as active sites of extension throughout rifting. Our analyses allowed us to forecast the likelihood of a future eruption or large earthquake in the region and informed the decisions made by the Saudi Arabian government to return the evacuees. © 2010 Macmillan Publishers Limited. All rights reserved.

  12. Broad accommodation of rift-related extension recorded by dyke intrusion in Saudi Arabia

    KAUST Repository

    Pallister, John S.; McCausland, Wendy A.; Jonsson, Sigurjon; Lu, Zhong; Zahran, Hani M.; El-Hadidy, Salah Y.; Aburukbah, Abdallah; Stewart, Ian C F; Lundgren, Paul R.; White, Randal A.; Moufti, Mohammed Rashad H

    2010-01-01

    The extensive harrat lava province of Arabia formed during the past 30 million years in response to Red Sea rifting and mantle upwelling. The area was regarded as seismically quiet, but between April and June 2009 a swarm of more than 30,000 earthquakes struck one of the lava fields in the province, Harrat Lunayyir, northwest Saudi Arabia. Concerned that larger damaging earthquakes might occur, the Saudi Arabian government evacuated 40,000 people from the region. Here we use geologic, geodetic and seismic data to show that the earthquake swarm resulted from magmatic dyke intrusion. We document a surface fault rupture that is 8 km long with 91 cm of offset. Surface deformation is best modelled by the shallow intrusion of a north-west trending dyke that is about 10 km long. Seismic waves generated during the earthquakes exhibit overlapping very low- and high-frequency components. We interpret the low frequencies to represent intrusion of magma and the high frequencies to represent fracturing of the crystalline basement rocks. Rather than extension being accommodated entirely by the central Red Sea rift axis, we suggest that the broad deformation observed in Harrat Lunayyir indicates that rift margins can remain as active sites of extension throughout rifting. Our analyses allowed us to forecast the likelihood of a future eruption or large earthquake in the region and informed the decisions made by the Saudi Arabian government to return the evacuees. © 2010 Macmillan Publishers Limited. All rights reserved.

  13. Broad accommodation of rift-related extension recorded by dyke intrusion in Saudi Arabia

    Science.gov (United States)

    Pallister, J.S.; McCausland, W.A.; Jonsson, Sigurjon; Lu, Z.; Zahran, H.M.; El, Hadidy S.; Aburukbah, A.; Stewart, I.C.F.; Lundgren, P.R.; White, R.A.; Moufti, M.R.H.

    2010-01-01

    The extensive harrat lava province of Arabia formed during the past 30 million years in response to Red Sea rifting and mantle upwelling. The area was regarded as seismically quiet, but between April and June 2009 a swarm of more than 30,000 earthquakes struck one of the lava fields in the province, Harrat Lunayyir, northwest Saudi Arabia. Concerned that larger damaging earthquakes might occur, the Saudi Arabian government evacuated 40,000 people from the region. Here we use geologic, geodetic and seismic data to show that the earthquake swarm resulted from magmatic dyke intrusion. We document a surface fault rupture that is 8 km long with 91 cm of offset. Surface deformation is best modelled by the shallow intrusion of a north-west trending dyke that is about 10 km long. Seismic waves generated during the earthquakes exhibit overlapping very low- and high-frequency components. We interpret the low frequencies to represent intrusion of magma and the high frequencies to represent fracturing of the crystalline basement rocks. Rather than extension being accommodated entirely by the central Red Sea rift axis, we suggest that the broad deformation observed in Harrat Lunayyir indicates that rift margins can remain as active sites of extension throughout rifting. Our analyses allowed us to forecast the likelihood of a future eruption or large earthquake in the region and informed the decisions made by the Saudi Arabian government to return the evacuees.

  14. Magma replenishment and volcanic unrest inferred from the analysis of VT micro-seismicity and seismic velocity changes at Piton de la Fournaise Volcano

    Science.gov (United States)

    Brenguier, F.; Rivemale, E.; Clarke, D. S.; Schmid, A.; Got, J.; Battaglia, J.; Taisne, B.; Staudacher, T.; Peltier, A.; Shapiro, N. M.; Tait, S.; Ferrazzini, V.; Di Muro, A.

    2011-12-01

    Piton de la Fournaise volcano (PdF) is among the most active basaltic volcanoes worldwide with more than one eruption per year on average. Also, PdF is densely instrumented with short-period and broad-band seismometers as well as with GPS receivers. Continuous seismic waveforms are available from 1999. Piton de la Fournaise volcano has a moderate inter-eruptive seismic activity with an average of five detected Volcano-Tectonic (VT) earthquakes per day with magnitudes ranging from 0.5 to 3.5. These earthquakes are shallow and located about 2.5 kilometers beneath the edifice surface. Volcanic unrest is captured on average a few weeks before eruptions by measurements of increased VT seismicity rate, inflation of the edifice summit, and decreased seismic velocities from correlations of seismic noise. Eruptions are usually preceded by seismic swarms of VT earthquakes. Recently, almost 50 % of seismic swarms were not followed by eruptions. Within this work, we aim to gather results from different groups of the UnderVolc research project in order to better understand the processes of deep magma transfer, volcanic unrest, and pre-eruptive magma transport initiation. Among our results, we show that the period 1999-2003 was characterized by a long-term increase of VT seismicity rate coupled with a long-term decrease of seismic velocities. These observations could indicate a long-term replenishment of the magma storage area. The relocation of ten years of inter-eruptive micro-seismicity shows a narrow (~300 m long) sub-vertical fault zone thus indicating a conduit rather than an extended magma reservoir as the shallow magma feeder system. Also, we focus on the processes of short-term volcanic unrest and prove that magma intrusions within the edifice leading to eruptions activate specific VT earthquakes that are distinct from magma intrusions that do not lead to eruptions. We thus propose that, among the different pathways of magma transport within the edifice, only one will

  15. Nuclear-power-plant perimeter-intrusion alarm systems

    International Nuclear Information System (INIS)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981

  16. Layered crust-mantle transition zone below a large crustal intrusion in the Norwegian-Danish basin

    DEFF Research Database (Denmark)

    Sandrin, Alessandro; Nielsen, Lars; Thybo, Hans

    2009-01-01

    the lowermost crust (7.7 km/s) and the uppermost mantle (7.9-8.0 km/s). The seismic data show a "ringing" Moho below the western part of the intrusion. The coda trailing the main PmP reflection is about 1.0 s long and is composed of 4-5 wavelets. We demonstrate that this feature may be explained by a layered......The crust and uppermost mantle below the large positive gravity anomaly in the central part of the Norwegian-Danish Basin, the Silkeborg Gravity High (SGH), is investigated using controlled source seismic data. A more than 80 km long and ~ 20 km thick intrusion is interpreted. The seismic velocity...... transition zone between 30 and 35 km depth, where high-velocity layers of mantle affinity (7.9-8.05 km/s) alternate with layers of typical lower crustal velocity (6.7-7.3 km/s). The characteristics of this layering, which causes thePmP coda, are modelled by matching synthetic seismograms to the observed data...

  17. Time lag between deformation and seismicity along monogenetic volcanic unrest periods: The case of El Hierro Island (Canary Islands)

    Science.gov (United States)

    Lamolda, Héctor; Felpeto, Alicia; Bethencourt, Abelardo

    2017-07-01

    Between 2011 and 2014 there were at least seven episodes of magmatic intrusion in El Hierro Island, but only the first one led to a submarine eruption in 2011-2012. In order to study the relationship between GPS deformation and seismicity during these episodes, we compare the temporal evolution of the deformation with the cumulative seismic energy released. In some of the episodes both deformation and seismicity evolve in a very similar way, but in others a time lag appears between them, in which the deformation precedes the seismicity. Furthermore, a linear correlation between decimal logarithm of intruded magma volume and decimal logarithm of total seismic energy released along the different episodes has been observed. Therefore, if a future magmatic intrusion in El Hierro Island follows this behavior with a proper time lag, we could have an a priori estimate on the order of magnitude the seismic energy released would reach.

  18. Angola Seismicity MAP

    Science.gov (United States)

    Neto, F. A. P.; Franca, G.

    2014-12-01

    The purpose of this job was to study and document the Angola natural seismicity, establishment of the first database seismic data to facilitate consultation and search for information on seismic activity in the country. The study was conducted based on query reports produced by National Institute of Meteorology and Geophysics (INAMET) 1968 to 2014 with emphasis to the work presented by Moreira (1968), that defined six seismogenic zones from macro seismic data, with highlighting is Zone of Sá da Bandeira (Lubango)-Chibemba-Oncócua-Iona. This is the most important of Angola seismic zone, covering the epicentral Quihita and Iona regions, geologically characterized by transcontinental structure tectono-magmatic activation of the Mesozoic with the installation of a wide variety of intrusive rocks of ultrabasic-alkaline composition, basic and alkaline, kimberlites and carbonatites, strongly marked by intense tectonism, presenting with several faults and fractures (locally called corredor de Lucapa). The earthquake of May 9, 1948 reached intensity VI on the Mercalli-Sieberg scale (MCS) in the locality of Quihita, and seismic active of Iona January 15, 1964, the main shock hit the grade VI-VII. Although not having significant seismicity rate can not be neglected, the other five zone are: Cassongue-Ganda-Massano de Amorim; Lola-Quilengues-Caluquembe; Gago Coutinho-zone; Cuima-Cachingues-Cambândua; The Upper Zambezi zone. We also analyzed technical reports on the seismicity of the middle Kwanza produced by Hidroproekt (GAMEK) region as well as international seismic bulletins of the International Seismological Centre (ISC), United States Geological Survey (USGS), and these data served for instrumental location of the epicenters. All compiled information made possible the creation of the First datbase of seismic data for Angola, preparing the map of seismicity with the reconfirmation of the main seismic zones defined by Moreira (1968) and the identification of a new seismic

  19. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  20. Robust site security using smart seismic array technology and multi-sensor data fusion

    Science.gov (United States)

    Hellickson, Dean; Richards, Paul; Reynolds, Zane; Keener, Joshua

    2010-04-01

    Traditional site security systems are susceptible to high individual sensor nuisance alarm rates that reduce the overall system effectiveness. Visual assessment of intrusions can be intensive and manually difficult as cameras are slewed by the system to non intrusion areas or as operators respond to nuisance alarms. Very little system intrusion performance data are available other than discrete sensor alarm indications that provide no real value. This paper discusses the system architecture, integration and display of a multi-sensor data fused system for wide area surveillance, local site intrusion detection and intrusion classification. The incorporation of a novel seismic array of smart sensors using FK Beamforming processing that greatly enhances the overall system detection and classification performance of the system is discussed. Recent test data demonstrates the performance of the seismic array within several different installations and its ability to classify and track moving targets at significant standoff distances with exceptional immunity to background clutter and noise. Multi-sensor data fusion is applied across a suite of complimentary sensors eliminating almost all nuisance alarms while integrating within a geographical information system to feed a visual-fusion display of the area being secured. Real-time sensor detection and intrusion classification data is presented within a visual-fusion display providing greatly enhanced situational awareness, system performance information and real-time assessment of intrusions and situations of interest with limited security operator involvement. This approach scales from a small local perimeter to very large geographical area and can be used across multiple sites controlled at a single command and control station.

  1. Seismic Amplitude Ratio Analysis of the 2014-2015 Bár∂arbunga-Holuhraun Dike Propagation and Eruption

    Science.gov (United States)

    Caudron, Corentin; White, Robert S.; Green, Robert G.; Woods, Jennifer; Ágústsdóttir, Thorbjörg; Donaldson, Clare; Greenfield, Tim; Rivalta, Eleonora; Brandsdóttir, Bryndís.

    2018-01-01

    Magma is transported in brittle rock through dikes and sills. This movement may be accompanied by the release of seismic energy that can be tracked from the Earth's surface. Locating dikes and deciphering their dynamics is therefore of prime importance in understanding and potentially forecasting volcanic eruptions. The Seismic Amplitude Ratio Analysis (SARA) method aims to track melt propagation using the amplitudes recorded across a seismic network without picking the arrival times of individual earthquake phases. This study validates this methodology by comparing SARA locations (filtered between 2 and 16 Hz) with the earthquake locations (same frequency band) recorded during the 2014-2015 Bár∂arbunga-Holuhraun dike intrusion and eruption in Iceland. Integrating both approaches also provides the opportunity to investigate the spatiotemporal characteristics of magma migration during the dike intrusion and ensuing eruption. During the intrusion SARA locations correspond remarkably well to the locations of earthquakes. Several exceptions are, however, observed. (1) A low-frequency signal was possibly associated with a subglacial eruption on 23 August. (2) A systematic retreat of the seismicity was also observed to the back of each active segment during stalled phases and was associated with a larger spatial extent of the seismic energy source. This behavior may be controlled by the dike's shape and/or by dike inflation. (3) During the eruption SARA locations consistently focused at the eruptive site. (4) Tremor-rich signal close to ice cauldrons occurred on 3 September. This study demonstrates the power of the SARA methodology, provided robust site amplification; Quality Factors and seismic velocities are available.

  2. Multiparametric statistical investigation of seismicity occurred at El Hierro (Canary Islands) from 2011 to 2014

    Science.gov (United States)

    Telesca, Luciano; Lovallo, Michele; Lopez, Carmen; Marti Molist, Joan

    2016-03-01

    A detailed statistical investigation of the seismicity occurred at El Hierro volcano (Canary Islands) from 2011 to 2014 has been performed by analysing the time variation of four parameters: the Gutenberg-Richter b-value, the local coefficient of variation, the scaling exponent of the magnitude distribution and the main periodicity of the earthquake sequence calculated by using the Schuster's test. These four parameters are good descriptors of the time and magnitude distributions of the seismic sequence, and their variation indicate dynamical changes in the volcanic system. These variations can be attributed to the causes and types of seismicity, thus allowing to distinguish between different host-rock fracturing processes caused by intrusions of magma at different depths and overpressures. The statistical patterns observed among the studied unrest episodes and between them and the eruptive episode of 2011-2012 indicate that the response of the host rock to the deformation imposed by magma intrusion did not differ significantly from one episode to the other, thus suggesting that no significant local stress changes induced by magma intrusion occurred when comparing between all them. Therefore, despite the studied unrest episodes were caused by intrusions of magma at different depths and locations below El Hierro island, the mechanical response of the lithosphere was similar in all cases. This suggests that the reason why the first unrest culminated in an eruption while the other did not, may be related to the role of the regional/local tectonics acting at that moment, rather than to the forceful of magma intrusion.

  3. An armored-cable-based fiber Bragg grating sensor array for perimeter fence intrusion detection

    Science.gov (United States)

    Hao, Jianzhong; Dong, Bo; Varghese, Paulose; Phua, Jiliang; Foo, Siang Fook

    2012-01-01

    In this paper, an armored-cable-based optical fiber Bragg grating (FBG) sensor array, for perimeter fence intrusion detection, is demonstrated and some of the field trial results are reported. The field trial was conducted at a critical local installation in Singapore in December 2010. The sensor array was put through a series of both simulated and live intrusion scenarios to test the stability and suitability of operation in the local environmental conditions and to determine its capabilities in detecting and reporting these intrusions accurately to the control station. Such a sensor array can provide perimeter intrusion detection with fine granularity and preset pin-pointing accuracy. The various types of intrusions included aided or unaided climbs, tampering and cutting of the fence, etc. The unique sensor packaging structure provides high sensitivity, crush resistance and protection against rodents. It is also capable of resolving nuisance events such as rain, birds sitting on the fence or seismic vibrations. These sensors are extremely sensitive with a response time of a few seconds. They can be customized for a desired spatial resolution and pre-determined sensitivity. Furthermore, it is easy to cascade a series of such sensors to monitor and detect intrusion events over a long stretch of fence line. Such sensors can be applied to real-time intrusion detection for perimeter security, pipeline security and communications link security.

  4. The 2001 Mt. Etna eruption: new constraints on the intrusive mechanism from ground deformation data

    Science.gov (United States)

    Palano, Mimmo; González, Pablo J.

    2013-04-01

    The occurrence of seismic swarms beneath the SW flank of Mt. Etna, often observed just a few months before an eruption, has been considered as the fragile response to a magma intrusion (Bonanno et al., 2011 and reference therein). These intrusions and/or pressurization of deep magmatic bodies, have been able to significantly affect the seismic pattern within the volcano edifice, leading to a changes in the local stress field. For example, during the months preceding the 1991-1993 Mt. Etna eruption, shallow intense seismic swarms (4-6 km deep) occurring in the SW flank (e.g. Cocina et al., 1998), related to the magma intrusion before the eruption onset, were observed contemporaneously with a rotation of stress field of about 90°. A similar scenario was observed during January 1998, when a magma recharging phases induced a local rotation of stress tensor, forcing a buried fault zone located beneath the SW flank of Mt. Etna to slip as a right-lateral strike-slip fault (Bonanno et al., 2011). This fault system was forced to slip again, during late April 2001 (more than 200 events in less than 5 days; maximum Magnitude = 3.6) by the pressurization of the magmatic bodies feeding the July-August 2001 Mt. Etna eruption. Here we analyzed in detail the July-August 2001 Mt. Etna eruption as well as the dynamics preceding this event, by using a large dataset of geodetic data (GPS and synthetic aperture radar interferometry) collected between July 2000 and August 2001. References Cocina, O., Neri, G., Privitera, E. and Spampinato S., 1998. Seismogenic stress field beneath Mt. Etna South Italy and possible relationships with volcano-tectonic features. J. Volcanol. Geotherm. Res., 83, 335-348. Bonanno A., Palano M., Privitera E., Gresta S., Puglisi G., 2011. Magma intrusion mechanisms and redistribution of seismogenic stress at Mt. Etna volcano (1997-1998). Terra Nova, 23, 339-348, doi: 10.1111/j.1365-3121.2011.01019.x, 2011.

  5. Magmatic sill intrusions beneath El Hierro Island following the 2011-2012 submarine eruption

    Science.gov (United States)

    Benito-Saz, María Á.; Sigmundsson, Freysteinn; Parks, Michelle M.; García-Cañada, Laura; Domínguez Cerdeña, Itahiza

    2016-04-01

    El Hierro, the most southwestern island of Canary Islands, Spain, is a volcano rising from around 3600 m above the ocean floor and up to of 1500 m above sea level. A submarine eruption occurred off the coast of El Hierro in 2011-2012, which was the only confirmed eruption in the last ~ 600 years. Activity continued after the end of the eruption with six magmatic intrusions occurring between 2012-2014. Each of these intrusions was characterized by hundreds of earthquakes and 3-19 centimeters of observed ground deformation. Ground displacements at ten continuous GPS sites were initially inverted to determine the optimal source parameters (location, geometry, volume/pressure change) that best define these intrusions from a geodetic point of view. Each intrusive period appears to be associated with the formation of a separate sill, with inferred volumes between 0.02 - 0.3 km3. SAR images from the Canadian RADARSAT-2 satellite and the Italian Space Agency COSMO-SkyMed constellation have been used to produce high-resolution detailed maps of line-of-sight displacements for each of these intrusions. These data have been combined with the continuous GPS observations and a joint inversion undertaken to gain further constraints on the optimal source parameters for each of these separate intrusive events. The recorded activity helps to understand how an oceanic intraplate volcanic island grows through repeated sill intrusions; well documented by seismic, GPS and InSAR observations in the case of the El Hierro activity.

  6. Mechanical intrusion models and their implications for the possibility of magma-driven swarms in NW Bohemia region

    Czech Academy of Sciences Publication Activity Database

    Dahm, T.; Fischer, Tomáš; Hainzl, S.

    2008-01-01

    Roč. 52, č. 4 (2008), s. 529-548 ISSN 0039-3169 Institutional research plan: CEZ:AV0Z30120515 Keywords : earthquake swarm * seismicity * magma tic intrusion * fracture model Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 0.770, year: 2008

  7. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  8. Evolution of the 2015 Cotopaxi eruption revealed by combined geochemical & seismic observations

    Science.gov (United States)

    Hidalgo, Silvana; Battaglia, Jean; Arellano, Santiago; Sierra, Daniel; Bernard, Benjamin; Parra, Rene; Kelly, Peter; Dinger, Florian; Barrington, Charlotte; Samaniego, Pablo

    2018-01-01

    Through integration of multiple data streams to monitor volcanic unrest scientists are able to make more robust eruption forecast and to obtain a more holistic interpretation of volcanic systems. We examined gas emission and gas geochemistry, seismic and petrologic data recorded during the 2015 unrest of Cotopaxi (Ecuador) in order to decipher the origin and temporal evolution of this eruption. Identification of families of similar seismic events and the use of seismic amplitude ratios reveals temporal changes in volcanic processes. SO2 (300 to 24000 t/d), BrO/SO2 (5-10 x10-5), SO2/HCl (5.8 ± 4.8 and 6.6 ± 3.0) and CO2/SO2 (0.6 to 2.1) measured throughout the eruption indicate a shallow magmatic source. Bulk ash and glass chemistry indicate a homogenous andesitic (SiO2 wt%=56.94 ± 0.25) magma having undergone extensive S-exsolution and degassing during ascent. These data lead us to interpret this eruption as a magma intrusion and ascend to shallow levels. The intrusion progressively interacted with the hydrothermal system, boiled off water, and produced hydromagmatic explosions. A small volume of this intrusion continued to fragment and produced episodic ash emissions until it was sufficiently degassed and rheologically stiff. Based on the 470 kt of measured SO2 we estimate that ~ 65.3 x106 m3 of magma were required to supply the emitted gases. This volume exceeds the volume of erupted juvenile material by a factor of 50. This result emphasizes the importance of careful monitoring of Cotopaxi to identify the intrusion of a new batch of magma, which could rejuvenate the non-erupted material.

  9. Towards Reliable Evaluation of Anomaly-Based Intrusion Detection Performance

    Science.gov (United States)

    Viswanathan, Arun

    2012-01-01

    This report describes the results of research into the effects of environment-induced noise on the evaluation process for anomaly detectors in the cyber security domain. This research was conducted during a 10-week summer internship program from the 19th of August, 2012 to the 23rd of August, 2012 at the Jet Propulsion Laboratory in Pasadena, California. The research performed lies within the larger context of the Los Angeles Department of Water and Power (LADWP) Smart Grid cyber security project, a Department of Energy (DoE) funded effort involving the Jet Propulsion Laboratory, California Institute of Technology and the University of Southern California/ Information Sciences Institute. The results of the present effort constitute an important contribution towards building more rigorous evaluation paradigms for anomaly-based intrusion detectors in complex cyber physical systems such as the Smart Grid. Anomaly detection is a key strategy for cyber intrusion detection and operates by identifying deviations from profiles of nominal behavior and are thus conceptually appealing for detecting "novel" attacks. Evaluating the performance of such a detector requires assessing: (a) how well it captures the model of nominal behavior, and (b) how well it detects attacks (deviations from normality). Current evaluation methods produce results that give insufficient insight into the operation of a detector, inevitably resulting in a significantly poor characterization of a detectors performance. In this work, we first describe a preliminary taxonomy of key evaluation constructs that are necessary for establishing rigor in the evaluation regime of an anomaly detector. We then focus on clarifying the impact of the operational environment on the manifestation of attacks in monitored data. We show how dynamic and evolving environments can introduce high variability into the data stream perturbing detector performance. Prior research has focused on understanding the impact of this

  10. Magma intrusion near Volcan Tancítaro: Evidence from seismic analysis

    Science.gov (United States)

    Pinzón, Juan I.; Núñez-Cornú, Francisco J.; Rowe, Charlotte A.

    2017-01-01

    Between May and June 2006, an earthquake swarm occurred near Volcan Tancítaro in Mexico, which was recorded by a temporary seismic deployment known as the MARS network. We located ∼1000 events from this seismic swarm. Previous earthquake swarms in the area were reported in the years 1997, 1999 and 2000. We relocate and analyze the evolution and properties of the 2006 earthquake swarm, employing a waveform cross-correlation-based phase repicking technique. Hypocenters from 911 events were located and divided into eighteen families having a correlation coefficient at or above 0.75. 90% of the earthquakes provide at least sixteen phase picks. We used the single-event location code Hypo71 and the P-wave velocity model used by the Jalisco Seismic and Accelerometer Network to improve hypocenters based on the correlation-adjusted phase arrival times. We relocated 121 earthquakes, which show clearly two clusters, between 9-10 km and 3-4 km depth respectively. The average location error estimates are rate of activity within the first 15 days; a b-value of 1.47; a jug-shaped hypocenter distribution; a shoaling rate of ∼5 km/month within the deeper cluster, and a composite focal mechanism solution indicating largely reverse faulting. These features of the swarm suggest a magmatic source elevating the crustal strain beneath Volcan Tancítaro.

  11. The Mesozoic-Cenozoic igneous intrusions and related sediment-dominated hydrothermal activities in the South Yellow Sea Basin, the Western Pacific continental margin

    Science.gov (United States)

    Yumao, Pang; Xunhua, Zhang; Guolin, Xiao; Luning, Shang; Xingwei, Guo; Zhenhe, Wen

    2018-04-01

    Various igneous complexes were identified in multi-channel seismic reflection profiles from the South Yellow Sea Basin. It is not rare that magmatic intrusions in sedimentary basins cause strong thermal perturbations and hydrothermal activities. Some intrusion-related hydrothermal vent complexes have been identified and they are considered to originate from the deep sedimentary contact aureole around igneous intrusions and terminate in upper vents structures, and are linked by a vertical conduit system. The upper vent complexes are usually eye-shaped, dome-shaped, fault-related, crater-shaped or pock-shaped in seismic profiles. A schematic model was proposed to illustrate the structures of different types of hydrothermal vent complexes. A conceptual conduit model composed of an upper pipe-like part and a lower branching part was also derived. Hydrothermal vent complexes mainly developed during the Middle-Late Cretaceous, which is coeval with, or shortly after the intrusion. The back-arc basin evolution of the area which is related to the subduction of the Paleo-Pacific plate during the Mesozoic-Cenozoic may be the principal factor for voluminous igneous complexes and vent complexes in this area. It is significant to study the characteristics of igneous complexes and related hydrothermal vent complexes, which will have implications for the future study of this area.

  12. Recent progress on the R and D program of the seismic attenuation system (SAS) proposed for the advanced gravitational wave detector, LIGO II

    International Nuclear Information System (INIS)

    Bertolini, A.; Cella, G.; Chenyang, W.; Salvo, R. de; Kovalik, J.; Marka, S.; Sannibale, V.; Takamori, A.; Tariq, H.; Viboud, N.

    2001-01-01

    High-performance Seismic Isolation Systems in gravitational wave interferometers are needed not only to increase the sensitivity of the detectors but also to guarantee long periods of stable operation. SAS is essentially a system which produces the required in-band seismic isolation by use of passive mechanical filters and actively reduces the out of band seismic noise using inertial damping. The passive isolation is achieved for all the 6 degrees of freedom, with an Inverted Pendulum and a chain of single wire pendula whose masses are the Geometrical Anti-Spring Filters (GASF). The active control is applied to reduce mainly the noise below 4 Hz and to damp the resonances of the chain acting from the inverted pendulum table. Here we present a brief overview of SAS and recent results achieved from the full scale SAS prototype

  13. Constraining the dynamics of 2014-15 Bardarbunga-Holuhraun intrusion and eruption using seismic noise

    Science.gov (United States)

    Caudron, Corentin; Donaldson, Clare; White, Robert

    2016-04-01

    The 2010 Eyjafjallajokull volcanic eruption explosively emitted a large quantity of ash in the atmosphere and paralysed the European airspace for weeks. Several seismic scientific studies already contributed to the understanding of this complex eruption (e.g., Tarasewicz et al., 2012). Although an excellent network of seismometers recorded this eruption, some volcanological and seismological aspects are still poorly understood. In order to gain further constraints on the dynamics of this ground-breaking eruptions, we mine the seismic dataset using the seismic ambient noise technique between pairs of stations and the Seismic Amplitude Ratio Analysis (SARA). Our preliminary results reveal a strong contamination of the Cross Correlation Functions (CCF) by the volcanic tremor, particularly above 0.5 Hz even for station pairs located >50 km from the volcano. Although this volcanic tremor precludes the monitoring of the seismic velocities, it literally illuminated the medium. The two phases of the eruptions (i.e., effusive and explosive) are clearly distinguished in these functions due to their different locations. During the explosive phase, an intriguing shift of the main peaks of the cross correlation functions is evidenced (early May 2010). It is remarkably consistent with the downward migration proposed by Tarasewicz et al. (2012) and is interpreted as a migration of the volcanic tremor. SARA methodology, which is continuously imaging and tracking any significant seismicity at a 10-min time scale (Taisne et al., 2010), is applied in the 5-15 Hz frequency band in order to image to continuously migrating microseismicity. The analysis displays several shallow migrations (above 5 km of depth, in March 2010) preceding the effusive phase of the eruption. Interestingly, the results also evidence a fast and deep migration (> 5 km) starting a few hours before the beginning of the explosive phase (13 April 2010). These preliminary results may shed light on the triggering of

  14. Repeated magmatic intrusions at El Hierro Island following the 2011-2012 submarine eruption

    Science.gov (United States)

    Benito-Saz, Maria A.; Parks, Michelle M.; Sigmundsson, Freysteinn; Hooper, Andrew; García-Cañada, Laura

    2017-09-01

    After more than 200 years of quiescence, in July 2011 an intense seismic swarm was detected beneath the center of El Hierro Island (Canary Islands), culminating on 10 October 2011 in a submarine eruption, 2 km off the southern coast. Although the eruption officially ended on 5 March 2012, magmatic activity continued in the area. From June 2012 to March 2014, six earthquake swarms, indicative of magmatic intrusions, were detected underneath the island. We have studied these post-eruption intrusive events using GPS and InSAR techniques to characterize the ground surface deformation produced by each of these intrusions, and to determine the optimal source parameters (geometry, location, depth, volume change). Source inversions provide insight into the depth of the intrusions ( 11-16 km) and the volume change associated with each of them (between 0.02 and 0.13 km3). During this period, > 20 cm of uplift was detected in the central-western part of the island, corresponding to approximately 0.32-0.38 km3 of magma intruded beneath the volcano. We suggest that these intrusions result from deep magma migrating from the mantle, trapped at the mantle/lower crust discontinuity in the form of sill-like bodies. This study, using joint inversion of GPS and InSAR data in a post-eruption period, provides important insight into the characteristics of the magmatic plumbing system of El Hierro, an oceanic intraplate volcanic island.

  15. Fault-Magma Interactions during Early Continental Rifting: Seismicity of the Magadi-Natron-Manyara basins, Africa

    Science.gov (United States)

    Weinstein, A.; Oliva, S. J.; Ebinger, C.; Aman, M.; Lambert, C.; Roecker, S. W.; Tiberi, C.; Muirhead, J.

    2017-12-01

    Although magmatism may occur during the earliest stages of continental rifting, its role in strain accommodation remains weakly constrained by largely 2D studies. We analyze seismicity data from a 13-month, 39-station broadband seismic array to determine the role of magma intrusion on state-of-stress and strain localization, and their along-strike variations. Precise earthquake locations using cluster analyses and a new 3D velocity model reveal lower crustal earthquakes along projections of steep border faults that degas CO2. Seismicity forms several disks interpreted as sills at 6-10 km below a monogenetic cone field. The sills overlie a lower crustal magma chamber that may feed eruptions at Oldoinyo Lengai volcano. After determining a new ML scaling relation, we determine a b-value of 0.87 ± 0.03. Focal mechanisms for 66 earthquakes, and a longer time period of relocated earthquakes from global arrays reveal an along-axis stress rotation of 50 o ( N150 oE) in the magmatically active zone. Using Kostrov summation of local and teleseismic mechanisms, we find opening directions of N122ºE and N92ºE north and south of the magmatically active zone. The stress rotation facilitates strain transfer from border fault systems, the locus of early stage deformation, to the zone of magma intrusion in the central rift. Our seismic, structural, and geochemistry results indicate that frequent lower crustal earthquakes are promoted by elevated pore pressures from volatile degassing along border faults, and hydraulic fracture around the margins of magma bodies. Earthquakes are largely driven by stress state around inflating magma bodies, and more dike intrusions with surface faulting, eruptions, and earthquakes are expected.

  16. A novel muon detector for borehole density tomography

    Science.gov (United States)

    Bonneville, Alain; Kouzes, Richard T.; Yamaoka, Jared; Rowe, Charlotte; Guardincerri, Elena; Durham, J. Matthew; Morris, Christopher L.; Poulson, Daniel C.; Plaud-Ramos, Kenie; Morley, Deborah J.; Bacon, Jeffrey D.; Bynes, James; Cercillieux, Julien; Ketter, Chris; Le, Khanh; Mostafanezhad, Isar; Varner, Gary; Flygare, Joshua; Lintereur, Azaree T.

    2017-04-01

    Muons can be used to image the density of materials through which they pass, including geological structures. Subsurface applications of the technology include tracking fluid migration during injection or production, with increasing concern regarding such timely issues as induced seismicity or chemical leakage into aquifers. Current density monitoring options include gravimetric data collection and active or passive seismic surveys. One alternative, or complement, to these methods is the development of a muon detector that is sufficiently compact and robust for deployment in a borehole. Such a muon detector can enable imaging of density structure to monitor small changes in density - a proxy for fluid migration - at depths up to 1500 m. Such a detector has been developed, and Monte Carlo modeling methods applied to simulate the anticipated detector response. Testing and measurements using a prototype detector in the laboratory and shallow underground laboratory demonstrated robust response. A satisfactory comparison with a large drift tube-based muon detector is also presented.

  17. Volcano-tectonic earthquakes: A new tool for estimating intrusive volumes and forecasting eruptions

    Science.gov (United States)

    White, Randall A.; McCausland, Wendy

    2016-01-01

    We present data on 136 high-frequency earthquakes and swarms, termed volcano-tectonic (VT) seismicity, which preceded 111 eruptions at 83 volcanoes, plus data on VT swarms that preceded intrusions at 21 other volcanoes. We find that VT seismicity is usually the earliest reported seismic precursor for eruptions at volcanoes that have been dormant for decades or more, and precedes eruptions of all magma types from basaltic to rhyolitic and all explosivities from VEI 0 to ultraplinian VEI 6 at such previously long-dormant volcanoes. Because large eruptions occur most commonly during resumption of activity at long-dormant volcanoes, VT seismicity is an important precursor for the Earth's most dangerous eruptions. VT seismicity precedes all explosive eruptions of VEI ≥ 5 and most if not all VEI 4 eruptions in our data set. Surprisingly we find that the VT seismicity originates at distal locations on tectonic fault structures at distances of one or two to tens of kilometers laterally from the site of the eventual eruption, and rarely if ever starts beneath the eruption site itself. The distal VT swarms generally occur at depths almost equal to the horizontal distance of the swarm from the summit out to about 15 km distance, beyond which hypocenter depths level out. We summarize several important characteristics of this distal VT seismicity including: swarm-like nature, onset days to years prior to the beginning of magmatic eruptions, peaking of activity at the time of the initial eruption whether phreatic or magmatic, and large non-double couple component to focal mechanisms. Most importantly we show that the intruded magma volume can be simply estimated from the cumulative seismic moment of the VT seismicity from:

  18. Wireless sensing without sensors—an experimental study of motion/intrusion detection using RF irregularity

    International Nuclear Information System (INIS)

    Lee, Pius W Q; Tan, Hwee-Pink; Seah, Winston K G; Yao, Zexi

    2010-01-01

    Motion and intrusion detection are often cited as wireless sensor network (WSN) applications with typical configurations comprising clusters of wireless nodes equipped with motion sensors to detect human motion. Currently, WSN performance is subjected to several constraints, namely radio irregularity and finite on-board computation/energy resources. Radio irregularity in radio frequency (RF) propagation rises to a higher level in the presence of human activity due to the absorption effect of the human body. In this paper, we investigate the feasibility of monitoring RF transmission for the purpose of intrusion detection through experimentation. With empirical data obtained from the Crossbow TelosB platform in several different environments, the impact of human activity on the signal strength of RF signals in a WSN is evaluated. We then propose a novel approach to intrusion detection by turning a constraint in WSN, namely radio irregularity, into an advantage for the purpose of intrusion detection, using signal fluctuations to detect the presence of human activity within the WSN. Unlike RF fingerprinting, the 'intruders' here neither transmit nor receive any RF signals. By enabling existing wireless infrastructures to serve as intrusion detectors instead of deploying numerous costly sensors, this approach shows great promise for providing novel solutions

  19. Human intrusion: New ideas?

    International Nuclear Information System (INIS)

    Cooper, J.R.

    2002-01-01

    Inadvertent human intrusion has been an issue for the disposal of solid radioactive waste for many years. This paper discusses proposals for an approach for evaluating the radiological significance of human intrusion as put forward by ICRP with contribution from work at IAEA. The approach focuses on the consequences of the intrusion. Protective actions could, however, include steps to reduce the probability of human intrusion as well as the consequences. (author)

  20. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  1. Application of Earthquake Subspace Detectors at Kilauea and Mauna Loa Volcanoes, Hawai`i

    Science.gov (United States)

    Okubo, P.; Benz, H.; Yeck, W.

    2016-12-01

    Recent studies have demonstrated the capabilities of earthquake subspace detectors for detailed cataloging and tracking of seismicity in a number of regions and settings. We are exploring the application of subspace detectors at the United States Geological Survey's Hawaiian Volcano Observatory (HVO) to analyze seismicity at Kilauea and Mauna Loa volcanoes. Elevated levels of microseismicity and occasional swarms of earthquakes associated with active volcanism here present cataloging challenges due the sheer numbers of earthquakes and an intrinsically low signal-to-noise environment featuring oceanic microseism and volcanic tremor in the ambient seismic background. With high-quality continuous recording of seismic data at HVO, we apply subspace detectors (Harris and Dodge, 2011, Bull. Seismol. Soc. Am., doi: 10.1785/0120100103) during intervals of noteworthy seismicity. Waveform templates are drawn from Magnitude 2 and larger earthquakes within clusters of earthquakes cataloged in the HVO seismic database. At Kilauea, we focus on seismic swarms in the summit caldera region where, despite continuing eruptions from vents in the summit region and in the east rift zone, geodetic measurements reflect a relatively inflated volcanic state. We also focus on seismicity beneath and adjacent to Mauna Loa's summit caldera that appears to be associated with geodetic expressions of gradual volcanic inflation, and where precursory seismicity clustered prior to both Mauna Loa's most recent eruptions in 1975 and 1984. We recover several times more earthquakes with the subspace detectors - down to roughly 2 magnitude units below the templates, based on relative amplitudes - compared to the numbers of cataloged earthquakes. The increased numbers of detected earthquakes in these clusters, and the ability to associate and locate them, allow us to infer details of the spatial and temporal distributions and possible variations in stresses within these key regions of the volcanoes.

  2. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  3. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  4. Some technical details concerning a new method of gravimetric-seismic inversion

    DEFF Research Database (Denmark)

    Strykowski, Gabriel

    1999-01-01

    In this paper a number of technical details related to a new method of gravimetric-seismic inversion, which is still under development, are explained. Although the present contribution aims on providing general statements on how to formulate and solve complex gravimetric-seismic modeling; problems......, the inspiration comes from the practical modeling problems in the area of Jutland peninsula (Denmark). More specifically, the methodological aspects of the proposed inversion method are illustrated on a problem of 3D modeling of the intra crustal intrusion associated with the Silkeborg Gravity High. The existing...... refraction seismic profile locates the source of the anomaly in depths 10 km - 18 km. In an earlier publication, (Strykowski, 1998), and for the same test area, a method of complex geological stripping is described. The present contribution is a continuation of this paper in the direction of inversion...

  5. Network Intrusion Forensic Analysis Using Intrusion Detection System

    OpenAIRE

    Manish Kumar; Dr. M. Hanumanthappa; Dr. T.V. Suresh Kumar

    2011-01-01

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investi...

  6. Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks

    Directory of Open Access Journals (Sweden)

    Wenjuan Li

    2018-01-01

    Full Text Available Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN has thus been developed by allowing intrusion detection system (IDS nodes to exchange data with each other. Insider attacks are a great threat for such types of collaborative networks, where an attacker has the authorized access within the network. In literature, a challenge-based trust mechanism is effective at identifying malicious nodes by sending challenges. However, such mechanisms are heavily dependent on two assumptions, which would cause CIDNs to be vulnerable to advanced insider attacks in practice. In this work, we investigate the influence of advanced on–off attacks on challenge-based CIDNs, which can respond truthfully to one IDS node but behave maliciously to another IDS node. To evaluate the attack performance, we have conducted two experiments under a simulated and a real CIDN environment. The obtained results demonstrate that our designed attack is able to compromise the robustness of challenge-based CIDNs in practice; that is, some malicious nodes can behave untruthfully without a timely detection.

  7. Real time monitoring of induced seismicity in the Insheim and Landau deep geothermal reservoirs, Upper Rhine Graben, using the new SeisComP3 cross-correlation detector

    Science.gov (United States)

    Vasterling, Margarete; Wegler, Ulrich; Bruestle, Andrea; Becker, Jan

    2016-04-01

    Real time information on the locations and magnitudes of induced earthquakes is essential for response plans based on the magnitude frequency distribution. We developed and tested a real time cross-correlation detector focusing on induced microseismicity in deep geothermal reservoirs. The incoming seismological data are cross-correlated in real time with a set of known master events. We use the envelopes of the seismograms rather than the seismograms themselves to account for small changes in the source locations or in the focal mechanisms. Two different detection conditions are implemented: After first passing a single trace correlation condition, secondly a network correlation is calculated taking the amplitude information of the seismic network into account. The magnitude is estimated by using the respective ratio of the maximum amplitudes of the master event and the detected event. The detector is implemented as a real time tool and put into practice as a SeisComp3 module, an established open source software for seismological real time data handling and analysis. We validated the reliability and robustness of the detector by an offline playback test using four month of data from monitoring the power plant in Insheim (Upper Rhine Graben, SW Germany). Subsequently, in October 2013 the detector was installed as real time monitoring system within the project "MAGS2 - Microseismic Activity of Geothermal Systems". Master events from the two neighboring geothermal power plants in Insheim and Landau and two nearby quarries are defined. After detection, manual phase determination and event location are performed at the local seismological survey of the Geological Survey and Mining Authority of Rhineland-Palatinate. Until November 2015 the detector identified 454 events out of which 95% were assigned correctly to the respective source. 5% were misdetections caused by local tectonic events. To evaluate the completeness of the automatically obtained catalogue, it is

  8. INFLUENCE OF THE SPATIAL ARRANGEMENT OF SEISMIC DETECTORS ON THE ACCURACY OF EARTHQUAKE HYPOCENTRE DETERMINATION

    Directory of Open Access Journals (Sweden)

    T. G. Aslanov

    2016-01-01

    Full Text Available Objectives. To determine the coordinates of the seismic focus of an earthquake with a minimum margin of error with the use of an optimal selection of seismic sensors. Method. Seismic wave velocity data, relying on the time discrepancies between the registering of seismic waves on the seismic sensor and the defined error in determining the time difference, were used to identify errors in the location of an earthquake's hypocenter depending on the respective positions of three seismic sensors. Discrepancies between data containing an error and those without it used to determine two hypocenters provide information about the hypocenter locating error. An analysis of the influence of the respective arrangements of the seismic sensors and the earthquake epicentre on the accuracy of determination of epicentre coordinates was carried out. Results. It is established that, in order to improve the accuracy of epicenter and hypocenter earthquake coordinate determination, it is preferable to use different combinations of seismic sensors. The present recommendations are based on the desire to reduce errors in determining the earthquake source coordinates. Due to earthquake epicenter distance determination errors found in different seismic sensors both with increasing and decreasing distance, the hypocenter coordinate determining error has been found to depend on the respective arrangement of seismic sensors and on the earthquake source's geographical location. In order to determine the dependence of the source coordinate determining error on the relative position of three seismic sensors, the third seismic sensor was displaced on a horizontal plane at the location centered at the coordinate of the origin. Conclusion. When selecting seismic sensors it is essential that one of them be located perpendicular to the center of the segment formed by the other two seismic sensors. The probability of a multidirectional error of measurement at the moment of arrival of

  9. Indian program for development of technologies relevant to reliable, non-intrusive, concealed-contraband detection

    International Nuclear Information System (INIS)

    Auluck, S.K.H.

    2007-01-01

    Generating capability for reliable, non-intrusive detection of concealed-contraband, particularly, organic contraband like explosives and narcotics, has become a national priority. This capability spans a spectrum of technologies. If a technology mission addressing the needs of a highly sophisticated technology like PFNA is set up, the capabilities acquired would be adequate to meet the requirements of many other sets of technologies. This forms the background of the Indian program for development of technologies relevant to reliable, non-intrusive, concealed contraband detection. One of the central themes of the technology development programs would be modularization of the neutron source and detector technologies, so that common elements can be combined in different ways for meeting a variety of application requirements. (author)

  10. Count out your intrusions: Effects of verbal encoding on intrusive memories

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.

    2009-01-01

    Peri-traumatic information processing is thought to affect the development of intrusive trauma memories. This study aimed to replicate and improve the study by Holmes, Brewin, and Hennessy (2004, Exp. 3) on the role of peri-traumatic verbal processing in analogue traumatic intrusion development.

  11. Options for human intrusion

    International Nuclear Information System (INIS)

    Bauser, M.; Williams, R.

    1993-01-01

    This paper addresses options for dealing with human intrusion in terms of performance requirements and repository siting and design requirements. Options are presented, along with the advantages and disadvantages of certain approaches. At the conclusion, a conceptual approach is offered emphasizing both the minimization of subjective judgements concerning future human activity, and specification of repository requirements to minimize the likelihood of human intrusion and any resulting, harmful effects should intrusion occur

  12. Crosshole seismic measurements to characterise and monitor the internal condition of embankment dams

    Energy Technology Data Exchange (ETDEWEB)

    Vazinkhoo, S. [Horizon Engineering Inc., North Vancouver, BC (Canada); Gaffran, P. [BC Hydro, Burnaby, BC (Canada)

    2002-12-01

    A sinkhole was discovered at the Bennett Dam in June 1996. The discovery was immediately followed by an investigation consisting 14 geophysical techniques, of which crosshole seismic testing was the most successful. The Bennett Dam Sinkhole Investigation Project resulted in remedial action which involved compaction grouting to repair the defects. Crosshole seismic testing has been carried out annually since 1996 to verify that the integrity of the repaired zone is being maintained. Large amounts of data have been collected since initial testing to augment other acquired data from more conventional geotechnical techniques. Both data sets have provided a unique opportunity to correlate seismic velocities to mechanical soil properties. The condition of the dam can now be readily assessed through the prediction of seismic velocities for a range of soil properties at any point in the dam. The study has resulted in a better understanding of measured velocities with respect to dam behaviour. Results confirm that seismic velocity testing is a useful, non-intrusive tool for monitoring the performance of embankment dams. 13 refs., 2 tabs., 8 figs.

  13. Seismic isolation of Advanced LIGO: Review of strategy, instrumentation and performance

    International Nuclear Information System (INIS)

    Matichard, F; Mittleman, R; Mason, K; Biscans, S; Barnum, S; Evans, M; Foley, S; Lantz, B; Celerier, C; Clark, D; DeBra, D; Kissel, J; Allwine, E; Abbott, B; Abbott, R; Abbott, S; Coyne, D; McIver, J; Birch, J; DeRosa, R

    2015-01-01

    The new generation of gravitational waves detectors require unprecedented levels of isolation from seismic noise. This article reviews the seismic isolation strategy and instrumentation developed for the Advanced LIGO observatories. It summarizes over a decade of research on active inertial isolation and shows the performance recently achieved at the Advanced LIGO observatories. The paper emphasizes the scientific and technical challenges of this endeavor and how they have been addressed. An overview of the isolation strategy is given. It combines multiple layers of passive and active inertial isolation to provide suitable rejection of seismic noise at all frequencies. A detailed presentation of the three active platforms that have been developed is given. They are the hydraulic pre-isolator, the single-stage internal isolator and the two-stage internal isolator. The architecture, instrumentation, control scheme and isolation results are presented for each of the three systems. Results show that the seismic isolation sub-system meets Advanced LIGO’s stringent requirements and robustly supports the operation of the two detectors. (paper)

  14. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  15. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  16. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  17. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  18. Application of non-intrusive geophysical techniques at the Mixed Waste Landfill, Technical Area 3, Sandia National Laboratories, New Mexico

    International Nuclear Information System (INIS)

    Peace, J.L.; Goering, T.J.

    1996-03-01

    The Environmental Restoration Project at Sandia National Laboratories, New Mexico is tasked with assessment and remediation of the Mixed Waste Landfill in Technical Area 3. The Mixed Waste Landfill is an inactive radioactive and mixed waste disposal site. The landfill contains disposal pits and trenches of questionable location and dimension. Non-intrusive geophysical techniques were utilized to provide an effective means of determining the location and dimension of suspected waste disposal trenches before Resource Conservation and Recovery Act intrusive assessment activities were initiated. Geophysical instruments selected for this investigation included a Geonics EM-31 ground conductivity meter, the new Geonics EM-61 high precision, time-domain metal detector, and a Geometrics 856 total field magnetometer. The results of these non-intrusive geophysical techniques were evaluated to enhance the efficiency and cost-effectiveness of future waste-site investigations at Environmental Restoration Project sites

  19. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  20. Seismic constraints on a large mafic intrusion with implications for the subsidence mechanism of the Danish Basin

    DEFF Research Database (Denmark)

    Sandrin, Alessandro; Thybo, Hans

    2008-01-01

    Gal) positive gravity anomaly known as Silkeborg Gravity High. The intrusion has a minimum volume of 40,000 km3, which implies that the magma influx and the consequent cooling of the lithosphere from high temperature could have had profound effects on the subsidence of the Danish Basin, in particular because...

  1. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  2. One Decade of Induced Seismicity in Basel, Switzerland: A Consistent High-Resolution Catalog Obtained by Template Matching

    Science.gov (United States)

    Herrmann, M.; Kraft, T.; Tormann, T.; Scarabello, L.; Wiemer, S.

    2017-12-01

    Induced seismicity at the site of the Basel Enhanced Geothermal System (EGS) continuously decayed for six years after injection had been stopped in December 2006. Starting in May 2012, the Swiss Seismological Service was detecting a renewed increase of induced seismicity in the EGS reservoir to levels last seen in 2007 and reaching magnitudes up to ML2.0. Seismic monitoring at this EGS site is running for more than ten years now, but the details of the long-term behavior of its induced seismicity remained unexplored because a seismic event catalog that is consistent in detection sensitivity and magnitude estimation did not exist.We have created such a catalog by applying our matched filter detector to the 11-year-long seismic recordings of a borehole station at 2.7km depth. Based on 3'600 located earthquakes of the operator's borehole-network catalog, we selected about 2'500 reasonably dissimilar templates using waveform clustering. This large template set ensures an adequate coverage of the diversity of event waveforms which is due to the reservoir's highly complex fault system and the close observation distance. To cope with the increased computational demand of scanning 11-years of data with 2'500 templates, we parallelized our detector to run on a high-performance computer of the Swiss National Supercomputing Centre.We detect more than 200'000 events down to ML-2.5 during the six-day-long stimulation in December 2006 alone. Previously, only 13'000 detections found by an amplitude-threshold-based detector were known for this period. The high temporal and spatial resolution of this new catalog allows us to analyze the statistics of the induced Basel earthquakes in great detail. We resolve spatio-temporal variations of the seismicity parameters (a- and b-value) that have not been identified before and derive the first high-resolution temporal evolution of the seismic hazard for the Basel EGS reservoir.In summer 2017, our detector monitored the 10-week pressure

  3. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  4. Characterization of the seismic environment at the Sanford Underground Laboratory, South Dakota

    Energy Technology Data Exchange (ETDEWEB)

    Harms, J; Dorsher, S; Kandhasamy, S; Mandic, V [University of Minnesota, 116 Church Street SE, Minneapolis, MN 55455 (United States); Acernese, F; Barone, F [Universita degli Studi di Salerno, Fisciano (Saudi Arabia) (Italy); Bartos, I; Marka, S [Columbia University, New York, NY 10027 (United States); Beker, M; Van den Brand, J F J; Rabeling, D S [Nikhef, National Institute for Subatomic Physics, Science Park 105, 1098 XG Amsterdam (Netherlands); Christensen, N; Coughlin, M [Carleton College, Northfield, MN 55057 (United States); DeSalvo, R [California Institute of Technology, Pasadena, CA 91125 (United States); Heise, J; Trancynger, T [Sanford Underground Laboratory, 630 East Summit Street, Lead, SD 57754 (United States); Mueller, G [University of Florida, Gainesville, FL 32611 (United States); Naticchioni, L [Department of Physics, University of Rome ' Sapienza' , P.le Aldo Moro 2, 00185 Rome (Italy); O' Keefe, T [Saint Louis University, 3450 Lindell Blvd., St. Louis, MO 63103 (United States); Sajeva, A, E-mail: janosch@caltech.ed [Dipartimento di Fisica ' Enrico Fermi' , Universita di Pisa, Largo Bruno Pontecorvo, Pisa (Italy)

    2010-11-21

    An array of seismometers is being developed at the Sanford Underground Laboratory, the former Homestake mine, in South Dakota to study the properties of underground seismic fields and Newtonian noise, and to investigate the possible advantages of constructing a third-generation gravitational-wave detector underground. Seismic data were analyzed to characterize seismic noise and disturbances. External databases were used to identify sources of seismic waves: ocean-wave data to identify sources of oceanic microseisms and surface wind-speed data to investigate correlations with seismic motion as a function of depth. In addition, sources of events contributing to the spectrum at higher frequencies are characterized by studying the variation of event rates over the course of a day. Long-term observations of spectral variations provide further insight into the nature of seismic sources. Seismic spectra at three different depths are compared, establishing the 4100 ft level as a world-class low seismic-noise environment.

  5. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  6. Anatomy of the TAMA SAS seismic attenuation system

    International Nuclear Information System (INIS)

    Marka, Szabolcs; Takamori, Akiteru; Ando, Masaki; Bertolini, Alessandro; Cella, Giancarlo; DeSalvo, Riccardo; Fukushima, Mitsuhiro; Iida, Yukiyoshi; Jacquier, Florian; Kawamura, Seiji; Nishi, Yuhiko; Numata, Kenji; Sannibale, Virginio; Somiya, Kentaro; Takahashi, Ryutaro; Tariq, Hareem; Tsubono, Kimio; Ugas, Jose; Viboud, Nicolas; Wang Chenyang; Yamamoto, Hiroaki; Yoda, Tatsuo

    2002-01-01

    The TAMA SAS seismic attenuation system was developed to provide the extremely high level of seismic isolation required by the next generation of interferometric gravitational wave detectors to achieve the desired sensitivity at low frequencies. Our aim was to provide good performance at frequencies above ∼10 Hz, while utilizing only passive subsystems in the sensitive frequency band of the TAMA interferometric gravitational wave detectors. The only active feedback is relegated below 6 Hz and it is used to damp the rigid body resonances of the attenuation chain. Simulations, based on subsystem performance characterizations, indicate that the system can achieve rms mirror residual motion measured in a few tens of nanometres. We will give a brief overview of the subsystems and point out some of the characterization results, supporting our claims of achieved performance. SAS is a passive, UHV compatible and low cost system. It is likely that extremely sensitive experiments in other fields will also profit from our study

  7. Cratonic roots and lower crustal seismicity: Investigating the role of deep intrusion in the Western rift, Africa

    Science.gov (United States)

    Drooff, C.; Ebinger, C. J.; Lavayssiere, A.; Keir, D.; Oliva, S. J.; Tepp, G.; Gallacher, R. J.

    2017-12-01

    Improved seismic imaging beneath the African continent reveals lateral variations in lithospheric thickness, and crustal structure, complementing a growing crust and mantle xenolith data base. Border fault systems in the active cratonic rifts of East Africa are characterized by lower crustal seismicity, both in magmatic sectors and weakly magmatic sectors, providing constraints on crustal rheology and, in some areas, magmatic fluid migration. We report new seismicity data from magmatic and weakly magmatic sectors of the East African rift zone, and place the work in the context of independent geophysical and geochemical studies to models for strain localization during early rifting stages. Specifically, multidisciplinary studies in the Magadi Natron rift sectors reveal volumetrically large magmatic CO2 degassing along border faults with seismicity along projections of surface dips to the lower crust. The magmatic CO2 degassing and high Vp/Vs ratios and reflectivity of the lower crust implies that the border fault serves a conduit between the lower crustal underplating and the atmospheric. Crustal xenoliths in the Eastern rift sector indicate a granulitic lower crust, which is relatively weak in the presence of fluids, arguing against a strong lower crust. Within magmatic sectors, seismic, structural, and geochemistry results indicate that frequent lower crustal earthquakes are promoted by elevated pore pressures from volatile degassing along border faults, and hydraulic fracture around the margins of magma bodies. Within some weakly magmatic sectors, lower crustal earthquakes also occur along projections of border faults to the lower crust (>30 km), and they are prevalent in areas with high Vp/Vs in the lower crust. Within the southern Tanganyika rift, focal mechanisms are predominantly normal with steep nodal planes. Our comparative studies suggest that pervasive metasomatism above a mantle plume, and melt extraction in thin zones between cratonic roots, lead to

  8. An international perspective on Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  9. Fault-magma interactions during early continental rifting: Seismicity of the Magadi-Natron-Manyara basins, Africa

    Science.gov (United States)

    Weinstein, A.; Oliva, S. J.; Ebinger, C. J.; Roecker, S.; Tiberi, C.; Aman, M.; Lambert, C.; Witkin, E.; Albaric, J.; Gautier, S.; Peyrat, S.; Muirhead, J. D.; Muzuka, A. N. N.; Mulibo, G.; Kianji, G.; Ferdinand-Wambura, R.; Msabi, M.; Rodzianko, A.; Hadfield, R.; Illsley-Kemp, F.; Fischer, T. P.

    2017-10-01

    Although magmatism may occur during the earliest stages of continental rifting, its role in strain accommodation remains weakly constrained by largely 2-D studies. We analyze seismicity data from a 13 month, 39-station broadband seismic array to determine the role of magma intrusion on state-of-stress and strain localization, and their along-strike variations. Precise earthquake locations using cluster analyses and a new 3-D velocity model reveal lower crustal earthquakes beneath the central basins and along projections of steep border faults that degas CO2. Seismicity forms several disks interpreted as sills at 6-10 km below a monogenetic cone field. The sills overlie a lower crustal magma chamber that may feed eruptions at Oldoinyo Lengai volcano. After determining a new ML scaling relation, we determine a b-value of 0.87 ± 0.03. Focal mechanisms for 65 earthquakes, and 13 from a catalogue prior to our array reveal an along-axis stress rotation of ˜60° in the magmatically active zone. New and prior mechanisms show predominantly normal slip along steep nodal planes, with extension directions ˜N90°E north and south of an active volcanic chain consistent with geodetic data, and ˜N150°E in the volcanic chain. The stress rotation facilitates strain transfer from border fault systems, the locus of early-stage deformation, to the zone of magma intrusion in the central rift. Our seismic, structural, and geochemistry results indicate that frequent lower crustal earthquakes are promoted by elevated pore pressures from volatile degassing along border faults, and hydraulic fracture around the margins of magma bodies. Results indicate that earthquakes are largely driven by stress state around inflating magma bodies.

  10. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  11. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  12. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    Part of the stakeholder consultation addressed strategies that media audiences are developing to cope with pressures and intrusions in a changing media environment, characterised by digitalisation and interactive possibilities. We interviewed ten stakeholders representing interests such as content...... production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...... no consensual motivation, nor any clear avenue for action. Therefore, we have analysed different discursive positions that prevent acknowledging or taking action upon the pressures and intrusions that we presented to these stakeholders. The discursive positions are outlined below....

  13. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  14. The relationship between the seismic characteristics of crustal structure in Shikoku Basin and en-echelon arrangement

    Science.gov (United States)

    Yamashita, M.; Takahashi, N.; Kodaira, S.; No, T.; Takizawa, K.; Miura, S.; Kaiho, Y.; Sato, T.; Kaneda, Y.

    2007-12-01

    Detailed crustal structure information of a back-arc basin must be obtained to elucidate the mechanism of its opening. Especially, the Shikoku Basin, which occupies the northern part of the Philippine Sea Plate between the Kyushu-Palau Ridge and the Izu-Ogasawara Arc, is an important area to elucidate the evolution of the back-arc basins as a part of the growth process of the Philippine Sea. Japan Agency for Marine-Earth Science and Technology (JAMSTEC) carried out multi-channel seismic reflection survey using 12,000 cu.in. air gun and streamer with 204 ch hydrophones in the Izu-Ogasawara region since 2004. The total length of survey lines is more than 10,000 km until 2006. We investigate the crustal structure beneath the Shikoku Basin along 10 survey lines, which are across to the strike of the en-echelon seamount chains in the rear arc. From the seismic profiles, some faults and intrusion structures are obtained in the Shikoku Basin. The deformation structure with acoustic basement is widely distributed between the Shikoku Basin and the Izu-Ogasawara arc. Some intrusions structure is identified in the Shikoku Basin are exposed on seafloor. The intrusions structure is assumed to locate in the extended region of the en-echelon arrangement. The strike-slip faults with flower structure cutting whole sediments are located in the arc-backarc transition zone in the northern Shikoku Basin, suggesting that this region is in share stress. On the other hand, these structures indicating the deformation and intrusions are not recognized in the eastern side of the Kyushu-Palau Ridge. The Izu-Ogasawara arc is colliding to the Japan Island arc in the Sagami Bay. In the Nankai Trough, the Philippine Sea plate is subducting to the Japan Island arc. Therefore, the strike-slip and reverse fault would be developed by the compression stress in the eastern side of Philippine Sea plate. If the en-echelon arrangement is developed along these faults, the intrusions structure obtained by

  15. Preliminary experimental results for a non-intrusive scheme for the detection of flaws in metal pipelines

    Science.gov (United States)

    Aydin, K.; Shinde, S.; Suhail, M.; Vyas, A.; Zieher, K. W.

    2002-05-01

    An acoustic pulse echo scheme for non-intrusive detection of flaws in metal pipelines has been investigated in the laboratory. The primary pulse is generated by a pulsed magnetic field enclosing a short section of a free pipe. The detection is by an electrostatic detector surrounding a short section of the pipe. Reflected pulses from thin areas, with a longitudinal extension of about one pipe radius and a reduction of the wall thickness of 40%, can be detected clearly.

  16. Inefficiency of IDS Static Anomaly Detectors in Real-World Networks

    Directory of Open Access Journals (Sweden)

    Edward Guillen

    2015-05-01

    Full Text Available A wide range of IDS implementations with anomaly detection modules have been deployed. In general, those modules depend on intrusion knowledge databases, such as Knowledge Discovery Dataset (KDD99, Center for Applied Internet Data Analysis (CAIDA or Community Resource for Archiving Wireless Data at Dartmouth (CRAWDAD, among others. Once the database is analyzed and a machine learning method is employed to generate detectors, some classes of new detectors are created. Thereafter, detectors are supposed to be deployed in real network environments in order to achieve detection with good results for false positives and detection rates. Since the traffic behavior is quite different according to the user’s network activities over available services, restrictions and applications, it is supposed that behavioral-based detectors are not well suited to all kind of networks. This paper presents the differences of detection results between some network scenarios by applying traditional detectors that were calculated with artificial neural networks. The same detector is deployed in different scenarios to measure the efficiency or inefficiency of static training detectors.

  17. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    International Conference on Computational Intelligence and Natural Computing, volume 2, pages 413–416, June 2009. • Rung Ching Chen, Kai -Fan Cheng, and...Chia-Fen Hsieh . “Using rough set and support vector machine for network intrusion detection.” International Journal of Network Security & Its...intrusion detection using FP tree rules.” Journal Of Advanced Networking and Applications, 1(1):30–39, 2009. • Ming-Yang Su, Gwo-Jong Yu , and Chun-Yuen

  18. From intrusive to oscillating thoughts.

    Science.gov (United States)

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  19. Design of an Acoustic Target Intrusion Detection System Based on Small-Aperture Microphone Array

    Science.gov (United States)

    Zu, Xingshui; Guo, Feng; Huang, Jingchang; Zhao, Qin; Liu, Huawei; Li, Baoqing; Yuan, Xiaobing

    2017-01-01

    Automated surveillance of remote locations in a wireless sensor network is dominated by the detection algorithm because actual intrusions in such locations are a rare event. Therefore, a detection method with low power consumption is crucial for persistent surveillance to ensure longevity of the sensor networks. A simple and effective two-stage algorithm composed of energy detector (ED) and delay detector (DD) with all its operations in time-domain using small-aperture microphone array (SAMA) is proposed. The algorithm analyzes the quite different velocities between wind noise and sound waves to improve the detection capability of ED in the surveillance area. Experiments in four different fields with three types of vehicles show that the algorithm is robust to wind noise and the probability of detection and false alarm are 96.67% and 2.857%, respectively. PMID:28273838

  20. Pick- and waveform-based techniques for real-time detection of induced seismicity

    Science.gov (United States)

    Grigoli, Francesco; Scarabello, Luca; Böse, Maren; Weber, Bernd; Wiemer, Stefan; Clinton, John F.

    2018-05-01

    The monitoring of induced seismicity is a common operation in many industrial activities, such as conventional and non-conventional hydrocarbon production or mining and geothermal energy exploitation, to cite a few. During such operations, we generally collect very large and strongly noise-contaminated data sets that require robust and automated analysis procedures. Induced seismicity data sets are often characterized by sequences of multiple events with short interevent times or overlapping events; in these cases, pick-based location methods may struggle to correctly assign picks to phases and events, and errors can lead to missed detections and/or reduced location resolution and incorrect magnitudes, which can have significant consequences if real-time seismicity information are used for risk assessment frameworks. To overcome these issues, different waveform-based methods for the detection and location of microseismicity have been proposed. The main advantages of waveform-based methods is that they appear to perform better and can simultaneously detect and locate seismic events providing high-quality locations in a single step, while the main disadvantage is that they are computationally expensive. Although these methods have been applied to different induced seismicity data sets, an extensive comparison with sophisticated pick-based detection methods is still missing. In this work, we introduce our improved waveform-based detector and we compare its performance with two pick-based detectors implemented within the SeiscomP3 software suite. We test the performance of these three approaches with both synthetic and real data sets related to the induced seismicity sequence at the deep geothermal project in the vicinity of the city of St. Gallen, Switzerland.

  1. Analysis of Bracket Assembly for Portable Leak Detector Station

    International Nuclear Information System (INIS)

    ZIADA, H.H.

    1999-01-01

    This Supporting Document Presents Structural and Stress Analysis of a Portable Leak Detector Station for Tank Farms. The results show that the bracket assembly meets the requirements for dead load and natural phenomena hazards loads (seismic and wind)

  2. Intrusive trauma memory: A review and functional analysis

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.; Holmes, E.A.

    2009-01-01

    Our contribution to this special issue focuses on the phenomenon of intrusive trauma memory. While intrusive trauma memories can undoubtedly cause impairment, we argue that they may exist for a potentially adaptive reason. Theory and experimental research on intrusion development are reviewed and

  3. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  4. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  5. Rapid laccolith intrusion driven by explosive volcanic eruption.

    Science.gov (United States)

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  6. assessment of Seawater Intrusion in Concrete by Measuring Chlorine Concentration

    International Nuclear Information System (INIS)

    Abdel-Monem, A.M.; Kansouh, W.A.; Osman, A.M.; Bashter, I.I.

    2011-01-01

    The object of this work is to measure water intrusion in concrete using a new methodology based on neutron activation technique. The applied method depends on measuring the activated gamma energy lines emitted from 38 Cl using a gamma spectrometer with Ge(Li) and HPGe detectors. Concrete samples with different percentages of silica fume (SF), up to 20 % submerged in seawater for different period of time were used to perform the investigation. Samples of concrete taken from different positions along the direction of water intrusion in concrete block were irradiated by thermal neutrons using the irradiation cell of 252 Cf neutron source and one of the vertical channels of search reactor at Delft University. The measured 38 Cl concentrations of the irradiated samples were used to plot groups of water profiles distribution in concrete samples with different SF % and submerged in seawater for different periods. These profiles were compared with the others which use here measured by neutron back emitted method where a satisfactory agreement was observed between the two. Further, the displayed measured results; show that the diffusivity for all water contents decreases with increasing the silica fume percentage up to 15 %. However, for concrete samples with silica fume 20 % the observed phenomenon is reversed due to the deterioration of concrete physical and mechanical properties

  7. Crosshole investigations - short and medium range seismic tomography

    International Nuclear Information System (INIS)

    Cosma, C.

    1987-02-01

    Seismic tomographic tests were conducted as a part of the Crosshole Investigations program of the Stripa Project. The aim has been to study if it is possible to detect by seismic tomography major fracture zones and determine their dimensions and orientation. The analysis was based on both compressional (P) and transversal (S) waves. The Young's modulus has been also calculated for a sub-set of measurements as a cross check for the P and S wave velocities. The experimental data was collected at the crosshole site in the Stripa mine during 1984-1985. A down-the-hole impact source was used together with triaxial detectors and a digital seismograph. Five tomographic sections were obtained. The number of records per section was appr. 250. Measurements were done down to 200 m depth in all boreholes. The main conclusion is that it is possible to detect major fracture zones by seismic tomography. Their position and orientation can also be estimated. (orig./HP)

  8. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  9. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  10. Indigenous technology development : seismic switch for nuclear reactors

    International Nuclear Information System (INIS)

    Varghese, Shiju; Shah, Jay; Limaye, P.K.; Soni, N.L; Patel, R.J.

    2016-01-01

    After Fukushima incident it has become a regulatory requirement to have automatic reactor trip on detection of earthquake beyond OBE level. Seismic Switches that meets the technical specifications required for nuclear reactor use were not available in the market. Hence, on Nuclear Power Corporation of India Ltd (NPCIL's) request, Refuelling Technology Division, BARC has developed Seismic Switches (electronic earthquake detectors) required for this application. Functionality of the system was successfully tested using a Shake Table. Two different designs of seismic switches have been developed. One is a microcontroller based system (digital) and the other is fully analogue electronics (analog) based. These switches are designed to meet the technical requirements of Class IA systems of nuclear reactors. It is also designed to meet other qualification tests such as EMI/EMC, climatic, vibration, and reliability requirements. In addition to nuclear industry seismic switches are having potential use in oil and gas, power plants, buildings and other industrial installations. These technologies are currently available for technology transfer and details are published in BARC website. This paper describes the requirements, principle of operation, and features and testing of the developed systems. (author)

  11. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  12. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  13. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  14. The shallow structure of Solfatara Volcano, Italy, revealed by dense, wide-aperture seismic profiling.

    Science.gov (United States)

    Bruno, Pier Paolo G; Maraio, Stefano; Festa, Gaetano

    2017-12-12

    Two active-source, high-resolution seismic profiles were acquired in the Solfatara tuff cone in May and November 2014, with dense, wide-aperture arrays. Common Receiver Surface processing was crucial in improving signal-to-noise ratio and reflector continuity. These surveys provide, for the first time, high-resolution seismic images of the Solfatara crater, depicting a ~400 m deep asymmetrical crater filled by volcanoclastic sediments and rocks and carved within an overall non-reflective pre-eruptive basement showing features consistent with the emplacement of shallow intrusive bodies. Seismic reflection data were interpreted using the trace complex attributes and clearly display several steep and segmented collapse faults, generally having normal kinematics and dipping toward the crater centre. Fault/fracture planes are imaged as sudden amplitude drops that generate narrow low-similarity and high-dip attributes. Uprising fluids degassed by a magmatic source are the most probable cause of the small-scale amplitude reduction. Seismic data also support the interpretation of the shallow structure of the Solfatara crater as a maar. Our results provides a solid framework to constrain the near-surface geological interpretation of such a complex area, which improves our understanding of the temporal changes of the structure in relation with other geophysical and geochemical measurements.

  15. Imaging CO2 reservoirs using muons borehole detectors

    Science.gov (United States)

    Bonneville, A.; Bonal, N.; Lintereur, A.; Mellors, R. J.; Paulsson, B. N. P.; Rowe, C. A.; Varner, G. S.; Kouzes, R.; Flygare, J.; Mostafanezhad, I.; Yamaoka, J. A. K.; Guardincerri, E.; Chapline, G.

    2016-12-01

    Monitoring of the post-injection fate of CO2 in subsurface reservoirs is of utmost importance. Generally, monitoring options are active methods, such as 4D seismic reflection or pressure measurements in monitoring wells. We present a method of 4D density tomography of subsurface CO2 reservoirs using cosmic-ray muon detectors deployed in a borehole. Although muon flux rapidly decreases with depth, preliminary analyses indicate that the muon technique is sufficiently sensitive to effectively map density variations caused by fluid displacement at depths consistent with proposed CO2reservoirs. The intensity of the muon flux is, to first order, inversely proportional to the density times the path length, with resolution increasing with measurement time. The primary technical challenge preventing deployment of this technology in subsurface locations is the lack of miniaturized muon-tracking detectors both capable of fitting in standard boreholes and that will be able to resist the harsh underground conditions (temperature, pressure, corrosion) for long periods of time. Such a detector with these capabilities has been developed through a collaboration supported by the U.S. Department of Energy. A prototype has been tested in underground laboratories during 2016. In particular, we will present results from a series of tests performed in a tunnel comparing efficiencies, and angular and position resolution to measurements collected at the same locations by large instruments developed by Los Alamos and Sandia National Laboratories. We will also present the results of simulations of muon detection for various CO2 reservoir situations and muon detector configurations. Finally, to improve imaging of 3D subsurface structures, a combination of seismic data, gravity data, and muons can be used. Because seismic waves, gravity anomalies, and muons are all sensitive to density, the combination of two or three of these measurements promises to be a powerful way to improve spatial

  16. Localization of short-range acoustic and seismic wideband sources: Algorithms and experiments

    Science.gov (United States)

    Stafsudd, J. Z.; Asgari, S.; Hudson, R.; Yao, K.; Taciroglu, E.

    2008-04-01

    We consider the determination of the location (source localization) of a disturbance source which emits acoustic and/or seismic signals. We devise an enhanced approximate maximum-likelihood (AML) algorithm to process data collected at acoustic sensors (microphones) belonging to an array of, non-collocated but otherwise identical, sensors. The approximate maximum-likelihood algorithm exploits the time-delay-of-arrival of acoustic signals at different sensors, and yields the source location. For processing the seismic signals, we investigate two distinct algorithms, both of which process data collected at a single measurement station comprising a triaxial accelerometer, to determine direction-of-arrival. The direction-of-arrivals determined at each sensor station are then combined using a weighted least-squares approach for source localization. The first of the direction-of-arrival estimation algorithms is based on the spectral decomposition of the covariance matrix, while the second is based on surface wave analysis. Both of the seismic source localization algorithms have their roots in seismology; and covariance matrix analysis had been successfully employed in applications where the source and the sensors (array) are typically separated by planetary distances (i.e., hundreds to thousands of kilometers). Here, we focus on very-short distances (e.g., less than one hundred meters) instead, with an outlook to applications in multi-modal surveillance, including target detection, tracking, and zone intrusion. We demonstrate the utility of the aforementioned algorithms through a series of open-field tests wherein we successfully localize wideband acoustic and/or seismic sources. We also investigate a basic strategy for fusion of results yielded by acoustic and seismic arrays.

  17. Intrusive Memories of Distressing Information: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Eva Battaglini

    Full Text Available Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42 viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13 demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13. Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC and dorsolateral prefrontal cortex (dlPFC, inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories.

  18. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  19. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  20. Human intrusion: issues concerning its assessment

    International Nuclear Information System (INIS)

    Grimwood, P.D.; Smith, G.M.

    1989-01-01

    The potential significance of human intrusion in the performance assessment of radioactive waste repositories has been increasingly recognized in recent years. It is however an area of assessment in which subjective judgments dominate. This paper identifies some of the issues involved. These include regulatory criteria, scenario development, probability assignment, consequence assessment and measures to mitigate human intrusion

  1. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  2. Probing dynamic hydrologic system of slowly-creeping landslides with passive seismic imaging: A comprehensive landslide monitoring site at Lantai, Ilan area in Taiwan

    Science.gov (United States)

    Huang, H. H.; Hsu, Y. J.; Kuo, C. Y.; Chen, C. C.; Kuo, L. W.; Chen, R. F.; Lin, C. R.; Lin, P. P.; Lin, C. W.; Lin, M. L.; Wang, K. L.

    2017-12-01

    A unique landslide monitoring project integrating multidisciplinary geophysics experiments such as GPS, inclinometer, piezometer, and spontaneous potential log has been established at Lantai, Ilan area to investigating the possible detachment depth range and the physical mechanism of a slowly creeping landslide. In parallel with this, a lately deployed local seismic network also lends an opportunity to employ the passive seismic imaging technique to detect the time-lapse changes of seismic velocity in and around the landslide area. Such technique that retrieves Green's functions by cross-correlation of continuous ambient noise has opened new opportunities to seismologically monitoring the environmental and tectonic events such as ground water variation, magma intrusion under volcanos, and co-seismic medium damage in recent years. Integrating these geophysical observations, we explore the primary controls of derived seismic velocity changes and especially the hydrological response of the landslide to the passage of Megi typhoon in the last September 2016, which could potentially further our understanding of the dynamic system of landslides and in turn help the hazard mitigation.

  3. Magmatic intrusions in the lunar crust

    Science.gov (United States)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  4. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  5. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  6. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  7. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  8. Evidential reasoning research on intrusion detection

    Science.gov (United States)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  9. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  10. A Survey on Anomaly Based Host Intrusion Detection System

    Science.gov (United States)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  11. Reflection seismic studies over the end-glacial Burträsk fault, Skellefteå, Sweden

    Directory of Open Access Journals (Sweden)

    C. Juhlin

    2011-01-01

    Full Text Available Reflection seismic data were acquired along a ca. 22 km long profile over the end-glacial Burträsk fault with a nominal receiver and source spacing of 20 m. A steeply dipping reflection can be correlated to the Burträsk fault, indicating that the fault dips at about 55° to the southeast near the surface. The reflection from the fault is rather poorly imaged, probably due to a lateral offset in the fault of about 1 km at this location and the crookedness of the seismic profile in the vicinity of the fault. A more pronounced steeply dipping reflection is observed about 4 km southeast of the Burträsk fault. Based on its correlation with a topographic low at the surface this reflection is interpreted to originate from a fracture zone. There are no signs of large displacements along this zone as the glacial ice receded, but earthquakes could be associated with it today. Other reflections on the processed seismic section may originate from changes in lithological variations in the supra-crustal rocks or from intrusions of more mafic rock. Constraints on the fault geometry provided by the reflection seismic data will help determine what stresses were required to activate the fault when the major rupture along it occurred ca. 9500 years ago.

  12. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  13. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  14. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    Science.gov (United States)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    We will present a detailed microstructural and geochemical study of reactive liquid flow in Unit 9 of the Rum Eastern Layered Intrusion. In the study region, Unit 9 comprises an underlying lens-like body of peridotite overlain by a sequence of troctolite and gabbro (termed allivalite), with some local and minor anorthosite. The troctolite is separated from the overlying gabbro by a distinct, sub-horizontal, undulose horizon (the major wavy horizon). Higher in the stratigraphy is another, similar, horizon (the minor wavy horizon) that separates relatively clinopyroxene-poor gabbro from an overlying gabbro. To the north of the peridotite lens, both troctolite and gabbro grade into poikilitic gabbro. Clinopyroxene habit in the allivalite varies from thin rims around olivine in troctolite, to equigranular crystals in gabbro, to oikocrysts in the poikilitic gabbro. The poikilitic gabbros contain multiple generations of clinopyroxene, with Cr-rich (~1.1 wt.% Cr2O3), anhedral cores with moderate REE concentrations (core1) overgrown by an anhedral REE-depleted second generation with moderate Cr (~0.7 wt.% Cr2O3) (core2). These composite cores are rimmed by Cr-poor (~0.2 wt.% Cr2O3) and REE-poor to moderate clinopyroxene. We interpret these microstructures as a consequence of two separate episodes of partial melting triggered by the intrusion of hot olivine-phyric picrite to form the discontinuous lenses that comprise the Unit 9 peridotite. Loss of clinopyroxene-saturated partial melt from the lower part of the allivalite immediately following the early stages of sill intrusion resulted in the formation of clinopyroxene-poor gabbro. The spatial extent of clinopyroxene loss is marked by the minor wavy horizon. A further partial melting event stripped out almost all clinopyroxene from the lowest allivalite, to form a troctolite, with the major wavy horizon marking the extent of melting during this second episode. The poikilitic gabbro formed from clinopyroxene-saturated melt

  15. A new intrusion prevention model using planning knowledge graph

    Science.gov (United States)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  16. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients

    Directory of Open Access Journals (Sweden)

    Usha Bapat

    2012-01-01

    Full Text Available To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients′ above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life

  17. Biological intrusion barriers for large-volume waste-disposal sites

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Cline, J.F.; Rickard, W.H.

    1982-01-01

    intrusion of plants and animals into shallow land burial sites with subsequent mobilization of toxic and radiotoxic materials has occured. Based on recent pathway modeling studies, such intrusions can contribute to the dose received by man. This paper describes past work on developing biological intrusion barrier systems for application to large volume waste site stabilization. State-of-the-art concepts employing rock and chemical barriers are discussed relative to long term serviceability and cost of application. The interaction of bio-intrusion barrier systems with other processes affecting trench cover stability are discussed to ensure that trench cover designs minimize the potential dose to man. 3 figures, 6 tables

  18. Seismic Activity Related to the 2002-2003 Mt. Etna Volcano Eruption (Italy): Fault Plane Solutions and Stress Tensor Computation

    Science.gov (United States)

    Barberi, G.; Cammarata, L.; Cocina, O.; Maiolino, V.; Musumeci, C.; Privitera, E.

    2003-04-01

    Late on the night of October 26, 2002, a bi-lateral eruption started on both the eastern and the southeastern flanks of Mt. Etna. The opening of the eruptive fracture system on the NE sector and the reactivation of the 2001 fracture system, on the S sector, were accompanied by a strong seismic swarm recorded between October 26 and 28 and by sharp increase of volcanic tremor amplitude. After this initial phase, on October 29 another seismogenetic zone became active in the SE sector of the volcano. At present (January 2003) the eruption is still in evolution. During the whole period a total of 862 earthquakes (Md≫1) was recorded by the local permanent seismic network run by INGV - Sezione di Catania. The maximum magnitude observed was Md=4.4. We focus our attention on 55 earthquakes with magnitude Md≫ 3.0. The dataset consists of accurate digital pickings of P- and S-phases including first-motion polarities. Firstly earthquakes were located using a 1D velocity model (Hirn et alii, 1991), then events were relocated by using two different 3D velocity models (Aloisi et alii, 2002; Patane et alii, 2002). Results indicate that most of earthquakes are located to the east of the Summit Craters and to northeast of them. Fault plane solutions (FPS) obtained show prevalent strike-slip rupture mechanisms. The suitable FPSs were considered for the application of Gephart and Forsyth`s algorithm in order to evaluate seismic stress field characteristics. Taking into account the preliminary results we propose a kinematic model of the eastern flank eastward movement in response of the intrusion processes in the central part of the volcano. References Aloisi M., Cocina O., Neri G., Orecchio B., Privitera E. (2002). Seismic tomography of the crust underneath the Etna volcano, Sicily. Physics of the Earth and Planetary Interiors 4154, pp. 1-17 Hirn A., Nercessian A., Sapin M., Ferrucci F., Wittlinger G. (1991). Seismic heterogeneity of Mt. Etna: structure and activity. Geophys. J

  19. Design and development of indigenous seismic switch for nuclear reactors

    International Nuclear Information System (INIS)

    Varghese, Shiju; Shah, Jay; Limaye, P.K.; Soni, N.L; Patel, R.J.

    2016-01-01

    After Fukushima incident it has become a regulatory requirement to have automatic reactor trip on detection of earthquake beyond OBE level. Seismic Switches that meets the technical specifications required for nuclear reactor use were not available in the market. Hence, on Nuclear Power Corporation of India Ltd (NPCIL's) request, Refuelling Technology Division, BARC has developed Seismic Switches (electronic earthquake detectors) required for this application. Functionality of the system was successfully tested using a Shake Table. Two different designs of seismic switches have been developed. One is a microcontroller based system (digital) and the other is fully analogue electronics (analog) based. These switches are designed to meet the technical requirements of Class IA systems of nuclear reactors. It is also designed to meet other qualification tests such as EMI/EMC, climatic, vibration, and reliability requirements. In addition to nuclear industry seismic switches are having potential use in oil and gas, power plants, buildings and other industrial installations. These technologies are currently available for technology transfer and details are published in BARC website. This paper describes the requirements, principle of operation and features and testing of the developed systems. (author)

  20. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    OpenAIRE

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumben...

  1. Identification of Human Intrusion Types into Radwaste Disposal Facility

    International Nuclear Information System (INIS)

    Budi Setiawan

    2007-01-01

    Human intrusion has long been recognized as a potentially important post-closure safety issue for rad waste disposal facility. It is due to the difficulties in predicting future human activities. For the preliminary study of human intrusion, identification of human intrusion types need to be recognized and investigated also the approaching of problem solving must be known to predict the prevention act and accepted risk. (author)

  2. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  3. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  4. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  5. Heart rate, startle response, and intrusive trauma memories

    Science.gov (United States)

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  6. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  7. Process and equipment for automatic measurement of resonant frequencies in seismic detectors

    International Nuclear Information System (INIS)

    Fredriksson, O.A.; Thomas, E.L.

    1977-01-01

    This is a process for the automatic indication of the resonant frequency of one or more detector elements which have operated inside a geophysical data-gathering system. Geophones or hydrophones or groups of both instruments are to be understood as comprising the detector elements. The invention concerns the creation of a process and of equipment working with laboratory precision, although it can be used in the field. (orig./RW) [de

  8. Recent results of a seismically isolated optical table prototype designed for advanced LIGO

    International Nuclear Information System (INIS)

    Sannibale, V; Abbott, B; Boschi, V; Coyne, D; DeSalvo, R; Aso, Y; Marka, S; Ottaway, D; Stochino, A

    2008-01-01

    The Horizontal Access Module Seismic Attenuation System (HAM-SAS) is a mechanical device expressly designed to isolate a multipurpose optical table and fit in the tight space of the LIGO HAM Ultra-High-Vacuum chamber. Seismic attenuation in the detectors' sensitivity frequency band is achieved with state of the art passive mechanical attenuators. These devices should provide an attenuation factor of about 70dB above 10Hz at the suspension point of the Advanced LIGO triple pendulum suspension. Automatic control techniques are used to position the optical table and damp rigid body modes. Here, we report the main results obtained from the full scale prototype installed at the MIT LIGO Advanced System Test Interferometer (LASTI) facility. Seismic attenuation performance, control strategies, improvements and limitations are also discussed

  9. The appraisal of intrusive thoughts in relation to obsessional-compulsive symptoms.

    Science.gov (United States)

    Barrera, Terri L; Norton, Peter J

    2011-01-01

    Research has shown that although intrusive thoughts occur universally, the majority of individuals do not view intrusive thoughts as being problematic (Freeston, Ladouceur, Thibodeau, & Gagnon, 1991; Rachman & de Silva, 1978; Salkovskis & Harrison, 1984). Thus, it is not the presence of intrusive thoughts that leads to obsessional problems but rather some other factor that plays a role in the development of abnormal obsessions. According to the cognitive model of obsessive-compulsive disorder (OCD) put forth by Salkovskis (1985), the crucial factor that differentiates between individuals with OCD and those without is the individual's appraisal of the naturally occurring intrusive thoughts. This study aimed to test Salkovskis's model by examining the role of cognitive biases (responsibility, thought-action fusion, and thought control) as well as distress in the relationship between intrusive thoughts and obsessive-compulsive symptoms in an undergraduate sample of 326 students. An existing measure of intrusive thoughts (the Revised Obsessional Intrusions Inventory) was modified for this study to include a scale of distress associated with each intrusive thought in addition to the current frequency scale. When the Yale-Brown Obsessive-Compulsive Scale was used as the measure of OCD symptoms, a significant interaction effect of frequency and distress of intrusive thoughts resulted. Additionally, a significant three-way interaction of Frequency × Distress × Responsibility was found when the Obsessive Compulsive Inventory-Revised was used as the measure of OCD symptoms. These results indicate that the appraisal of intrusive thoughts is important in predicting OCD symptoms, thus providing support for Salkovskis's model of OCD.

  10. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  11. Saharan dust intrusions in Spain: Health impacts and associated synoptic conditions.

    Science.gov (United States)

    Díaz, Julio; Linares, Cristina; Carmona, Rocío; Russo, Ana; Ortiz, Cristina; Salvador, Pedro; Trigo, Ricardo Machado

    2017-07-01

    A lot of papers have been published about the impact on mortality of Sahara dust intrusions in individual cities. However, there is a lack of studies that analyse the impact on a country and scarcer if in addition the analysis takes into account the meteorological conditions that favour these intrusions. The main aim is to examine the effect of Saharan dust intrusions on daily mortality in different Spanish regions and to characterize the large-scale atmospheric circulation anomalies associated with such dust intrusions. For determination of days with Saharan dust intrusions, we used information supplied by the Ministry of Agriculture, Food & Environment, it divides Spain into 9 main areas. In each of these regions, a representative province was selected. A time series analysis has been performed to analyse the relationship between daily mortality and PM 10 levels in the period from 01.01.04 to 31.12.09, using Poisson regression and stratifying the analysis by the presence or absence of Saharan dust advections. The proportion of days on which there are Saharan dust intrusions rises to 30% of days. The synoptic pattern is characterised by an anticyclonic ridge extending from northern Africa to the Iberian Peninsula. Particulate matter (PM) on days with intrusions are associated with daily mortality, something that does not occur on days without intrusions, indicating that Saharan dust may be a risk factor for daily mortality. In other cases, what Saharan dust intrusions do is to change the PM-related mortality behaviour pattern, going from PM 2.5 . A study such as the one conducted here, in which meteorological analysis of synoptic situations which favour Saharan dust intrusions, is combined with the effect on health at a city level, would seem to be crucial when it comes to analysing the differentiated mortality pattern in situations of Saharan dust intrusions. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. An evaluation of classification algorithms for intrusion detection ...

    African Journals Online (AJOL)

    An evaluation of classification algorithms for intrusion detection. ... Log in or Register to get access to full text downloads. ... Most of the available IDSs use all the 41 features in the network to evaluate and search for intrusive pattern in which ...

  13. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  14. Non-Intrusive Intelligibility Prediction Using a Codebook-Based Approach

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Kavalekalam, Mathew Shaji; Xenaki, Angeliki

    2017-01-01

    It could be beneficial for users of hearing aids if these were able to automatically adjust the processing according to the speech intelligibility in the specific acoustic environment. Most speech intelligibility metrics are intrusive, i.e., they require a clean reference signal, which is rarely...... a high correlation between the proposed non-intrusive codebookbased STOI (NIC-STOI) and the intrusive STOI indicating that NIC-STOI is a suitable metric for automatic classification of speech signals...

  15. Distributed state machine supervision for long-baseline gravitational-wave detectors

    International Nuclear Information System (INIS)

    Rollins, Jameson Graef

    2016-01-01

    The Laser Interferometer Gravitational-wave Observatory (LIGO) consists of two identical yet independent, widely separated, long-baseline gravitational-wave detectors. Each Advanced LIGO detector consists of complex optical-mechanical systems isolated from the ground by multiple layers of active seismic isolation, all controlled by hundreds of fast, digital, feedback control systems. This article describes a novel state machine-based automation platform developed to handle the automation and supervisory control challenges of these detectors. The platform, called Guardian, consists of distributed, independent, state machine automaton nodes organized hierarchically for full detector control. User code is written in standard Python and the platform is designed to facilitate the fast-paced development process associated with commissioning the complicated Advanced LIGO instruments. While developed specifically for the Advanced LIGO detectors, Guardian is a generic state machine automation platform that is useful for experimental control at all levels, from simple table-top setups to large-scale multi-million dollar facilities.

  16. Distributed state machine supervision for long-baseline gravitational-wave detectors

    Energy Technology Data Exchange (ETDEWEB)

    Rollins, Jameson Graef, E-mail: jameson.rollins@ligo.org [LIGO Laboratory, California Institute of Technology, Pasadena, California 91125 (United States)

    2016-09-15

    The Laser Interferometer Gravitational-wave Observatory (LIGO) consists of two identical yet independent, widely separated, long-baseline gravitational-wave detectors. Each Advanced LIGO detector consists of complex optical-mechanical systems isolated from the ground by multiple layers of active seismic isolation, all controlled by hundreds of fast, digital, feedback control systems. This article describes a novel state machine-based automation platform developed to handle the automation and supervisory control challenges of these detectors. The platform, called Guardian, consists of distributed, independent, state machine automaton nodes organized hierarchically for full detector control. User code is written in standard Python and the platform is designed to facilitate the fast-paced development process associated with commissioning the complicated Advanced LIGO instruments. While developed specifically for the Advanced LIGO detectors, Guardian is a generic state machine automation platform that is useful for experimental control at all levels, from simple table-top setups to large-scale multi-million dollar facilities.

  17. Newtonian noise cancellation in tensor gravitational wave detector

    International Nuclear Information System (INIS)

    Paik, Ho Jung; Harms, Jan

    2016-01-01

    Terrestrial gravity noise produced by ambient seismic and infrasound fields poses one of the main sensitivity limitations in low-frequency ground-based gravitational-wave (GW) detectors. This noise needs to be suppressed by 3-5 orders of magnitude in the frequency band 10 mHz to 1 Hz, which is extremely challenging. We present a new approach that greatly facilitates cancellation of gravity noise in full-tensor GW detectors. It makes explicit use of the direction of propagation of a GW, and can therefore either be implemented in directional searches for GWs or in observations of known sources. We show that suppression of the Newtonian-noise foreground is greatly facilitated using the extra strain channels in full-tensor GW detectors. Only a modest number of auxiliary, high-sensitivity environmental sensors is required to achieve noise suppression by a few orders of magnitude. (paper)

  18. Patterns of seismicity in a complex volcanic crisis at Brava, Cabo Verde

    Science.gov (United States)

    Faria, B. V. E.; Day, S. J.

    2017-12-01

    Brava is the smallest inhabited island of the Cape Verde archipelago, with an area of 62.5 km2 and a population of 6000. Geologically recent volcanism on Brava has produced lava (including carbonatite) flows, phonolite lava domes, pyroclastic density current deposits, and many phreatomagmatic craters in central Brava (where most of the population lives). Recent geological studies indicate that last eruptive period is about 1000 years old. Brava has experienced recurrent seismic swarms and felt earthquakes. The first permanent seismic station was installed in 1999, and a small network in 2011. From then until 2015 the seismic rate was near constant with sporadic peaks. Most seismic events were located offshore and associated with submarine volcanoes. However, the pattern of activity has been very different since 25th September 2015, when a M4 earthquake occurred in the submarine slopes of Brava. Subsequently, the seismicity became very complex with frequent volcano-tectonic (VT) earthquake swarms beneath Brava itself, with a few offshore events in some months. In addition, long-period, hybrid and hydrothermal events and likely very weak volcanic tremor episodes have been recorded. These non-VT events support the hypothesis that magma emplacement beneath Brava is at the origin of the abnormal seismic activity. The VT swarms indicate deformation around the magma body and possible dike intrusions, and there are indications of perturbation of a shallow hydrothermal system. The largest swarm occurred on the 1st and 2nd August 2016, with almost 1000 shallow events, including a M3.7 VT earthquake, medium-frequency events and weak volcanic tremor. An alert for a possible eruption was issued and a village (about 300 people) was evacuated as a precaution. Distributions of the cumulative number of events with depth in the main swarms suggest that the hypocenters are becoming shallower with time. Thus a possible eruption in the near future cannot be ruled out.

  19. Intrusion of Magmatic Bodies Into the Continental Crust: 3-D Numerical Models

    Science.gov (United States)

    Gorczyk, Weronika; Vogt, Katharina

    2018-03-01

    Magma intrusion is a major material transfer process in the Earth's continental crust. Yet the mechanical behavior of the intruding magma and its host are a matter of debate. In this study we present a series of numerical thermomechanical simulations on magma emplacement in 3-D. Our results demonstrate the response of the continental crust to magma intrusion. We observe change in intrusion geometries between dikes, cone sheets, sills, plutons, ponds, funnels, finger-shaped and stock-like intrusions, and injection time. The rheology and temperature of the host are the main controlling factors in the transition between these different modes of intrusion. Viscous deformation in the warm and deep crust favors host rock displacement and plutons at the crust-mantle boundary forming deep-seated plutons or magma ponds in the lower to middle crust. Brittle deformation in the cool and shallow crust induces cone-shaped fractures in the host rock and enables emplacement of finger- or stock-like intrusions at shallow or intermediate depth. Here the passage of magmatic and hydrothermal fluids from the intrusion through the fracture pattern may result in the formation of ore deposits. A combination of viscous and brittle deformation forms funnel-shaped intrusions in the middle crust. Intrusion of low-density magma may more over result in T-shaped intrusions in cross section with magma sheets at the surface.

  20. Seismic isolation - efficient procedure for seismic response assessement

    International Nuclear Information System (INIS)

    Zamfir, M. A.; Androne, M.

    2016-01-01

    The aim of this analysis is to reduce the dynamic response of a structure. The seismic isolation solution must take into consideration the specific site ground motion. In this paper will be presented results obtained by applying the seismic isolation method. Based on the obtained results, important conclusions can be outlined: the seismic isolation device has the ability to reduce seismic acceleration of the seismic isolated structure to values that no longer present a danger to people and environment; the seismic isolation solution is limiting devices deformations to safety values for ensuring structural integrity and stability of the entire system; the effective seismic energy dissipation and with no side effects both for the seismic isolated building and for the devices used, and the return to the initial position before earthquake occurence are obtained with acceptable permanent displacement. (authors)

  1. Nuisance alarm suppression techniques for fibre-optic intrusion detection systems

    Science.gov (United States)

    Mahmoud, Seedahmed S.; Visagathilagar, Yuvaraja; Katsifolis, Jim

    2012-02-01

    The suppression of nuisance alarms without degrading sensitivity in fibre-optic intrusion detection systems is important for maintaining acceptable performance. Signal processing algorithms that maintain the POD and minimize nuisance alarms are crucial for achieving this. A level crossings algorithm is presented for suppressing torrential rain-induced nuisance alarms in a fibre-optic fence-based perimeter intrusion detection system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr, and intrusion events can be detected simultaneously during rain periods. The use of a level crossing based detection and novel classification algorithm is also presented demonstrating the suppression of nuisance events and discrimination of nuisance and intrusion events in a buried pipeline fibre-optic intrusion detection system. The sensor employed for both types of systems is a distributed bidirectional fibre-optic Mach Zehnder interferometer.

  2. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  3. Seismicity patterns during a period of inflation at Sierra Negra volcano, Galápagos Ocean Island Chain

    Science.gov (United States)

    Davidge, Lindsey; Ebinger, Cynthia; Ruiz, Mario; Tepp, Gabrielle; Amelung, Falk; Geist, Dennis; Coté, Dustin; Anzieta, Juan

    2017-03-01

    Basaltic shield volcanoes of the western Galápagos islands are among the most rapidly deforming volcanoes worldwide, but little was known of the internal structure and brittle deformation processes accompanying inflation and deflation cycles. A 15-station broadband seismic array was deployed on and surrounding Sierra Negra volcano, Galápagos from July 2009 through June 2011 to characterize seismic strain patterns during an inter-eruption inflation period and to evaluate single and layered magma chamber models for ocean island volcanoes. We compare precise earthquake locations determined from a 3D velocity model and from a double difference cluster method. Using first-motion of P-arrivals, we determine focal mechanisms for 8 of the largest earthquakes (ML ≤ 1.5) located within the array. Most of the 2382 earthquakes detected by the array occurred beneath the broad (∼9 km-wide) Sierra Negra caldera, at depths from surface to about 8 km below sea level. Although outside our array, frequent and larger magnitude (ML ≤ 3.4) earthquakes occurred at Alcedo and Fernandina volcano, and in a spatial cluster beneath the shallow marine platform between Fernandina and Sierra Negra volcanoes. The time-space relations and focal mechanism solutions from a 4-day long period of intense seismicity June 4-9, 2010 along the southeastern flank of Sierra Negra suggests that the upward-migrating earthquake swarm occurred during a small volume intrusion at depths 5-8 km subsurface, but there was no detectable signal in InSAR data to further constrain geometry and volume. Focal mechanisms of earthquakes beneath the steep intra-caldera faults and along the ring fault system are reverse and strike-slip. These new seismicity data integrated with tomographic, geodetic, and petrological models indicate a stratified magmatic plumbing system: a shallow sill beneath the large caldera that is supplied by magma from a large volume deeper feeding system. The large amplitude inter

  4. Analysis of the geometry of diabase sills of the Serra Geral magmatism, by 2D seismic interpretation, in Guareí region, São Paulo, Paraná basin, Brazil

    Directory of Open Access Journals (Sweden)

    Diego Felipe Bezerra da Costa

    Full Text Available ABSTRACT: The Paraná Basin holds in its stratigraphic record a thick layer of volcanic rocks related to the opening of the Gondwana Supercontinent, which occurred during the Eocretaceous. Based on the interpretation of three two-dimensional (2D seismic lines in the region of Guareí, East-Central São Paulo state, in the Southeast of Brazil, the subsurface geometries of these volcanic rocks were identified. Since the original seismic resolution quality was low, alternative techniques were utilized to improve the seismic imaging, such as isolating maximum and minimum amplitude values by manipulating the color scale, and using the root mean square (RMS attribute and the Amplitude Volume technique (tecVA, which emphasize the seismic signature of igneous rocks in relation to sedimentary layers. The use of such techniques allowed the identification of different geometries of diabase sills and showed a relationship between these intrusive and organic matter maturation of the source rock.

  5. Terrane accumulation and collapse in central Europe: seismic and rheological constraints

    Science.gov (United States)

    Meissner, R.

    1999-05-01

    An attempt is made to compare the tectonic units and their evolution in central Europe with the deep seismic velocity structure and patterns of reflectivity. Caledonian and Variscan terrane accretion and orogenic collapse dominate the tectonic development in central and western Europe and have left their marks in a distinct velocity structure and crustal thickness as well as in the various reflectivity patterns. Whereas the memory of old collisional structures is still preserved in the rigid upper crust, collapse processes have formed and modified the lower crust. They have generally created rejuvenated, thin crusts with shallow Mohos. In the Variscan internides, the center of collision and post-orogenic heat pulses, the lower crust developed strong and thick seismic lamellae, the (cooler) externides show a thrust and shear pattern in the whole crust, and the North German Basin experienced large mafic intrusions in the lower crust and developed a high-velocity structure with only very thin lamellae on top of the Moho. The various kinds of reflectivity patterns in the lithosphere can be explained by a thermo-rheological model from terrane collision, with crustal thickening to collapse in a hot, post-orogenic setting.

  6. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  7. An ontology-based intrusion patterns classification system | Shonubi ...

    African Journals Online (AJOL)

    Studies have shown that computer intrusions have been on the increase in recent times. Many techniques and patterns are being used by intruders to gain access to data on host computer networks. In this work, intrusion patterns were identified and classified and inherent knowledge were represented using an ontology of ...

  8. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    Seawater intrusion; coastal aquifers; density-dependent flow and ... The seawater intrusion mechanism in coastal aquifers generally causes the occurrence of ... (4) The dynamic viscosity of the fluid does not change with respect to salinity and.

  9. Seismic testing

    International Nuclear Information System (INIS)

    Sollogoub, Pierre

    2001-01-01

    This lecture deals with: qualification methods for seismic testing; objectives of seismic testing; seismic testing standards including examples; main content of standard; testing means; and some important elements of seismic testing

  10. A Machine Learning Based Intrusion Impact Analysis Scheme for Clouds

    Directory of Open Access Journals (Sweden)

    Junaid Arshad

    2012-01-01

    Full Text Available Clouds represent a major paradigm shift, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of on demand expandable computing infrastructures. However, Clouds introduce novel security challenges which need to be addressed to facilitate widespread adoption. This paper is focused on one such challenge - intrusion impact analysis. In particular, we highlight the significance of intrusion impact analysis for the overall security of Clouds. Additionally, we present a machine learning based scheme to address this challenge in accordance with the specific requirements of Clouds for intrusion impact analysis. We also present rigorous evaluation performed to assess the effectiveness and feasibility of the proposed method to address this challenge for Clouds. The evaluation results demonstrate high degree of effectiveness to correctly determine the impact of an intrusion along with significant reduction with respect to the intrusion response time.

  11. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    -intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results......Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non...

  12. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  13. Finite element analysis of ground deformation due to dike intrusion with applications to Mt. Etna volcano

    Directory of Open Access Journals (Sweden)

    G. La Rosa

    2004-06-01

    Full Text Available A 2D finite elements study was carried out to analyse the effects caused by dike intrusion inside a heterogeneous medium and with a realistic topography of Mt. Etna volcano. Firstly, the method (dimension domain, elements type was calibrated using plane strain models in elastic half-spaces; the results were compared with those obtained from analytical dislocation models. Then the effects caused both by the topographic variations and the presence of multi-layered medium on the surface, were studied. In particular, an application was then considered to Mt. Etna by taking into account the real topography and the stratification deduced from seismic tomography. In these conditions, the effects expected by the dike, employed to model the 2001 eruption under simple elastic half-space medium conditions, were computed, showing that topography is extremely important, at least in the near field.

  14. seismic-py: Reading seismic data with Python

    Directory of Open Access Journals (Sweden)

    2008-08-01

    Full Text Available The field of seismic exploration of the Earth has changed
    dramatically over the last half a century. The Society of Exploration
    Geophysicists (SEG has worked to create standards to store the vast
    amounts of seismic data in a way that will be portable across computer
    architectures. However, it has been impossible to predict the needs of the
    immense range of seismic data acquisition systems. As a result, vendors have
    had to bend the rules to accommodate the needs of new instruments and
    experiment types. For low level access to seismic data, there is need for a
    standard open source library to allow access to a wide range of vendor data
    files that can handle all of the variations. A new seismic software package,
    seismic-py, provides an infrastructure for creating and managing drivers for
    each particular format. Drivers can be derived from one of the known formats
    and altered to handle any slight variations. Alternatively drivers can be
    developed from scratch for formats that are very different from any previously
    defined format. Python has been the key to making driver development easy
    and efficient to implement. The goal of seismic-py is to be the base system
    that will power a wide range of experimentation with seismic data and at the
    same time provide clear documentation for the historical record of seismic
    data formats.

  15. Imaging the Iceland Hotspot Track Beneath Greenland with Seismic Noise Correlations

    Science.gov (United States)

    Mordret, A.

    2017-12-01

    During the past 65 million years, the Greenland craton drifted over the Iceland hotspot; however, uncertainties in geodynamic modeling and a lack of geophysical evidence prevent an accurate reconstruction of the hotspot track. I image the Greenland lithosphere down to 300 km depth with seismic noise tomography. The hotspot track is observed as a linear high-velocity anomaly in the middle crust associated with magmatic intrusions. In the upper mantle, the remnant thermal signature of the hotspot manifests as low velocity and low viscosity bodies. This new detailed picture of the Greenland lithosphere will drive more accurate geodynamic reconstructions of tectonic plate motions and prediction of Greenland heat flow, which in turn will enable more precise estimations of the Greenland ice-sheet mass balance.

  16. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  17. New geological interpretation of multi-channel seismic profiles from the Pacific Margin of the Antarctic Peninsula

    Directory of Open Access Journals (Sweden)

    Okoń Jan

    2016-06-01

    Full Text Available The Polish Geophysical Expedition to West Antarctica in 1979–1980 was carried out by the Institute of Geophysics, Polish Academy of Sciences. Beside deep seismic soundings, 12 multi-channel seismic profiles, with a total length of ca 1000 km have been recorded north and east of the South Shetland Islands and in the Bransfield Strait, but they have never before been completely interpreted and published. All profiles have been processed with modern processing flow including time migration. Profiles crossing the South Shetland Trench revealed distinct reflector inside continental slope, which has been interpreted as border between buried accretionary prism and overlying slope sediments of glacial-marine origin. Profiles in the Bransfield Strait show traces of the Last Glacial Maximum (LGM in the form of glacial foreground valleys, with some of them used as weak spots for young age volcanic intrusions. This paper is the first comprehensive geological interpretation of collected dataset and differences between results from other expeditions are discussed.

  18. Intrusion problematic during water supply systems’ operation

    OpenAIRE

    Jesus Mora-Rodriguez, P. Amparo López-Jimenez, Helena M. Ramos

    2011-01-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuse...

  19. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection.

    Science.gov (United States)

    Hu, Weiming; Gao, Jun; Wang, Yanguo; Wu, Ou; Maybank, Stephen

    2014-01-01

    Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.

  20. Appraisal and control of sexual and non-sexual intrusive thoughts in university students.

    Science.gov (United States)

    Clark, D A; Purdon, C; Byers, E S

    2000-05-01

    This study examined differences in the appraisal and thought control strategies associated with the perceived control of unwanted sexual and non-sexual intrusive thoughts. Eleven appraisal dimensions, subjective physiological arousal and 10 thought control strategies were measured in 171 university students who were administered the Revised Obsessive Intrusions Inventory-Sex Version, a self-report measure of unwanted intrusive thoughts. Thought-action fusion (TAF) likelihood was a significant unique predictor of the perceived controllability of respondents' most upsetting sexual and non-sexual intrusive thought. Moreover greater subjective physiological arousal was a significant predictor of reduced control over sexual intrusions, whereas worry that one might act on an intrusive thought and greater effort to control the intrusion were significant unique predictors of the control of non-sexual intrusive thoughts. Various thought control strategies were more often used in response to non-sexual than sexual cognitions. The results are discussed in terms of the differential role of various appraisal processes in the control of unwanted sexual and non-sexual thoughts.

  1. Advanced LIGO: the next generation of gravitational wave detectors

    International Nuclear Information System (INIS)

    Harry, Gregory M

    2010-01-01

    The Advanced LIGO gravitational wave detectors are next generation instruments which will replace the existing initial LIGO detectors. They are currently being constructed and installed. Advanced LIGO strain sensitivity is designed to be about a factor 10 better than initial LIGO over a broad band and usable to 10 Hz, in contrast to 40 Hz for initial LIGO. This is expected to allow for detections and significant astrophysics in most categories of gravitational waves. To achieve this sensitivity, all hardware subsystems are being replaced with improvements. Designs and expected performance are presented for the seismic isolation, suspensions, optics and laser subsystems. Possible enhancements to Advanced LIGO, either to resolve problems that may arise and/or to allow for improved performance, are now being researched. Some of these enhancements are discussed along with some potential technology being considered for detectors beyond Advanced LIGO.

  2. Late Cretaceous sub-volcanic structure in the continental shelf off Portugal and its implications on tectonics and seismicity

    Science.gov (United States)

    Neres, Marta; Terrinha, Pedro; Custódio, Susana; Noiva, João; Brito, Pedro; Santos, Joana; Carrilho, Fernando

    2017-04-01

    Long-lasting and widespread alkaline magmatism is recognized in the west Portuguese margin. Offshore, several volcanic seamounts punctuate the Tore-Madeira Rise and the Estremadura Spur, with known ages between 80 and 100 Ma. Onshore, the major events are the Monchique (69-73 Ma), Sines (75-77 Ma) and Sintra (75-82 Ma) plutons - whose location (aligned along 200 km) and age discrepancy inspired some geodynamic models for Iberia during the Cretaceous - and the Lisbon Volcanic Complex (90-100 Ma). Structural links between them have been proposed but no direct evidence was yet found for it. In this work we present new magnetic data from recent marine magnetic surveys (ROCHEL and MINEPLAT project) conducted off the west Portuguese coast on the continental shelf and slope. A total area of about 3000 km2 between Sintra and Sines was surveyed with line spacing of 1 mile. Very high-resolution multi-channel seismic profiles were simultaneously acquired with the magnetics covering an area of 400 km2 off Sines. Two main primary outcomes arise from these data. On one hand, higher-resolution mapping in regions where magnetic anomalies were already known allows a better understanding of the buried sub-volcanic system. On the other hand, previously unknown NNW-SSE aligned magnetic anomalies were identified along the coast off Sines, possibly corresponding to buried Late Cretaceous alkaline magmatic intrusives. The presence of magmatic bodies was up to now unknown in this region, and these findings reignite the discussion about a structural link connecting the three main on land intrusive complexes, Sintra, Sines and Monchique. In addition to the structural control of the magmatic complexes, seismicity is also an issue as a cluster of seismicity coincident with the Monchique complex has long been known. Smaller clusters coincide with the magnetic anomalies mapped during the ROCHEL and MINEPLAT surveys, as well. We interpret these results in the light of the tectono-magmatism of

  3. Toddler inhibited temperament, maternal cortisol reactivity and embarrassment, and intrusive parenting.

    Science.gov (United States)

    Kiel, Elizabeth J; Buss, Kristin A

    2013-06-01

    The relevance of parenting behavior to toddlers' development necessitates a better understanding of the influences on parents during parent-child interactions. Toddlers' inhibited temperament may relate to parenting behaviors, such as intrusiveness, that predict outcomes later in childhood. The conditions under which inhibited temperament relates to intrusiveness, however, remain understudied. A multimethod approach would acknowledge that several levels of processes determine mothers' experiences during situations in which they witness their toddlers interacting with novelty. As such, the current study examined maternal cortisol reactivity and embarrassment about shyness as moderators of the relation between toddlers' inhibited temperament and maternal intrusive behavior. Participants included 92 24-month-old toddlers and their mothers. Toddlers' inhibited temperament and maternal intrusiveness were measured observationally in the laboratory. Mothers supplied saliva samples at the beginning of the laboratory visit and 20 minutes after observation. Maternal cortisol reactivity interacted with inhibited temperament in relation to intrusive behavior, such that mothers with higher levels of cortisol reactivity were observed to be more intrusive with more highly inhibited toddlers. Embarrassment related to intrusive behavior as a main effect. These results highlight the importance of considering child characteristics and psychobiological processes in relation to parenting behavior. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  4. Source characteristics and tectonic setting of mafic-ultramafic intrusions in North Xinjiang, NW China: Insights from the petrology and geochemistry of the Lubei mafic-ultramafic intrusion

    Science.gov (United States)

    Chen, Bao-Yun; Yu, Jin-Jie; Liu, Shuai-Jie

    2018-05-01

    The newly discovered Lubei sulfide-bearing mafic-ultramafic intrusion forms the western extension of the Huangshan-Jin'erquan mafic-ultramafic intrusion belt in East Tianshan, NW China. The Lubei intrusion comprises hornblende peridotite, lherzolite, and harzburgite in its southern portion, gabbro in its middle portion, and hornblende gabbro in its northern portion. Intrusive relationships indicate that three magma pulses were involved in the formation of the intrusion, and that they were likely evolved from a common primitive magma. Estimated compositions of the Lubei primitive magma are similar to those of island arc calc-alkaline basalt except for the low Na2O and CaO contents of the Lubei primitive magma. This paper reports on the mineral compositions, whole-rock major and trace element contents, and Rb-Sr and Sm-Nd isotopic compositions of the Lubei intrusion, and a zircon LA-MC-ICP-MS U-Pb age for hornblende gabbro. The Lubei intrusion is characterized by enrichment in large-ion lithophile elements, depletion in high-field-strength elements, and marked negative Nb and Ta anomalies, with enrichment in chondrite-normalized light rare earth elements. It exhibits low (87Sr/86Sr)i ratios of 0.70333-0.70636 and low (143Nd/144Nd)i ratios of 0.51214-0.51260, with positive εNd values of +4.01 to +6.33. LA-ICP-MS U-Pb zircon ages yielded a weighted-mean age of 287.9 ± 1.6 Ma for the Lubei intrusion. Contemporaneous mafic-ultramafic intrusions in different tectonic domains in North Xinjiang show similar geological and geochemical signatures to the Lubei intrusion, suggesting a source region of metasomatized mantle previously modified by hydrous fluids from the slab subducted beneath the North Xinjiang region in the early Permian. Metasomatism of the mantle was dominated by hydrous fluids and was related to subduction of the Paleo-Asian oceanic lithosphere during the Paleozoic. Sr-Nd-Pb isotopic compositions suggest that the mantle source was a mixture of depleted mid

  5. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS.

  6. Unique Challenges in WiFi Intrusion Detection

    OpenAIRE

    Milliken, Jonny

    2014-01-01

    The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more deta...

  7. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  8. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  9. Development of non-intrusive monitoring techniques - ESDRED and TEM projects at Mont Terri and the Grimsel test site

    International Nuclear Information System (INIS)

    Breen, B.; Johnson, M.; Frieg, B.; Blechschmidt, I.; Manukyan, E.; Marelli, S.; Maurer, H.R.

    2008-01-01

    The EC Integrated Project, IP ESDRED (Engineering Studies and Demonstration of Repository Designs) was commissioned to establish a sound technical basis for demonstrating the safety of disposing of spent fuel and long-lived radioactive wastes in deep geological formations and to underpin the development of a common European view on the main issues related to the management and disposal of radioactive waste. The in situ development of non-intrusive monitoring techniques is included within the programme as an important component of the overall ESDRED programme. Monitoring will play an important role in providing information to the repository operator and to society in general and to support decision-making about if and when, to move from one phase to the next. The challenges, when constructing engineered barrier systems (EBS) to isolate the waste, is the ability to monitor the waste and the barriers, once isolated. Conventional monitoring systems depend upon wires or cable s to transfer information from the monitoring sensors outside the barriers. Monitoring sensors also have a limited lifetime and new sensors cannot be emplaced without disturbing the barrier. The development of non-intrusive monitoring systems which do not rely upon 'hard-wired' connection, thus providing the opportunity for continued monitoring after isolation. The ESDRED partners developed a programme utilising cross-hole seismic tomography to monitor an experimental demonstration by Nagra at Mont Terri Underground Research Laboratory (URL). The work programme includes PhD studies to conduct full seismic waveform analysis and to develop algorithms to address natural anisotropy in the Opalinus clay at Mont Terri. Following on from the ESDRED developments, some of ESDRED partner organisations identified a further opportunity for developing in situ monitoring techniques utilising the construction and testing programme of a low pH shotcrete plug being constructed in granite at the Grimsel Test Site

  10. Ground magnetic studies along a regional seismic-reflection profile across Bare Mountain, Crater Flat and Yucca Mountain, Nevada

    International Nuclear Information System (INIS)

    Langenheim, V.E.; Ponce, D.A.

    1995-01-01

    Ground magnetic data were collected along a 26-km-long regional seismic-reflection profile in southwest Nevada that starts in the Amargosa Desert, crosses Bare Mountain, Crater Flat and Yucca Mountain, and ends in Midway Valley. Parallel ground magnetic profiles were also collected about 100 m to either side of the western half of the seismic-reflection line. The magnetic data indicate that the eastern half of Crater Flat is characterized by closely-spaced faulting (1--2 km) in contrast to the western half of Crater Flat. Modeling of the data indicates that the Topopah Spring Tuff is offset about 250 m on the Solitario Canyon fault and about 50 m on the Ghost Dance fault. These estimates of fault offset are consistent with seismic-reflection data and geologic mapping. A broad magnetic high of about 500--600 nT is centered over Crater Flat. Modeling of the magnetic data indicates that the source of this high is not thickening and doming of the Bullfrog Tuff, but more likely lies below the Bullfrog Tuff. Possible source lithologies for this magnetic high include altered argillite of the Eleana Formation, Cretaceous or Tertiary intrusions, and mafic sills

  11. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...... the intersection of IDSs and blockchains. In particular, we introduce the background of intrusion detection and blockchain, discuss the applicability of blockchain to intrusion detection, and identify open challenges in this direction....

  12. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M.; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N.; Mazzoni, Elvis; Pappas, Ilias O.; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M. S.; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS. PMID:27994566

  13. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Directory of Open Access Journals (Sweden)

    Agata Błachnio

    2016-12-01

    Full Text Available The increase in the number of users of social networking sites has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2,628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Measure, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively and low context (positively; of the personality variables, conscientiousness and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of social networking sites (SNS.

  14. Study on structural seismic margin and probabilistic seismic risk. Development of a structural capacity-seismic risk diagram

    International Nuclear Information System (INIS)

    Nakajima, Masato; Ohtori, Yasuki; Hirata, Kazuta

    2010-01-01

    Seismic margin is extremely important index and information when we evaluate and account seismic safety of critical structures, systems and components quantitatively. Therefore, it is required that electric power companies evaluate the seismic margin of each plant in back-check of nuclear power plants in Japan. The seismic margin of structures is usually defined as a structural capacity margin corresponding to design earthquake ground motion. However, there is little agreement as to the definition of the seismic margin and we have no knowledge about a relationship between the seismic margin and seismic risk (annual failure probability) which is obtained in PSA (Probabilistic Safety Assessment). The purpose of this report is to discuss a definition of structural seismic margin and to develop a diagram which can identify a relation between seismic margin and seismic risk. The main results of this paper are described as follows: (1) We develop seismic margin which is defined based on the fact that intensity of earthquake ground motion is more appropriate than the conventional definition (i.e., the response-based seismic margin) for the following reasons: -seismic margin based on earthquake ground motion is invariant where different typed structures are considered, -stakeholders can understand the seismic margin based on the earthquake ground motion better than the response-based one. (2) The developed seismic margin-risk diagram facilitates us to judge easily whether we need to perform detailed probabilistic risk analysis or only deterministic analysis, given that the reference risk level although information on the uncertainty parameter beta is not obtained. (3) We have performed numerical simulations based on the developed method for four sites in Japan. The structural capacity-risk diagram differs depending on each location because the diagram is greatly influenced by seismic hazard information for a target site. Furthermore, the required structural capacity

  15. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor .... and after amplification is finally read by a digital multimeter (Fluke make: 179 true ... To study the response of the present FO refractometer, propylene glycol has been ... values of all the samples were initially measured by Abbe's refractometer.

  16. U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland

    DEFF Research Database (Denmark)

    Þórarinsson, Sigurjón Böðvar; Holm, Paul Martin; Tappe, Sebatstian

    2016-01-01

    Several major tholeiitic (e.g. the Skaergaard intrusion) and alkaline (e.g. the Kangerlussuaq Syenite) intrusive complexes of the North Atlantic Large Igneous Province are exposed along the Kangerlussuaq Fjord in East Greenland. The Kærven Complex forms a satellite intrusion to the Kangerlussuaq ...

  17. Seismic Ecology

    Science.gov (United States)

    Seleznev, V. S.; Soloviev, V. M.; Emanov, A. F.

    The paper is devoted to researches of influence of seismic actions for industrial and civil buildings and people. The seismic actions bring influence directly on the people (vibration actions, force shocks at earthquakes) or indirectly through various build- ings and the constructions and can be strong (be felt by people) and weak (be fixed by sensing devices). The great number of work is devoted to influence of violent seismic actions (first of all of earthquakes) on people and various constructions. This work is devoted to study weak, but long seismic actions on various buildings and people. There is a need to take into account seismic oscillations, acting on the territory, at construction of various buildings on urbanized territories. Essential influence, except for violent earthquakes, man-caused seismic actions: the explosions, seismic noise, emitted by plant facilities and moving transport, radiation from high-rise buildings and constructions under action of a wind, etc. can exert. Materials on increase of man- caused seismicity in a number of regions in Russia, which earlier were not seismic, are presented in the paper. Along with maps of seismic microzoning maps to be built indicating a variation of amplitude spectra of seismic noise within day, months, years. The presence of an information about amplitudes and frequencies of oscillations from possible earthquakes and man-caused oscillations in concrete regions allows carry- ing out soundly designing and construction of industrial and civil housing projects. The construction of buildings even in not seismically dangerous regions, which have one from resonance frequencies coincident on magnitude to frequency of oscillations, emitted in this place by man-caused objects, can end in failure of these buildings and heaviest consequences for the people. The practical examples of detail of engineering- seismological investigation of large industrial and civil housing projects of Siberia territory (hydro power

  18. A survey of intrusion detection techniques in Cloud

    OpenAIRE

    Modi, C.; Patel, D.; Patel, H.; Borisaniya, B.; Patel, A.; Rajarajan, M.

    2013-01-01

    Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and...

  19. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  20. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  1. Association between intrusive negative autobiographical memories and depression: A meta-analytic investigation.

    Science.gov (United States)

    Mihailova, Stella; Jobson, Laura

    2018-02-23

    The study investigated several associations between depression and intrusive negative autobiographical memories. A systematic literature search identified 23 eligible studies (N = 2,582), which provided 59 effect sizes. Separate meta-analyses indicated that depression was moderately, positively associated with intrusive memory frequency, memory distress, maladaptive memory appraisals, memory avoidance, and memory rumination. Intrusive memory vividness was not significantly associated with depression. There were insufficient data to examine the relationship between depression and memory vantage perspective. Between-study heterogeneity was high for intrusive memory frequency and memory avoidance, and the percentage of females in studies significantly moderated the relationship between these variables and depression. An additional exploratory meta-analysis (3 studies; N = 257) indicated that intrusive memories were experienced more frequently by those with posttraumatic stress disorder than those with depression. Overall, the findings suggest that intrusive memories warrant clinical attention as they may contribute to the maintenance of depressive symptomatology. Copyright © 2018 John Wiley & Sons, Ltd.

  2. Intensively exploited Mediterranean aquifers: resilience and proximity to critical points of seawater intrusion

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2013-11-01

    We investigate here seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta Aquifer, the Israel Coastal Aquifer and the Cyprus Akrotiri Aquifer. Using a generalized analytical sharp-interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future sea intrusion forcings. We identify two different critical limits of sea intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete sea intrusion upto the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that sea intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that the advance of seawater currently seriously threatens the Nile Delta Aquifer and the Israel Coastal Aquifer. The Cyprus Akrotiri Aquifer is currently somewhat less threatened by increased seawater intrusion.

  3. Intensively exploited Mediterranean aquifers: resilience to seawater intrusion and proximity to critical thresholds

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2014-05-01

    We investigate seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta, Israel Coastal and Cyprus Akrotiri aquifers. Using a generalized analytical sharp interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future seawater intrusion forcings. We identify two different critical limits of seawater intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete seawater intrusion up to the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that seawater intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that (a) the intruding seawater currently seriously threatens the Nile Delta aquifer, (b) in the Israel Coastal aquifer the sharp interface toe approaches the well location and (c) the Cyprus Akrotiri aquifer is currently somewhat less threatened by increased seawater intrusion.

  4. Suspension-thermal noise in spring–antispring systems for future gravitational-wave detectors

    Science.gov (United States)

    Harms, Jan; Mow-Lowry, Conor M.

    2018-01-01

    Spring–antispring systems have been investigated in the context of low-frequency seismic isolation in high-precision optical experiments. These systems provide the possibility to tune the fundamental resonance frequency to, in principle, arbitrarily low values, and at the same time maintain a compact design. It was argued though that thermal noise in spring–antispring systems would not be as small as one may naively expect from lowering the fundamental resonance frequency. In this paper, we present calculations of suspension-thermal noise for spring–antispring systems potentially relevant in future gravitational-wave detectors, i.e. the beam-balance tiltmeter, and the Roberts linkage. We find a concise expression of the suspension-thermal noise spectrum, which assumes a form very similar to the well-known expression for a simple pendulum. For systems such as the Roberts linkage foreseen as passive seismic isolation, we find that while they can provide strong seismic isolation due to a very low fundamental resonance frequency, their thermal noise is determined by the dimension of the system and is insensitive to fine-tunings of the geometry that can strongly influence the resonance frequency. By analogy, i.e. formal similarity of the equations of motion, this is true for all horizontal mechanical isolation systems with spring–antispring dynamics. This imposes strict requirements on mechanical spring–antispring systems for seismic isolation in potential future low-frequency gravitational-wave detectors as we discuss for the four main concepts, atom-interferometric, superconducting, torsion-bars, and conventional laser interferometer, and generally suggests that thermal noise needs to be evaluated carefully for high-precision experiments implementing spring–antispring dynamics.

  5. A new seismic station in Romania the Bucovina seismic array

    International Nuclear Information System (INIS)

    Grigore, Adrian; Grecu, Bogdan; Ionescu, Constantin; Ghica, Daniela; Popa, Mihaela; Rizescu, Mihaela

    2002-01-01

    Recently, a new seismic monitoring station, the Bucovina Seismic Array, has been established in the northern part of Romania, in a joint effort of the Air Force Technical Applications Center, USA, and the National Institute for Earth Physics, Romania. The array consists of 10 seismic sensors (9 short-period and one broad band) located in boreholes and distributed in a 5 x 5 km area. On July 24, 2002 the official Opening Ceremony of Bucovina Seismic Array took place in the area near the city of Campulung Moldovenesc in the presence of Romanian Prime Minister, Adrian Nastase. Starting with this date, the new seismic monitoring system became fully operational by continuous recording and transmitting data in real-time to the National Data Center of Romania, in Bucharest and to the National Data Center of USA, in Florida. Bucovina Seismic Array, added to the present Seismic Network, will provide much better seismic monitoring coverage of Romania's territory, on-scale recording for weak-to-strong events, and will contribute to advanced seismological studies on seismic hazard and risk, local effects and microzonation, seismic source physics, Earth structure. (authors)

  6. The 2017 Maple Creek Seismic Swarm in Yellowstone National Park

    Science.gov (United States)

    Pang, G.; Hale, J. M.; Farrell, J.; Burlacu, R.; Koper, K. D.; Smith, R. B.

    2017-12-01

    The University of Utah Seismograph Stations (UUSS) performs near-real-time monitoring of seismicity in the region around Yellowstone National Park in partnership with the United States Geological Survey and the National Park Service. UUSS operates and maintains 29 seismic stations with network code WY (short-period, strong-motion, and broadband) and records data from five other seismic networks—IW, MB, PB, TA, and US—to enhance the location capabilities in the Yellowstone region. A seismic catalog is produced using a conventional STA/LTA detector and single-event location techniques (Hypoinverse). On June 12, 2017, a seismic swarm began in Yellowstone National Park about 5 km east of Hebgen Lake. The swarm is adjacent to the source region of the 1959 MW 7.3 Hebgen Lake earthquake, in an area corresponding to positive Coulumb stress change from that event. As of Aug. 1, 2017, the swarm consists of 1481 earthquakes with 1 earthquake above magnitude 4, 8 earthquakes in the magnitude 3 range, 115 earthquakes in the magnitude 2 range, 469 earthquakes in the magnitude 1 range, 856 earthquakes in the magnitude 0 range, 22 earthquakes with negative magnitudes, and 10 earthquakes with no magnitude. Earthquake depths are mostly between 3 and 10 km and earthquake depth increases toward the northwest. Moment tensors for the 2 largest events (3.6 MW and 4.4. MW) show strike-slip faulting with T axes oriented NE-SW, consistent with the regional stress field. We are currently using waveform cross-correlation methods to measure differential travel times that are being used with the GrowClust program to generate high-accuracy relative relocations. Those locations will be used to identify structures in the seismicity and make inferences about the tectonic and magmatic processes causing the swarm.

  7. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  8. Multisensor Fusion for Intrusion Detection and Situational Awareness

    OpenAIRE

    Hallstensen, Christoffer V

    2017-01-01

    Cybercrime damage costs the world several trillion dollars annually. And al-though technical solutions to protect organizations from hackers are being con-tinuously developed, criminals learn fast to circumvent them. The question is,therefore, how to create leverage to protect an organization by improving in-trusion detection and situational awareness? This thesis seeks to contribute tothe prior art in intrusion detection and situational awareness by using a multi-sensor data fusion...

  9. When Intrusion Detection Meets Blockchain Technology: A Review

    OpenAIRE

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju; Wang, Yu; Han, Jinguang

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness ...

  10. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes

    Science.gov (United States)

    L., Passarelli; E., Rivalta; A., Shuler

    2014-01-01

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process. PMID:24469260

  11. Automatic picking of direct P, S seismic phases and fault zone head waves

    Science.gov (United States)

    Ross, Z. E.; Ben-Zion, Y.

    2014-10-01

    We develop a set of algorithms for automatic detection and picking of direct P and S waves, as well as fault zone head waves (FZHW), generated by earthquakes on faults that separate different lithologies and recorded by local seismic networks. The S-wave picks are performed using polarization analysis and related filters to remove P-wave energy from the seismograms, and utilize STA/LTA and kurtosis detectors in tandem to lock on the phase arrival. The early portions of P waveforms are processed with STA/LTA, kurtosis and skewness detectors for possible first-arriving FZHW. Identification and picking of direct P and FZHW is performed by a multistage algorithm that accounts for basic characteristics (motion polarities, time difference, sharpness and amplitudes) of the two phases. The algorithm is shown to perform well on synthetic seismograms produced by a model with a velocity contrast across the fault, and observed data generated by earthquakes along the Parkfield section of the San Andreas fault and the Hayward fault. The developed techniques can be used for systematic processing of large seismic waveform data sets recorded near major faults.

  12. Seismic and potential field studies over the East Midlands

    Science.gov (United States)

    Kirk, Wayne John

    A seismic refraction profile was undertaken to investigate the source of an aeromagnetic anomaly located above the Widmerpool Gulf, East Midlands. Ten shots were fired into 51 stations at c. 1.5km spacing in a 70km profile during 41 days recording. The refraction data were processed using standard techniques to improve the data quality. A new filtering technique, known as Correlated Adaptive Noise Cancellation was tested on synthetic data and successfully applied to controlled source and quarry blast data. Study of strong motion data reveals that the previous method of site calibration is invalid. A new calibration technique, known as the Scaled Amplitude method is presented to provide safer charge size estimation. Raytrace modelling of the refraction data and two dimensional gravity interpretation confirms the presence of the Widmerpool Gulf but no support is found for the postulated intrusion. Two dimensional magnetic interpretation revealed that the aeromagnetic anomaly could be modelled with a Carboniferous igneous source. A Lower Palaeozoic refractor with a velocity of 6.0 km/s is identified at a maximum depth of c. 2.85km beneath the Widmerpool Gulf. Carboniferous and post-Carboniferous sediments within the gulf have velocities between 2.6-5.5 km/s with a strong vertical gradient. At the gulf margins, a refractor with a constant velocity of 5.2 km/s is identified as Dinantian limestone. A low velocity layer of proposed unaltered Lower Palaeozoics is identified beneath the limestone at the eastern edge of the Derbyshire Dome. The existence and areal extent of this layer are also determined from seismic reflection data. Image analysis of potential field data, presents a model identifying 3 structural provinces, the Midlands Microcraton, the Welsh and English Caledonides and a central region of complex linears. This model is used to explain the distribution of basement rocks determined from seismic and gravity profiles.

  13. The Seismic Analyzer: Interpreting and Illustrating 2D Seismic Data

    OpenAIRE

    Patel, Daniel; Giertsen, Christopher; Thurmond, John; Gjelberg, John; Gröller, Eduard

    2008-01-01

    We present a toolbox for quickly interpreting and illustrating 2D slices of seismic volumetric reflection data. Searching for oil and gas involves creating a structural overview of seismic reflection data to identify hydrocarbon reservoirs. We improve the search of seismic structures by precalculating the horizon structures of the seismic data prior to interpretation. We improve the annotation of seismic structures by applying novel illustrative rendering algorithms tailored to seism...

  14. Data Fusion for Network Intrusion Detection: A Review

    Directory of Open Access Journals (Sweden)

    Guoquan Li

    2018-01-01

    Full Text Available Rapid progress of networking technologies leads to an exponential growth in the number of unauthorized or malicious network actions. As a component of defense-in-depth, Network Intrusion Detection System (NIDS has been expected to detect malicious behaviors. Currently, NIDSs are implemented by various classification techniques, but these techniques are not advanced enough to accurately detect complex or synthetic attacks, especially in the situation of facing massive high-dimensional data. Besides, the inherent defects of NIDSs, namely, high false alarm rate and low detection rate, have not been effectively solved. In order to solve these problems, data fusion (DF has been applied into network intrusion detection and has achieved good results. However, the literature still lacks thorough analysis and evaluation on data fusion techniques in the field of intrusion detection. Therefore, it is necessary to conduct a comprehensive review on them. In this article, we focus on DF techniques for network intrusion detection and propose a specific definition to describe it. We review the recent advances of DF techniques and propose a series of criteria to compare their performance. Finally, based on the results of the literature review, a number of open issues and future research directions are proposed at the end of this work.

  15. Efficient cooling of rocky planets by intrusive magmatism

    Science.gov (United States)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  16. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  17. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  18. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  19. Conjunctive Management of Multi-Aquifer System for Saltwater Intrusion Mitigation

    Science.gov (United States)

    Tsai, F. T. C.; Pham, H. V.

    2015-12-01

    Due to excessive groundwater withdrawals, many water wells in Baton Rouge, Louisiana experience undesirable chloride concentration because of saltwater intrusion. The study goal is to develop a conjunctive management framework that takes advantage of the Baton Rouge multi-aquifer system to mitigate saltwater intrusion. The conjunctive management framework utilizes several hydraulic control techniques to mitigate saltwater encroachment. These hydraulic control approaches include pumping well relocation, freshwater injection, saltwater scavenging, and their combinations. Specific objectives of the study are: (1) constructing scientific geologic architectures of the "800-foot" sand, the "1,000-foot" sand, the "1,200-foot" sand, the "1,500-foot" sand, the "1,700-foot" sand, and the "2,000-foot" sand, (2) developing scientific saltwater intrusion models for these sands. (3) using connector wells to draw native groundwater from one sand and inject to another sand to create hydraulic barriers to halt saltwater intrusion, (4) using scavenger wells or well couples to impede saltwater intrusion progress and reduce chloride concentration in pumping wells, and (5) reducing cones of depression by relocating and dispersing pumping wells to different sands. The study utilizes optimization techniques and newest LSU high performance computing (HPC) facilities to derive solutions. The conjunctive management framework serves as a scientific tool to assist policy makers to solve the urgent saltwater encroachment issue in the Baton Rouge area. The research results will help water companies as well as industries in East Baton Rouge Parish and neighboring parishes by reducing their saltwater intrusion threats, which in turn would sustain Capital Area economic development.

  20. Caltech/USGS Southern California Seismic Network: Recent Developments

    Science.gov (United States)

    Bhadha, R.; Chen, S.; Crummey, J.; Hauksson, E.; Solanki, K.; Thomas, V. I.; Watkins, M.; Yip, R.; Yu, E.; Given, D.; Peats, R.; Schwarz, S.

    2010-12-01

    power spectral density (PSDs) in PQLX and XMax for seismic data quality assurance; 6) Development of memory-based and disk-based waveform servers that acquire seismic data via multicast; 7) Updates to the alarm processing configuration of our real-time and post-processing systems; 8) Development of metrics for tracking overall system performance; 9) Tightening our computing and network environment to prevent security intrusions. Some of these efforts were under way before the 4 April 2010 El Mayor - Cucapah Mw 7.2 earthquake sequence which allowed us to test the effectiveness of our improvements and motivated further enhancements. We found generally that the upgraded system handled the increased load but additional needs should be addressed for the system to weather an earthquake sequence within the network of similar or greater magnitude.

  1. Seismic Microzonation for Refinement of Seismic Load Parameters

    Energy Technology Data Exchange (ETDEWEB)

    Savich, A. I.; Bugaevskii, A. G., E-mail: office@geodyn.ru, E-mail: bugaevskiy@geodyn.ru [Center of the Office of Geodynamic Observations in the Power Sector, an affiliate of JSC “Institut Gidroproekt” (Russian Federation)

    2016-05-15

    Functional dependencies are established for the characteristics of seismic transients recorded at various points of a studied site, which are used to propose a new approach to seismic microzonation (SMZ) that enables the creation of new SMZ maps of strong seismic motion, with due regard for dynamic parameters of recorded transients during weak earthquakes.

  2. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  3. The seismic analyzer: interpreting and illustrating 2D seismic data.

    Science.gov (United States)

    Patel, Daniel; Giertsen, Christopher; Thurmond, John; Gjelberg, John; Gröller, M Eduard

    2008-01-01

    We present a toolbox for quickly interpreting and illustrating 2D slices of seismic volumetric reflection data. Searching for oil and gas involves creating a structural overview of seismic reflection data to identify hydrocarbon reservoirs. We improve the search of seismic structures by precalculating the horizon structures of the seismic data prior to interpretation. We improve the annotation of seismic structures by applying novel illustrative rendering algorithms tailored to seismic data, such as deformed texturing and line and texture transfer functions. The illustrative rendering results in multi-attribute and scale invariant visualizations where features are represented clearly in both highly zoomed in and zoomed out views. Thumbnail views in combination with interactive appearance control allows for a quick overview of the data before detailed interpretation takes place. These techniques help reduce the work of seismic illustrators and interpreters.

  4. Study of variations of radon emanations from soil in Morocco using solid state nuclear track detectors. Correlations with atmospheric parameters and seismic activities

    International Nuclear Information System (INIS)

    Boukhal, H.

    1993-01-01

    This study investigates the quantity variations of radon emanating from soil in accordance with time. It aims to verify the possibility of the radon sign use in earthquake prediction. Regular measures of radon concentration in soil have been carried out over the two years 1991 and 1992 in five towns of Morocco: Rabat, Tetouan, Ifrane and Khouribga, and in geophysic observatory of Ibn Rochd (Berchid region). The measuring method is based on the solid state nuclear track detectors technique. The obtained results have shown an influence of the atmospheric effects on the radon emanation. The experiment proved that, on one hand, the variations of the aforesaid influence are correlated to variations of the pluviometry and the atmospheric temperature and, on the other hand, there is no notable effect of atmospheric pressure or atmospheric humidity. The good correlations between the different seismic activities and the variations of radon emanation rate in the five measurement stations, have shown the interest of radon use in the earthquake prediction field. 81 refs., 100 figs., 17 tabs.(F. M.)

  5. Seismicity and seismic monitoring in the Asse salt mine

    International Nuclear Information System (INIS)

    Flach, D.; Gommlich, G.; Hente, B.

    1987-01-01

    Seismicity analyses are made in order to assess the safety of candidate sites for ultimate disposal of hazardous wastes. The report in hand reviews the seismicity history of the Asse salt mine and presents recent results of a measuring campaign made in the area. The monitoring network installed at the site supplies data and information on the regional seismicity, on seismic amplitudes under ground and above ground, and on microseismic activities. (DG) [de

  6. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  7. Seismic swarm associated with the 2008 eruption of Kasatochi Volcano, Alaska: earthquake locations and source parameters

    Science.gov (United States)

    Ruppert, Natalia G.; Prejean, Stephanie G.; Hansen, Roger A.

    2011-01-01

    An energetic seismic swarm accompanied an eruption of Kasatochi Volcano in the central Aleutian volcanic arc in August of 2008. In retrospect, the first earthquakes in the swarm were detected about 1 month prior to the eruption onset. Activity in the swarm quickly intensified less than 48 h prior to the first large explosion and subsequently subsided with decline of eruptive activity. The largest earthquake measured as moment magnitude 5.8, and a dozen additional earthquakes were larger than magnitude 4. The swarm exhibited both tectonic and volcanic characteristics. Its shear failure earthquake features were b value = 0.9, most earthquakes with impulsive P and S arrivals and higher-frequency content, and earthquake faulting parameters consistent with regional tectonic stresses. Its volcanic or fluid-influenced seismicity features were volcanic tremor, large CLVD components in moment tensor solutions, and increasing magnitudes with time. Earthquake location tests suggest that the earthquakes occurred in a distributed volume elongated in the NS direction either directly under the volcano or within 5-10 km south of it. Following the MW 5.8 event, earthquakes occurred in a new crustal volume slightly east and north of the previous earthquakes. The central Aleutian Arc is a tectonically active region with seismicity occurring in the crusts of the Pacific and North American plates in addition to interplate events. We postulate that the Kasatochi seismic swarm was a manifestation of the complex interaction of tectonic and magmatic processes in the Earth's crust. Although magmatic intrusion triggered the earthquakes in the swarm, the earthquakes failed in context of the regional stress field.

  8. Monitoring changes in seismic velocity related to an ongoing rapid inflation event at Okmok volcano, Alaska

    Science.gov (United States)

    Bennington, Ninfa; Haney, Matt; De Angelis, Silvio; Thurber, Clifford; Freymueller, Jeff

    2015-01-01

    Okmok is one of the most active volcanoes in the Aleutian Arc. In an effort to improve our ability to detect precursory activity leading to eruption at Okmok, we monitor a recent, and possibly ongoing, GPS-inferred rapid inflation event at the volcano using ambient noise interferometry (ANI). Applying this method, we identify changes in seismic velocity outside of Okmok’s caldera, which are related to the hydrologic cycle. Within the caldera, we observe decreases in seismic velocity that are associated with the GPS-inferred rapid inflation event. We also determine temporal changes in waveform decorrelation and show a continual increase in decorrelation rate over the time associated with the rapid inflation event. Themagnitude of relative velocity decreases and decorrelation rate increases are comparable to previous studies at Piton de la Fournaise that associate such changes with increased production of volatiles and/ormagmatic intrusion within the magma reservoir and associated opening of fractures and/or fissures. Notably, the largest decrease in relative velocity occurs along the intrastation path passing nearest to the center of the caldera. This observation, along with equal amplitude relative velocity decreases revealed via analysis of intracaldera autocorrelations, suggests that the inflation sourcemay be located approximately within the center of the caldera and represent recharge of shallow magma storage in this location. Importantly, there is a relative absence of seismicity associated with this and previous rapid inflation events at Okmok. Thus, these ANI results are the first seismic evidence of such rapid inflation at the volcano.

  9. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  10. German seismic regulations

    International Nuclear Information System (INIS)

    Danisch, Ruediger

    2002-01-01

    Rules and regulations for seismic design in Germany cover the following: seismic design of conventional buildings; and seismic design of nuclear facilities. Safety criteria for NPPs, accident guidelines, and guidelines for PWRs as well as safety standards are cited. Safety standards concerned with NPPs seismic design include basic principles, soil analysis, design of building structures, design of mechanical and electrical components, seismic instrumentation, and measures to be undertaken after the earthquake

  11. Review on assessment methodology for human intrusion into a repository for radioactive waste

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility

  12. Review on assessment methodology for human intrusion into a repository for radioactive waste

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-09-15

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility.

  13. Establishing seismic design criteria to achieve an acceptable seismic margin

    International Nuclear Information System (INIS)

    Kennedy, R.P.

    1997-01-01

    In order to develop a risk based seismic design criteria the following four issues must be addressed: (1) What target annual probability of seismic induced unacceptable performance is acceptable? (2). What minimum seismic margin is acceptable? (3) Given the decisions made under Issues 1 and 2, at what annual frequency of exceedance should the Safe Shutdown Earthquake ground motion be defined? (4) What seismic design criteria should be established to reasonably achieve the seismic margin defined under Issue 2? The first issue is purely a policy decision and is not addressed in this paper. Each of the other three issues are addressed. Issues 2 and 3 are integrally tied together so that a very large number of possible combinations of responses to these two issues can be used to achieve the target goal defined under Issue 1. Section 2 lays out a combined approach to these two issues and presents three potentially attractive combined resolutions of these two issues which reasonably achieves the target goal. The remainder of the paper discusses an approach which can be used to develop seismic design criteria aimed at achieving the desired seismic margin defined in resolution of Issue 2. Suggestions for revising existing seismic design criteria to more consistently achieve the desired seismic margin are presented

  14. Seismic capacity of a reinforced concrete frame structure without seismic detailing and limited ductility seismic design in moderate seismicity

    International Nuclear Information System (INIS)

    Kim, J. K.; Kim, I. H.

    1999-01-01

    A four-story reinforced concrete frame building model is designed for the gravity loads only. Static nonlinear pushover analyses are performed in two orthogonal horizontal directions. The overall capacity curves are converted into ADRS spectra and compared with demand spectra. At several points the deformed shape, moment and shear distribution are calculated. Based on these results limited ductility seismic design concept is proposed as an alternative seismic design approach in moderate seismicity resign

  15. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  16. Borehole Muon Detector Development

    Science.gov (United States)

    Bonneville, A.; Flygare, J.; Kouzes, R.; Lintereur, A.; Yamaoka, J. A. K.; Varner, G. S.

    2015-12-01

    Increasing atmospheric CO2 concentrations have spurred investigation into carbon sequestration methods. One of the possibilities being considered, storing super-critical CO2 in underground reservoirs, has drawn more attention and pilot projects are being supported worldwide. Monitoring of the post-injection fate of CO2 is of utmost importance. Generally, monitoring options are active methods, such as 4D seismic reflection or pressure measurements in monitoring wells. We propose here to develop a 4-D density tomography of subsurface CO2 reservoirs using cosmic-ray muon detectors deployed in a borehole. Muon detection is a relatively mature field of particle physics and there are many muon detector designs, though most are quite large and not designed for subsurface measurements. The primary technical challenge preventing deployment of this technology in the subsurface is the lack of miniaturized muon-tracking detectors capable of fitting in standard boreholes and that will resist the harsh underground conditions. A detector with these capabilities is being developed by a collaboration supported by the U.S. Department of Energy. Current simulations based on a Monte Carlo modeling code predict that the incoming muon angle can be resolved with an error of approximately two degrees, using either underground or sea level spectra. The robustness of the design comes primarily from the use of scintillating rods as opposed to drift tubes. The rods are arrayed in alternating layers to provide a coordinate scheme. Preliminary testing and measurements are currently being performed to test and enhance the performance of the scintillating rods, in both a laboratory and a shallow underground facility. The simulation predictions and data from the experiments will be presented.

  17. Protection of High Ceiling Nuclear Facilities Using Photoelectric Sensors and Infrared Fire Detectors

    International Nuclear Information System (INIS)

    Wadoud, A.A.; El Eissawi, H.M.; Saleh, A.A.

    2017-01-01

    A variety of different security systems and components are commercially available and widely used. Before implementing a security system, it is important to understand the characteristics and requirements of the facility area to be protected. Technology and manufacturers of security devices are rapidly changing. It is necessary to use optimal security equipment suitable for the surrounding environment of the facility to be protected. Several security sensors can be used to protect the nuclear facilities, such as passive infrared detectors and glass breakage sensors, vibration detectors, and microwave sensors. This work introduces technical specifications, operation and method of installation for these detectors in nuclear facilities. Also a comparative study of different security sensors or equipment is provided. The photoelectric detectors and infrared fire beam smoke detectors are reliable, suitable and advanced security equipment. They can be used in special cases because of their advantages, this includes their long ranges and accuracy in performance. This paper presents a new concept for adapting the use infrared optical fire beam smoke detector as intrusion detection equipment in high ceiling buildings or towering height facilities. This is in addition to their main function, namely fire detection.The paper also provides a study for their types and installation method. Focus is made on the installation and operation method for two advanced security systems, and wireless control circuit for the overall system operation

  18. Burar seismic station: evaluation of seismic performance

    International Nuclear Information System (INIS)

    Ghica, Daniela; Popa, Mihaela

    2005-01-01

    A new seismic monitoring system, the Bucovina Seismic Array (BURAR), has been established since July 2002, in the Northern part of Romania, in a joint effort of the Air Force Technical Applications Center, USA, and the National Institute for Earth Physics (NIEP), Romania. The small-aperture array consists of 10 seismic sensors (9 vertical short-period and one three-component broad band) located in boreholes and distributed in a 5 x 5 km 2 area. At present, the seismic data are continuously recorded by the BURAR and transmitted in real-time to the Romanian National Data Center in Bucharest and National Data Center of the USA, in Florida. Based on the BURAR seismic information gathered at the National Data Center, NIEP (ROM N DC), in the August 2002 - December 2004 time interval, analysis and statistical assessments were performed. Following the preliminary processing of the data, several observations on the global performance of the BURAR system were emphasized. Data investigation showed an excellent efficiency of the BURAR system particularly in detecting teleseismic and regional events. Also, a statistical analysis for the BURAR detection capability of the local Vrancea events was performed in terms of depth and magnitude for the year 2004. The high signal detection capability of the BURAR resulted, generally, in improving the location solutions for the Vrancea seismic events. The location solution accuracy is enhanced when adding BURAR recordings, especially in the case of low magnitude events (recorded by few stations). The location accuracy is increased, both in terms of constraining hypocenter depth and epicentral coordinates. Our analysis certifies the importance of the BURAR system in NIEP efforts to elaborate seismic bulletins. Furthermore, the specific procedures for array data processing (beam forming, f-k analysis) increase significantly the signal-to-noise ratio by summing up the coherent signals from the array components, and ensure a better accuracy

  19. Computational neural network regression model for Host based Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Gautam

    2016-09-01

    Full Text Available The current scenario of information gathering and storing in secure system is a challenging task due to increasing cyber-attacks. There exists computational neural network techniques designed for intrusion detection system, which provide security to single machine and entire network's machine. In this paper, we have used two types of computational neural network models, namely, Generalized Regression Neural Network (GRNN model and Multilayer Perceptron Neural Network (MPNN model for Host based Intrusion Detection System using log files that are generated by a single personal computer. The simulation results show correctly classified percentage of normal and abnormal (intrusion class using confusion matrix. On the basis of results and discussion, we found that the Host based Intrusion Systems Model (HISM significantly improved the detection accuracy while retaining minimum false alarm rate.

  20. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  1. Ambient noise tomography across Mount St. Helens using a dense seismic array

    KAUST Repository

    Wang, Yadong

    2017-05-08

    We investigated upper crustal structure with data from a dense seismic array deployed around Mount St. Helens for 2 weeks in the summer of 2014. Interstation cross correlations of ambient seismic noise data from the array were obtained, and clear fundamental mode Rayleigh waves were observed between 2.5 and 5 s periods. In addition, higher-mode signals were observed around 2 s period. Frequency-time analysis was applied to measure fundamental mode Rayleigh wave phase velocities, which were used to invert for 2-D phase velocity maps. An azimuth-dependent traveltime correction was implemented to mitigate potential biases introduced due to an inhomogeneous noise source distribution. Reliable phase velocity maps were only obtained between 3 and 4 s periods due to limitations imposed by the array aperture and higher-mode contamination. The phase velocity tomography results, which are sensitive to structure shallower than 6 km depth, reveal an ~10–15% low-velocity anomaly centered beneath the volcanic edifice and peripheral high-velocity anomalies that likely correspond to cooled igneous intrusions. We suggest that the low-velocity anomaly reflects the high-porosity mixture of lava and ash deposits near the surface of the edifice, a highly fractured magmatic conduit and hydrothermal system beneath the volcano, and possibly a small contribution from silicate melt.

  2. Intrusion mechanics according to Burstone with the NiTi-SE-steel uprighting spring.

    Science.gov (United States)

    Sander, F G; Wichelhaus, A; Schiemann, C

    1996-08-01

    Intrusion mechanics according to Burstone can be regarded as a practicable method for the intrusion of incisors. 1. By applying the NiTi-SE-steel uprighting spring, relatively constant forces can be exerted over a large range of intrusion on both sides of the anterior tooth archwire. 2. By bending a 150 degrees tip-back bend or a curvature into the steel portion, the uprighting spring presented here is brought into the plastic range of the characteristic curve of force. 3. Application of sliding hooks on the intrusion spring permits readjustment for force transfer onto the anterior archwire. 4. Connecting the anterior archwire with the posterior elements by means of a steel ligature can be recommended only in some cases, because sagittally directed forces may be produced. 5. The adult patients presented showed an average intrusion of 0.6 mm/month, if a linear connection was presupposed. 6. An intrusive effect on the incisors could first be detected clinically after 6 to 8 weeks. 7. Application of a torque-key proves especially useful in controlling the incisor position during intrusion in order to avoid unnecessary radiography. 8. Actual prediction of the centre of resistance with the help of a cephalometric radiograph proved not to be feasible. 9. The calculated maximal intrusion of the mandibular incisors was 7 mm. 10. The torque-segmented archwire with crimped hooks and pseudoelastic springs between the molars and the crimped hooks proved very effective for retrusion and intrusion of maxillary incisors. The maxillary anterior teeth can be retruded by a total of 7 mm without readjustment. 11. Constant moments and forces could be transferred by applying preformed arch wires and segmented arch wires.

  3. Seismic hazard estimation based on the distributed seismicity in northern China

    Science.gov (United States)

    Yang, Yong; Shi, Bao-Ping; Sun, Liang

    2008-03-01

    In this paper, we have proposed an alternative seismic hazard modeling by using distributed seismicites. The distributed seismicity model does not need delineation of seismic source zones, and simplify the methodology of probabilistic seismic hazard analysis. Based on the devastating earthquake catalogue, we established three seismicity model, derived the distribution of a-value in northern China by using Gaussian smoothing function, and calculated peak ground acceleration distributions for this area with 2%, 5% and 10% probability of exceedance in a 50-year period by using three attenuation models, respectively. In general, the peak ground motion distribution patterns are consistent with current seismic hazard map of China, but in some specific seismic zones which include Shanxi Province and Shijiazhuang areas, our results indicated a little bit higher peak ground motions and zonation characters which are in agreement with seismicity distribution patterns in these areas. The hazard curves have been developed for Beijing, Tianjin, Taiyuan, Tangshan, and Ji’nan, the metropolitan cities in the northern China. The results showed that Tangshan, Taiyuan, Beijing has a higher seismic hazard than that of other cities mentioned above.

  4. Analogue modelling on the interaction between shallow magma intrusion and a strike-slip fault: Application on the Middle Triassic Monzoni Intrusive Complex (Dolomites, Italy)

    Science.gov (United States)

    Michail, Maria; Coltorti, Massimo; Gianolla, Piero; Riva, Alberto; Rosenau, Matthias; Bonadiman, Costanza; Galland, Olivier; Guldstrand, Frank; Thordén Haug, Øystein; Rudolf, Michael; Schmiedel, Tobias

    2017-04-01

    The southwestern part of the Dolomites in Northern Italy has undergone a short-lived Ladinian (Middle Triassic) tectono-magmatic event, forming a series of significant magmatic features. These intrusive bodies deformed and metamorphosed the Permo-Triassic carbonate sedimentary framework. In this study we focus on the tectono-magmatic evolution of the shallow shoshonitic Monzoni Intrusive Complex of this Ladinian event (ca 237 Ma), covering an area of 20 km^2. This NW-SE elongated intrusive structure (5 km length) shows an orogenic magmatic affinity which is in contrast to the tectonic regime at the time of intrusion. Strain analysis shows anorogenic transtensional displacement in accordance with the ENE-WSW extensional pattern in the central Dolomites during the Ladinian. Field interpretations led to a detailed description of the regional stratigraphic sequence and the structural features of the study area. However, the geodynamic context of this magmatism and the influence of the inherited strike-slip fault on the intrusion, are still in question. To better understand the specific natural prototype and the general mechanisms of magma emplacement in tectonically active areas, we performed analogue experiments defined by, but not limited to, first order field observations. We have conducted a systematic series of experiments in different tectonic regimes (static conditions, strike-slip, transtension). We varied the ratio of viscous to brittle stresses between magma and country rock, by injecting Newtonian fluids both of high and low viscosity (i.e. silicone oil/vegetable oil) into granular materials of varying cohesion (sand, silica flour, glass beads). The evolving surface and side view of the experiments were monitored by photogrammetric techniques for strain analyses and topographic evolution. In our case, the combination of the results from field and analogue experiments brings new insights regarding the tectonic regime, the geometry of the intrusive body, and

  5. Late Neoproterozoic layered mafic intrusion of arc-affinity in the Arabian-Nubian Shield: A case study from the Shahira layered mafic intrusion, southern Sinai, Egypt

    Energy Technology Data Exchange (ETDEWEB)

    Azer, M.K.; Obeid, M.A.; Gahalan, H.A.

    2016-07-01

    The Shahira Layered Mafic Intrusion (SLMI), which belongs to the late Neoproterozoic plutonic rocks of the Arabian-Nubian Shield, is the largest layered mafic intrusion in southern Sinai. Field relations indicate that it is younger than the surrounding metamorphic rocks and older than the post-orogenic granites. Based on variation in mineral paragenesis and chemical composition, the SLMI is distinguished into pyroxene-hornblende gabbro, hornblende gabbro and diorite lithologies. The outer zone of the mafic intrusion is characterized by fine-grained rocks (chilled margin gabbroic facies), with typical subophitic and/or microgranular textures. Different rock units from the mafic intrusion show gradational boundaries in between. They show some indications of low grade metamorphism, where primary minerals are transformed into secondary ones. Geochemically, the Shahira layered mafic intrusion is characterized by enrichment in LILE relative to HFSE (e.g. Nb, P, Zr, Ti, Y), and LREE relative to HREE [(La/Lu)n= 4.75–8.58], with subalkaline characters. It has geochemical characteristics of pre-collisional arc-type environment. The geochemical signature of the investigated gabbros indicates partial melting of mantle wedge in a volcanic-arc setting, being followed by fractional crystallization and crustal contamination. Fractional crystallization processes played a vital role during emplacement of the Shahira intrusion and evolution of its mafic and intermediate rock units. The initial magma was evolved through crystallization of hornblende which was caused by slight increasing of H2O in the magma after crystallization of liquidus olivine, pyroxene and Ca-rich plagioclase. The gabbroic rocks crystallized at pressures between 4.5 and 6.9kbar (~15–20km depth). Whereas, the diorites yielded the lowest crystallization pressure between 1.0 to 4.4Kbar (<10km depth). Temperature was estimated by several geothermometers, which yielded crystallization temperatures ranging from 835

  6. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  7. Progressive Seismic Failure, Seismic Gap, and Great Seismic Risk across the Densely Populated North China Basin

    Science.gov (United States)

    Yin, A.; Yu, X.; Shen, Z.

    2014-12-01

    Although the seismically active North China basin has the most complete written records of pre-instrumentation earthquakes in the world, this information has not been fully utilized for assessing potential earthquake hazards of this densely populated region that hosts ~200 million people. In this study, we use the historical records to document the earthquake migration pattern and the existence of a 180-km seismic gap along the 600-km long right-slip Tangshan-Hejian-Cixian (THC) fault zone that cuts across the North China basin. The newly recognized seismic gap, which is centered at Tianjin with a population of 11 million people and ~120 km from Beijing (22 million people) and Tangshan (7 million people), has not been ruptured in the past 1000 years by M≥6 earthquakes. The seismic migration pattern in the past millennium suggests that the epicenters of major earthquakes have shifted towards this seismic gap along the THC fault, which implies that the 180- km gap could be the site of the next great earthquake with M≈7.6 if it is ruptured by a single event. Alternatively, the seismic gap may be explained by aseismic creeping or seismic strain transfer between active faults.

  8. Floor-fractured craters on the Moon: an evidence of past intrusive magmatic activity

    Science.gov (United States)

    Thorey, C.; Michaut, C.

    2012-12-01

    Floor-fractured lunar craters (FFC's) are a class of craters modified by post impact mechanisms. They are defined by distinctive shallow, often plate-like or convex floors, wide floor moats and radial, concentric and polygonal floor-fractures, suggesting an endogenous process of modification. Two main mechanisms have been proposed to account for such observations : 1) viscous relaxation and 2) spreading of magmatic intrusions at depth below the crater. Here, we propose to test the case of magmatic intrusions. We develop a model for the dynamics of magma spreading below an elastic crust with a crater-like topography and above a rigid horizontal surface. Results show first that the lithostatic pressure increase at the crater rim prevents the intrusion from spreading horizontally giving rise to intrusion thickening and to an uplift of the crater floor. Second, the deformation of the overlying crust exerts a strong control on the intrusion shape, and hence, on the nature of the crater floor uplift. As the deformation can only occur over a minimum flexural wavelength noted Λ, the intrusion shape shows a bell-shaped geometry for crater radius smaller than 3Λ, or a flat top with smooth edges for crater radius larger than 3Λ. For given crustal elastic properties, the crust flexural wavelength increases with the intrusion depth. Therefore, for a large intrusion depth or small crater size, we observe a convex uplift of the crater floor. On the contrary, for a small intrusion depth or large crater size, the crater floor undergoes a piston-like uplift and a circular moat forms just before the rim. The depth of the moat is controlled by the thickening of the crust at the crater rim. On the contrary to viscous relaxation models, our model is thus able to reproduce most of the features of FFC's, including small-scale features. Spreading of a magmatic intrusion at depth can thus be considered as the main endogenous mechanism at the origin of the deformations observed at FFC

  9. Time-Independent Annual Seismic Rates, Based on Faults and Smoothed Seismicity, Computed for Seismic Hazard Assessment in Italy

    Science.gov (United States)

    Murru, M.; Falcone, G.; Taroni, M.; Console, R.

    2017-12-01

    In 2015 the Italian Department of Civil Protection, started a project for upgrading the official Italian seismic hazard map (MPS04) inviting the Italian scientific community to participate in a joint effort for its realization. We participated providing spatially variable time-independent (Poisson) long-term annual occurrence rates of seismic events on the entire Italian territory, considering cells of 0.1°x0.1° from M4.5 up to M8.1 for magnitude bin of 0.1 units. Our final model was composed by two different models, merged in one ensemble model, each one with the same weight: the first one was realized by a smoothed seismicity approach, the second one using the seismogenic faults. The spatial smoothed seismicity was obtained using the smoothing method introduced by Frankel (1995) applied to the historical and instrumental seismicity. In this approach we adopted a tapered Gutenberg-Richter relation with a b-value fixed to 1 and a corner magnitude estimated with the bigger events in the catalogs. For each seismogenic fault provided by the Database of the Individual Seismogenic Sources (DISS), we computed the annual rate (for each cells of 0.1°x0.1°) for magnitude bin of 0.1 units, assuming that the seismic moments of the earthquakes generated by each fault are distributed according to the same tapered Gutenberg-Richter relation of the smoothed seismicity model. The annual rate for the final model was determined in the following way: if the cell falls within one of the seismic sources, we merge the respective value of rate determined by the seismic moments of the earthquakes generated by each fault and the value of the smoothed seismicity model with the same weight; if instead the cells fall outside of any seismic source we considered the rate obtained from the spatial smoothed seismicity. Here we present the final results of our study to be used for the new Italian seismic hazard map.

  10. Radiological Mapping of the Alkaline Intrusive Complex of Jombo, South Coastal Kenya by In-Situ Gamma-Ray Spectrometry

    Science.gov (United States)

    Kaniu, Ian; Darby, Iain G.; Kalambuka Angeyo, Hudson

    2016-04-01

    Carbonatites and alkaline intrusive complexes are rich in a variety of mineral deposits such as rare earth elements (REEs), including Nb, Zr and Mn. These are often associated with U and Th bearing minerals, including monazite, samarskite and pyrochlore. Mining waste resulting from mineral processing activities can be highly radioactive and therefore poses a risk to human health and environment. The Jombo complex located in Kenya's south coastal region is potentially one of the richest sources of Nb and REEs in the world. It consists of the main intrusion at Jombo hill, three associated satellite intrusions at Mrima, Kiruku and Nguluku hills, and several dykes. The complex is highly heterogeneous with regard to its geological formation as it is characterized by alkaline igneous rocks and carbonatites which also influence its radio-ecological dynamics. In-situ gamma spectrometry offers a low-cost, rapid and spatially representative radioactivity estimate across a range of landscapes compared to conventional radiometric techniques. In this work, a wide ranging radiological survey was conducted in the Jombo complex as follow up on previous studies[1,2], to determine radiation exposure levels and source distributions, and perform radiological risk assessments. The in-situ measurements were carried out using a 2.0 l NaI(Tl) PGIS-2 portable detector from Pico Envirotec Inc integrated with GPS, deployed for ground (back-pack) and vehicular gamma-ray spectrometry. Preliminary results of radiological distribution and mapping will be presented. [1] Patel, J. P. (1991). Discovery and Innovation, 3(3): 31-35. [2] Kebwaro, J. M. et. al. (2011). J. Phys. Sci., 6(13): 3105-3110.

  11. Influence of crystallised igneous intrusions on fault nucleation and reactivation during continental extension

    Science.gov (United States)

    Magee, Craig; McDermott, Kenneth G.; Stevenson, Carl T. E.; Jackson, Christopher A.-L.

    2014-05-01

    Continental rifting is commonly accommodated by the nucleation of normal faults, slip on pre-existing fault surfaces and/or magmatic intrusion. Because crystallised igneous intrusions are pervasive in many rift basins and are commonly more competent (i.e. higher shear strengths and Young's moduli) than the host rock, it is theoretically plausible that they locally intersect and modify the mechanical properties of pre-existing normal faults. We illustrate the influence that crystallised igneous intrusions may have on fault reactivation using a conceptual model and observations from field and subsurface datasets. Our results show that igneous rocks may initially resist failure, and promote the preferential reactivation of favourably-oriented, pre-existing faults that are not spatially-associated with solidified intrusions. Fault segments situated along strike from laterally restricted fault-intrusion intersections may similarly be reactivated. This spatial and temporal control on strain distribution may generate: (1) supra-intrusion folds in the hanging wall; (2) new dip-slip faults adjacent to the igneous body; or (3) sub-vertical, oblique-slip faults oriented parallel to the extension direction. Importantly, stress accumulation within igneous intrusions may eventually initiate failure and further localise strain. The results of our study have important implications for the structural of sedimentary basins and the subsurface migration of hydrocarbons and mineral-bearing fluids.

  12. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  13. Time, space, and composition relations among northern Nevada intrusive rocks and their metallogenic implications

    Science.gov (United States)

    duBray, E.A.

    2007-01-01

    Northern Nevada contains ∼360 igneous intrusions subequally distributed among three age groups: middle Tertiary, Cretaceous, and Jurassic. These intrusions are dominantly granodiorite and monzogranite, although some are more mafic. Major-oxide and trace-element compositions of intrusion age groups are remarkably similar, forming compositional arrays that are continuous, overlapping, and essentially indistinguishable. Within each age group, compositional diversity is controlled by a combination of fractional crystallization and two-component mixing. Mafic intrusions represent mixing of mantle-derived magma and assimilated continental crust, whereas intermediate to felsic intrusions evolved by fractional crystallization. Several petrologic parameters suggest that the northern Nevada intrusion age groups formed in a variety of subduction-related, magmatic arc settings: Jurassic intrusions were likely formed during backarc, slab-window magmatism related to breakoff of the Mezcalera plate; Cretaceous magmatism was related to rapid, shallow subduction of the Farallon plate and consequent inboard migration of arc magmatism; and Tertiary magmatism initially swept southward into northern Nevada in response to foundering of the Farallon plate and was followed by voluminous Miocene bimodal magmatism associated with backarc continental rifting.

  14. Intrusive fathering, children's self-regulation and social skills: a mediation analysis.

    Science.gov (United States)

    Stevenson, M; Crnic, K

    2013-06-01

    Fathers have unique influences on children's development, and particularly in the development of social skills. Although father-child relationship influences on children's social competence have received increased attention in general, research on fathering in families of children with developmental delays (DD) is scant. This study examined the pathway of influence among paternal intrusive behaviour, child social skills and child self-regulatory ability, testing a model whereby child regulatory behaviour mediates relations between fathering and child social skills. Participants were 97 families of children with early identified DD enrolled in an extensive longitudinal study. Father and mother child-directed intrusiveness was coded live in naturalistic home observations at child age 4.5, child behaviour dysregulation was coded from a video-taped laboratory problem-solving task at child age 5, and child social skills were measured using independent teacher reports at child age 6. Analyses tested for mediation of the relationship between fathers' intrusiveness and child social skills by child behaviour dysregulation. Fathers' intrusiveness, controlling for mothers' intrusiveness and child behaviour problems, was related to later child decreased social skills and this relationship was mediated by child behaviour dysregulation. Intrusive fathering appears to carry unique risk for the development of social skills in children with DD. Findings are discussed as they related to theories of fatherhood and parenting in children with DD, as well as implications for intervention and future research. © 2012 The Authors. Journal of Intellectual Disability Research © 2012 John Wiley & Sons Ltd, MENCAP & IASSID.

  15. Aspects of cold intrusions over Greece during autumn

    Science.gov (United States)

    Mita, Constantina; Marinaki, Aggeliki; Zeini, Konstantina; Konstantara, Metaxia

    2010-05-01

    This study is focused on the description of atmospheric disturbances that caused intense cold intrusions over Greece during autumn for a period of 25 years (1982-2006). The study was based on data analysis from the meteorological station network of the Hellenic National Meteorological Service (HNMS) and the European Centre for Medium Range Weather Forecasts (ECMWF). Initially, the days with temperature at the isobaric surface of 850 hPa less or equal to the mean temperature for the 10-day period the day under investigation belongs to are isolated, composing a new confined data set which was further used. An event of intense cold intrusion is identified based on a subjective set of criteria, considering the temperature decrease at the level of 850 hPa and its duration. In particular, the criteria that were used to identify a cold intrusion were: temperature variation between two successive days at the isobaric level of 850 hPa being equal or greater than 50 C at least once during the event and duration of the event of at least two successive days with continuous temperature decrease. Additionally, the synoptic analysis of the atmospheric disturbances involved using weather charts from ECMWF, revealed that all cases were related to low pressure systems at the level of 500 hPa, accompanied by cold air masses. Moreover, a methodology proposed to classify the cold intrusions based on general circulation characteristics of the atmosphere, resulted in seven major categories. More than half of the events belong in two categories, originated northwest of the greater Greek area (Greece and parts of neighbouring countries), between 400 and 600 N. Further analysis indicated that the frequency of events increases from September to November and the majority of the events lasted two to three days. Additionally, the non-parametric Mann-Kendall test was used for the investigation of the statistical significance of the trends appearing in the results. The tests revealed that over

  16. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    Science.gov (United States)

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  17. The evolution of Interior Intrusion Detection Technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  18. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  19. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  20. Delineation of seismic source zones based on seismicity parameters ...

    Indian Academy of Sciences (India)

    In the present study, an attempt has been made to delineate seismic source zones in the study area (south India) based on the seismicity parameters. Seismicity parameters and the maximum probable earthquake for these source zones were evaluated and were used in the hazard evaluation. The probabilistic evaluation of ...

  1. Intrusive thoughts in obsessive-compulsive disorder and eating disorder patients: a differential analysis.

    Science.gov (United States)

    García-Soriano, Gemma; Roncero, Maria; Perpiñá, Conxa; Belloch, Amparo

    2014-05-01

    The present study aims to compare the unwanted intrusions experienced by obsessive-compulsive (OCD) and eating disorder (ED) patients, their appraisals, and their control strategies and analyse which variables predict the intrusions' disruption and emotional disturbance in each group. Seventy-nine OCD and 177 ED patients completed two equivalent self-reports designed to assess OCD-related and ED-related intrusions, their dysfunctional appraisals, and associated control strategies. OCD and ED patients experienced intrusions with comparable frequency and emotional disturbance, but OCD patients experienced greater disruption. Differences appeared between groups on some appraisals and control strategies. Intolerance to uncertainty (OCD group) and thought importance (ED group) predicted their respective emotional disturbance and disruption. Additionally, control importance (OCD group) and thought-action fusion moral (OCD and ED groups) predicted their emotional disturbance. OCD and ED share the presence of intrusions; however, different variables explain why they are disruptive and emotionally disturbing. Cognitive intrusions require further investigation as a transdiagnostic variable. Copyright © 2014 John Wiley & Sons, Ltd and Eating Disorders Association.

  2. Effect of winds and waves on salt intrusion in the Pearl River estuary

    Science.gov (United States)

    Gong, Wenping; Lin, Zhongyuan; Chen, Yunzhen; Chen, Zhaoyun; Zhang, Heng

    2018-02-01

    Salt intrusion in the Pearl River estuary (PRE) is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST) modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  3. Russian regulatory approaches to seismic design and seismic analysis of NPP piping

    International Nuclear Information System (INIS)

    Kaliberda, Y.V.

    2003-01-01

    The paper presents an overview of Russian regulatory approaches to seismic design and seismic analysis of NPP piping. The paper is focused on categorization and seismic analysis of nuclear power plant items (piping, equipment, supports, valves, but not building structures). The paper outlines the current seismic recommendations, corresponding methods with the examples of calculation models. The paper considers calculation results of the mechanisms of dynamic behavior and the problems of developing a rational and economical approaches to seismic design and seismic protection. (author)

  4. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  5. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  6. France's seismic zoning

    International Nuclear Information System (INIS)

    Mohammadioun, B.

    1997-01-01

    In order to assess the seismic hazard in France in relation to nuclear plant siting, the CEA, EDF and the BRGM (Mine and Geology Bureau) have carried out a collaboration which resulted in a seismic-tectonic map of France and a data base on seismic history (SIRENE). These studies were completed with a seismic-tectonic zoning, taking into account a very long period of time, that enabled a probabilistic evaluation of the seismic hazard in France, and that may be related to adjacent country hazard maps

  7. Effects of heat-flow and hydrothermal fluids from volcanic intrusions on authigenic mineralization in sandstone formations

    Directory of Open Access Journals (Sweden)

    Wolela Ahmed

    2002-06-01

    Full Text Available Volcanic intrusions and hydrothermal activity have modified the diagenetic minerals. In the Ulster Basin, UK, most of the authigenic mineralization in the Permo-Triassic sandstones pre-dated tertiary volcanic intrusions. The hydrothermal fluids and heat-flow from the volcanic intrusions did not affect quartz and feldspar overgrowths. However, clay mineral-transformation, illite-smectite to illite and chlorite was documented near the volcanic intrusions. Abundant actinolite, illite, chlorite, albite and laumontite cementation of the sand grains were also documented near the volcanic intrusions. The abundance of these cementing minerals decreases away from the volcanic intrusions.In the Hartford Basin, USA, the emplacement of the volcanic intrusions took place simultaneous with sedimentation. The heat-flow from the volcanic intrusions and hydrothermal activity related to the volcanics modified the texture of authigenic minerals. Microcrystalline mosaic albite and quartz developed rather than overgrowths and crystals near the intrusions. Chlorite clumps and masses were also documented with microcrystalline mosaic albite and quartz. These features are localized near the basaltic intrusions. Laumontite is also documented near the volcanic intrusions. The reservoir characteristics of the studied sandstone formations are highly affected by the volcanic and hydrothermal fluids in the Hartford and the Ulster Basin. The porosity dropped from 27.4 to zero percent and permeability from 1350 mD to 1 mD.

  8. Pukala intrusion, its age and connection to hydrothermal alteration in Orivesi, southwestern Finland

    Directory of Open Access Journals (Sweden)

    Matti Talikka

    2005-01-01

    Full Text Available The Pukala intrusion is situated in the Paleoproterozoic Svecofennian domain of the Fennoscandian Shield in the contact region between the Central Finland Granitoid Complex and the Tampere Belt. The acid subvolcanic intrusion, which is in contact or close to severalaltered domains, mainly consists of porphyritic granodiorite and trondhjemite. The Pukala intrusion was emplaced into volcanic sequence in an island-arc or fore-arc setting before or during the early stages of the main regional deformation phase of the Svecofennian orogeny. On the basis of the geochemical data, the Pukala intrusion is a peraluminous volcanic-arc granitoid. After crystallisation at 1896±3 Ma, multiphase deformation and metamorphismcaused alteration, recrystallisation, and orientation of the minerals, and tilted the intrusion steeply towards south. The 1851±5 Ma U-Pb age for titanite is connected to the late stages of the Svecofennian tectonometamorphic evolution of the region. Several hydrothermally altered domains are located in the felsic and intermediate metavolcanic rocks of the Tampere Belt within less than one kilometre south of the Pukala intrusion. Alteration is divided into three basic types: partial silica alteration, chlorite-sericite±silica alteration, and sericite alteration in shear zones. The first two types probably formed during the emplacement and crystallisation of the Pukala intrusion, and the third is linked to late shearing. Intense sericitisation and comb quartz bands in the contact of theintrusion and the altered domain at Kutemajärvi suggest that the hydrothermal system was driven by the Pukala intrusion.

  9. Seismic Noise Analysis and Reduction through Utilization of Collocated Seismic and Atmospheric Sensors at the GRO Chile Seismic Network

    Science.gov (United States)

    Farrell, M. E.; Russo, R. M.

    2013-12-01

    The installation of Earthscope Transportable Array-style geophysical observatories in Chile expands open data seismic recording capabilities in the southern hemisphere by nearly 30%, and has nearly tripled the number of seismic stations providing freely-available data in southern South America. Through the use of collocated seismic and atmospheric sensors at these stations we are able to analyze how local atmospheric conditions generate seismic noise, which can degrade data in seismic frequency bands at stations in the ';roaring forties' (S latitudes). Seismic vaults that are climate-controlled and insulated from the local environment are now employed throughout the world in an attempt to isolate seismometers from as many noise sources as possible. However, this is an expensive solution that is neither practical nor possible for all seismic deployments; and also, the increasing number and scope of temporary seismic deployments has resulted in the collection and archiving of terabytes of seismic data that is affected to some degree by natural seismic noise sources such as wind and atmospheric pressure changes. Changing air pressure can result in a depression and subsequent rebound of Earth's surface - which generates low frequency noise in seismic frequency bands - and even moderate winds can apply enough force to ground-coupled structures or to the surface above the seismometers themselves, resulting in significant noise. The 10 stations of the permanent Geophysical Reporting Observatories (GRO Chile), jointly installed during 2011-12 by IRIS and the Chilean Servicio Sismológico, include instrumentation in addition to the standard three seismic components. These stations, spaced approximately 300 km apart along the length of the country, continuously record a variety of atmospheric data including infrasound, air pressure, wind speed, and wind direction. The collocated seismic and atmospheric sensors at each station allow us to analyze both datasets together, to

  10. Engineering evaluation of intrusion prevention strategies for single-shell tanks

    International Nuclear Information System (INIS)

    Jenkins, C.E.

    1994-01-01

    In this study, previously implemented actions to prevent liquid intrusion into out-of-service single-shell tanks (SSTs), i.e., interim isolation or partial interim isolation, are investigated and expanded to identify additional cost-effective intrusion prevention techniques that could be reasonably taken until SSTs are ready for waste retrieval. Possible precipitation, groundwater, and condensation pathways and internal tank connections that could provide possible pathways for liquids are examined. Techniques to block identified potential pathways are developed and costed to determine the potential benefit to costed trade-offs for implementing the techniques. (Note: Surveillance data show increased waste surface levels for several SSTs that indicate possible liquid intrusion despite interim isolation activities.)

  11. Cellular Neural Network-Based Methods for Distributed Network Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Kang Xie

    2015-01-01

    Full Text Available According to the problems of current distributed architecture intrusion detection systems (DIDS, a new online distributed intrusion detection model based on cellular neural network (CNN was proposed, in which discrete-time CNN (DTCNN was used as weak classifier in each local node and state-controlled CNN (SCCNN was used as global detection method, respectively. We further proposed a new method for design template parameters of SCCNN via solving Linear Matrix Inequality. Experimental results based on KDD CUP 99 dataset show its feasibility and effectiveness. Emerging evidence has indicated that this new approach is affordable to parallelism and analog very large scale integration (VLSI implementation which allows the distributed intrusion detection to be performed better.

  12. Reflection and tubewave analysis of the seismic data from the Stripa crosshole site

    International Nuclear Information System (INIS)

    Cosma, C.; Baehler, S.; Hammarstroem, M.; Pihl, J.

    1986-12-01

    The data from the crosshole research program (radar, seismics and hydraulics) in the Stripa Phase II Project resulted in the construction of a model. The results from the present study were compared to this model. It was found that the existing data set used for tomographic analysis could only be used to a limited extent, as reflection analysis requires a more dense detector coverage. Nevertheless two reflectors were detected. The positions of the reflectors were compared to the existing crosshole model and proved to correlate well. For the tubewave analysis almost all crosshole seismic data could be used. By comparing the results with previous hydraulic tests, it was found that tubewave sources and hydraulically conductive zones are in concordance. All previously defined zones but one could be detected. (orig./HP)

  13. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  14. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  15. Sexually intrusive behaviour following brain injury: approaches to assessment and rehabilitation.

    Science.gov (United States)

    Bezeau, Scott C; Bogod, Nicholas M; Mateer, Catherine A

    2004-03-01

    Sexually intrusive behaviour, which may range from inappropriate commentary to rape, is often observed following a traumatic brain injury. It may represent novel behaviour patterns or an exacerbation of pre-injury personality traits, attitudes, and tendencies. Sexually intrusive behaviour poses a risk to staff and residents of residential facilities and to the community at large, and the development of a sound assessment and treatment plan for sexually intrusive behaviour is therefore very important. A comprehensive evaluation is best served by drawing on the fields of neuropsychology, forensic psychology, and cognitive rehabilitation. The paper discusses the types of brain damage that commonly lead to sexually intrusive behaviour, provides guidance for its assessment, and presents a three-stage treatment model. The importance of a multidisciplinary approach to both assessment and treatment is emphasized. Finally, a case example is provided to illustrate the problem and the possibilities for successful management.

  16. The evolution of interior intrusion detection technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combination developed when commercial sensors were unavailable and the future application of expert systems. 5 refs

  17. The evolution of interior intrusion detection technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-01-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the U.S. Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). The authors also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  18. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  19. Seismic re-evaluation of Mochovce nuclear power plant. Seismic reevaluation of civil structures

    International Nuclear Information System (INIS)

    Podrouzek, P.

    1997-01-01

    In this contribution, an overview of seismic design procedures used for reassessment of seismic safety of civil structures at the Mochovce NPP in Slovak Republic presented. As an introduction, the objectives, history, and current status of seismic design of the NPP have been explained. General philosophy of design methods, seismic classification of buildings, seismic data, calculation methods, assumptions on structural behavior under seismic loading and reliability assessment were described in detail in the subsequent section. Examples of calculation models used for dynamic calculations of seismic response are given in the last section. (author)

  20. A Novel Immune-Inspired Shellcode Detection Algorithm Based on Hyperellipsoid Detectors

    Directory of Open Access Journals (Sweden)

    Tianliang Lu

    2018-01-01

    Full Text Available Shellcodes are machine language codes injected into target programs in the form of network packets or malformed files. Shellcodes can trigger buffer overflow vulnerability and execute malicious instructions. Signature matching technology used by antivirus software or intrusion detection system has low detection rate for unknown or polymorphic shellcodes; to solve such problem, an immune-inspired shellcode detection algorithm was proposed, named ISDA. Static analysis and dynamic analysis were both applied. The shellcodes were disassembled to assembly instructions during static analysis and, for dynamic analysis, the API function sequences of shellcodes were obtained by simulation execution to get the behavioral features of polymorphic shellcodes. The extracted features of shellcodes were encoded to antigens based on n-gram model. Immature detectors become mature after immune tolerance based on negative selection algorithm. To improve nonself space coverage rate, the immune detectors were encoded to hyperellipsoids. To generate better antibody offspring, the detectors were optimized through clonal selection algorithm with genetic mutation. Finally, shellcode samples were collected and tested, and result shows that the proposed method has higher detection accuracy for both nonencoded and polymorphic shellcodes.

  1. Numerical modeling of seawater intrusion in Zhoushuizi district of Dalian City, China

    Science.gov (United States)

    Zhao, J.; Lin, J.; Wu, J.

    2013-12-01

    A three-dimensional heterogeneous density-dependent numerical model was constructed to simulate the seawater intrusion process in coastal aquifers in Zhoushuizi Region, Dalian City. Model calibration was achieved through a prediction-correction method by adjusting the zonation and values of hydrogeologic parameters until the calculated heads and concentrations matched the observed values. Model validation results also showed that it was reasonable under current data conditions. Then the calibrated and validated model was applied to predict the dynamics and trend of seawater intrusion according to the current groundwater abstraction conditions in this study area 30 years after 2010. Prediction results showed that overall seawater intrusion in the future would be even more severe. Actually, with the growing of the population and development of the economy, the demand for ground water will be increasing continuously so that the problem of seawater intrusion may be more serious than that predicted by the modelin this study. Better strategies for reasonably governing exploitation of groundwater in the study area can be further developed by using this three-dimensional seawater intrusion model.

  2. The assessment of human intrusion into underground repositories for radioactive waste Volume 2: Appendices

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Ashton, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  3. Role of seismic PRA in seismic safety decisions of nuclear power plants

    International Nuclear Information System (INIS)

    Ravindra, M.K.; Kennedy, R.P.; Sues, R.H.

    1985-01-01

    This paper highlights the important roles that seismic probabilistic risk assessments (PRAs) can play in the seismic safety decisions of nuclear power plants. If a seismic PRA has been performed for a plant, its results can be utilized to evaluate the seismic capability beyond the safe shutdown event (SSE). Seismic fragilities of key structures and equipment, fragilities of dominant plant damage states and the frequencies of occurrence of these plant damage states are reviewed to establish the seismic safety of the plant beyond the SSE level. Guidelines for seismic margin reviews and upgrading may be developed by first identifying the generic classes of structures and equipment that have been shown to be dominant risk contributors in the completed seismic PRAs, studying the underlying causes for their contribution and examining why certain other items (e.g., piping) have not proved to be high-risk-contributors

  4. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    International Nuclear Information System (INIS)

    Bernot, P.

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  5. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungwon Lee

    2009-05-01

    Full Text Available TheIP-based Ubiquitous Sensor Network (IP-USN is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System called RIDES (Robust Intrusion DEtection System for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  6. Comparison of seismic margin assessment and probabilistic risk assessment in seismic IPE

    International Nuclear Information System (INIS)

    Reed, J.W.; Kassawara, R.P.

    1993-01-01

    A comparison of technical requirements and managerial issues between seismic margin assessment (SMA) and seismic probabilistic risk assessment (SPRA) in a seismic Individual Plant Examination (IPE) is presented and related to requirements for an Unresolved Safety Issue (USI) A-46 review which is required for older nuclear power plants. Advantages and disadvantages are discussed for each approach. Technical requirements reviewed for a seismic IPE include: scope of plants covered, seismic input, scope of review, selection of equipment, required experience and training of engineers, walkdown procedure, evaluation of components, relay review, containment review, quality assurance, products, documentation requirements, and closure procedure. Managerial issues discussed include regulatory acceptability, compatibility with seismic IPE, compliance with seismic IPE requirements, ease of use by utilities, and relative cost

  7. Evaluation of induced seismicity forecast models in the Induced Seismicity Test Bench

    Science.gov (United States)

    Király, Eszter; Gischig, Valentin; Zechar, Jeremy; Doetsch, Joseph; Karvounis, Dimitrios; Wiemer, Stefan

    2016-04-01

    Induced earthquakes often accompany fluid injection, and the seismic hazard they pose threatens various underground engineering projects. Models to monitor and control induced seismic hazard with traffic light systems should be probabilistic, forward-looking, and updated as new data arrive. Here, we propose an Induced Seismicity Test Bench to test and rank such models. We apply the test bench to data from the Basel 2006 and Soultz-sous-Forêts 2004 geothermal stimulation projects, and we assess forecasts from two models that incorporate a different mix of physical understanding and stochastic representation of the induced sequences: Shapiro in Space (SiS) and Hydraulics and Seismics (HySei). SiS is based on three pillars: the seismicity rate is computed with help of the seismogenic index and a simple exponential decay of the seismicity; the magnitude distribution follows the Gutenberg-Richter relation; and seismicity is distributed in space based on smoothing seismicity during the learning period with 3D Gaussian kernels. The HySei model describes seismicity triggered by pressure diffusion with irreversible permeability enhancement. Our results show that neither model is fully superior to the other. HySei forecasts the seismicity rate well, but is only mediocre at forecasting the spatial distribution. On the other hand, SiS forecasts the spatial distribution well but not the seismicity rate. The shut-in phase is a difficult moment for both models in both reservoirs: the models tend to underpredict the seismicity rate around, and shortly after, shut-in. Ensemble models that combine HySei's rate forecast with SiS's spatial forecast outperform each individual model.

  8. Effect of winds and waves on salt intrusion in the Pearl River estuary

    Directory of Open Access Journals (Sweden)

    W. Gong

    2018-02-01

    Full Text Available Salt intrusion in the Pearl River estuary (PRE is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  9. Treatment of Intrusive Suicidal Imagery Using Eye Movements

    Directory of Open Access Journals (Sweden)

    Jaël S. van Bentum

    2017-06-01

    Full Text Available Suicide and suicidal behavior are major public health concerns, and affect 3–9% of the population worldwide. Despite increased efforts for national suicide prevention strategies, there are still few effective interventions available for reducing suicide risk. In this article, we describe various theoretical approaches for suicide ideation and behavior, and propose to examine the possible effectiveness of a new and innovative preventive strategy. A model of suicidal intrusion (mental imagery related to suicide, also referred to as suicidal flash-forwards is presented describing one of the assumed mechanisms in the etiology of suicide and the mechanism of therapeutic change. We provide a brief rationale for an Eye Movement Dual Task (EMDT treatment for suicidal intrusions, describing techniques that can be used to target these suicidal mental images and thoughts to reduce overall behavior. Based on the available empirical evidence for the mechanisms of suicidal intrusions, this approach appears to be a promising new treatment to prevent suicidal behavior as it potentially targets one of the linking pins between suicidal ideation and suicidal actions.

  10. Numerical Continuation Methods for Intrusive Uncertainty Quantification Studies

    Energy Technology Data Exchange (ETDEWEB)

    Safta, Cosmin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Najm, Habib N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Phipps, Eric Todd [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-09-01

    Rigorous modeling of engineering systems relies on efficient propagation of uncertainty from input parameters to model outputs. In recent years, there has been substantial development of probabilistic polynomial chaos (PC) Uncertainty Quantification (UQ) methods, enabling studies in expensive computational models. One approach, termed ”intrusive”, involving reformulation of the governing equations, has been found to have superior computational performance compared to non-intrusive sampling-based methods in relevant large-scale problems, particularly in the context of emerging architectures. However, the utility of intrusive methods has been severely limited due to detrimental numerical instabilities associated with strong nonlinear physics. Previous methods for stabilizing these constructions tend to add unacceptably high computational costs, particularly in problems with many uncertain parameters. In order to address these challenges, we propose to adapt and improve numerical continuation methods for the robust time integration of intrusive PC system dynamics. We propose adaptive methods, starting with a small uncertainty for which the model has stable behavior and gradually moving to larger uncertainty where the instabilities are rampant, in a manner that provides a suitable solution.

  11. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  12. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  13. Prevention and analysis of hacker's intrusion

    International Nuclear Information System (INIS)

    Liu Baoxu; An Dehai; Xu Rongsheng

    2000-01-01

    The author analyzes the behavior characteristics and relevant technologies about the hacker's intrusion, and gives some corresponding solutions pertinently. To the recent events about hackers, the author gives detailed introduction and puts forward the relevant advice and valuable consideration

  14. Comparison of seismic sources for shallow seismic: sledgehammer and pyrotechnics

    Directory of Open Access Journals (Sweden)

    Brom Aleksander

    2015-10-01

    Full Text Available The pyrotechnic materials are one of the types of the explosives materials which produce thermal, luminous or sound effects, gas, smoke and their combination as a result of a self-sustaining chemical reaction. Therefore, pyrotechnics can be used as a seismic source that is designed to release accumulated energy in a form of seismic wave recorded by tremor sensors (geophones after its passage through the rock mass. The aim of this paper was to determine the utility of pyrotechnics for shallow seismic engineering. The work presented comparing the conventional method of seismic wave excitation for seismic refraction method like plate and hammer and activating of firecrackers on the surface. The energy released by various sources and frequency spectra was compared for the two types of sources. The obtained results did not determine which sources gave the better results but showed very interesting aspects of using pyrotechnics in seismic measurements for example the use of pyrotechnic materials in MASW.

  15. Monitoring the mechanical vibration of in-core detector tubes and fuel channels via ICFD noise analysis

    International Nuclear Information System (INIS)

    Glockler, O.; Cooke, D.F.; Czuppon, G.J.; Kapoor, K.K.

    2000-01-01

    Vibrations of core internals are regularly monitored in the CANDU nuclear generating stations of Ontario Power Generation (OPG) via the noise analysis of in-core flux detectors (ICFDs). Voltage signals of standard station instrumentation are recorded by portable multi-channel high-speed high-resolution data acquisition systems, then statistical parameters are derived from the multi-channel time series measurements. Reactor noise analysis is a non-intrusive statistical technique regularly used in system surveillance, diagnostics and in actual operational I and C problems. It utilizes the dynamic information carried by the small fluctuations (noise) of station signals measured around their mean values during steady-state operation. The present paper discusses specific results related to the flow-induced mechanical vibrations of detector tubes and fuel channels. (author)

  16. Post-seismic relaxation from geodetic and seismic data

    Directory of Open Access Journals (Sweden)

    Mikhail V. Rodkin

    2017-01-01

    Full Text Available We have examined the aftershock sequence and the post-seismic deformation process of the Parkfield earthquake (2004, M = 6, California, USA source area using GPS data. This event was chosen because of the possibility of joint analysis of data from the rather dense local GPS network (from SOPAC Internet archive and of the availability of the rather detailed aftershock sequence data (http://www.ncedc.org/ncedc/catalog-search.html. The relaxation process of post-seismic deformation prolongs about the same 400 days as the seismic aftershock process does. Thus, the aftershock process and the relaxation process in deformation could be the different sides of the same process. It should be noted that the ratio of the released seismic energy and of the GPS obtained deformation is quite different for the main shock and for the aftershock stage. The ratio of the released seismic energy to the deformation value decreases essentially for the post-shock process. The similar change in the seismic energy/deformation value ratio is valid in a few other strong earthquakes. Thus, this decrease seems typical of aftershock sequences testifying for decrease of ratio of elastic to inelastic deformation in the process of post-shock relaxation when the source area appears to be mostly fractured after the main shock occurs, but the healing process had no yet sufficient time to develop.

  17. Seismic texture classification. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Vinther, R.

    1997-12-31

    The seismic texture classification method, is a seismic attribute that can both recognize the general reflectivity styles and locate variations from these. The seismic texture classification performs a statistic analysis for the seismic section (or volume) aiming at describing the reflectivity. Based on a set of reference reflectivities the seismic textures are classified. The result of the seismic texture classification is a display of seismic texture categories showing both the styles of reflectivity from the reference set and interpolations and extrapolations from these. The display is interpreted as statistical variations in the seismic data. The seismic texture classification is applied to seismic sections and volumes from the Danish North Sea representing both horizontal stratifications and salt diapers. The attribute succeeded in recognizing both general structure of successions and variations from these. Also, the seismic texture classification is not only able to display variations in prospective areas (1-7 sec. TWT) but can also be applied to deep seismic sections. The seismic texture classification is tested on a deep reflection seismic section (13-18 sec. TWT) from the Baltic Sea. Applied to this section the seismic texture classification succeeded in locating the Moho, which could not be located using conventional interpretation tools. The seismic texture classification is a seismic attribute which can display general reflectivity styles and deviations from these and enhance variations not found by conventional interpretation tools. (LN)

  18. Recent Vs. Historical Seismicity Analysis For Banat Seismic Region (Western Part Of Romania)

    OpenAIRE

    Oros Eugen; Diaconescu Mihai

    2015-01-01

    The present day seismic activity from a region reflects the active tectonics and can confirm the seismic potential of the seismogenic sources as they are modelled using the historical seismicity. This paper makes a comparative analysis of the last decade seismicity recorded in the Banat Seismic Region (western part of Romania) and the historical seismicity of the region (Mw≥4.0). Four significant earthquake sequences have been recently localized in the region, three of them nearby the city of...

  19. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  20. Work Zone Intrusion Report Interface Design

    Science.gov (United States)

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  1. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  2. Seismic changes industry

    International Nuclear Information System (INIS)

    Taylor, G.

    1992-01-01

    This paper discusses the growth in the seismic industry as a result of the recent increases in the foreign market. With the decline of communism and the opening of Latin America to exploration, seismic teams have moved out into these areas in support of the oil and gas industry. The paper goes on to discuss the improved technology available for seismic resolution and the subsequent use of computers to field-proof the data while the seismic team is still on-site. It also discusses the effects of new computer technology on reducing the amount of support staff that is required to both conduct and interpret seismic information

  3. Gravitational-wave confusion background from cosmological compact binaries: Implications for future terrestrial detectors

    International Nuclear Information System (INIS)

    Regimbau, T.; Hughes, Scott A.

    2009-01-01

    Increasing the sensitivity of a gravitational-wave (GW) detector improves our ability to measure the characteristics of detected sources. It also increases the number of weak signals that contribute to the data. Because GW detectors have nearly all-sky sensitivity, they can be subject to a confusion limit: Many sources which cannot be distinguished may be measured simultaneously, defining a stochastic noise floor to the sensitivity. For GW detectors operating at present and for their planned upgrades, the projected event rate is sufficiently low that we are far from the confusion-limited regime. However, some detectors currently under discussion may have large enough reach to binary inspiral that they enter the confusion-limited regime. In this paper, we examine the binary inspiral confusion limit for terrestrial detectors. We consider a broad range of inspiral rates in the literature, several planned advanced gravitational-wave detectors, and the highly advanced 'Einstein telescope' design. Though most advanced detectors will not be impacted by this limit, the Einstein telescope with a very low-frequency 'seismic wall' may be subject to confusion noise. At a minimum, careful data analysis will be require to separate signals which will appear confused. This result should be borne in mind when designing highly advanced future instruments.

  4. National Seismic Station

    International Nuclear Information System (INIS)

    Stokes, P.A.

    1982-06-01

    The National Seismic Station was developed to meet the needs of regional or worldwide seismic monitoring of underground nuclear explosions to verify compliance with a nuclear test ban treaty. The Station acquires broadband seismic data and transmits it via satellite to a data center. It is capable of unattended operation for periods of at least a year, and will detect any tampering that could result in the transmission of unauthentic seismic data

  5. Preliminary evaluation of solution-mining intrusion into a salt-dome repository

    International Nuclear Information System (INIS)

    1981-06-01

    This report is the product of the work of an ONWI task force to evaluate inadvertant human intrusion into a salt dome repository by solution mining. It summarizes the work in the following areas: a general review of the levels of defense that could reduce both the likelihood and potential consequences of human intrusion into a salt dome repository; evaluation of a hypothetical intrusion scenario and its consequences; recommendation for further studies. The conclusions of this task force report can be summarized as follows: (1) it is not possible at present to establish with certainty that solution mining is credible as a human-intrusion event. The likelihood of such an intrusion will depend on the effectiveness of the preventive measures; (2) an example analysis based on the realistic approach is presented in this report; it concluded that the radiological consequences are strongly dependent upon the mode of radionuclide release from the waste form, time after emplacement, package design, impurities in the host salt, the amount of a repository intercepted, the solution mining cavity form, the length of time over which solution mining occurs, the proportion of contaminated salt source for human consumption compared to other sources, and the method of salt purification for culinary purposes; (3) worst case scenarios done by other studies suggest considerable potential for exposures to man while preliminary evaluations of more realistic cases suggest significantly reduced potential consequences. Mathematical model applications to process systems, guided by more advanced assumptions about human intrusion into geomedia, will shed more light on the potential for concerns and the degree to which mitigative measures will be required

  6. Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection

    Science.gov (United States)

    Elfers, Carsten; Horstmann, Mirko; Sohr, Karsten; Herzog, Otthein

    Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine learning techniques have been proposed. However, one critical issue is that the amount of reference data that contains serious intrusions is very sparse. In this paper we present an inference process with linear chain conditional random fields that aims to solve this problem by using domain knowledge about the alerts of different intrusion sensors represented in an ontology.

  7. Computer Game Play Reduces Intrusive Memories of Experimental Trauma via Reconsolidation-Update Mechanisms.

    Science.gov (United States)

    James, Ella L; Bonsall, Michael B; Hoppitt, Laura; Tunbridge, Elizabeth M; Geddes, John R; Milton, Amy L; Holmes, Emily A

    2015-08-01

    Memory of a traumatic event becomes consolidated within hours. Intrusive memories can then flash back repeatedly into the mind's eye and cause distress. We investigated whether reconsolidation-the process during which memories become malleable when recalled-can be blocked using a cognitive task and whether such an approach can reduce these unbidden intrusions. We predicted that reconsolidation of a reactivated visual memory of experimental trauma could be disrupted by engaging in a visuospatial task that would compete for visual working memory resources. We showed that intrusive memories were virtually abolished by playing the computer game Tetris following a memory-reactivation task 24 hr after initial exposure to experimental trauma. Furthermore, both memory reactivation and playing Tetris were required to reduce subsequent intrusions (Experiment 2), consistent with reconsolidation-update mechanisms. A simple, noninvasive cognitive-task procedure administered after emotional memory has already consolidated (i.e., > 24 hours after exposure to experimental trauma) may prevent the recurrence of intrusive memories of those emotional events. © The Author(s) 2015.

  8. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  9. Overview of seismic margin insights gained from seismic PRA results

    International Nuclear Information System (INIS)

    Kennedy, R.P.; Sues, R.H.; Campbell, R.D.

    1986-01-01

    This paper presents the findings of a study conducted under NRC and EPRI sponsorship in which published seismic PRAs were reviewed in order to gain insight to the seismic margins inherent in existing nuclear plants. The approach taken was to examine the fragilities of those components which have been found to be dominant contributors to seismic risk at plants in low-to-moderate seismic regions (SSE levels between 0.12g and 0.25g). It is concluded that there is significant margin inherent in the capacity of most critical components above the plant design basis. For ground motions less than about 0.3g, the predominant sources of seismic risk are loss of offsite power coupled with random failure of the emergency diesels, non-recoverable circuit breaker trip due to relay chatter, unanchored equipment, unreinforced non-load bearing block walls, vertical water storage tanks, systems interactions and possibly soil liquefaction. Recommendations as to which components should be reviewed in seismic margin studies for margin earthquakes less than 0.3g, between 0.3g and 0.5g, and greater than 0.5g, developed by the NRC expert panel on the quantification of seismic margins (based on the review of past PRA data, earthquake experience data, and their own personal experience) are presented

  10. Adding seismic broadband analysis to characterize Andean backarc seismicity in Argentina

    Science.gov (United States)

    Alvarado, P.; Giuliano, A.; Beck, S.; Zandt, G.

    2007-05-01

    Characterization of the highly seismically active Andean backarc is crucial for assessment of earthquake hazards in western Argentina. Moderate-to-large crustal earthquakes have caused several deaths, damage and drastic economic consequences in Argentinean history. We have studied the Andean backarc crust between 30°S and 36°S using seismic broadband data available from a previous ("the CHARGE") IRIS-PASSCAL experiment. We collected more than 12 terabytes of continuous seismic data from 22 broadband instruments deployed across Chile and Argentina during 1.5 years. Using free software we modeled full regional broadband waveforms and obtained seismic moment tensor inversions of crustal earthquakes testing for the best focal depth for each event. We also mapped differences in the Andean backarc crustal structure and found a clear correlation with different types of crustal seismicity (i.e. focal depths, focal mechanisms, magnitudes and frequencies of occurrence) and previously mapped terrane boundaries. We now plan to use the same methodology to study other regions in Argentina using near-real time broadband data available from the national seismic (INPRES) network and global seismic networks operating in the region. We will re-design the national seismic network to optimize short-period and broadband seismic station coverage for different network purposes. This work is an international effort that involves researchers and students from universities and national government agencies with the goal of providing more information about earthquake hazards in western Argentina.

  11. Seismic failure modes and seismic safety of Hardfill dam

    Directory of Open Access Journals (Sweden)

    Kun Xiong

    2013-04-01

    Full Text Available Based on microscopic damage theory and the finite element method, and using the Weibull distribution to characterize the random distribution of the mechanical properties of materials, the seismic response of a typical Hardfill dam was analyzed through numerical simulation during the earthquakes with intensities of 8 degrees and even greater. The seismic failure modes and failure mechanism of the dam were explored as well. Numerical results show that the Hardfill dam remains at a low stress level and undamaged or slightly damaged during an earthquake with an intensity of 8 degrees. During overload earthquakes, tensile cracks occur at the dam surfaces and extend to inside the dam body, and the upstream dam body experiences more serious damage than the downstream dam body. Therefore, under the seismic conditions, the failure pattern of the Hardfill dam is the tensile fracture of the upstream regions and the dam toe. Compared with traditional gravity dams, Hardfill dams have better seismic performance and greater seismic safety.

  12. Magmatic Diversity of the Wehrlitic Intrusions in the Oceanic Lower Crust of the Northern Oman Ophiolite

    Science.gov (United States)

    Kaneko, R.; Adachi, Y.; Miyashita, S.

    2014-12-01

    The Oman ophiolite extends along the east coast of Oman, and is the world's largest and best-preserved slice of obducted oceanic lithosphere. The magmatic history of this ophiolite is complex and is generally regarded as having occurred in three stages (MOR magmatism, subduction magmatism and intraplate magmatism). Wehrlitic intrusions constitute an important element of oceanic lower crust of the ophiolite, and numerous intrusions cut gabbro units in the northern Salahi block of this ophiolite. In this study area, we identified two different types of wehrlitic intrusions. One type of the intrusions mainly consists of dunite, plagioclase (Pl) wehrlite and mela-olivine (Ol) gabbro, in which the crystallization sequence is Ol followed by the contemporaneous crystallization of Pl and clinopyroxene (Cpx). This type is called "ordinary" wehrlitic intrusions and has similar mineral compositions to host gabbros (Adachi and Miyashita 2003; Kaneko et al. 2014). Another type of the intrusions is a single intrusion that crops out in an area 250 m × 150 m along Wadi Salahi. This intrusion consists of Pl-free "true" wehrlite, in which the crystallization sequence is Ol and then Cpx. The forsterite contents (Fo%) of Ol from the "ordinary" wehrlitic intrusions and "true" wehrlitic intrusions have ranges of 90.8-87.0 (NiO = 0.36-0.13 wt%) and 84.7 (NiO = 0.31 wt%), respectively. Cr numbers (Cr#) of Cr-spinel from the "true" wehrlitic intrusions show higher Cr# value of 0.85 than those of the "ordinary" wehrlitic intrusions (0.48-0.64). But the former is characterized by very high Fe3+ values (YFe3+ = 0.49-0.68). Kaneko et al. (2014) showed that the "ordinary" ubiquitous type has similar features to MOR magmatism and the depleted type in the Fizh block (Adachi and Miyashita 2003) links to subduction magmatism. These types are distinguished by their mineral chemistries (TiO2 and Na2O contents of Cpx). The TiO2 and Na2O contents of Cpx from the "true" wehrlitic intrusions have 0

  13. Environmental data processor of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Rogers, M.S.

    1977-06-01

    A data acquisition system oriented specifically toward collection and processing of various meteorological and environmental parameters has been designed around a National Semiconductor IMP-16 microprocessor, This system, called the Environmental Data Processor (EDP), was developed specifically for use with the Adaptive Intrusion Data System (AIDS) in a perimeter intrusion alarm evaluation, although its design is sufficiently general to permit use elsewhere. This report describes in general detail the design of the EDP and its interaction with other AIDS components

  14. Cultural syndromes and age moderate the emotional impact of illness intrusiveness in rheumatoid arthritis.

    Science.gov (United States)

    Devins, Gerald M; Gupta, Anita; Cameron, Jill; Woodend, Kirsten; Mah, Kenneth; Gladman, Dafna

    2009-02-01

    The authors investigated cultural syndromes (multidimensional vectors comprising culturally based attitudes, values, and beliefs) and age as moderators of the emotional impact of illness intrusiveness--illness-induced lifestyle disruptions--in rheumatoid arthritis (RA) and examined illness intrusiveness effects in total and separately for three life domains (relationships and personal development, intimacy, and instrumental). People with RA (n = 105) completed the Illness Intrusiveness Ratings, Individualism-Collectivism, and Center for Epidemiologic Studies--Depression scales in a one-on-one interview. Controlling for disease and background characteristics, the association between illness intrusiveness (total score and the Relationships and Personal Development subscale) and distress was inverse when young adults with RA endorsed high horizontal individualism. Illness intrusiveness into intimacy was associated with increased distress, and this intensified when respondents endorsed high vertical individualism, horizontal collectivism, vertical collectivism, or low horizontal individualism. The negative emotional impact of illness intrusiveness into intimacy diminished with increasing age. Given an aging and increasingly pluralistic society, diversity can no longer be ignored in addressing the psychosocial impact of chronic, disabling disease.

  15. Expert judgement on inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Hora, S.C.; von Winterfeldt, D.; Trauth, K.M.

    1991-12-01

    Four expert-judgment teams have developed analyses delineating possible future societies in the next 10,000 years in the vicinity of the Waste Isolation Pilot Plant (WIPP). Expert-judgment analysis was used to address the question of future societies because neither experimentation, observation, nor modeling can resolve such uncertainties. Each of the four, four-member teams, comprised of individuals with expertise in the physical, social, or political sciences, developed detailed qualitative assessments of possible future societies. These assessments include detailed discussions of the underlying physical and societal factors that would influence society and the likely modes of human-intrusion at the WIPP, as well as the probabilities of intrusion. Technological development, population growth, economic development, conservation of information, persistence of government control, and mitigation of danger from nuclear waste were the factors the teams believed to be most important. Likely modes of human-intrusion were categorized as excavation, disposal/storage, tunneling, drilling, and offsite activities. Each team also developed quantitative assessments by providing probabilities of various alternative futures, of inadvertent human intrusion, and in some cases, of particular modes of intrusion. The information created throughout this study will be used in conjunction with other types of information, including experimental data, calculations from physical principles and computer models, and perhaps other judgments, as input to ''performance assessment.'' The more qualitative results of this study will be used as input to another expert panel considering markers to deter inadvertent human intrusion at the WIPP

  16. Stratigraphic controls on saltwater intrusion in the Dominguez Gap area of coastal Los Angeles

    Science.gov (United States)

    Edwards, B.D.; Ehman, K.D.; Ponti, D.J.; Reichard, E.G.; Tinsley, J.C.; Rosenbauer, R.J.; Land, M.

    2009-01-01

    The Los Angeles Basin is a densely populated coastal area that significantly depends on groundwater. A part of this groundwater supply is at risk from saltwater intrusion-the impetus for this study. High-resolution seismic-reflection data collected from the Los Angeles-Long Beach Harbor Complex have been combined with borehole geophysical and descriptive geological data from four nearby ??400-m-deep continuously cored wells and with borehole geophysical data from adjacent water and oil wells to characterize the Pliocene to Holocene stratigraphy of the Dominguez Gap coastal aquifer system. The new data are shown as a north-south, two- dimensional, sequence-stratigraphic model that is compared to existing lithostratigraphic models of the Los Angeles Basin in an attempt to better understand pathways of saltwater intrusion into coastal aquifers. Intrusion of saltwater into the coastal aquifer system generally is attributed to over-pumping that caused the hydraulic gradient to reverse during the mid-1920s. Local water managers have used the existing lithostratigraphic model to site closely spaced injection wells of freshwater (barrier projects) attempting to hydraulically control the saltwater intrusion. Improved understanding of the stratigraphic relationships can guide modifications to barrier design that will allow more efficient operation. Allostratigraphic nomenclature is used to define a new sequence-stratigraphic model for the area because the existing lithostratigraphic correlations that have been used to define aquifer systems are shown not to be time-correlative. The youngest sequence, the Holocene Dominguez sequence, contains the Gaspur aquifer at its base. The Gaspur aquifer is intruded with saltwater and consists of essentially flat-lying gravelly sands deposited by the ancestral Los Angeles River as broad channels that occupied a paleovalley incised into the coastal plain during the last glacio-eustatic highstand. The underlying sequences are deformed into

  17. Intrusion detection techniques for plant-wide network in a nuclear power plant

    International Nuclear Information System (INIS)

    Rajasekhar, P.; Shrikhande, S.V.; Biswas, B.B.; Patil, R.K.

    2012-01-01

    Nuclear power plants have a lot of critical data to be sent to the operator workstations. A plant wide integrated communication network, with high throughput, determinism and redundancy, is required between the workstations and the field. Switched Ethernet network is a promising prospect for such an integrated communication network. But for such an integrated system, intrusion is a major issue. Hence the network should have an intrusion detection system to make the network data secure and enhance the network availability. Intrusion detection is the process of monitoring the events occurring in a network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of network security policies, acceptable user policies, or standard security practices. This paper states the various intrusion detection techniques and approaches which are applicable for analysis of a plant wide network. (author)

  18. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    Sulfide intrusion in seagrasses represents a global threat to seagrasses and thereby an important parameter in resilience of seagrass ecosystems. In contrast seegrasses colonize and grow in hostile sediments, where they are constantly exposed to invasion of toxic gaseous sulfide. Remarkably little...... strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis, tracing sulfur compounds combined with ecosystem parameters we found different spatial, intraspecific and interspecific strategies to cope with sulfidic sediments. 1...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  19. Radiological risks due to intrusion into a deep bedrock repository

    International Nuclear Information System (INIS)

    Nordlinder, S.; Bergstroem, U.; Edlund, O.

    1999-01-01

    The Swedish concept for disposal of high-level waste is a deep (500 m) bedrock repository (SFL) protected by multiple barriers that isolate the waste from the environment for such a long time that the physical decay will cause a substantial reduction of the radioactivity. The aim of concentration and isolation of high-level waste is to reduce the radiation risk. Intrusion in the repository may introduce a small residual risk to individuals. A risk analysis was performed comprising dose assessment and probabilities of occurrence. Intrusions may be considered to take place either due to conscious actions or by actions without any knowledge about the repository. For conscious intrusion it may be assumed that there will be enough knowledge to manage the radiation situation in a professional manner. Several reasons for making inadvertent intrusion are possible. Independently of the purpose, the most probable initial way of coming into contact with the radioactive material is by deep drilling. Examples of causes for drilling could be general scientific purposes or exploitation of geothermal energy. Dose assessments were made for intrusion due to inclined drilling directly into a canister, and drilling near an initially malfunctioning canister from which radionuclides have leaked into the groundwater. For the former case, external pathways were considered due to exposure from a core of the canister with fuel and contaminated bore dust. The most common drilling method is with water flushing for removal of bore dust, which will not cause any substantial transfer of radionuclides to air. For the second case, it was assumed that there was a well in the vicinity. The only pathway considered was therefore consumption of water because it dominates the exposure. The highest dose rates to man were, as expected, obtained by drilling into the canister. Dose rates decrease with time after closure. During the first time the relatively short-lived radionuclides Cs-137 and Sr-90 give

  20. Sill intrusion in volcanic calderas: implications for vent opening probability

    Science.gov (United States)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    Calderas show peculiar behaviors with remarkable dynamic processes, which do not often culminate in eruptions. Observations and studies conducted in recent decades have shown that the most common cause of unrest in the calderas is due to magma intrusion; in particular, the intrusion of sills at shallow depths. Monogenic cones, with large areal dispersion, are quite common in the calderas, suggesting that the susceptibility analysis based on geological features, is not strictly suitable for estimating the vent opening probability in calderas. In general, the opening of a new eruptive vent can be regarded as a rock failure process. The stress field in the rocks that surrounds and tops the magmatic reservoirs plays an important role in causing the rock failure and creating the path that magma can follow towards the surface. In this conceptual framework, we approach the problem of getting clues about the probability of vent opening in volcanic calderas through the study of the stress field produced by the intrusion of magma, in particular, by the intrusion of a sill. We simulate the intrusion of a sill free to expand radially, with shape and dimensions which vary with time. The intrusion process is controlled by the elastic response of the rock plate above the sill, which bends because of the intrusion, and by gravity, that drives the magma towards the zones where the thickness of the sill is smaller. We calculated the stress field in the plate rock above the sill. We found that at the bottom of the rock plate above the sill the maximum intensity of tensile stress is concentrated at the front of the sill and spreads radially with it, over time. For this reason, we think that the front of the spreading sill is prone to open for eruptive vents. Even in the central area of the sill the intensity of stress is relatively high, but at the base of the rock plate stress is compressive. Under isothermal conditions, the stress soon reaches its maximum value (time interval

  1. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  2. THE PALEOPROTEROZOIC IMANDRA-VARZUGA RIFTING STRUCTURE (KOLA PENINSULA: INTRUSIVE MAGMATISM AND MINERAGENY

    Directory of Open Access Journals (Sweden)

    V. V. Chashchin

    2014-01-01

    Full Text Available The article provides data on the structure of the Paleoproterozoic intercontinental Imandra-Varzuga rifting structure (IVS and compositions of intrusive formations typical of the early stage of the IVS development and associated mineral resources. IVS is located in the central part of the Kola region. Its length is about 350 km, and its width varies from 10 km at the flanks to 50 km in the central part. IVS contains an association of the sedimentary-volcanic, intrusive and dyke complexes. It is a part of a large igneous Paleoproterozoic province of the Fennoscandian Shield spreading for a huge area (about 1 million km2, which probably reflects the settings of the head part of the mantle plume. Two age groups of layered intrusions were associated with the initial stage of the IVS development. The layered intrusions of the Fedorovo-Pansky and Monchegorsk complexes (about 2.50 Ga are confined to the northern flank and the western closure of IVS, while intrusions of the Imandra complex (about 2.45 Ga are located at the southern flank of IVS. Intrusions of older complexes are composed of rock series from dunite to gabbro and anorthosites (Monchegorsk complex and from orthopyroxenite to gabbro and anorthosites (Fedorovo-Pansky complex. Some intrusions of this complexes reveal features of multiphase ones. The younger Imandra complex intrusions (about 2.45 Ga are stratified from orthopyroxenite to ferrogabbro. Their important feature is comagmatical connection with volcanites. All the intrusive complexes have the boninite-like mantle origin enriched by lithophyle components. Rocks of these two complexеs with different age have specific geochemical characteristics. In the rocks of the Monchegorsk and Fedorovo-Pansky complexes, the accumulation of REE clearly depends on the basicity of the rocks, the spectrum of REE is non-fractionated and ‘flat’, and the Eu positive anomaly is slightly manifested. In the rocks of the Imandra complex, the level of

  3. Experimental results from a reactor monitoring experiment with a cubic meter scale antineutrino detector

    International Nuclear Information System (INIS)

    Bernstein, A.

    2007-01-01

    Cubic meter scale antineutrino detectors can stably and no intrusively monitor both plutonium content and reactor power at the few percent level, at a standoff of a few tens of meters. Our Lawrence Livermore National Laboratory/Sandia National Laboratories collaboration has deployed a detector to demonstrate this capability at a 3 GWt pressurized water reactor in Southern California, operating 25 meters from the core center, and acquiring data over an approximate one year period. Such monitoring may be useful for tracking power output and plutonium buildup in nuclear reactors, constraining the fissile content and providing the earliest possible measurement of the amount of plutonium in the reactor core. We present our antineutrino event sample, and show that the observed change in antineutrino rate recorded in our detector over the reactor cycle correlates with plutonium ingrowth according to predictions. We present our current precision and estimate the attainable precision of the method, and discuss the benefits this technology may have for the International Atomic Energy Agency (IAEA) or other safeguards regimes

  4. Early estimation of epicenter seismic intensities according to co-seismic deformation

    OpenAIRE

    Weidong, Li; Chaojun, Zhang; Dahui, Li; Jiayong, He; Huizhong, Chen; Lomnitz, Cinna

    2010-01-01

    The absolute fault displacement in co-seismic deformation is derived assuming that location, depth, faulting mechanism and magnitude of the earthquake are known. The 2008 Wenchuan earthquake (M8.0) is used as an example to determine the distribution of seismic intensities using absolute displacement and a crustal model. We fnd that an early prediction of the distribution of seismic intensities after a large earthquake may be performed from the estimated absolute co-seismic displacements using...

  5. Facebook intrusion, fear of missing out, narcissism, and life satisfaction: A cross-sectional study.

    Science.gov (United States)

    Błachnio, Agata; Przepiórka, Aneta

    2018-01-01

    Facebook is one of the most popular social networking sites. The present paper examines the relations between fear of missing out, narcissism, Facebook intrusion, and life satisfaction. We hypothesized that the fear of missing out and narcissism would play a significant role in Facebook intrusion. The participants in the study were 360 Polish users of Facebook. We administered the Facebook Intrusion Scale, the Fear of Missing Out Scale, the Narcissistic Personality Inventory, and the Satisfaction with Life Scale. The results showed that a high level of fear of missing out and high narcissism are predictors of Facebook intrusion, while a low level of fear of missing out and high narcissism are related to satisfaction with life. Our findings provide a more comprehensive picture of the predictors of Facebook intrusion and reveal interesting patterns. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  7. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments....

  8. Working group 4B - human intrusion: Design/performance requirements

    International Nuclear Information System (INIS)

    Channell, J.

    1993-01-01

    There is no summary of the progress made by working group 4B (Human Intrusion: Design/performance Requirements) during the Electric Power Research Institute's EPRI Workshop on the technical basis of EPA HLW Disposal Criteria, March 1993. This group was to discuss the waste disposal standard, 40 CFR Part 191, in terms of the design and performance requirements of human intrusion. Instead, because there were so few members, they combined with working group 4A and studied the three-tier approach to evaluating postclosure performance

  9. Data mining approach to web application intrusions detection

    Science.gov (United States)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  10. AdaBoost-based algorithm for network intrusion detection.

    Science.gov (United States)

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  11. The LVD signals during the early-mid stages of the L'Aquila seismic sequence and the radon signature of some aftershocks of moderate magnitude

    International Nuclear Information System (INIS)

    Cigolini, C.; Laiolo, M.; Coppola, D.

    2015-01-01

    The L'Aquila seismic swarm culminated with the mainshock of April 6, 2009 (M L = 5.9). Here, we report and analyze the Large Volume Detector (LVD, used in neutrinos research) low energy traces (∼0.8 MeV), collected during the early-mid stages of the seismic sequence, together with the data of a radon monitoring experiment. The peaks of LVD traces do not correlate with the evolution and magnitude of earthquakes, including major aftershocks. Conversely, our radon measurements obtained by utilizing three automatic stations deployed along the regional NW–SE faulting system, seem to be, in one case, more efficient. In fact, the timeseries collected on the NW–SE Paganica fracture recorded marked variations and peaks that occurred during and prior moderate aftershocks (with M L > 3). The Paganica monitoring station (PGN) seems to better responds to active seismicity due to the fact that the radon detector was placed directly within the bedrock of an active fault. It is suggested that future networks for radon monitoring of active seismicity should preferentially implement this setting. - Highlights: • The April 9, 2009 Aquila earthquake (ML 5.9) had a remarkable echo in the media. • We report LVD traces together with the data of a radon monitoring experiment. • Radon emissions were measured by 3 automatic stations along the main NW–SE fault. • The one that better responds to seismicity was placed in the fault's bedrock. • Future networks for earthquake radon monitoring should implement this setting

  12. Mental Imagery and Posttraumatic Stress Disorder: a neuroimaging and experimental psychopathology approach to intrusive memories of trauma

    Directory of Open Access Journals (Sweden)

    Ian A Clark

    2015-07-01

    Full Text Available This hypothesis and theory paper presents a pragmatic framework to help bridge the clinical presentation and neuroscience of intrusive memories following psychological trauma. Intrusive memories are a hallmark symptom of Posttraumatic Stress Disorder. However, key questions, including those involving aetiology remain. In particular, we know little about the brain mechanisms involved in why only some moments of the trauma return as intrusive memories while others do not. We first present an overview of the patient experience of intrusive memories and the neuroimaging studies that have investigated intrusive memories in PTSD patients. Next, one mechanism of how to model intrusive memories in the laboratory, the trauma film paradigm, is examined. In particular, we focus on studies combining the trauma film paradigm with neuroimaging. Stemming from the clinical presentation and our current understanding of the processes involved in intrusive memories, we propose a framework in which an intrusive memory comprises five component parts; autobiographical (trauma memory, involuntary recall, negative emotions, attention hijacking and mental imagery. Each component part is considered in turn, both behaviourally and from a brain imaging perspective. A mapping of these five components onto our understanding of the brain is described. Unanswered questions that exist in our understanding of intrusive memories are considered using the proposed framework. Overall, we suggest that mental imagery is key to bridging the experience, memory and intrusive recollection of the traumatic event. Further, we suggest that by considering the brain mechanisms involved in the component parts of an intrusive memory, in particular mental imagery, we may be able to aid the development of a firmer bridge between patients’ experiences of intrusive memories and the clinical neuroscience behind them.

  13. A 5-year follow-up case of multiple intrusive luxative injuries

    Directory of Open Access Journals (Sweden)

    Seema Thakur

    2012-01-01

    Full Text Available Introduction: Traumatic intrusive luxation is one of the most severe forms of dental injuries, usually affecting the maxillary incisors. The consequence of such an occurrence is a high risk of healing complications such as pulp necrosis, external inflammatory resorption, and external replacement resorption (ankylosis. Case Report: This report presents a case of severe intrusive luxation of multiple anterior teeth in an 11-year-old girl. The teeth were repositioned successfully by endodontic and orthodontic management. The case was monitored for 5 years. Discussion: Depending on the severity of the injury, different clinical approaches for treatment of intrusive luxation may be used. Despite the variety of treatment modalities, rehabilitation of intruded teeth is always a challenge and a multidisciplinary approach is important to achieve a successful result. In this case, intruded teeth were endodontically treated with multiple calcium hydroxide dressings and repositioned orthodontically. The follow-up of such cases is very important as the repair process after intrusion is complex. After 5 years, no clinical or radiographic pathology was detected.

  14. A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing

    DEFF Research Database (Denmark)

    Wang, Yu; Xie, Lin; Li, Wenjuan

    2017-01-01

    Nowadays, cyber threats (e.g., intrusions) are distributed across various networks with the dispersed networking resources. Intrusion detection systems (IDSs) have already become an essential solution to defend against a large amount of attacks. With the development of cloud computing, a modern IDS...

  15. Geochemical characteristics and tectonic setting of the Tuerkubantao mafic-ultramafic intrusion in West Junggar, Xinjiang, China

    Directory of Open Access Journals (Sweden)

    Yufeng Deng

    2015-03-01

    Full Text Available Mineral chemistry, whole-rock major oxide, and trace element compositions have been determined for the Tuerkubantao mafic-ultramafic intrusion, in order to understand the early Paleozoic tectonic evolution of the West Junggar orogenic belt at the southern margin of the Central Asian orogenic belt. The Tuerkubantao mafic-ultramafic intrusion is a well-differentiated complex comprising peridotite, olivine pyroxenite, gabbro, and diorite. The ultramafic rocks are mostly seen in the central part of the intrusion and surrounded by mafic rocks. The Tuerkubantao intrusive rocks are characterized by enrichment of large ion lithophile elements and depleted high field strength elements relative to N-MORB. In addition, the Tuerkubantao intrusion displays relatively low Th/U and Nb/U (1.13–2.98 and 2.53–7.02, respectively and high La/Nb and Ba/Nb (1.15–4.19 and 37.7–79.82, respectively. These features indicate that the primary magma of the intrusion was derived from partial melting of a previously metasomatized mantle source in a subduction setting. The trace element patterns of peridotites, gabbros, and diorite in the Tuerkubantao intrusion have sub-parallel trends, suggesting that the different rock types are related to each other by differentiation of the same primary magma. The intrusive contact between peridotite and gabbro clearly suggest that the Tuerkubantao is not a fragment of an ophiolite. However, the Tuerkubantao intrusion displays many similarities with Alaskan-type mafic-ultramafic intrusions along major sutures of Phanerozoic orogenic belts. Common features include their geodynamic setting, internal lithological zoning, and geochemistry. The striking similarities indicate that the middle Devonian Tuerkubantao intrusion likely formed in a subduction-related setting similar to that of the Alaskan-type intrusions. In combination with the Devonian magmatism and porphyry mineralization, we propose that subduction of the oceanic slab has

  16. The assessment of human intrusion into underground repositories for radioactive waste Volume 1: Main report

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Asthon, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  17. EU-project AEROJET. Non-intrusive measurements of aircraft engine exhaust emissions

    Energy Technology Data Exchange (ETDEWEB)

    Schaefer, K.; Heland, J. [Fraunhofer-Inst. fuer Atmosphaerische Umweltforschung (IFU), Garmisch-Partenkirchen (Germany); Burrows, R. [Rolls-Royce Ltd. (United Kingdom). Engine Support Lab.; Bernard, M. [AUXITROL, S.A. (France). Aerospace Equipment Div.; Bishop, G. [British Aerospace (United Kingdom). Sowerby Research Centre; Lindermeir, E. [Deutsche Forschungsanstalt fuer Luft- und Raumfahrt e. V. (DLR), Bonn (Germany). Inst. fuer Optoelektronik; Lister, D.H. [Defence and Research Agency, Hants (United Kingdom). Propulsion and Development Dept.; Wiesen, P. [Bergische Univ. Wuppertal (Gesamthochshule) (Germany); Hilton, M. [University of Reading (United Kingdom). Dept. of Physics

    1997-12-31

    The main goal of the AEROJET programme is to demonstrate the equivalence of remote measurement techniques to conventional extractive methods for both gaseous and particulate measurements. The different remote measurement techniques are compared and calibrated. A demonstrator measurement system for exhaust gases, temperature and particulates including data-analysis software is regarded as result of this project. Non-intrusive measurements are the method of choice within the AEROJET project promising to avoid the disadvantages of the gas sampling techniques which are currently used. Different ground based non-intrusive measurement methods are demonstrated during a final evaluation phase. Several non-intrusive techniques are compared with conventional gas sampling and analysis techniques. (R.P.) 3 refs.

  18. EU-project AEROJET. Non-intrusive measurements of aircraft engine exhaust emissions

    Energy Technology Data Exchange (ETDEWEB)

    Schaefer, K; Heland, J [Fraunhofer-Inst. fuer Atmosphaerische Umweltforschung (IFU), Garmisch-Partenkirchen (Germany); Burrows, R [Rolls-Royce Ltd. (United Kingdom). Engine Support Lab.; Bernard, M [AUXITROL, S.A. (France). Aerospace Equipment Div.; Bishop, G [British Aerospace (United Kingdom). Sowerby Research Centre; Lindermeir, E [Deutsche Forschungsanstalt fuer Luft- und Raumfahrt e. V. (DLR), Bonn (Germany). Inst. fuer Optoelektronik; Lister, D H [Defence and Research Agency, Hants (United Kingdom). Propulsion and Development Dept.; Wiesen, P [Bergische Univ. Wuppertal (Gesamthochshule) (Germany); Hilton, M [University of Reading (United Kingdom). Dept. of Physics

    1998-12-31

    The main goal of the AEROJET programme is to demonstrate the equivalence of remote measurement techniques to conventional extractive methods for both gaseous and particulate measurements. The different remote measurement techniques are compared and calibrated. A demonstrator measurement system for exhaust gases, temperature and particulates including data-analysis software is regarded as result of this project. Non-intrusive measurements are the method of choice within the AEROJET project promising to avoid the disadvantages of the gas sampling techniques which are currently used. Different ground based non-intrusive measurement methods are demonstrated during a final evaluation phase. Several non-intrusive techniques are compared with conventional gas sampling and analysis techniques. (R.P.) 3 refs.

  19. Data Mining for Intrusion Detection

    Science.gov (United States)

    Singhal, Anoop; Jajodia, Sushil

    Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This chapter discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested.

  20. Mechanical design of a single-axis monolithic accelerometer for advanced seismic attenuation systems

    Energy Technology Data Exchange (ETDEWEB)

    Bertolini, Alessandro [Dipartimento di Fisica dell' Universita di Pisa and INFM, Largo Pontecorvo 2, I-56127 Pisa (Italy) and LIGO Project, California Institute of Technology, 1200 E. California Blvd., Pasadena, CA 91125 (United States)]. E-mail: alessandro.bertolini@desy.de; DeSalvo, Riccardo [LIGO Project, California Institute of Technology, 1200 E. California Blvd., Pasadena, CA 91125 (United States); Fidecaro, Francesco [Dipartimento di Fisica dell' Universita di Pisa and INFM, Largo Pontecorvo 2, I-56127 Pisa (Italy); Francesconi, Mario [Dipartimento di Fisica dell' Universita di Pisa and INFM, Largo Pontecorvo 2, I-56127 Pisa (Italy); Marka, Szabolcs [Department of Physics, Columbia University, 538 W. 120th St., New York, NY 10027 (United States); Sannibale, Virginio [LIGO Project, California Institute of Technology, 1200 E. California Blvd., Pasadena, CA 91125 (United States); Simonetti, Duccio [Dipartimento di Fisica dell' Universita di Pisa and INFM, Largo Pontecorvo 2, I-56127 Pisa (Italy); Takamori, Akiteru [LIGO Project, California Institute of Technology, 1200 E. California Blvd., Pasadena, CA 91125 (United States); Earthquake Research Institute, University of Tokyo, 1-1-1 Yayoi, Bunkyo-Ku, Tokyo 113-0032 (Japan); Tariq, Hareem [LIGO Project, California Institute of Technology, 1200 E. California Blvd., Pasadena, CA 91125 (United States)

    2006-01-15

    The design and mechanics for a new very-low noise low frequency horizontal accelerometer is presented. The sensor has been designed to be integrated in an advanced seismic isolation system for interferometric gravitational wave detectors. The motion of a small monolithic folded-pendulum (FP) is monitored by a high resolution capacitance displacement sensor; a feedback force actuator keeps the mass at the equilibrium position. The feedback signal is proportional to the ground acceleration in the frequency range 0-150Hz. The very high mechanical quality factor, Q{approx}3000 at a resonant frequency of 0.5Hz, reduces the Brownian motion of the proof mass of the accelerometer below the resolution of the displacement sensor. This scheme enables the accelerometer to detect the inertial displacement of a platform with a root-mean-square noise less than 1nm, integrated over the frequency band from 0.01 to 150Hz. The FP geometry, combined with the monolithic design, allows the accelerometer to be extremely directional. A vertical-horizontal coupling ranging better than 10{sup -3} has been achieved. A detailed account of the design and construction of the accelerometer is reported here. The instrument is fully ultra-high vacuum compatible and has been tested and approved for integration in seismic attenuation system of japanese TAMA 300 gravitational wave detector. The monolithic design also makes the accelerometer suitable for cryogenic operation.

  1. Causality between expansion of seismic cloud and maximum magnitude of induced seismicity in geothermal field

    Science.gov (United States)

    Mukuhira, Yusuke; Asanuma, Hiroshi; Ito, Takatoshi; Häring, Markus

    2016-04-01

    Occurrence of induced seismicity with large magnitude is critical environmental issues associated with fluid injection for shale gas/oil extraction, waste water disposal, carbon capture and storage, and engineered geothermal systems (EGS). Studies for prediction of the hazardous seismicity and risk assessment of induced seismicity has been activated recently. Many of these studies are based on the seismological statistics and these models use the information of the occurrence time and event magnitude. We have originally developed physics based model named "possible seismic moment model" to evaluate seismic activity and assess seismic moment which can be ready to release. This model is totally based on microseismic information of occurrence time, hypocenter location and magnitude (seismic moment). This model assumes existence of representative parameter having physical meaning that release-able seismic moment per rock volume (seismic moment density) at given field. Seismic moment density is to be estimated from microseismic distribution and their seismic moment. In addition to this, stimulated rock volume is also inferred by progress of microseismic cloud at given time and this quantity can be interpreted as the rock volume which can release seismic energy due to weakening effect of normal stress by injected fluid. Product of these two parameters (equation (1)) provide possible seismic moment which can be released from current stimulated zone as a model output. Difference between output of this model and observed cumulative seismic moment corresponds the seismic moment which will be released in future, based on current stimulation conditions. This value can be translated into possible maximum magnitude of induced seismicity in future. As this way, possible seismic moment can be used to have feedback to hydraulic stimulation operation in real time as an index which can be interpreted easily and intuitively. Possible seismic moment is defined as equation (1), where D

  2. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  3. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.

    Science.gov (United States)

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  4. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  5. Illness intrusiveness among survivors of autologous blood and marrow transplantation.

    Science.gov (United States)

    Schimmer, A D; Elliott, M E; Abbey, S E; Raiz, L; Keating, A; Beanlands, H J; McCay, E; Messner, H A; Lipton, J H; Devins, G M

    2001-12-15

    Illness-induced disruptions to lifestyles, activities, and interests (i.e., illness intrusiveness) compromise subjective well-being. The authors measured illness intrusiveness in autologous blood and bone marrow transplantation (ABMT) survivors and compared the results with survivors of solid organ transplants. Forty-four of 64 consecutive ABMT survivors referred to the University of Toronto ABMT long-term follow-up clinic completed the Illness Intrusiveness Ratings Scale (IIRS), the Affect Balance Scale (ABS), the Atkinson Life Happiness Rating (ATKLH), the Beck Hopelessness Scale (BHS), and the Center for Epidemiologic Studies Depression (CES-D) Scale. Mean time from ABMT to evaluation was 4.6 +/- 2.8 years. All patients were in remission or had stable disease at the time of evaluation. Autologous blood and bone marrow transplantation patients' IIRS scores were compared with scores reported by recipients of kidney (n = 357), liver (n = 150), lung (n = 77), and heart (n = 60) transplants. Mean IIRS score for the 44 ABMT patients was 37.2 +/- 17 (maximum possible score, 91; minimum possible score, 13). Higher IIRS scores correlated with lower scores on the ABS (r = -0.54; P work, financial situation, and active recreation. Despite achieving a remission after ABMT, patients continue to experience illness intrusiveness compromising subjective well-being. Copyright 2001 American Cancer Society.

  6. Seismic Studies

    Energy Technology Data Exchange (ETDEWEB)

    R. Quittmeyer

    2006-09-25

    This technical work plan (TWP) describes the efforts to develop and confirm seismic ground motion inputs used for preclosure design and probabilistic safety 'analyses and to assess the postclosure performance of a repository at Yucca Mountain, Nevada. As part of the effort to develop seismic inputs, the TWP covers testing and analyses that provide the technical basis for inputs to the seismic ground-motion site-response model. The TWP also addresses preparation of a seismic methodology report for submission to the U.S. Nuclear Regulatory Commission (NRC). The activities discussed in this TWP are planned for fiscal years (FY) 2006 through 2008. Some of the work enhances the technical basis for previously developed seismic inputs and reduces uncertainties and conservatism used in previous analyses and modeling. These activities support the defense of a license application. Other activities provide new results that will support development of the preclosure, safety case; these results directly support and will be included in the license application. Table 1 indicates which activities support the license application and which support licensing defense. The activities are listed in Section 1.2; the methods and approaches used to implement them are discussed in more detail in Section 2.2. Technical and performance objectives of this work scope are: (1) For annual ground motion exceedance probabilities appropriate for preclosure design analyses, provide site-specific seismic design acceleration response spectra for a range of damping values; strain-compatible soil properties; peak motions, strains, and curvatures as a function of depth; and time histories (acceleration, velocity, and displacement). Provide seismic design inputs for the waste emplacement level and for surface sites. Results should be consistent with the probabilistic seismic hazard analysis (PSHA) for Yucca Mountain and reflect, as appropriate, available knowledge on the limits to extreme ground

  7. Seismic Studies

    International Nuclear Information System (INIS)

    R. Quittmeyer

    2006-01-01

    This technical work plan (TWP) describes the efforts to develop and confirm seismic ground motion inputs used for preclosure design and probabilistic safety 'analyses and to assess the postclosure performance of a repository at Yucca Mountain, Nevada. As part of the effort to develop seismic inputs, the TWP covers testing and analyses that provide the technical basis for inputs to the seismic ground-motion site-response model. The TWP also addresses preparation of a seismic methodology report for submission to the U.S. Nuclear Regulatory Commission (NRC). The activities discussed in this TWP are planned for fiscal years (FY) 2006 through 2008. Some of the work enhances the technical basis for previously developed seismic inputs and reduces uncertainties and conservatism used in previous analyses and modeling. These activities support the defense of a license application. Other activities provide new results that will support development of the preclosure, safety case; these results directly support and will be included in the license application. Table 1 indicates which activities support the license application and which support licensing defense. The activities are listed in Section 1.2; the methods and approaches used to implement them are discussed in more detail in Section 2.2. Technical and performance objectives of this work scope are: (1) For annual ground motion exceedance probabilities appropriate for preclosure design analyses, provide site-specific seismic design acceleration response spectra for a range of damping values; strain-compatible soil properties; peak motions, strains, and curvatures as a function of depth; and time histories (acceleration, velocity, and displacement). Provide seismic design inputs for the waste emplacement level and for surface sites. Results should be consistent with the probabilistic seismic hazard analysis (PSHA) for Yucca Mountain and reflect, as appropriate, available knowledge on the limits to extreme ground motion at

  8. Using Seismic Interferometry to Investigate Seismic Swarms

    Science.gov (United States)

    Matzel, E.; Morency, C.; Templeton, D. C.

    2017-12-01

    Seismicity provides a direct means of measuring the physical characteristics of active tectonic features such as fault zones. Hundreds of small earthquakes often occur along a fault during a seismic swarm. This seismicity helps define the tectonically active region. When processed using novel geophysical techniques, we can isolate the energy sensitive to the fault, itself. Here we focus on two methods of seismic interferometry, ambient noise correlation (ANC) and the virtual seismometer method (VSM). ANC is based on the observation that the Earth's background noise includes coherent energy, which can be recovered by observing over long time periods and allowing the incoherent energy to cancel out. The cross correlation of ambient noise between a pair of stations results in a waveform that is identical to the seismogram that would result if an impulsive source located at one of the stations was recorded at the other, the Green function (GF). The calculation of the GF is often stable after a few weeks of continuous data correlation, any perturbations to the GF after that point are directly related to changes in the subsurface and can be used for 4D monitoring.VSM is a style of seismic interferometry that provides fast, precise, high frequency estimates of the Green's function (GF) between earthquakes. VSM illuminates the subsurface precisely where the pressures are changing and has the potential to image the evolution of seismicity over time, including changes in the style of faulting. With hundreds of earthquakes, we can calculate thousands of waveforms. At the same time, VSM collapses the computational domain, often by 2-3 orders of magnitude. This allows us to do high frequency 3D modeling in the fault region. Using data from a swarm of earthquakes near the Salton Sea, we demonstrate the power of these techniques, illustrating our ability to scale from the far field, where sources are well separated, to the near field where their locations fall within each other

  9. Strontium isotopic geochemistry of intrusive rocks, Puerto Rico, Greater Antilles

    International Nuclear Information System (INIS)

    Jones, L.M.; Kesler, S.E.

    1980-01-01

    The strontium isotope geochemistry is given for three Puerto Rican intrusive rocks: the granodioritic Morovis and San Lorenzo plutons and the Rio Blanco stock of quartz dioritic composition. The average calculated initial 87 Sr/ 86 Sr ratios are 0.70370, 0.70355 and 0.70408, respectively. In addition, the San Lorenzo data establish a whole-rock isochron of 71 +- 2 m.y., which agrees with the previously reported K-Ar age of 73 m.y. Similarity of most of the intrusive rocks in the Greater Antilles with respect to their strontium isotopic geochemistry regardless of their major element composition indicates that intrusive magmas with a wide range of composition can be derived from a single source material. The most likely source material, in view of the available isotopic data, is the mantle wedge overlying the subduction zone. (orig.)

  10. Seismic qualification of equipment

    International Nuclear Information System (INIS)

    Heidebrecht, A.C.; Tso, W.K.

    1983-03-01

    This report describes the results of an investigation into the seismic qualification of equipment located in CANDU nuclear power plants. It is particularly concerned with the evaluation of current seismic qualification requirements, the development of a suitable methodology for the seismic qualification of safety systems, and the evaluation of seismic qualification analysis and testing procedures

  11. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  12. Individual differences in spatial configuration learning predict the occurrence of intrusive memories.

    Science.gov (United States)

    Meyer, Thomas; Smeets, Tom; Giesbrecht, Timo; Quaedflieg, Conny W E M; Girardelli, Marta M; Mackay, Georgina R N; Merckelbach, Harald

    2013-03-01

    The dual-representation model of posttraumatic stress disorder (PTSD; Brewin, Gregory, Lipton, & Burgess, Psychological Review, 117, 210-232 2010) argues that intrusions occur when people fail to construct context-based representations during adverse experiences. The present study tested a specific prediction flowing from this model. In particular, we investigated whether the efficiency of temporal-lobe-based spatial configuration learning would account for individual differences in intrusive experiences and physiological reactivity in the laboratory. Participants (N = 82) completed the contextual cuing paradigm, which assesses spatial configuration learning that is believed to depend on associative encoding in the parahippocampus. They were then shown a trauma film. Afterward, startle responses were quantified during presentation of trauma reminder pictures versus unrelated neutral and emotional pictures. PTSD symptoms were recorded in the week following participation. Better configuration learning performance was associated with fewer perceptual intrusions, r = -.33, p .46) and had no direct effect on intrusion-related distress and overall PTSD symptoms, rs > -.12, ps > .29. However, configuration learning performance tended to be associated with reduced physiological responses to unrelated negative images, r = -.20, p = .07. Thus, while spatial configuration learning appears to be unrelated to affective responding to trauma reminders, our overall findings support the idea that the context-based memory system helps to reduce intrusions.

  13. Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

    OpenAIRE

    Jingyu Wang; xuefeng Zheng; Dengliang Luo

    2011-01-01

    Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources and reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. In order to address the problem of intrusion tolerance of cloud computing platform and sensitive data in...

  14. Earthquake source parameter and focal mechanism estimates for the Western Quebec Seismic Zone in eastern Canada

    Science.gov (United States)

    Rodriguez Padilla, A. M.; Onwuemeka, J.; Liu, Y.; Harrington, R. M.

    2017-12-01

    The Western Quebec Seismic Zone (WQSZ) is a 160-km-wide band of intraplate seismicity extending 500 km from the Adirondack Highlands (United States) to the Laurentian uplands (Canada). Historically, the WQSZ has experienced over fifteen earthquakes above magnitude 5, with the noteworthy MN5.2 Ladysmith event on May 17, 2013. Previous studies have associated seismicity in the area to the reactivation of Early Paleozoic normal faults within a failed Iapetan rift arm, or strength contrasts between mafic intrusions and felsic rocks due to the Mesozoic track of the Great Meteor hotspot. A good understanding of seismicity and its relation to pre-existing structures requires information about event source properties, such as static stress drop and fault plane orientation, which can be constrained via spectral analysis and focal mechanism solutions. Using data recorded by the CNSN and USArray Transportable Array, we first characterize b-value for 709 events between 2012 and 2016 in WQSZ, obtaining a value of 0.75. We then determine corner frequency and seismic moment values by fitting S-wave spectra on transverse components at all stations for 35 events MN 2.7+. We select event pairs with highly similar waveforms, proximal hypocenters, and magnitudes differing by 1-2 units. Our preliminary results using single-station spectra show corner frequencies of 15 to 40 Hz and stress drop values between 7 and 130 MPa, typical of intraplate seismicity. Last, we solve focal mechanism solutions of 35 events with impulsive P-wave arrivals at a minimum of 8 stations using the hybridMT moment tensor inversion algorithm. Our preliminary results suggest predominantly thrust faulting mechanisms, and at times oblique thrust faulting. The P-axis trend of the focal mechanism solutions suggests a principal stress orientation of NE-SW, which is consistent with that derived from focal mechanisms of earthquakes prior to 2013. We plan to fit the event pair spectral ratios to correct for attenuation

  15. Formation of thick stratiform Fe-Ti oxide layers in layered intrusion and frequent replenishment of fractionated mafic magma: Evidence from the Panzhihua intrusion, SW China

    Science.gov (United States)

    Song, Xie-Yan; Qi, Hua-Wen; Hu, Rui-Zhong; Chen, Lie-Meng; Yu, Song-Yue; Zhang, Jia-Fei

    2013-03-01

    Panzhihua intrusion is one of the largest layered intrusions that hosts huge stratiform Fe-Ti oxide layers in the central part of the Emeishan large igneous province, SW China. Up to 60 m thick stratiform massive Fe-Ti oxide layers containing 85 modal% of magnetite and ilmenite and overlying magnetite gabbro compose cyclic units of the Lower Zone of the intrusion. The cyclic units of the Middle Zone consist of magnetite gabbro and overlying gabbro. In these cyclic units, contents of Fe2O3(t), TiO2 and Cr and Fe3+/Ti4+ ratio of the rocks decrease upward, Cr content of magnetite and forsterite percentage of olivine decrease as well. The Upper Zone consists of apatite gabbro characterized by enrichment of incompatible elements (e.g., 12-18 ppm La, 20-28 ppm Y) and increasing of Fe3+/Ti4+ ratio (from 1.3 to 2.3) upward. These features indicate that the Panzhihua intrusion was repeatedly recharged by more primitive magma and evolved magmas had been extracted. Calculations using MELTS indicate that extensive fractionation of olivine and clinopyroxene in deep level resulted in increasing Fe and Ti contents in the magma. When these Fe-Ti-enriched magmas were emplaced along the base of the Panzhihua intrusion, Fe-Ti oxides became an early crystallization phase, leading to a residual magma of lower density. We propose that the unusually thick stratiform Fe-Ti oxide layers resulted from coupling of gravity settling and sorting of the crystallized Fe-Ti oxides from Fe-Ti-enriched magmas and frequent magma replenishment along the floor of the magma chamber.

  16. Geomorphology and seismic risk

    Science.gov (United States)

    Panizza, Mario

    1991-07-01

    The author analyses the contributions provided by geomorphology in studies suited to the assessment of seismic risk: this is defined as function of the seismic hazard, of the seismic susceptibility, and of the vulnerability. The geomorphological studies applicable to seismic risk assessment can be divided into two sectors: (a) morpho-neotectonic investigations conducted to identify active tectonic structures; (b) geomorphological and morphometric analyses aimed at identifying the particular situations that amplify or reduce seismic susceptibility. The morpho-neotectonic studies lead to the identification, selection and classification of the lineaments that can be linked with active tectonic structures. The most important geomorphological situations that can condition seismic susceptibility are: slope angle, debris, morphology, degradational slopes, paleo-landslides and underground cavities.

  17. Development of a software for monitoring of seismic activity through the analysis of satellite images

    Science.gov (United States)

    Soto-Pinto, C.; Poblete, A.; Arellano-Baeza, A. A.; Sanchez, G.

    2010-12-01

    A software for extraction and analysis of the lineaments has been developed and applied for the tracking of the accumulation/relaxation of stress in the Earth’s crust due to seismic and volcanic activity. A lineament is a straight or a somewhat curved feature in a satellite image, which reflects, at least partially, presence of faults in the crust. The technique of lineament extraction is based on the application of directional filters and Hough transform. The software has been checked for several earthquakes occurred in the Pacific coast of the South America with the magnitude > 4 Mw, analyzing temporal sequences of the ASTER/TERRA multispectral satellite images for the regions around an epicenter. All events were located in the regions with small seasonal variations and limited vegetation to facilitate the tracking of features associated with the seismic activity only. It was found that the number and orientation of lineaments changes significantly about one month before an earthquake approximately, and a few months later the system returns to its initial state. This effect increases with the earthquake magnitude. It also was shown that the behavior of lineaments associated to the volcano seismic activity is opposite to that obtained previously for earthquakes. This discrepancy can be explained assuming that in the last case the main reason of earthquakes is compression and accumulation of strength in the Earth’s crust due to subduction of tectonic plates, whereas in the first case we deal with the inflation of a volcano edifice due to elevation of pressure and magma intrusion.

  18. Intrusive Images in Psychological Disorders

    Science.gov (United States)

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  19. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    International Nuclear Information System (INIS)

    P. Bernot

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  20. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  1. Seismic sequences in the Sombrero Seismic Zone

    Science.gov (United States)

    Pulliam, J.; Huerfano, V. A.; ten Brink, U.; von Hillebrandt, C.

    2007-05-01

    The northeastern Caribbean, in the vicinity of Puerto Rico and the Virgin Islands, has a long and well-documented history of devastating earthquakes and tsunamis, including major events in 1670, 1787, 1867, 1916, 1918, and 1943. Recently, seismicity has been concentrated to the north and west of the British Virgin Islands, in the region referred to as the Sombrero Seismic Zone by the Puerto Rico Seismic Network (PRSN). In the combined seismicity catalog maintained by the PRSN, several hundred small to moderate magnitude events can be found in this region prior to 2006. However, beginning in 2006 and continuing to the present, the rate of seismicity in the Sombrero suddenly increased, and a new locus of activity developed to the east of the previous location. Accurate estimates of seismic hazard, and the tsunamigenic potential of seismic events, depend on an accurate and comprehensive understanding of how strain is being accommodated in this corner region. Are faults locked and accumulating strain for release in a major event? Or is strain being released via slip over a diffuse system of faults? A careful analysis of seismicity patterns in the Sombrero region has the potential to both identify faults and modes of failure, provided the aggregation scheme is tuned to properly identify related events. To this end, we experimented with a scheme to identify seismic sequences based on physical and temporal proximity, under the assumptions that (a) events occur on related fault systems as stress is refocused by immediately previous events and (b) such 'stress waves' die out with time, so that two events that occur on the same system within a relatively short time window can be said to have a similar 'trigger' in ways that two nearby events that occurred years apart cannot. Patterns that emerge from the identification, temporal sequence, and refined locations of such sequences of events carry information about stress accommodation that is obscured by large clouds of

  2. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  3. Fracturing of doleritic intrusions and associated contact zones: Implications for fluid flow in volcanic basins

    Science.gov (United States)

    Senger, Kim; Buckley, Simon J.; Chevallier, Luc; Fagereng, Åke; Galland, Olivier; Kurz, Tobias H.; Ogata, Kei; Planke, Sverre; Tveranger, Jan

    2015-02-01

    Igneous intrusions act as both carriers and barriers to subsurface fluid flow and are therefore expected to significantly influence the distribution and migration of groundwater and hydrocarbons in volcanic basins. Given the low matrix permeability of igneous rocks, the effective permeability in- and around intrusions is intimately linked to the characteristics of their associated fracture networks. Natural fracturing is caused by numerous processes including magma cooling, thermal contraction, magma emplacement and mechanical disturbance of the host rock. Fracturing may be locally enhanced along intrusion-host rock interfaces, at dyke-sill junctions, or at the base of curving sills, thereby potentially enhancing permeability associated with these features. In order to improve our understanding of fractures associated with intrusive bodies emplaced in sedimentary host rocks, we have investigated a series of outcrops from the Karoo Basin of the Eastern Cape province of South Africa, where the siliciclastic Burgersdorp Formation has been intruded by various intrusions (thin dykes, mid-sized sheet intrusions and thick sills) belonging to the Karoo dolerite. We present a quantified analysis of fracturing in- and around these igneous intrusions based on five outcrops at three individual study sites, utilizing a combination of field data, high-resolution lidar virtual outcrop models and image processing. Our results show a significant difference between the three sites in terms of fracture orientation. The observed differences can be attributed to contrasting intrusion geometries, outcrop geometry (for lidar data) and tectonic setting. Two main fracture sets were identified in the dolerite at two of the sites, oriented parallel and perpendicular to the contact respectively. Fracture spacing was consistent between the three sites, and exhibits a higher degree of variation in the dolerites compared to the host rock. At one of the study sites, fracture frequency in the

  4. Patterns of Seismicity Associated with USGS Identified Areas of Potentially Induced Seismicity.

    Science.gov (United States)

    Barnes, Caitlin; Halihan, Todd

    2018-03-13

    A systematic review across U.S. Geological Survey (USGS) identified potentially induced seismic locations was conducted to discover seismic distance patterns and trends over time away from injection disposal wells. Previous research indicates a 10 km (6 miles) average where the majority of induced seismicity is expected to occur within individual locations, with some areas reporting a larger radius of 35 km (22 miles) to over 70 km (43 miles). This research analyzed earthquake occurrences within nine USGS locations where specified wells were identified as contributors to induced seismicity to determine distance patterns from disposal wells or outward seismic migration over time using established principles of hydrogeology. Results indicate a radius of 31.6 km (20 miles) where 90% of felt earthquakes occur among locations, with the closest proximal felt seismic events, on average, occurring 3 km (1.9 miles) away from injection disposal wells. The results of this research found distance trends across multiple locations of potentially induced seismicity. © 2018, National Ground Water Association.

  5. Seismic proving test of process computer systems with a seismic floor isolation system

    International Nuclear Information System (INIS)

    Fujimoto, S.; Niwa, H.; Kondo, H.

    1995-01-01

    The authors have carried out seismic proving tests for process computer systems as a Nuclear Power Engineering Corporation (NUPEC) project sponsored by the Ministry of International Trade and Industry (MITI). This paper presents the seismic test results for evaluating functional capabilities of process computer systems with a seismic floor isolation system. The seismic floor isolation system to isolate the horizontal motion was composed of a floor frame (13 m x 13 m), ball bearing units, and spring-damper units. A series of seismic excitation tests was carried out using a large-scale shaking table of NUPEC. From the test results, the functional capabilities during large earthquakes of computer systems with a seismic floor isolation system were verified

  6. Intrusive Images in Psychological Disorders

    OpenAIRE

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in th...

  7. Seismic gaps and plate tectonics: seismic potential for major boundaries

    Energy Technology Data Exchange (ETDEWEB)

    McCann, W R; Nishenko, S P; Sykes, L R; Krause, J

    1979-01-01

    The theory of plate tectonics provides a basic framework for evaluating the potential for future great earthquakes to occur along major plate boundaries. Along most of the transform and convergent plate boundaries considered in this paper, the majority of seismic slip occurs during large earthquakes, i.e., those of magnitude 7 or greater. The concepts that rupture zones, as delineated by aftershocks, tend to abut rather than overlap, and large events occur in regions with histories of both long-and short-term seismic quiescence are used in this paper to delineate major seismic gaps. The term seismic gap is taken to refer to any region along an active plate boundary that has not experienced a large thrust or strike-slip earthquake for more than 30 years. A region of high seismic potential is a seismic gap that, for historic or tectonic reasons, is considered likely to produce a large shock during the next few decades. The seismic gap technique provides estimates of the location, size of future events and origin time to within a few tens of years at best. The accompanying map summarizes six categories of seismic potential for major plate boundaries in and around the margins of the Pacific Ocean and the Caribbean, South Sandwich and Sunda (Indonesia) regions for the next few decades. These six categories are meant to be interpreted as forecasts of the location and size of future large shocks and should not be considered to be predictions in which a precise estimate of the time of occurrence is specified. The categories of potential assigned here provide a rationale for assigning priorities for instrumentation, for future studies aimed at predicting large earthquakes and for making estimates of tsunami potential.

  8. Intense Seismic Activity at Chiles and Cerro Negro Volcanoes on the Colombia-Ecuador Border

    Science.gov (United States)

    Torres, R. A.; Cadena, O.; Gomez, D.; Ruiz, M. C.; Prejean, S. G.; Lyons, J. J.; White, R. A.

    2015-12-01

    The region of Chiles and Cerro Negro volcanoes, located on the Colombian-Ecuadorian border, has experienced an ongoing seismic swarm beginning in Aug. 2013. Based on concern for local residents and authorities, a cooperative broadband monitoring network was installed by the Servicio Geológico Colombiano in Colombia and the Instituto Geofísico of the Escuela Politécnica Nacional in Ecuador. Since November 2013 more than 538,000 earthquakes were recorded; although since May 2015 the seismicity has decreased significantly to an average of 70 events per day. Three large earthquake swarms with increasing energy occurred in Aug.-Oct. 2013, March-May 2014, and Sept.-Dec. 2014. By the end of 2014, roughly 400 earthquakes greater than M 3 had occurred with a maximum rate of 8000 earthquakes per day. The largest earthquake was a 5.6 ML on Oct. 20, 2014. This event produced an InSAR coseismic deformation of ~23 cm (S. Ebmeier, personal communication). Most events are typical brittle failure volcano-tectonic (VT) earthquakes that are located in a cluster beneath the southern flank of Chiles volcano, with depths between 1.5 and 10 km. Although the great majority of earthquakes are VT, some low-frequency (LF, ~0.5 Hz) and very-low-frequency (VLF) events have occurred. Particle motion analysis suggests that the VLF source migrated with time. While a VLF on Oct. 15, 2014 was located south of Chiles volcano, near the InSAR source, the VLF registered on Feb. 14, 2015 was likely located very close to Chiles Volcano. We infer that magma intrusion and resulting fluid exsolution at depths greater than 5 km are driving seismicity in the Chiles-Cerro Negro region. However earthquakes are failing in a manner consistent with regional tectonics. Relative relocations reveal a structure consistent with mapped regional faults. Thus seismicity is likely controlled by an interaction of magmatic and tectonic processes. Because the regional stress field is highly compressional and the volcanoes

  9. Recent Vs. Historical Seismicity Analysis For Banat Seismic Region (Western Part Of Romania

    Directory of Open Access Journals (Sweden)

    Oros Eugen

    2015-03-01

    Full Text Available The present day seismic activity from a region reflects the active tectonics and can confirm the seismic potential of the seismogenic sources as they are modelled using the historical seismicity. This paper makes a comparative analysis of the last decade seismicity recorded in the Banat Seismic Region (western part of Romania and the historical seismicity of the region (Mw≥4.0. Four significant earthquake sequences have been recently localized in the region, three of them nearby the city of Timisoara (January 2012 and March 2013 and the fourth within Hateg Basin, South Carpathians (October 2013. These sequences occurred within the epicentral areas of some strong historical earthquakes (Mw≥5.0. The main events had some macroseismic effects on people up to some few kilometers from the epicenters. Our results update the Romanian earthquakes catalogue and bring new information along the local seismic hazard sources models and seismotectonics.

  10. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    Science.gov (United States)

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation

    Directory of Open Access Journals (Sweden)

    Basant Subba

    2016-06-01

    Full Text Available Present Intrusion Detection Systems (IDSs for MANETs require continuous monitoring which leads to rapid depletion of a node's battery life. To address this issue, we propose a new IDS scheme comprising a novel cluster leader election process and a hybrid IDS. The cluster leader election process uses the Vickrey–Clarke–Groves mechanism to elect the cluster leader which provides the intrusion detection service. The hybrid IDS comprises a threshold based lightweight module and a powerful anomaly based heavyweight module. Initially, only the lightweight module is activated. The decision to activate the heavyweight module is taken by modeling the intrusion detection process as an incomplete information non-cooperative game between the elected leader node and the potential malicious node. Simulation results show that the proposed scheme significantly reduces the IDS traffic and overall power consumption in addition to maintaining a high detection rate and accuracy.

  12. Effective use of surface-water management to control saltwater intrusion

    Science.gov (United States)

    Hughes, J. D.; White, J.

    2012-12-01

    The Biscayne aquifer in southeast Florida is susceptible to saltwater intrusion and inundation from rising sea-level as a result of high groundwater withdrawal rates and low topographic relief. Groundwater levels in the Biscayne aquifer are managed by an extensive canal system that is designed to control flooding, supply recharge to municipal well fields, and control saltwater intrusion. We present results from an integrated surface-water/groundwater model of a portion of the Biscayne aquifer to evaluate the ability of the existing managed surface-water control network to control saltwater intrusion. Surface-water stage and flow are simulated using a hydrodynamic model that solves the diffusive-wave approximation of the depth-integrated shallow surface-water equations. Variable-density groundwater flow and fluid density are solved using the Oberbeck--Boussinesq approximation of the three-dimensional variable-density groundwater flow equation and a sharp interface approximation, respectively. The surface-water and variable-density groundwater domains are implicitly coupled during each Picard iteration. The Biscayne aquifer is discretized into a multi-layer model having a 500-m square horizontal grid spacing. All primary and secondary surface-water features in the active model domain are discretized into segments using the 500-m square horizontal grid. A 15-year period of time is simulated and the model includes 66 operable surface-water control structures, 127 municipal production wells, and spatially-distributed daily internal and external hydrologic stresses. Numerical results indicate that the existing surface-water system can be effectively used in many locations to control saltwater intrusion in the Biscayne aquifer resulting from increases in groundwater withdrawals or sea-level rise expected to occur over the next 25 years. In other locations, numerical results indicate surface-water control structures and/or operations may need to be modified to control

  13. Delineation of seismic source zones based on seismicity parameters ...

    Indian Academy of Sciences (India)

    these source zones were evaluated and were used in the hazard evaluation. ... seismic sources, linear and areal, were considered in the present study to model the seismic sources in the ..... taken as an authentic reference manual for iden-.

  14. Micro-seismicity and seismic moment release within the Coso Geothermal Field, California

    Science.gov (United States)

    Kaven, Joern; Hickman, Stephen H.; Davatzes, Nicholas C.

    2014-01-01

    We relocate 16 years of seismicity in the Coso Geothermal Field (CGF) using differential travel times and simultaneously invert for seismic velocities to improve our knowledge of the subsurface geologic and hydrologic structure. We expand on our previous results by doubling the number of relocated events from April 1996 through May 2012 using a new field-wide 3-D velocity model. Relocated micro-seismicity sharpens in many portions of the active geothermal reservoir, likely defining large-scale fault zones and fluid pressure compartment boundaries. However, a significant fraction of seismicity remains diffuse and does not cluster into sharply defined structures, suggesting that permeability is maintained within the reservoir through distributed brittle failure. The seismic velocity structure reveals heterogeneous distributions of compressional (Vp) and shear (Vs) wave speed, with Vs generally higher in the Main Field and East Flank and Vp remaining relatively uniform across the CGF, but with significant local variations. The Vp/Vs ratio appears to outline the two main producing compartments of the reservoir at depths below mean ground level of approximately 1 to 2.5 km, with a ridge of relatively high Vp/Vs separating the Main Field from the East Flank. Detailed analyses of spatial and temporal variations in earthquake relocations and cumulative seismic moment release in the East Flank reveal three regions with persistently high rates of seismic activity. Two of these regions exhibit sharp, stationary boundaries at the margins of the East Flank that likely represent barriers to fluid flow and advective heat transport. However, seismicity and moment release in a third region at the northern end of the East Flank spread over time to form an elongated NE to SW structure, roughly parallel both to an elongated cluster of seismicity at the southern end of the East Flank and to regional fault traces mapped at the surface. Our results indicate that high

  15. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring.

    Science.gov (United States)

    Alcalá, José M; Ureña, Jesús; Hernández, Álvaro; Gualda, David

    2017-02-11

    The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN) are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs), which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN) prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM), is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people' demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented.

  16. A Simulation-Optimization Model for Seawater Intrusion Management at Pingtung Coastal Area, Taiwan

    Directory of Open Access Journals (Sweden)

    Po-Syun Huang

    2018-02-01

    Full Text Available The coastal regions of Pingtung Plain in southern Taiwan rely on groundwater as their main source of fresh water for aquaculture, agriculture, domestic, and industrial sectors. The availability of fresh groundwater is threatened by unsustainable groundwater extraction and the over-pumpage leads to the serious problem of seawater intrusion. It is desired to find appropriate management strategies to control groundwater salinity and mitigate seawater intrusion. In this study, a simulation–optimization model has been presented to solve the problem of seawater intrusion along the coastal aquifers in Pingtung Plain and the objective is using injection well barriers and minimizing the total injection rate based on the pre-determined locations of injection barriers. The SEAWAT code is used to simulate the process of seawater intrusion and the surrogate model of artificial neural networks (ANNs is used to approximate the seawater intrusion (SWI numerical model to increase the computational efficiency during the optimization process. The heuristic optimization scheme of differential evolution (DE algorithm is selected to identify the global optimal management solution. Two different management scenarios, one is the injection barriers located along the coast and the other is the injection barrier located at the inland, are considered and the optimized results show that the deployment of injection barriers at the inland is more effective to reduce total dissolved solids (TDS concentrations and mitigate seawater intrusion than that along the coast. The computational time can be reduced by more than 98% when using ANNs to replace the numerical model and the DE algorithm has been confirmed as a robust optimization scheme to solve groundwater management problems. The proposed framework can identify the most reliable management strategies and provide a reference tool for decision making with regard to seawater intrusion remediation.

  17. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  18. Respon Konsumen pada Mobile Advergames: Intrusiveness dan Irritation

    Directory of Open Access Journals (Sweden)

    Sony Kusumasondjaja

    2016-12-01

    Full Text Available Abstract. Increasing adoption of mobile advergames to deliver marketing messages has not been followed by empirical findings to support its effectiveness. This research attempts to examine the effect of mobile advergames intrusiveness on consumer irritation, attitudes, and purchase intention. This investigation on mobile advergame effectiveness was based on the increasing use of mobile media to deliver marketing messages to consumers from different demographic background. Conceptual framework was developed based on Advertising Avoidance Theory. For data collection, self-administered survey was conducted by adopting purposive sampling involving 213 respondents residing in Surabaya who have had experience in playing mobile game as respondents. Results indicate that intrusiveness positively affects consumer irritation. Consumer irritation negatively affects attitude towards the mobile advergames and attitude towards the advertised product. The better the consumer attitude towards the mobile advergames, the more positive the attitude towards the advertised product. Moreover, the more positive the attitude towards the advertised product, the greater the consumer intention to purchase. Interestingly, consumer attitude toward the mobile advergames has insignificant influence on purchase intention. Findings of the study offer significant contribution to marketing practices using mobile advergames as media placement in their advertising strategy. Keywords: intrusiveness, irritation, mobile advergames, attitude, advertising

  19. Development of Canadian seismic design approach and overview of seismic standards

    Energy Technology Data Exchange (ETDEWEB)

    Usmani, A. [Amec Foster Wheeler, Toronto, ON (Canada); Aziz, T. [TSAziz Consulting Inc., Mississauga, ON (Canada)

    2015-07-01

    Historically the Canadian seismic design approaches have evolved for CANDU® nuclear power plants to ensure that they are designed to withstand a design basis earthquake (DBE) and have margins to meet the safety requirements of beyond DBE (BDBE). While the Canadian approach differs from others, it is comparable and in some cases more conservative. The seismic requirements are captured in five CSA nuclear standards which are kept up to date and incorporate lessons learnt from recent seismic events. This paper describes the evolution of Canadian approach, comparison with others and provides an overview and salient features of CSA seismic standards. (author)

  20. The effect of destination linked feature selection in real-time network intrusion detection

    CSIR Research Space (South Africa)

    Mzila, P

    2013-07-01

    Full Text Available techniques in the network intrusion detection system (NIDS) is the feature selection technique. The ability of NIDS to accurately identify intrusion from the network traffic relies heavily on feature selection, which describes the pattern of the network...

  1. Rescaled Range analysis of Induced Seismicity: rapid classification of clusters in seismic crisis

    Science.gov (United States)

    Bejar-Pizarro, M.; Perez Lopez, R.; Benito-Parejo, M.; Guardiola-Albert, C.; Herraiz, M.

    2017-12-01

    Different underground fluid operations, mainly gas storing, fracking and water pumping, can trigger Induced Seismicity (IS). This seismicity is normally featured by small-sized earthquakes (M<2.5), although particular cases reach magnitude as great as 5. It has been up for debate whether earthquakes greater than 5 can be triggered by IS or this level of magnitude only corresponds to tectonic earthquakes caused by stress change. Whatever the case, the characterization of IS for seismic clusters and seismic series recorded close but not into the gas storage, is still under discussion. Time-series of earthquakes obey non-linear patterns where the Hurst exponent describes the persistency or anti-persistency of the sequence. Natural seismic sequences have an H-exponent close to 0.7, which combined with the b-value time evolution during the time clusters, give us valuable information about the stationarity of the phenomena. Tectonic earthquakes consist in a main shock with a decay of time-occurrence of seismic shocks obeying the Omori's empirical law. On the contrary, IS does not exhibit a main shock and the time occurrence depends on the injection operations instead of on the tectonic energy released. In this context, the H-exponent can give information about the origin of the sequence. In 2013, a seismic crisis was declared from the Castor underground gas storing located off-shore in the Mediterranean Sea, close to the Northeastern Spanish cost. The greatest induced earthquake was 3.7. However, a 4.2 earthquake, probably of tectonic origin, occurred few days after the operations stopped. In this work, we have compared the H-exponent and the b-value time evolution according to the timeline of gas injection. Moreover, we have divided the seismic sequence into two groups: (1) Induced Seismicity and (2) Triggered Seismicity. The rescaled range analysis allows the differentiation between natural and induced seismicity and gives information about the persistency and long

  2. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    Science.gov (United States)

    Ganapathy, S.; Yogesh, P.; Kannan, A.

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. PMID:23056036

  3. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    Science.gov (United States)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  4. Background noise spectra of global seismic stations

    Energy Technology Data Exchange (ETDEWEB)

    Wada, M.M.; Claassen, J.P.

    1996-08-01

    Over an extended period of time station noise spectra were collected from various sources for use in estimating the detection and location performance of global networks of seismic stations. As the database of noise spectra enlarged and duplicate entries became available, an effort was mounted to more carefully select station noise spectra while discarding others. This report discusses the methodology and criteria by which the noise spectra were selected. It also identifies and illustrates the station noise spectra which survived the selection process and which currently contribute to the modeling efforts. The resulting catalog of noise statistics not only benefits those who model network performance but also those who wish to select stations on the basis of their noise level as may occur in designing networks or in selecting seismological data for analysis on the basis of station noise level. In view of the various ways by which station noise were estimated by the different contributors, it is advisable that future efforts which predict network performance have available station noise data and spectral estimation methods which are compatible with the statistics underlying seismic noise. This appropriately requires (1) averaging noise over seasonal and/or diurnal cycles, (2) averaging noise over time intervals comparable to those employed by actual detectors, and (3) using logarithmic measures of the noise.

  5. Quantitative Seismic Amplitude Analysis

    NARCIS (Netherlands)

    Dey, A.K.

    2011-01-01

    The Seismic Value Chain quantifies the cyclic interaction between seismic acquisition, imaging and reservoir characterization. Modern seismic innovation to address the global imbalance in hydrocarbon supply and demand requires such cyclic interaction of both feed-forward and feed-back processes.

  6. Time to face it! Facebook intrusion and the implications for romantic jealousy and relationship satisfaction.

    Science.gov (United States)

    Elphinston, Rachel A; Noller, Patricia

    2011-11-01

    Young people's exposure to social network sites such as Facebook is increasing, along with the potential for such use to complicate romantic relationships. Yet, little is known about the overlaps between the online and offline worlds. We extended previous research by investigating the links between Facebook intrusion, jealousy in romantic relationships, and relationship outcomes in a sample of undergraduates currently in a romantic relationship. A Facebook Intrusion Questionnaire was developed based on key features of technological (behavioral) addictions. An eight-item Facebook Intrusion Questionnaire with a single-factor structure was supported; internal consistency was high. Facebook intrusion was linked to relationship dissatisfaction, via jealous cognitions and surveillance behaviors. The results highlight the possibility of high levels of Facebook intrusion spilling over into romantic relationships, resulting in problems such as jealousy and dissatisfaction. The results have implications for romantic relationships and for Facebook users in general.

  7. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  8. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  9. Seismic Design of a Single Bored Tunnel: Longitudinal Deformations and Seismic Joints

    Science.gov (United States)

    Oh, J.; Moon, T.

    2018-03-01

    The large diameter bored tunnel passing through rock and alluvial deposits subjected to seismic loading is analyzed for estimating longitudinal deformations and member forces on the segmental tunnel liners. The project site has challenges including high hydrostatic pressure, variable ground profile and high seismic loading. To ensure the safety of segmental tunnel liner from the seismic demands, the performance-based two-level design earthquake approach, Functional Evaluation Earthquake and Safety Evaluation Earthquake, has been adopted. The longitudinal tunnel and ground response seismic analyses are performed using a three-dimensional quasi-static linear elastic and nonlinear elastic discrete beam-spring elements to represent segmental liner and ground spring, respectively. Three components (longitudinal, transverse and vertical) of free-field ground displacement-time histories evaluated from site response analyses considering wave passage effects have been applied at the end support of the strain-compatible ground springs. The result of the longitudinal seismic analyses suggests that seismic joint for the mitigation measure requiring the design deflection capacity of 5-7.5 cm is to be furnished at the transition zone between hard and soft ground condition where the maximum member forces on the segmental liner (i.e., axial, shear forces and bending moments) are induced. The paper illustrates how detailed numerical analyses can be practically applied to evaluate the axial and curvature deformations along the tunnel alignment under difficult ground conditions and to provide the seismic joints at proper locations to effectively reduce the seismic demands below the allowable levels.

  10. Maternal intrusiveness, family financial means, and anxiety across childhood in a large multiphase sample of community youth

    Science.gov (United States)

    Cooper-Vince, Christine E.; Pincus, Donna B.; Comer, Jonathan S.

    2013-01-01

    Intrusive parenting has been positively associated with child anxiety, although examinations of this relationship to date have been largely confined to middle to upper middle class families and have rarely used longitudinal designs. With several leading interventions for child anxiety emphasizing the reduction of parental intrusiveness, it is critical to determine whether the links between parental intrusiveness and child anxiety broadly apply to families of all financial means, and whether parental intrusiveness prospectively predicts the development of child anxiety. This study employed latent growth curve analysis to evaluate the interactive effects of maternal intrusiveness and financial means on the developmental trajectory of child anxiety from 1st grade to age 15 in 1,121 children (50.7% male) and their parents from the NICHD SECCYD. The overall model was found to provide good fit, revealing that early maternal intrusiveness and financial means did not impact individual trajectories of change in child anxiety, which were stable from 1st to 5th grade, and then decrease from 5th grade to age 15. Cross-sectional analyses also examined whether family financial means moderated contemporaneous relationships between maternal intrusiveness and child anxiety in 3rd and 5th grades. The relationship between maternal intrusiveness and child anxiety was moderated by family financial means for 1st graders, with stronger links found among children of lower family financial means, but not for 3rd and 5th graders. Neither maternal intrusiveness nor financial means in 1st grade predicted subsequent changes in anxiety across childhood. Findings help elucidate for whom and when maternal intrusiveness has the greatest link with child anxiety and can inform targeted treatment efforts. PMID:23929005

  11. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  12. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  13. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  14. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  15. On emulation-based network intrusion detection systems

    NARCIS (Netherlands)

    Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; Etalle, S.; Stavrou, A.; Bos, H.; Portokalidis, G.

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity.

  16. Pre-Stressor Interference Control and Intrusive Memories

    NARCIS (Netherlands)

    Verwoerd, J.; Wessel, I.; De Jong, P.J.; Nieuwenhuis, Maurice; Huntjens, R.J.C.

    Although intrusive imagery is a common response in the aftermath of a stressful or traumatic event, only a minority of trauma victims show persistent re-experiencing and related psychopathology. Individual differences in pre-trauma executive control possibly play a critical role. Therefore, this

  17. Development and seismic evaluation of the seismic monitoring analysis system for HANARO

    International Nuclear Information System (INIS)

    Ryu, J. S.; Youn, D. B.; Kim, H. G.; Woo, J. S.

    2003-01-01

    Since the start of operation, the seismic monitoring system has been utilized for monitoring an earthquake at the HANARO site. The existing seismic monitoring system consists of field sensors and monitoring panel. The analog-type monitoring system with magnetic tape recorder is out-of-date model. In addition, the disadvantage of the existing system is that it does not include signal-analyzing equipment. Therefore, we have improved the analog seismic monitoring system except the field sensors into a new digital Seismic Monitoring Analysis System(SMAS) that can monitor and analyze earthquake signals. To achieve this objective for HANARO, the digital type hardware of the SMAS has been developed. The seismic monitoring and analysis programs that can provide rapid and precise information for an earthquake were developed. After the installation of the SMAS, we carried out the Site Acceptance Test (SAT) to confirm the functional capability of the newly developed system. The results of the SAT satisfy the requirements of the fabrication technical specifications. In addition, the seismic characteristics and structural integrity of the SMAS were evaluated. The results show that the cabinet of SMAS can withstand the effects of seismic loads and remain functional. This new SMAS is operating in the HANARO instrument room to acquire and analyze the signal of an earthquake

  18. How Intrusion Detection Can Improve Software Decoy Applications

    National Research Council Canada - National Science Library

    Monteiro, Valter

    2003-01-01

    This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack...

  19. A seismic design of nuclear reactor building structures applying seismic isolation system in a seismicity region-a feasibility case study in Japan

    Energy Technology Data Exchange (ETDEWEB)

    Kubo, Tetsuo [The University of Tokyo, Tokyo (Japan); Yamamoto, Tomofumi; Sato, Kunihiko [Mitsubishi Heavy Industries, Ltd., Kobe (Japan); Jimbo, Masakazu [Toshiba Corporation, Yokohama (Japan); Imaoka, Tetsuo [Hitachi-GE Nuclear Energy, Ltd., Hitachi (Japan); Umeki, Yoshito [Chubu Electric Power Co. Inc., Nagoya (Japan)

    2014-10-15

    A feasibility study on the seismic design of nuclear reactor buildings with application of a seismic isolation system is introduced. After the Hyogo-ken Nanbu earthquake in Japan of 1995, seismic isolation technologies have been widely employed for commercial buildings. Having become a mature technology, seismic isolation systems can be applied to NPP facilities in areas of high seismicity. Two reactor buildings are discussed, representing the PWR and BWR buildings in Japan, and the application of seismic isolation systems is discussed. The isolation system employing rubber bearings with a lead plug positioned (LRB) is examined. Through a series of seismic response analyses using the so-named standard design earthquake motions covering the design basis earthquake motions obtained for NPP sites in Japan, the responses of the seismic isolated reactor buildings are evaluated. It is revealed that for the building structures examined herein: (1) the responses of both isolated buildings and isolating LRBs fulfill the specified design criteria; (2) the responses obtained for the isolating LRBs first reach the ultimate condition when intensity of motion is 2.0 to 2.5 times as large as that of the design-basis; and (3) the responses of isolated reactor building fall below the range of the prescribed criteria.

  20. Seismic hazard assessment: Issues and alternatives

    Science.gov (United States)

    Wang, Z.

    2011-01-01

    Seismic hazard and risk are two very important concepts in engineering design and other policy considerations. Although seismic hazard and risk have often been used inter-changeably, they are fundamentally different. Furthermore, seismic risk is more important in engineering design and other policy considerations. Seismic hazard assessment is an effort by earth scientists to quantify seismic hazard and its associated uncertainty in time and space and to provide seismic hazard estimates for seismic risk assessment and other applications. Although seismic hazard assessment is more a scientific issue, it deserves special attention because of its significant implication to society. Two approaches, probabilistic seismic hazard analysis (PSHA) and deterministic seismic hazard analysis (DSHA), are commonly used for seismic hazard assessment. Although PSHA has been pro-claimed as the best approach for seismic hazard assessment, it is scientifically flawed (i.e., the physics and mathematics that PSHA is based on are not valid). Use of PSHA could lead to either unsafe or overly conservative engineering design or public policy, each of which has dire consequences to society. On the other hand, DSHA is a viable approach for seismic hazard assessment even though it has been labeled as unreliable. The biggest drawback of DSHA is that the temporal characteristics (i.e., earthquake frequency of occurrence and the associated uncertainty) are often neglected. An alternative, seismic hazard analysis (SHA), utilizes earthquake science and statistics directly and provides a seismic hazard estimate that can be readily used for seismic risk assessment and other applications. ?? 2010 Springer Basel AG.

  1. Determination of the Antarctic region active margin basement by using integration of the information coming from the multichannel seismic analysis and the magnetometry; Determinacao do embasamento da margen ativa da regiao Antartica pela integracao de informacoes provenientes da sismica multicanal e da magnetometria

    Energy Technology Data Exchange (ETDEWEB)

    Torres, Luiz Carlos [Diretoria de Hidrografia e Navegacao, XX (Brazil); Gomes, Benedito Souza [PETROBRAS S.A., Rio de Janeiro, RJ (Brazil); Gamboa, Luiz Antonio P. [Universidade Federal Fluminense, Niteroi, RJ (Brazil)

    1999-07-01

    Geophysical measurements were carried out in the Western Margin of the Antarctic Peninsula and Bransfield Strait by the Brazilian Antarctic Program during the summers of 1987 and 1988. The present work, using a continued seismic multi channel and magnetometry data profile crossing the area, intends to present a two-dimensional model of the interface sediment/basement and contribute to the understanding of the complex geology verified in the studying area. By this model, the main provinces of the are (Deep Ocean, South Shetland Trench, Accretionary Prism, Volcanic Arc South Shetland Islands and Bransfield Basin) could be determined. The seismic and magnetic measurements information when superposed can attribute more consistencies to the interpreted basement; although each method has its particular resolution. This way, when the seismic interpretation was not possible due to complex structures disposition, magnetic measurements could offer good estimation about basement depth. The fit between both methods (seismic and magnetic measurements) was reasonable both on the oceanic basin and in the region of Bransfield Strait. The magnetometry, as as well seismic, was sensible to the dip of Drake Plate at South Shetland Trench and the Intrusive occurrence at Bransfield Basin axis. (author)

  2. Perceptual processing during trauma, priming and the development of intrusive memories

    Science.gov (United States)

    Sündermann, Oliver; Hauschildt, Marit; Ehlers, Anke

    2013-01-01

    Background Intrusive reexperiencing in posttraumatic stress disorder (PTSD) is commonly triggered by stimuli with perceptual similarity to those present during the trauma. Information processing theories suggest that perceptual processing during the trauma and enhanced perceptual priming contribute to the easy triggering of intrusive memories by these cues. Methods Healthy volunteers (N = 51) watched neutral and trauma picture stories on a computer screen. Neutral objects that were unrelated to the content of the stories briefly appeared in the interval between the pictures. Dissociation and data-driven processing (as indicators of perceptual processing) and state anxiety during the stories were assessed with self-report questionnaires. After filler tasks, participants completed a blurred object identification task to assess priming and a recognition memory task. Intrusive memories were assessed with telephone interviews 2 weeks and 3 months later. Results Neutral objects were more strongly primed if they occurred in the context of trauma stories than if they occurred during neutral stories, although the effect size was only moderate (ηp2=.08) and only significant when trauma stories were presented first. Regardless of story order, enhanced perceptual priming predicted intrusive memories at 2-week follow-up (N = 51), but not at 3 months (n = 40). Data-driven processing, dissociation and anxiety increases during the trauma stories also predicted intrusive memories. Enhanced perceptual priming and data-driven processing were associated with lower verbal intelligence. Limitations It is unclear to what extent these findings generalize to real-life traumatic events and whether they are specific to negative emotional events. Conclusions The results provide some support for the role of perceptual processing and perceptual priming in reexperiencing symptoms. PMID:23207970

  3. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring

    Directory of Open Access Journals (Sweden)

    José M. Alcalá

    2017-02-01

    Full Text Available The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs, which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM, is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people’ demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented.

  4. Seismic and Geodetic Monitoring of the Nicoya, Costa Rica, Seismic Gap

    Science.gov (United States)

    Protti, M.; Gonzalez, V.; Schwartz, S.; Dixon, T.; Kato, T.; Kaneda, Y.; Simila, G.; Sampson, D.

    2007-05-01

    The Nicoya segment of the Middle America Trench has been recognized as a mature seismic gap with potential to generate a large earthquake in the near future (it ruptured with large earthquakes in 1853, 1900 and 1950). Low level of background seismicity and fast crustal deformation of the forearc are indicatives of strong coupling along the plate interface. Given its high seismic potential, the available data and especially the fact that the Nicoya peninsula extends over large part of the rupture area, this gap was selected as one of the two sites for a MARGINS-SEIZE experiment. With the goal of documenting the evolution of loading and stress release along this seismic gap, an international effort involving several institutions from Costa Rica, the United States and Japan is being carried out for over a decade in the region. This effort involves the installation of temporary and permanent seismic and geodetic networks. The seismic network includes short period, broad band and strong motion instruments. The seismic monitoring has provided valuable information on the geometry and characteristics of the plate interface. The geodetic network includes temporary and permanent GPS stations as well as surface and borehole tiltmeters. The geodetic networks have helped quantify the extend and degree of coupling. A continuously recording, three- station GPS network on the Nicoya Peninsula, Costa Rica, recorded what we believe is the first slow slip event observed along the plate interface of the Costa Rica subduction zone. We will present results from these monitoring networks. Collaborative international efforts are focused on expanding these seismic and geodetic networks to provide improved resolution of future creep events, to enhanced understanding of the mechanical behavior of the Nicoya subduction segment of the Middle American Trench and possibly capture the next large earthquake and its potential precursor deformation.

  5. Seismic Structure of Perth Basin (Australia) and surroundings from Passive Seismic Deployments

    Science.gov (United States)

    Issa, N.; Saygin, E.; Lumley, D. E.; Hoskin, T. E.

    2016-12-01

    We image the subsurface structure of Perth Basin, Western Australia and surroundings by using ambient seismic noise data from 14 seismic stations recently deployed by University of Western Australia (UWA) and other available permanent stations from Geoscience Australia seismic network and the Australian Seismometers in Schools program. Each of these 14 UWA seismic stations comprises a broadband sensor and a high fidelity 3-component 10 Hz geophone, recording in tandem at 250 Hz and 1000 Hz. The other stations used in this study are equipped with short period and broadband sensors. In addition, one shallow borehole station is operated with eight 3 component geophones at depths of between 2 and 44 m. The network is deployed to characterize natural seismicity in the basin and to try and identify any microseismic activity across Darling Fault Zone (DFZ), bounding the basin to the east. The DFZ stretches to approximately 1000 km north-south in Western Australia, and is one of the longest fault zones on the earth with a limited number of detected earthquakes. We use seismic noise cross- and auto-correlation methods to map seismic velocity perturbations across the basin and the transition from DFZ to the basin. Retrieved Green's functions are stable and show clear dispersed waveforms. Travel times of the surface wave Green's functions from noise cross-correlations are inverted with a two-step probabilistic framework to map the absolute shear wave velocities as a function of depth. The single station auto-correlations from the seismic noise yields P wave reflectivity under each station, marking the major discontinuities. Resulting images show the shear velocity perturbations across the region. We also quantify the variation of ambient seismic noise at different depths in the near surface using the geophones in the shallow borehole array.

  6. Internet use, Facebook intrusion, and depression: Results of a cross-sectional study.

    Science.gov (United States)

    Błachnio, A; Przepiórka, A; Pantic, I

    2015-09-01

    Facebook has become a very popular social networking platform today, particularly among adolescents and young adults, profoundly changing the way they communicate and interact. However, some reports have indicated that excessive Facebook use might have detrimental effects on mental health and be associated with certain psychological problems. Because previous findings on the relationship between Facebook addiction and depression were not unambiguous, further investigation was required. The main objective of our study was to examine the potential associations between Internet use, depression, and Facebook intrusion. A total of 672 Facebook users took part in the cross-sectional study. The Facebook Intrusion Questionnaire and the Center for Epidemiologic Studies Depression Scale were used. For collecting the data, the snowball sampling procedure was used. We showed that depression can be a predictor of Facebook intrusion. Our results provides additional evidence that daily Internet use time in minutes, gender, and age are also predictors of Facebook intrusion: that Facebook intrusion can be predicted by being male, young age, and an extensive number of minutes spent online. On the basis of this study, it is possible to conclude that there are certain demographic - variables, such as age, gender, or time spent online - that may help in outlining the profile of a user who may be in danger of becoming addicted to Facebook. This piece of knowledge may serve for prevention purposes. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  7. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  8. The Sonju Lake layered intrusion, northeast Minnesota: Internal structure and emplacement history inferred from magnetic fabrics

    Science.gov (United States)

    Maes, S.M.; Tikoff, B.; Ferre, E.C.; Brown, P.E.; Miller, J.D.

    2007-01-01

    The Sonju Lake intrusion (SLI), in northeastern Minnesota, is a layered mafic complex of Keweenawan age (1096.1 ?? 0.8 Ma) related to the Midcontinent rift. The cumulate paragenesis of the intrusion is recognized as broadly similar to the Skaergaard intrusion, a classic example of closed-system differentiation of a tholeiitic mafic magma. The SLI represents nearly closed-system differentiation through bottom-up fractional crystallization. Geochemical studies have identified the presence of a stratabound, 50-100 m thick zone anomalously enriched in Au + PGE. Similar to the PGE reefs of the Skaergaard intrusion, this PGE-enriched zone is hosted within oxide gabbro cumulates, about two-third of the way up from the base of the intrusion. We present a petrofabric study using the anisotropy of magnetic susceptibility (AMS) to investigate the emplacement and flow patterns within the Sonju Lake intrusion. Petrographic and electron microprobe studies, combined with AMS and hysteresis measurements indicate the primary source of the magnetic signal is pseudo-single domain (PSD) magnetite or titanomagnetite. Low field AMS was measured at 32 sites within the Sonju Lake intrusion, which provided information about primary igneous fabrics. The magnetic fabrics in the layered series of the Sonju Lake intrusion are consistent with sub-horizontal to inclined emplacement of the intrusion and show evidence that the cumulate layers were deposited in a dynamic environment. Well-aligned magnetic lineations, consistently plunging shallowly toward the southwest, indicate the source of the magma is a vertical sill-like feeder, presumably located beneath the Finland granite. The Finland granite acted as a density trap for the Sonju Lake magmas, forcing lateral flow of magma to the northeast. The strongly oblate magnetic shape fabrics indicate the shallowly dipping planar fabrics were enhanced by compaction of the crystal mush. ?? 2007 Elsevier B.V. All rights reserved.

  9. Context-aware local Intrusion Detection in SCADA systems : a testbed and two showcases

    NARCIS (Netherlands)

    Chromik, Justyna Joanna; Haverkort, Boudewijn R.H.M.; Remke, Anne Katharina Ingrid; Pilch, Carina; Brackmann, Pascal; Duhme, Christof; Everinghoff, Franziska; Giberlein, Artur; Teodorowicz, Thomas; Wieland, Julian

    2017-01-01

    This paper illustrates the use of a testbed that we have developed for context-aware local intrusion detection. This testbed is based on the co-simulation framework Mosaik and allows for the validation of local intrusion detection mechanisms at field stations in power distribution networks. For two

  10. THE GEOMORPHOLOGIC FEATURES OF INTRUSIVE MAGMATIC STRUCTURES FROM BÂRGĂU MOUNTAINS (EASTERN CARPATHIANS, ROMANIA

    Directory of Open Access Journals (Sweden)

    Ioan Bâca

    2016-08-01

    Full Text Available Igneous intrusive structures from Bârgău Mountains belong to the group of central Neogene volcanic chain of the Eastern Carpathians of Romania. The evolution of the relief developed on these structures are three main stages: the stage of injection of structures (Pannonian, the stage of uncovering of igneous intrusive bodies from Oligo-Miocene sedimentary cover (Pliocene, and the stage of subaerial modeling of magmatic bodies (Pliocene-current.In those circumstances, the geodiversity of intrusive magmatic structures from Bârgău Mountains is represented by several types of landforms such as: polycyclic landforms (erosional levels, structural landforms (the configuration of igneous intrusive structures, petrographic landforms (andesites, lithological contact, fluvial landforms (valleys, slopes, ridges, periglacial landforms (cryogenic and crionival landforms, biogenic and anthropogenic landforms. This study highlights certain features of the landforms modeled on igneous intrusive bodies with the aim of developing some strategy for tourism recovery by local and county authorities.

  11. Geophysics and geochemistry techniques in seawater intrusion monitoring and mapping at Kerpan, Kedah

    International Nuclear Information System (INIS)

    Bashillah Baharuddin; Nazrul Hizam Yusoff; Abdul Rahim Samsudin

    2002-01-01

    Lately, groundwater contamination has become a public concern. Seawater intrusion is not a new issue, and only it started to magnetize attention from lots of parties since at also a contributor to groundwater contamination. Therefore a study about seawater intrusion is carried out and the selected area is Kerpan, Kedah. This information is useful particularly in agriculture because any contamination that cause by chlorine (seawater) intrusion can affect crops production. For Kerpan Project, two modernized electric resistivity survey instruments, the Terrameter SAS 4000 and SAS 300C are used which provide image profiles. This profiles have the capability to access a comprehensive geological interpretation by examine subsurface electric characteristics such as resistivity, permittivity and chargeability (John, 1997). At Kerpan, Kedah a study about salinity in canals was also carried out to monitor if there is any seawater intrusion that can get through the canals. The study was done since that the canals are directly to the sea. Instrument for this study is STD 12-plus. (Author)

  12. Intrusion recognition for optic fiber vibration sensor based on the selective attention mechanism

    Science.gov (United States)

    Xu, Haiyan; Xie, Yingjuan; Li, Min; Zhang, Zhuo; Zhang, Xuewu

    2017-11-01

    Distributed fiber-optic vibration sensors receive extensive investigation and play a significant role in the sensor panorama. A fiber optic perimeter detection system based on all-fiber interferometric sensor is proposed, through the back-end analysis, processing and intelligent identification, which can distinguish effects of different intrusion activities. In this paper, an intrusion recognition based on the auditory selective attention mechanism is proposed. Firstly, considering the time-frequency of vibration, the spectrogram is calculated. Secondly, imitating the selective attention mechanism, the color, direction and brightness map of the spectrogram is computed. Based on these maps, the feature matrix is formed after normalization. The system could recognize the intrusion activities occurred along the perimeter sensors. Experiment results show that the proposed method for the perimeter is able to differentiate intrusion signals from ambient noises. What's more, the recognition rate of the system is improved while deduced the false alarm rate, the approach is proved by large practical experiment and project.

  13. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    spatiotemporal relations to form complex events which model the intrusion patterns. ... Wireless sensor networks; complex event processing; event stream; ...... of the 2006 ACM SIGMOD International Conference on Management of Data, 407– ...

  14. New seismic source `BLASTER` for seismic survey; Hasaiyaku wo shingen to shite mochiita danseiha tansa

    Energy Technology Data Exchange (ETDEWEB)

    Koike, G; Yoshikuni, Y [OYO Corp., Tokyo (Japan)

    1996-10-01

    Built-up weight and vacuole have been conceived as seismic sources without using explosive. There have been problems that they have smaller energy to generate elastic wave than explosive, and that they have inferior working performance. Concrete crushing explosive is tried to use as a new seismic source. It is considered to possess rather large seismic generating energy, and it is easy to handle from the viewpoint of safety. Performance as seismic source and applicability to exploration works of this crushing explosive were compared with four kinds of seismic sources using dynamite, dropping weight, shot-pipe utilizing shot vacuole, and impact by wooden maul. When considered by the velocity amplitude, the seismic generating energy of the crushing explosive of 120 g is about one-fifth of dynamite of 100 g. Elastic wave generated includes less high frequency component than that by dynamite, and similar to that using seismic source without explosive, such as the weight dropping. The maximum seismic receiving distance obtained by the seismic generation was about 100 m. This was effective for the slope survey with the exploration depth between 20 m and 30 m. 1 ref., 9 figs., 2 tabs.

  15. Seismic rupture modelling, strong motion prediction and seismic hazard assessment: fundamental and applied approaches

    International Nuclear Information System (INIS)

    Berge-Thierry, C.

    2007-05-01

    The defence to obtain the 'Habilitation a Diriger des Recherches' is a synthesis of the research work performed since the end of my Ph D. thesis in 1997. This synthesis covers the two years as post doctoral researcher at the Bureau d'Evaluation des Risques Sismiques at the Institut de Protection (BERSSIN), and the seven consecutive years as seismologist and head of the BERSSIN team. This work and the research project are presented in the framework of the seismic risk topic, and particularly with respect to the seismic hazard assessment. Seismic risk combines seismic hazard and vulnerability. Vulnerability combines the strength of building structures and the human and economical consequences in case of structural failure. Seismic hazard is usually defined in terms of plausible seismic motion (soil acceleration or velocity) in a site for a given time period. Either for the regulatory context or the structural specificity (conventional structure or high risk construction), seismic hazard assessment needs: to identify and locate the seismic sources (zones or faults), to characterize their activity, to evaluate the seismic motion to which the structure has to resist (including the site effects). I specialized in the field of numerical strong-motion prediction using high frequency seismic sources modelling and forming part of the IRSN allowed me to rapidly working on the different tasks of seismic hazard assessment. Thanks to the expertise practice and the participation to the regulation evolution (nuclear power plants, conventional and chemical structures), I have been able to work on empirical strong-motion prediction, including site effects. Specific questions related to the interface between seismologists and structural engineers are also presented, especially the quantification of uncertainties. This is part of the research work initiated to improve the selection of the input ground motion in designing or verifying the stability of structures. (author)

  16. Seismic and tsunami safety margin assessment

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-15

    Nuclear Regulation Authority is going to establish new seismic and tsunami safety guidelines to increase the safety of NPPs. The main purpose of this research is testing structures/components important to safety and tsunami resistant structures/components, and evaluating the capacity of them against earthquake and tsunami. Those capacity data will be utilized for the seismic and tsunami back-fit review based on the new seismic and tsunami safety guidelines. The summary of the program in 2012 is as follows. 1. Component seismic capacity test and quantitative seismic capacity evaluation. PWR emergency diesel generator partial-model seismic capacity tests have been conducted and quantitative seismic capacities have been evaluated. 2. Seismic capacity evaluation of switching-station electric equipment. Existing seismic test data investigation, specification survey and seismic response analyses have been conducted. 3. Tsunami capacity evaluation of anti-inundation measure facilities. Tsunami pressure test have been conducted utilizing a small breakwater model and evaluated basic characteristics of tsunami pressure against seawall structure. (author)

  17. Seismic and tsunami safety margin assessment

    International Nuclear Information System (INIS)

    2013-01-01

    Nuclear Regulation Authority is going to establish new seismic and tsunami safety guidelines to increase the safety of NPPs. The main purpose of this research is testing structures/components important to safety and tsunami resistant structures/components, and evaluating the capacity of them against earthquake and tsunami. Those capacity data will be utilized for the seismic and tsunami back-fit review based on the new seismic and tsunami safety guidelines. The summary of the program in 2012 is as follows. 1. Component seismic capacity test and quantitative seismic capacity evaluation. PWR emergency diesel generator partial-model seismic capacity tests have been conducted and quantitative seismic capacities have been evaluated. 2. Seismic capacity evaluation of switching-station electric equipment. Existing seismic test data investigation, specification survey and seismic response analyses have been conducted. 3. Tsunami capacity evaluation of anti-inundation measure facilities. Tsunami pressure test have been conducted utilizing a small breakwater model and evaluated basic characteristics of tsunami pressure against seawall structure. (author)

  18. Biological intrusion of low-level-waste trench covers

    Science.gov (United States)

    Hakonson, T. E.; Gladney, E. S.

    The long-term integrity of low-level waste shallow land burialsites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. The need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatment is demonstrated. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and sil overburden depth.

  19. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  20. Seismic Consequence Abstraction

    International Nuclear Information System (INIS)

    Gross, M.

    2004-01-01

    The primary purpose of this model report is to develop abstractions for the response of engineered barrier system (EBS) components to seismic hazards at a geologic repository at Yucca Mountain, Nevada, and to define the methodology for using these abstractions in a seismic scenario class for the Total System Performance Assessment - License Application (TSPA-LA). A secondary purpose of this model report is to provide information for criticality studies related to seismic hazards. The seismic hazards addressed herein are vibratory ground motion, fault displacement, and rockfall due to ground motion. The EBS components are the drip shield, the waste package, and the fuel cladding. The requirements for development of the abstractions and the associated algorithms for the seismic scenario class are defined in ''Technical Work Plan For: Regulatory Integration Modeling of Drift Degradation, Waste Package and Drip Shield Vibratory Motion and Seismic Consequences'' (BSC 2004 [DIRS 171520]). The development of these abstractions will provide a more complete representation of flow into and transport from the EBS under disruptive events. The results from this development will also address portions of integrated subissue ENG2, Mechanical Disruption of Engineered Barriers, including the acceptance criteria for this subissue defined in Section 2.2.1.3.2.3 of the ''Yucca Mountain Review Plan, Final Report'' (NRC 2003 [DIRS 163274])

  1. Seismic Consequence Abstraction

    Energy Technology Data Exchange (ETDEWEB)

    M. Gross

    2004-10-25

    The primary purpose of this model report is to develop abstractions for the response of engineered barrier system (EBS) components to seismic hazards at a geologic repository at Yucca Mountain, Nevada, and to define the methodology for using these abstractions in a seismic scenario class for the Total System Performance Assessment - License Application (TSPA-LA). A secondary purpose of this model report is to provide information for criticality studies related to seismic hazards. The seismic hazards addressed herein are vibratory ground motion, fault displacement, and rockfall due to ground motion. The EBS components are the drip shield, the waste package, and the fuel cladding. The requirements for development of the abstractions and the associated algorithms for the seismic scenario class are defined in ''Technical Work Plan For: Regulatory Integration Modeling of Drift Degradation, Waste Package and Drip Shield Vibratory Motion and Seismic Consequences'' (BSC 2004 [DIRS 171520]). The development of these abstractions will provide a more complete representation of flow into and transport from the EBS under disruptive events. The results from this development will also address portions of integrated subissue ENG2, Mechanical Disruption of Engineered Barriers, including the acceptance criteria for this subissue defined in Section 2.2.1.3.2.3 of the ''Yucca Mountain Review Plan, Final Report'' (NRC 2003 [DIRS 163274]).

  2. Wave Induced Saline Intrusion in Sea Outfalls

    DEFF Research Database (Denmark)

    Larsen, Torben; Burrows, Richard

    1989-01-01

    Experimental and numerical studies have shown that the influence of wave increases the tendency of saline intrusion in multi-riser sea outfalls. The flow field in the diffusor under such unsteady and inhomogeneous circumstances is in general very complex, but when sufficient wave energy is dissip...

  3. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  4. Detection and localization capability of an urban seismic sinkhole monitoring network

    Science.gov (United States)

    Becker, Dirk; Dahm, Torsten; Schneider, Fabian

    2017-04-01

    Microseismic events linked to underground processes in sinkhole areas might serve as precursors to larger mass dislocation or rupture events which can cause felt ground shaking or even structural damage. To identify these weak and shallow events, a sensitive local seismic monitoring network is needed. In case of an urban environment the performance of local monitoring networks is severely compromised by the high anthropogenic noise level. We study the detection and localization capability of such a network, which is already partly installed in the urban area of the city of Hamburg, Germany, within the joint project SIMULTAN (http://www.gfz-potsdam.de/en/section/near-surface-geophysics/projects/simultan/). SIMULTAN aims to monitor a known sinkhole structure and gain a better understanding of the underlying processes. The current network consists of six surface stations installed in the basement of private houses and underground structures of a research facility (DESY - Deutsches Elektronen Synchrotron). During the started monitoring campaign since 2015, no microseismic events could be unambiguously attributed to the sinkholes. To estimate the detection and location capability of the network, we calculate synthetic waveforms based on the location and mechanism of former events in the area. These waveforms are combined with the recorded urban seismic noise at the station sites. As detection algorithms a simple STA/LTA trigger and a more sophisticated phase detector are used. While the STA/LTA detector delivers stable results and is able to detect events with a moment magnitude as low as 0.35 at a distance of 1.3km from the source even under the present high noise conditions the phase detector is more sensitive but also less stable. It should be stressed that due to the local near surface conditions of the wave propagation the detections are generally performed on S- or surface waves and not on P-waves, which have a significantly lower amplitude. Due to the often

  5. Seismic evidence for arc segmentation, active magmatic intrusions and syn-rift fault system in the northern Ryukyu volcanic arc

    Science.gov (United States)

    Arai, Ryuta; Kodaira, Shuichi; Takahashi, Tsutomu; Miura, Seiichi; Kaneda, Yoshiyuki

    2018-04-01

    Tectonic and volcanic structures of the northern Ryukyu arc are investigated on the basis of multichannel seismic (MCS) reflection data. The study area forms an active volcanic front in parallel to the non-volcanic island chain in the eastern margin of the Eurasian plate and has been undergoing regional extension on its back-arc side. We carried out a MCS reflection experiment along two across-arc lines, and one of the profiles was laid out across the Tokara Channel, a linear bathymetric depression which demarcates the northern and central Ryukyu arcs. The reflection image reveals that beneath this topographic valley there exists a 3-km-deep sedimentary basin atop the arc crust, suggesting that the arc segment boundary was formed by rapid and focused subsidence of the arc crust driven by the arc-parallel extension. Around the volcanic front, magmatic conduits represented by tubular transparent bodies in the reflection images are well developed within the shallow sediments and some of them are accompanied by small fragments of dipping seismic reflectors indicating intruded sills at their bottoms. The spatial distribution of the conduits may suggest that the arc volcanism has multiple active outlets on the seafloor which bifurcate at crustal depths and/or that the location of the volcanic front has been migrating trenchward over time. Further distant from the volcanic front toward the back-arc (> 30 km away), these volcanic features vanish, and alternatively wide rift basins become predominant where rapid transitions from normal-fault-dominant regions to strike-slip-fault-dominant regions occur. This spatial variation in faulting patterns indicates complex stress regimes associated with arc/back-arc rifting in the northern Okinawa Trough.[Figure not available: see fulltext.

  6. Co-seismic slip, post-seismic slip, and largest aftershock associated with the 1994 Sanriku-haruka-oki, Japan, earthquake

    Science.gov (United States)

    Yagi, Yuji; Kikuchi, Masayuki; Nishimura, Takuya

    2003-11-01

    We analyzed continuous GPS data to investigate the spatio-temporal distribution of co-seismic slip, post-seismic slip, and largest aftershock associated with the 1994 Sanriku-haruka-oki, Japan, earthquake (Mw = 7.7). To get better resolution for co-seismic and post-seismic slip distribution, we imposed a weak constraint as a priori information of the co-seismic slip determined by seismic wave analyses. We found that the post-seismic slip during 100 days following the main-shock amount to as much moment release as the main-shock, and that the sites of co-seismic slip and post-seismic slip are partitioning on a plate boundary region in complimentary fashion. The major post-seismic slip was triggered by the mainshock in western side of the co-seismic slip, and the extent of the post-seismic slip is almost unchanged with time. It rapidly developed a shear stress concentration ahead of the slip area, and triggered the largest aftershock.

  7. Full distributed fiber optical sensor for intrusion detection in application to buried pipelines

    Science.gov (United States)

    Gao, Jianzhong; Jiang, Zhuangde; Zhao, Yulong; Zhu, Li; Zhao, Guoxian

    2005-11-01

    Based on the microbend effect of optical fiber, a distributed sensor for real-time continuous monitoring of intrusion in application to buried pipelines is proposed. The sensing element is a long cable with a special structure made up of an elastic polymer wire, an optical fiber, and a metal wire. The damage point is located with an embedded optical time domain reflectometry (OTDR) instrument. The intrusion types can be indicated by the amplitude of output voltage. Experimental results show that the detection system can alarm adequately under abnormal load and can locate the intrusion point within 22.4 m for distance of 3.023 km.

  8. Distributed fiber optic moisture intrusion sensing system

    Science.gov (United States)

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  9. Multilayer Statistical Intrusion Detection in Wireless Networks

    Science.gov (United States)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  10. Medication Adherence using Non-intrusive Wearable Sensors

    Directory of Open Access Journals (Sweden)

    T. H. Lim

    2017-12-01

    Full Text Available Activity recognition approaches have been applied in home ambient systems to monitor the status and well- being of occupant especially for home care systems. With the advancement of embedded wireless sensing devices, various applications have been proposed to monitor user´s activities and maintain a healthy lifestyle. In this paper, we propose and evaluate a Smart Medication Alert and Treatment Electronic Systems (SmartMATES using a non-intrusive wearable activity recognition sensing system to monitor and alert an user for missing medication prescription. Two sensors are used to collect data from the accelerometer and radio transceiver. Based on the data collected, SmartMATES processes the data and generate a model for the various actions including taking medication. We have evaluated the SmartMATES on 9 participants. The results show that the SmartMATES can identify and prevent missing dosage in a less intrusive way than existing mobile application and traditional approaches.

  11. Nuclear waste disposal facility intrusion: an archeologist's perspective

    International Nuclear Information System (INIS)

    Virginia, C.; Christie, L.

    1981-01-01

    A scenario is presented for the intrusion of a shallow land burial site by archeologists from a future generation. A description is given for the potential widespread exposure and contamination of populations by recovered artifacts

  12. A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Wenchao Li

    2014-01-01

    abnormal nodes from normal nodes by observing their abnormal behaviors, and we analyse parameter selection and error rate of the intrusion detection system. The paper elaborates on the design and implementation of the detection system. This system has achieved efficient, rapid intrusion detection by improving the wireless ad hoc on-demand distance vector routing protocol (Ad hoc On-Demand Distance the Vector Routing, AODV. Finally, the test results show that: the system has high detection accuracy and speed, in accordance with the requirement of wireless sensor network intrusion detection.

  13. Risk based seismic design criteria

    International Nuclear Information System (INIS)

    Kennedy, R.P.

    1999-01-01

    In order to develop a risk based seismic design criteria the following four issues must be addressed: (1) What target annual probability of seismic induced unacceptable performance is acceptable? (2) What minimum seismic margin is acceptable? (3) Given the decisions made under Issues 1 and 2, at what annual frequency of exceedance should the safe-shutdown-earthquake (SSE) ground motion be defined? (4) What seismic design criteria should be established to reasonably achieve the seismic margin defined under Issue 2? The first issue is purely a policy decision and is not addressed in this paper. Each of the other three issues are addressed. Issues 2 and 3 are integrally tied together so that a very large number of possible combinations of responses to these two issues can be used to achieve the target goal defined under Issue 1. Section 2 lays out a combined approach to these two issues and presents three potentially attractive combined resolutions of these two issues which reasonably achieves the target goal. The remainder of the paper discusses an approach which can be used to develop seismic design criteria aimed at achieving the desired seismic margin defined in resolution of Issue 2. Suggestions for revising existing seismic design criteria to more consistently achieve the desired seismic margin are presented. (orig.)

  14. Coplanar capacitance sensors for detecting water intrusion in composite structures

    International Nuclear Information System (INIS)

    Nassr, Amr A; El-Dakhakhni, Wael W; Ahmed, Wael H

    2008-01-01

    Composite materials are becoming more affordable and widely used for retrofitting, rehabilitating and repairing reinforced concrete structures designed and constructed under older specifications. However, the mechanical properties and long-term durability of composite materials may degrade severely in the presence of water intrusion. This study presents a new non-destructive evaluation (NDE) technique for detecting the water intrusion in composite structures by evaluating the dielectric properties of different composite system constituent materials. The variation in the dielectric signatures was employed to design a coplanar capacitance sensor with high sensitivity to detect such defects. An analytical model was used to study the effect of the sensor geometry on the output signal and to optimize sensor design. A finite element model was developed to validate analytical results and to evaluate other sensor design-related parameters. Experimental testing of a concrete specimen wrapped with composite laminate and containing a series of pre-induced water intrusion defects was conducted in order to validate the concept of the new technique. Experimental data showed excellent agreement with the finite element model predictions and confirmed sensor performance

  15. An Automata Based Intrusion Detection Method for Internet of Things

    Directory of Open Access Journals (Sweden)

    Yulong Fu

    2017-01-01

    Full Text Available Internet of Things (IoT transforms network communication to Machine-to-Machine (M2M basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.

  16. Simulation of sea water intrusion in coastal aquifers

    Indian Academy of Sciences (India)

    dependent miscible flow and transport modelling approach for simulation of seawater intrusion in coastal aquifers. A nonlinear optimization-based simulation methodology was used in this study. Various steady state simulations are performed for a ...

  17. Evaluation of intrusion sensors and video assessment in areas of restricted passage

    International Nuclear Information System (INIS)

    Hoover, C.E.; Ringler, C.E.

    1996-04-01

    This report discusses an evaluation of intrusion sensors and video assessment in areas of restricted passage. The discussion focuses on applications of sensors and video assessment in suspended ceilings and air ducts. It also includes current and proposed requirements for intrusion detection and assessment. Detection and nuisance alarm characteristics of selected sensors as well as assessment capabilities of low-cost board cameras were included in the evaluation

  18. Root resorption after orthodontic intrusion and extrusion:.

    NARCIS (Netherlands)

    Han, G.; Huang, S.; Hoff, J.W. Von den; Zeng, X.; Kuijpers-Jagtman, A.M.

    2005-01-01

    The aim of this investigation was to compare root resorption in the same individual after application of continuous intrusive and extrusive forces. In nine patients (mean age 15.3 years), the maxillary first premolars were randomly intruded or extruded with a continuous force of 100 cN for eight

  19. Externalizing symptoms, effortful control, and intrusive parenting: A test of bidirectional longitudinal relations during early childhood.

    Science.gov (United States)

    Eisenberg, Nancy; Taylor, Zoe E; Widaman, Keith F; Spinrad, Tracy L

    2015-11-01

    At approximately 30, 42, and 54 months of age (N = 231), the relations among children's externalizing symptoms, intrusive maternal parenting, and children's effortful control (EC) were examined. Both intrusive parenting and low EC have been related to psychopathology, but children's externalizing problems and low EC might affect the quality of parenting and one another. Mothers' intrusive behavior with their children was assessed with observations, children's EC was measured with mothers' and caregivers' reports, and children's externalizing symptoms were assessed with mothers', fathers', and caregivers' reports. In a structural equation panel model, bidirectional relations between intrusive parenting and EC were found: EC at 30 and 42 months predicted low levels of intrusive parenting a year later, controlling for prior levels of parenting and vice versa. Moreover, high levels of children's externalizing problems at both 30 and 42 months negatively predicted EC a year later, controlling for prior levels of EC. Although externalizing problems positively predicted high EC over time, this appeared to be a suppression effect because these variables had a strong negative pattern in the zero-order correlations. Moreover, when controlling for the stability of intrusive parenting, EC, and externalizing (all exhibited significant stability across time) and the aforementioned cross-lagged predictive paths, EC and externalizing problems were still negatively related within the 54-month assessment. The findings are consistent with the view that children's externalizing behavior undermines their EC and contributes to intrusive mothering and that relations between intrusive parenting and EC are bidirectional across time. Thus, interventions that focus on modifying children's externalizing problems (as well as the quality of parenting) might affect the quality of parenting they receive and, hence, subsequent problems with adjustment.

  20. Enhancement of seismic resistance of buildings

    Directory of Open Access Journals (Sweden)

    Claudiu-Sorin Dragomir

    2014-03-01

    Full Text Available The objectives of the paper are both seismic instrumentation for damage assessment and enhancing of seismic resistance of buildings. In according with seismic design codes in force the buildings are designed to resist at seismic actions. Due to the time evolution of these design provisions, there are buildings that were designed decades ago, under the less stringent provisions. The conceptual conformation is nowadays provided in all Codes of seismic design. According to the Code of seismic design P100-1:2006 the asymmetric structures do not have an appropriate seismic configuration; they have disadvantageous distribution of volumes, mass and stiffness. Using results of temporary seismic instrumentation the safety condition of the building may be assessed in different phases of work. Based on this method, the strengthening solutions may be identified and the need of seismic joints may be emphasised. All the aforementioned ideas are illustrated through a case study. Therefore it will be analysed the dynamic parameter evolution of an educational building obtained in different periods. Also, structural intervention scenarios to enhance seismic resistance will be presented.

  1. Comparing the New Madrid Seismic Zone with the Osning Thrust: implications for GIA-induced intraplate tectonics in northern Germany

    Science.gov (United States)

    Brandes, Christian; Steffen, Holger; Wu, Patrick; Tanner, David; Winsemann, Jutta

    2013-04-01

    Continental intraplate tectonics is a widespread phenomenon that causes significant earthquakes. These earthquakes even occur in areas that are characterized by low strain rates and there are often long intervals between the individual seismic events (Gangopadhyay & Talwani, 2003) that result in a hazard potential. To better understand the controlling factors of intraplate plate earthquakes in northern Germany, we compare the Osning Thrust with the intensively-studied New Madrid Seismic Zone in the Midwest USA. Both areas share major similarities such as a failed rift-basin setting, the presence of intrusive magmatic bodies in the subsurface, tectonic reactivation during the Late Cretaceous, paleo- and historic seismicity and comparable fault parameters. In addition, both areas have a very similar Late Pleistocene deglaciation history. New Madrid was c. 340 km south of the Laurentide ice sheet and ice retreat started around 21 ka and was completed by 8.5 ka (Grollimund & Zoback, 2001). The Osning Thrust was c. 310 km south of the Scandinavian ice sheet and deglaciation began at 24 ka. Both areas show historic seismicity in a similar time frame (New Madrid Seismic Zone: 1811-1812, Johnston & Schweig, 1996); Osning Thrust: 1612 and 1767, Grünthal & Bosse, 1997). We use numerical simulations to identify the timing of potentially GIA-induced fault activity, which are based on the fault stability margin concept of Wu & Hasegawa (1996). From our modelling results it is evident that the fault stability margin changed to negative between 16 and 13 ka for the Osning Thrust, which matches the OSL data of fault-related growth strata (Brandes et al., 2012). For the New Madrid Seismic Zone, the fault stability margin becomes zero between 2.5 ka BP (before 1812) to about 2 ka after the 1812 event, depending on the parameters of the model. This indicates that for both seismic zones, seismicity due to deglaciation was and still is very likely. From this study it can be derived

  2. Commerce geophysical lineament - Its source, geometry, and relation to the Reelfoot rift and New Madrid seismic zone

    Science.gov (United States)

    Langenheim, V.E.; Hildenbrand, T.G.

    1997-01-01

    The Commerce geophysical lineament is a northeast-trending magnetic and gravity feature that extends from central Arkansas to southern Illinois over a distance of ???400 km. It is parallel to the trend of the Reelfoot graben, but offset ???40 km to the northwest of the western margin of the rift floor. Modeling indicates that the source of the aeromagnetic and gravity anomalies is probably a mafic dike swarm. The age of the source of the Commerce geophysical lineament is not known, but the linearity and trend of the anomalies suggest a relationship with the Reelfoot rift, which has undergone episodic igneous activity. The Commerce geophysical lineament coincides with several topographic lineaments, movement on associated faults at least as young as Quaternary, and intrusions of various ages. Several earthquakes (Mb > 3) coincide with the Commerce geophysical lineament, but the diversity of associated focal mechanisms and the variety of surface structural features along the length of the Commerce geophysical lineament obscure its relation to the release of present-day strain. With the available seismicity data, it is difficult to attribute individual earthquakes to a specific structural lineament such as the Commerce geophysical lineament. However, the close correspondence between Quaternary faulting and present-day seismicity along the Commerce geophysical lineament is intriguing and warrants further study.

  3. Seismic risk map for Southeastern Brazil

    International Nuclear Information System (INIS)

    Mioto, J.A.

    1984-01-01

    During the last few years, some studies regarding seismic risk were prepared for three regions of Brazil. They were carried on account of two basic interests: first, toward the seismic history and recurrence of Brazilian seismic events; second, in a way as to provide seismic parameters for the design and construction of hydro and nuclear power plants. The first seismic risk map prepared for the southeastern region was elaborated in 1979 by 6he Universidade de Brasilia (UnB-Brasilia Seismological Station). In 1981 another seismic risk map was completed on the basis of seismotectonic studies carried out for the design and construction of the Nuclear power plants of Itaorna Beach (Angra dos Reis, Rio de Janeiro) by IPT (Mining and Applied Geology Division). In Brazil, until 1984, seismic studies concerning hydro and nuclear power plants and other civil construction of larger size did not take into account the seismic events from the point of view of probabilities of seismic recurrences. Such analysis in design is more important than the choice of a level of intensity or magnitude, or adoption of a seismicity level ased on deterministic methods. In this way, some considerations were made, concerning the use of seisms in Brazilian designs of hydro and nuclear power plants, as far as seismic analysis is concerned, recently altered over the current seismic risk panorama. (D.J.M.) [pt

  4. Multi-User Low Intrusive Occupancy Detection

    Directory of Open Access Journals (Sweden)

    Azkario Rizky Pratama

    2018-03-01

    Full Text Available Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS of BLE (Bluetooth Low Energy nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach.

  5. Ant colony induced decision trees for intrusion detection

    CSIR Research Space (South Africa)

    Botes, FH

    2017-06-01

    Full Text Available platform. Intrusion Detection Systems (IDS) analyse network traffic to identify suspicious patterns with the intention to compromise the system. Practitioners train classifiers to classify the data within different categories e.g. malicious or normal...

  6. Free to love? The role of intrusive parenting for young adult children's romantic relationship quality.

    Science.gov (United States)

    Parise, Miriam; Manzi, Claudia; Donato, Silvia; Iafrate, Raffaella

    2017-01-01

    Intrusive parenting is a form of boundary disturbance in the parent-child relationship which has been consistently associated with children's maladjustment. The present study examines the role of intrusive parenting for young adult children's romantic relationship quality. Relying on data from a two-wave longitudinal study among young couples in transition to marriage in Italy, we investigated the link between young adults' perceived intrusive parenting and change in their romantic relationship quality from 6 months before marriage to 18 months after marriage, as well as the mediating role of change in the capacity to include the partner in the self. Data were analyzed using actor-partner interdependence modeling. Perceived intrusive parenting negatively predicted change in inclusion of the other in the self and change in romantic relationship quality for both partners. For females, change in their capacity of inclusion of the other in the self fully mediated the association between their perceived intrusive parenting and change in their own and partner's relationship quality. Limitations and implications for practice are discussed.

  7. Evolution of Th and U whole-rock contents in the Ilimaussaq intrusion

    International Nuclear Information System (INIS)

    Bailey, J.C.; Rose-Hansen, J.; Soerensen, H.

    1981-01-01

    Thorium and uranium values of a large collction of representative samples taken from all rock types of the Ilimaussaq alkaline intrusion, South Greenland, are presented. The values are largely obtained by laboratory gamma-ray spectrometric (GRS) analysis. The results are discussed in relation to current knowledge and ideas on the petrologic evolution of the Ilimaussaq intrusion. It is concluded that (1) Rocks from the Ilimaussaq alkaline intrusion evolve to extremely high Th and U contents; (2) The evolution is characterised by appearance of low-Th/U cumulates due to the appearance of low-Th/U eudialyte as a liquidus phase; (3) Fractionation of the observed cumulus assemblages fails to explain all features of the Th-U evolution; (4) Losses of mobile fluids, rich in Th/U, occur in the final stages. (BP)

  8. Active Low Intrusion Hybrid Monitor for Wireless Sensor Networks.

    Science.gov (United States)

    Navia, Marlon; Campelo, Jose C; Bonastre, Alberto; Ors, Rafael; Capella, Juan V; Serrano, Juan J

    2015-09-18

    Several systems have been proposed to monitor wireless sensor networks (WSN). These systems may be active (causing a high degree of intrusion) or passive (low observability inside the nodes). This paper presents the implementation of an active hybrid (hardware and software) monitor with low intrusion. It is based on the addition to the sensor node of a monitor node (hardware part) which, through a standard interface, is able to receive the monitoring information sent by a piece of software executed in the sensor node. The intrusion on time, code, and energy caused in the sensor nodes by the monitor is evaluated as a function of data size and the interface used. Then different interfaces, commonly available in sensor nodes, are evaluated: serial transmission (USART), serial peripheral interface (SPI), and parallel. The proposed hybrid monitor provides highly detailed information, barely disturbed by the measurement tool (interference), about the behavior of the WSN that may be used to evaluate many properties such as performance, dependability, security, etc. Monitor nodes are self-powered and may be removed after the monitoring campaign to be reused in other campaigns and/or WSNs. No other hardware-independent monitoring platforms with such low interference have been found in the literature.

  9. Seismic retrofitting of Apsara reactor building

    International Nuclear Information System (INIS)

    Reddy, G.R.; Parulekar, Y.M.; Sharma, A.; Rao, K.N.; Narasimhan, Rajiv; Srinivas, K.; Basha, S.M.; Thomas, V.S.; Soma Kumar, K.

    2006-01-01

    Seismic analysis of Apsara Reactor building was carried out and was found not meeting the current seismic requirements. Due to the building not qualifying for seismic loads, a retrofit scheme using elasto-plastic dampers is proposed. Following activities have been performed in this direction: Carried out detailed seismic analysis of Apsara reactor building structure incorporating proposed seismic retrofit. Demonstrating the capability of the retrofitted structure to with stand the earth quake level for Trombay site as per the current standards by analysis and by model studies. Implementation of seismic retrofit program. This paper presents the details of above aspects related to Seismic analysis and retrofitting of Apsara reactor building. (author)

  10. Seismic fragility analyses

    International Nuclear Information System (INIS)

    Kostov, Marin

    2000-01-01

    In the last two decades there is increasing number of probabilistic seismic risk assessments performed. The basic ideas of the procedure for performing a Probabilistic Safety Analysis (PSA) of critical structures (NUREG/CR-2300, 1983) could be used also for normal industrial and residential buildings, dams or other structures. The general formulation of the risk assessment procedure applied in this investigation is presented in Franzini, et al., 1984. The probability of failure of a structure for an expected lifetime (for example 50 years) can be obtained from the annual frequency of failure, β E determined by the relation: β E ∫[d[β(x)]/dx]P(flx)dx. β(x) is the annual frequency of exceedance of load level x (for example, the variable x may be peak ground acceleration), P(fI x) is the conditional probability of structure failure at a given seismic load level x. The problem leads to the assessment of the seismic hazard β(x) and the fragility P(fl x). The seismic hazard curves are obtained by the probabilistic seismic hazard analysis. The fragility curves are obtained after the response of the structure is defined as probabilistic and its capacity and the associated uncertainties are assessed. Finally the fragility curves are combined with the seismic loading to estimate the frequency of failure for each critical scenario. The frequency of failure due to seismic event is presented by the scenario with the highest frequency. The tools usually applied for probabilistic safety analyses of critical structures could relatively easily be adopted to ordinary structures. The key problems are the seismic hazard definitions and the fragility analyses. The fragility could be derived either based on scaling procedures or on the base of generation. Both approaches have been presented in the paper. After the seismic risk (in terms of failure probability) is assessed there are several approaches for risk reduction. Generally the methods could be classified in two groups. The

  11. Detection capability of the IMS seismic network based on ambient seismic noise measurements

    Science.gov (United States)

    Gaebler, Peter J.; Ceranna, Lars

    2016-04-01

    All nuclear explosions - on the Earth's surface, underground, underwater or in the atmosphere - are banned by the Comprehensive Nuclear-Test-Ban Treaty (CTBT). As part of this treaty, a verification regime was put into place to detect, locate and characterize nuclear explosion testings at any time, by anyone and everywhere on the Earth. The International Monitoring System (IMS) plays a key role in the verification regime of the CTBT. Out of the different monitoring techniques used in the IMS, the seismic waveform approach is the most effective technology for monitoring nuclear underground testing and to identify and characterize potential nuclear events. This study introduces a method of seismic threshold monitoring to assess an upper magnitude limit of a potential seismic event in a certain given geographical region. The method is based on ambient seismic background noise measurements at the individual IMS seismic stations as well as on global distance correction terms for body wave magnitudes, which are calculated using the seismic reflectivity method. From our investigations we conclude that a global detection threshold of around mb 4.0 can be achieved using only stations from the primary seismic network, a clear latitudinal dependence for the detection threshold can be observed between northern and southern hemisphere. Including the seismic stations being part of the auxiliary seismic IMS network results in a slight improvement of global detection capability. However, including wave arrivals from distances greater than 120 degrees, mainly PKP-wave arrivals, leads to a significant improvement in average global detection capability. In special this leads to an improvement of the detection threshold on the southern hemisphere. We further investigate the dependence of the detection capability on spatial (latitude and longitude) and temporal (time) parameters, as well as on parameters such as source type and percentage of operational IMS stations.

  12. A model for the dynamics of crater-centered intrusion: Application to lunar floor-fractured craters

    Science.gov (United States)

    Thorey, Clément; Michaut, Chloé

    2014-01-01

    Lunar floor-fractured craters are a class of craters modified by post-impact mechanisms. They are defined by distinctive shallow floors that are convex or plate-like, sometimes with a wide floor moat bordering the wall region. Radial, concentric, and polygonal floor fractures suggest an endogenous process of modification. Two mechanisms have been proposed to account for such deformations: viscous relaxation and spreading of a magma intrusion at depth below the crater. To test the second assumption and bring more constraints on the intrusion process, we develop a model for the dynamics of magma spreading below an elastic overlying layer with a crater-like topography. As predicted in earlier more qualitative studies, the increase in lithostatic pressure at the crater wall zone prevents the intrusion from spreading laterally, leading to the thickening of the intrusion. Additionally, our model shows that the final crater floor appearance after the uplift, which can be convex or flat, with or without a circular moat bordering the wall zone, depends on the elastic thickness of the layer overlying the intrusion and on the crater size. Our model provides a simple formula to derive the elastic thickness of the overlying layer hence a minimum estimate for the intrusion depth. Finally, our model suggests that crust redistribution by cratering must have controlled magma ascent below most of these craters.

  13. Biological intrusion of low-level-waste trench covers

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Gladney, E.S.

    1981-01-01

    The long-term integrity of low-level waste shallow land burial sites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. Past research on low-level waste shallow land burial methods has emphasized physical (i.e., water infiltration, soil erosion) and chemical (radionuclide leaching) processes that can cause waste site failure and subsequent radionuclide transport. The purpose of this paper is to demonstrate the need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatments. Plants and animals not only can transport radionuclides to the ground surface via root systems and soil excavated from the cover profile by animal burrowing activities, but they modify physical and chemical processes within the cover profile by changing the water infiltration rates, soil erosion rates and chemical composition of the soil. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and soil overburden depth. The rate of biological intrusion through the various barrier materials is being evaluated through the use of activatable stable tracers

  14. Intrusive images and voluntary memory for affective pictures: contextualization and dual-task interference.

    Science.gov (United States)

    Krans, Julie; Langner, Oliver; Reinecke, Andrea; Pearson, David G

    2013-12-01

    The present study addressed the role of context information and dual-task interference during the encoding of negative pictures on intrusion development and voluntary recall. Healthy participants were shown negative pictures with or without context information. Pictures were either viewed alone or concurrently with a visuospatial or verbal task. Participants reported their intrusive images of the pictures in a diary. At follow-up, perceptual and contextual memory was tested. Participants in the context group reported more intrusive images and perceptual voluntary memory than participants in the no context group. No effects of the concurrent tasks were found on intrusive image frequency, but perceptual and contextual memory was affected according to the cognitive load of the task. The analogue method cannot be generalized to real-life trauma and the secondary tasks may differ in cognitive load. The findings challenge a dual memory model of PTSD but support an account in which retrieval strategy, rather than encoding processes, accounts for the experience of involuntary versus voluntary recall. Copyright © 2013 Elsevier Ltd. All rights reserved.

  15. QOS and Control-Theoretic Techniques for Intrusion Tolerance

    National Research Council Canada - National Science Library

    Ye, Nong

    2004-01-01

    ...), even in the face of intrusions. This report examines two host-based resources, a router and a web server, and presents simulated models of modifications that can be made to these resources to make them QoS-capable...

  16. Innovative methods to reduce salt water intrusion in harbours

    Science.gov (United States)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  17. Georgia-Armenia Transboarder seismicity studies

    Science.gov (United States)

    Godoladze, T.; Tvaradze, N.; Javakishvili, Z.; Elashvili, M.; Durgaryan, R.; Arakelyan, A.; Gevorgyan, M.

    2012-12-01

    In the presented study we performed Comprehensive seismic analyses for the Armenian-Georgian transboarder active seismic fault starting on Armenian territory, cutting the state boarder and having possibly northern termination on Adjara-Triealeti frontal structure in Georgia. In the scope of International projects: ISTC A-1418 "Open network of scientific Centers for mitigation risk of natural hazards in the Southern Caucasus and Central Asia" and NATO SfP- 983284 Project "Caucasus Seismic Emergency Response" in Akhalkalaki (Georgia) seismic center, Regional Summer school trainings and intensive filed investigations were conducted. Main goal was multidisciplinary study of the Javakheti fault structure and better understanding seismicity of the area. Young scientists from Turkey, Armenia, Azerbaijan and Georgia were participated in the deployment of temporal seismic network in order to monitor seisimity on the Javakheti highland and particularly delineate fault scarf and identify active seismic structures. In the scope of international collaboration the common seismic database has been created in the southern Caucasus and collected data from the field works is available now online. Javakheti highland, which is located in the central part of the Caucasus, belongs to the structure of the lesser Caucasus and represents a history of neotectonic volcanism existed in the area. Jasvakheti highland is seismicalu active region devastating from several severe earthquakes(1088, 1283, 1899…). Hypocenters located during analogue network were highly scattered and did not describe real pattern of seismicity of the highland. We relocated hypocenters of the region and improved local velocity model. The hypocenters derived from recently deployed local seismic network in the Javakheti highland, clearly identified seismically active structures. Fault plane solutions of analogue data of the Soviet times have been carefully analyzed and examined. Moment tensor inversion were preformed

  18. SEISMIC ANALYSIS FOR PRECLOSURE SAFETY

    Energy Technology Data Exchange (ETDEWEB)

    E.N. Lindner

    2004-12-03

    The purpose of this seismic preclosure safety analysis is to identify the potential seismically-initiated event sequences associated with preclosure operations of the repository at Yucca Mountain and assign appropriate design bases to provide assurance of achieving the performance objectives specified in the Code of Federal Regulations (CFR) 10 CFR Part 63 for radiological consequences. This seismic preclosure safety analysis is performed in support of the License Application for the Yucca Mountain Project. In more detail, this analysis identifies the systems, structures, and components (SSCs) that are subject to seismic design bases. This analysis assigns one of two design basis ground motion (DBGM) levels, DBGM-1 or DBGM-2, to SSCs important to safety (ITS) that are credited in the prevention or mitigation of seismically-initiated event sequences. An application of seismic margins approach is also demonstrated for SSCs assigned to DBGM-2 by showing a high confidence of a low probability of failure at a higher ground acceleration value, termed a beyond-design basis ground motion (BDBGM) level. The objective of this analysis is to meet the performance requirements of 10 CFR 63.111(a) and 10 CFR 63.111(b) for offsite and worker doses. The results of this calculation are used as inputs to the following: (1) A classification analysis of SSCs ITS by identifying potential seismically-initiated failures (loss of safety function) that could lead to undesired consequences; (2) An assignment of either DBGM-1 or DBGM-2 to each SSC ITS credited in the prevention or mitigation of a seismically-initiated event sequence; and (3) A nuclear safety design basis report that will state the seismic design requirements that are credited in this analysis. The present analysis reflects the design information available as of October 2004 and is considered preliminary. The evolving design of the repository will be re-evaluated periodically to ensure that seismic hazards are properly

  19. SEISMIC ANALYSIS FOR PRECLOSURE SAFETY

    International Nuclear Information System (INIS)

    E.N. Lindner

    2004-01-01

    The purpose of this seismic preclosure safety analysis is to identify the potential seismically-initiated event sequences associated with preclosure operations of the repository at Yucca Mountain and assign appropriate design bases to provide assurance of achieving the performance objectives specified in the Code of Federal Regulations (CFR) 10 CFR Part 63 for radiological consequences. This seismic preclosure safety analysis is performed in support of the License Application for the Yucca Mountain Project. In more detail, this analysis identifies the systems, structures, and components (SSCs) that are subject to seismic design bases. This analysis assigns one of two design basis ground motion (DBGM) levels, DBGM-1 or DBGM-2, to SSCs important to safety (ITS) that are credited in the prevention or mitigation of seismically-initiated event sequences. An application of seismic margins approach is also demonstrated for SSCs assigned to DBGM-2 by showing a high confidence of a low probability of failure at a higher ground acceleration value, termed a beyond-design basis ground motion (BDBGM) level. The objective of this analysis is to meet the performance requirements of 10 CFR 63.111(a) and 10 CFR 63.111(b) for offsite and worker doses. The results of this calculation are used as inputs to the following: (1) A classification analysis of SSCs ITS by identifying potential seismically-initiated failures (loss of safety function) that could lead to undesired consequences; (2) An assignment of either DBGM-1 or DBGM-2 to each SSC ITS credited in the prevention or mitigation of a seismically-initiated event sequence; and (3) A nuclear safety design basis report that will state the seismic design requirements that are credited in this analysis. The present analysis reflects the design information available as of October 2004 and is considered preliminary. The evolving design of the repository will be re-evaluated periodically to ensure that seismic hazards are properly

  20. A SEISMIC DESIGN OF NUCLEAR REACTOR BUILDING STRUCTURES APPLYING SEISMIC ISOLATION SYSTEM IN A HIGH SEISMICITY REGION –A FEASIBILITY CASE STUDY IN JAPAN-

    Directory of Open Access Journals (Sweden)

    TETSUO KUBO

    2014-10-01

    Full Text Available A feasibility study on the seismic design of nuclear reactor buildings with application of a seismic isolation system is introduced. After the Hyogo-ken Nanbu earthquake in Japan of 1995, seismic isolation technologies have been widely employed for commercial buildings. Having become a mature technology, seismic isolation systems can be applied to NPP facilities in areas of high seismicity. Two reactor buildings are discussed, representing the PWR and BWR buildings in Japan, and the application of seismic isolation systems is discussed. The isolation system employing rubber bearings with a lead plug positioned (LRB is examined. Through a series of seismic response analyses using the so-named standard design earthquake motions covering the design basis earthquake motions obtained for NPP sites in Japan, the responses of the seismic isolated reactor buildings are evaluated. It is revealed that for the building structures examined herein: (1 the responses of both isolated buildings and isolating LRBs fulfill the specified design criteria; (2 the responses obtained for the isolating LRBs first reach the ultimate condition when intensity of motion is 2.0 to 2.5 times as large as that of the design-basis; and (3 the responses of isolated reactor building fall below the range of the prescribed criteria.

  1. Seismic fragility capacity of equipment

    International Nuclear Information System (INIS)

    Iijima, Toru; Abe, Hiroshi; Suzuki, Kenichi

    2006-01-01

    Seismic probabilistic safety assessment (PSA) is an available method to evaluate residual risks of nuclear plants that are designed on definitive seismic conditions. From our preliminary seismic PSA analysis, horizontal shaft pumps are important components that have significant influences on the core damage frequency (CDF). An actual horizontal shaft pump and some kinds of elements were tested to evaluate realistic fragility capacities. Our test results showed that the realistic fragility capacity of horizontal shaft pump would be at least four times as high as a current value, 1.6 x 9.8 m/s 2 , used for our seismic PSA. We are going to incorporate the fragility capacity data that were obtained from those tests into our seismic PSA analysis, and we expect that the reliability of seismic PSA should increase. (author)

  2. Evidence of a sewer vapor transport pathway at the USEPA vapor intrusion research duplex

    Science.gov (United States)

    The role of sewer lines as preferential pathways for vapor intrusion is poorly understood. Although the importance of sewer lines for volatile organic compound (VOC) transport has been documented at a small number of sites with vapor intrusion, sewer lines are not routinely sampl...

  3. Type D personality, stress coping strategies and self-efficacy as predictors of Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Czuczwar, Stanisław Jerzy

    2017-07-01

    Recently, Facebook has become one of the most popular social networking sites. People use it more and more often. A number of studies have recently addressed the issue of excessive Facebook use, showing this phenomenon to be a spreading problem. The main aim of the present study was to examine whether Type D personality, self-efficacy and coping strategies are related to Facebook intrusion. The participants were 882 students of Polish universities, all of them Facebook users (72% women, mean age: 22.25 years, SD =2.06). We used the Facebook Intrusion Questionnaire, the Facebook Intensity Scale, the General Self-Efficacy Scale, the Coping Inventory for Stressful Situations, and the Type D Scale. We applied the pen-and-paper procedure. Our results indicate that emotion-oriented and avoidance-oriented strategies of coping in stressful situations are predictors of Facebook intrusion and Facebook intensity. The relations between both Facebook intrusion and intensity and social inhibition are significant only when emotion-oriented coping strategy is controlled. The knowledge of whether coping strategies in stressful situations, such as focus on emotions or avoidance, are related to Facebook intrusion might be useful for clinical purposes. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.

  4. Prediction of changes due to mandibular autorotation following miniplate-anchored intrusion of maxillary posterior teeth in open bite cases.

    Science.gov (United States)

    Kassem, Hassan E; Marzouk, Eiman S

    2018-05-14

    Prediction of the treatment outcome of various orthodontic procedures is an essential part of treatment planning. Using skeletal anchorage for intrusion of posterior teeth is a relatively novel procedure for the treatment of anterior open bite in long-faced subjects. Data were analyzed from lateral cephalometric radiographs of a cohort of 28 open bite adult subjects treated with intrusion of the maxillary posterior segment with zygomatic miniplate anchorage. Mean ratios and regression equations were calculated for selected variables before and after intrusion. Relative to molar intrusion, there was approximately 100% vertical change of the hard and soft tissue mention and 80% horizontal change of the hard and soft tissue pogonion. The overbite deepened two folds with 60% increase in overjet. The lower lip moved forward about 80% of the molar intrusion. Hard tissue pogonion and mention showed the strongest correlations with molar intrusion. There was a general agreement between regression equations and mean ratios at 3 mm molar intrusion. This study attempted to provide the clinician with a tool to predict the changes in key treatment variables following skeletally anchored maxillary molar intrusion and autorotation of the mandible.

  5. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against

  6. Potential for saltwater intrusion into the lower Tamiami aquifer near Bonita Springs, southwestern Florida

    Science.gov (United States)

    Shoemaker, W. Barclay; Edwards, K. Michelle

    2003-01-01

    A study was conducted to examine the potential for saltwater intrusion into the lower Tamiami aquifer beneath Bonita Springs in southwestern Florida. Field data were collected, and constant- and variable-density ground-water flow simulations were performed that: (1) spatially quantified modern and seasonal stresses, (2) identified potential mechanisms of saltwater intrusion, and (3) estimated the potential extent of saltwater intrusion for the area of concern. MODFLOW and the inverse modeling routine UCODE were used to spatially quantify modern and seasonal stresses by calibrating a constant-density ground-water flow model to field data collected in 1996. The model was calibrated by assuming hydraulic conductivity parameters were accurate and by estimating unmonitored ground-water pumpage and potential evapotranspiration with UCODE. Uncertainty in these estimated parameters was quantified with 95-percent confidence intervals. These confidence intervals indicate more uncertainty (or less reliability) in the estimates of unmonitored ground-water pumpage than estimates of pan-evaporation multipliers, because of the nature and distribution of observations used during calibration. Comparison of simulated water levels, streamflows, and net recharge with field data suggests the model is a good representation of field conditions. Potential mechanisms of saltwater intrusion into the lower Tamiami aquifer include: (1) lateral inland movement of the freshwater-saltwater interface from the southwestern coast of Florida; (2) upward leakage from deeper saline water-bearing zones through natural upwelling and upconing, both of which could occur as diffuse upward flow through semiconfining layers, conduit flow through karst features, or pipe flow through leaky artesian wells; (3) downward leakage of saltwater from surface-water channels; and (4) movement of unflushed pockets of relict seawater. Of the many potential mechanisms of saltwater intrusion, field data and variable

  7. Working memory and inhibitory control across the life span: Intrusion errors in the Reading Span Test.

    Science.gov (United States)

    Robert, Christelle; Borella, Erika; Fagot, Delphine; Lecerf, Thierry; de Ribaupierre, Anik

    2009-04-01

    The aim of this study was to examine to what extent inhibitory control and working memory capacity are related across the life span. Intrusion errors committed by children and younger and older adults were investigated in two versions of the Reading Span Test. In Experiment 1, a mixed Reading Span Test with items of various list lengths was administered. Older adults and children recalled fewer correct words and produced more intrusions than did young adults. Also, age-related differences were found in the type of intrusions committed. In Experiment 2, an adaptive Reading Span Test was administered, in which the list length of items was adapted to each individual's working memory capacity. Age groups differed neither on correct recall nor on the rate of intrusions, but they differed on the type of intrusions. Altogether, these findings indicate that the availability of attentional resources influences the efficiency of inhibition across the life span.

  8. Graben Formation and Dike Arrest during the 2009 Harrat Lunayyir Dike Intrusion in Saudi Arabia: Insights from InSAR, Stress Calculations and Analog Experiments

    KAUST Repository

    Xu, Wenbin; Jonsson, Sigurjon; Corbi, Fabio; Rivalta, Eleonora

    2016-01-01

    Detailed spatial and temporal accounts of propagating dikes from crustal deformation data, including their interplay with faulting, are rare, leaving many questions about how this interplay affects graben formation and the arrest of dikes unanswered. Here we use InSAR observations, stress calculations and analog experiments to investigate the interaction between an intruding dike and normal faulting during the 2009 Harrat Lunayyir dike intrusion in western Saudi Arabia. We generated five displacement maps from InSAR data to unravel the temporal evolution of deformation covering the majority of the intrusion. We find that the observed surface displacements can be modeled by a ~2-m-thick dike with an upper tip ~2 km below the surface on 16 May 2009, four weeks after the onset of seismic unrest. In the following three days, the dike propagated to within ~1 km of the surface with graben-bounding normal faulting dominating the near-field deformation. The volume of the dike doubled between mid-May and mid-June. We carried out analog experiments that indicate that the wedge-shaped graben grew outwards with the faulting style changing progressively from normal faulting to oblique. Coulomb failure stress change calculations show that the intruding dike caused two zones of shallow horizontal tension on both sides of the dike, producing two zones of fissuring and normal faulting at the surface. In return, the faulting provoked compression around the upper tip of the dike, holding back its vertical propagation.

  9. Graben Formation and Dike Arrest during the 2009 Harrat Lunayyir Dike Intrusion in Saudi Arabia: Insights from InSAR, Stress Calculations and Analog Experiments

    KAUST Repository

    Xu, Wenbin

    2016-03-04

    Detailed spatial and temporal accounts of propagating dikes from crustal deformation data, including their interplay with faulting, are rare, leaving many questions about how this interplay affects graben formation and the arrest of dikes unanswered. Here we use InSAR observations, stress calculations and analog experiments to investigate the interaction between an intruding dike and normal faulting during the 2009 Harrat Lunayyir dike intrusion in western Saudi Arabia. We generated five displacement maps from InSAR data to unravel the temporal evolution of deformation covering the majority of the intrusion. We find that the observed surface displacements can be modeled by a ~2-m-thick dike with an upper tip ~2 km below the surface on 16 May 2009, four weeks after the onset of seismic unrest. In the following three days, the dike propagated to within ~1 km of the surface with graben-bounding normal faulting dominating the near-field deformation. The volume of the dike doubled between mid-May and mid-June. We carried out analog experiments that indicate that the wedge-shaped graben grew outwards with the faulting style changing progressively from normal faulting to oblique. Coulomb failure stress change calculations show that the intruding dike caused two zones of shallow horizontal tension on both sides of the dike, producing two zones of fissuring and normal faulting at the surface. In return, the faulting provoked compression around the upper tip of the dike, holding back its vertical propagation.

  10. Two applications of time reversal mirrors: Seismic radio and seismic radar

    KAUST Repository

    Hanafy, Sherif M.

    2011-07-08

    Two seismic applications of time reversal mirrors (TRMs) are introduced and tested with field experiments. The first one is sending, receiving, and decoding coded messages similar to a radio except seismic waves are used. The second one is, similar to radar surveillance, detecting and tracking a moving object(s) in a remote area, including the determination of the objects speed of movement. Both applications require the prior recording of calibrationGreen’s functions in the area of interest. This reference Green’s function will be used as a codebook to decrypt the coded message in the first application and as a moving sensor for the second application. Field tests show that seismicradar can detect the moving coordinates ( x(t), y(t), z(t)) of a person running through a calibration site. This information also allows for a calculation of his velocity as a function of location. Results with the seismic radio are successful in seismically detecting and decoding coded pulses produced by a hammer. Both seismic radio and radar are highly robust to signals in high noise environments due to the super-stacking property of TRMs.

  11. The relationship between loss of parents in the holocaust, intrusive memories, and distress among child survivors.

    Science.gov (United States)

    Letzter-Pouw, Sonia; Werner, Perla

    2012-04-01

    The prevalence of intrusive memories of the Holocaust and their relationship to distress was examined among 272 child survivors in Israel. Using attachment theory as a conceptual framework, the authors also examined the effects of type of experience and loss of parents in the Holocaust, psychological resources, other life events, and sociodemographic characteristics on distress and symptomatic behavior. Eighty five percent of the participants reported suffering from intrusive memories. Structural equation modeling showed that survivors who lost one or both parents in the Holocaust suffered more distress because of more intrusive memories. These findings suggest that intrusive memories may be part of unfinished mourning processes related to the loss of parents in the Holocaust. © 2012 American Orthopsychiatric Association.

  12. Two applications of time reversal mirrors: Seismic radio and seismic radar

    KAUST Repository

    Hanafy, Sherif M.; Schuster, Gerard T.

    2011-01-01

    Two seismic applications of time reversal mirrors (TRMs) are introduced and tested with field experiments. The first one is sending, receiving, and decoding coded messages similar to a radio except seismic waves are used. The second one is, similar

  13. Magma intrusion in the upper crust of Abu Dabbab area, South East of Egypt from Vp and Vp/Vs tomography

    International Nuclear Information System (INIS)

    Hosny, A.; El Hady, S.M.; Mohamed, A.A.; Panza, G.F.

    2007-12-01

    3-D images of P-wave velocity and Vp/Vs ratio have been produced for the upper crust of the Abu Dabbab area, North Mars Alam city. The inversion of local travel times of high quality data recorded at eleven mobile seismic stations around the study area is carried out. The best, in the least-squares sense, 1-D Vp model and the average value of Vp/Vs (1.72) were computed as prerequisites of the 3-D inversion that reaches a depth of 14 km. From the 3-D model it is evident that the distributions of Vp and Vp/Vs are characterized by marked lateral and vertical variations delineating structural heterogeneities. Due to the presence of a thin layer of sedimentary rocks saturated with surface water, low P-wave velocity and high Vp/Vs values are noticed near the surface. At greater depths, high Vp and low Vp/Vs zones may indicate crustal rocks with relatively higher rigidity and brittle behavior, while high Vp/Vs and low Vp may identify zones of relatively softer rocks, with ductile behavior. Low P-wave velocity values are observed at the intersections among the faults. Some magma intrusions could be associated to the Vp/Vs values which form an elongated anomaly, in the western part of the study area, which extends from a depth of 12 km to about 1-2 km of depth. If the obtained 3-D model is used in the relocation of selected events, they turn out to be strongly clustered in correspondence with the high velocity anomalies detected in the central part of the study area. Most of the seismicity tends to occur at the boundaries between the high and low velocity anomalies and at pre-existing weakness zones, i.e. the areas of intersection among different faults. The occurrence of the seismic activity in the vicinity of low velocity anomalies and at the boundary between velocity contrast could also be explained by the occurrence of serpentinization processes in the crust of the study area. (author)

  14. Notes on saltwater intrusion and trace element distribution in Metro Manila groundwaters

    International Nuclear Information System (INIS)

    Santos, G. Jr.; Ramos, A.F.; Fernandez, L.G.; Almoneda, R.V.; Garcia, T.Y.; Cruz, C.C.; Petrache, C.A.; Andal, T.T.; Alcantara, E.

    1989-01-01

    Preliminary analyses of waters for uranium and other trace elements from deepwells operated by the Metropolitan Waterworks and Sewerage System (MWSS) in Metro Manila were performed. Uranium, which ranged from 0.2 ppb to 6 ppb, was correlated with saltwater intrusion. Values >=0.8 ppb for uranium were considered indicative of saline water intrusion in the aquifers. Saline water intrusions in Malabon, Navotas, Paranaque, Las Pinas, Bacoor, Imus, Kawit, Pasig, Antipolo, San Mateo, Taguig, Cainta, Taytay, Alabang and Muntinlupa were noted. Most of these areas were also identified by MWSS as being affected by saltwater intrusion. Tritium values ranged from 0 (below detection limits) to 44 tritium units. Except for one well in Muntinlupa, all the values obtained were below the lower limit of detection of 30.83 T.U. Mercury contents in six well locations had values above the maximum limit set by the National Standards for Drinking Water. Four wells exceeded the permissible level for manganese while two wells had iron concentrations greater than the National Standards. Other trace element concentrations such as Cr, Pb, Zn, Co and Ni either did not exceed their permissible levels or were not included in the National Standards. (Auth.). 6 refs.; 1 tab.; 3 figs

  15. 3D Modelling of Seismically Active Parts of Underground Faults via Seismic Data Mining

    Science.gov (United States)

    Frantzeskakis, Theofanis; Konstantaras, Anthony

    2015-04-01

    During the last few years rapid steps have been taken towards drilling for oil in the western Mediterranean sea. Since most of the countries in the region benefit mainly from tourism and considering that the Mediterranean is a closed sea only replenishing its water once every ninety years careful measures are being taken to ensure safe drilling. In that concept this research work attempts to derive a three dimensional model of the seismically active parts of the underlying underground faults in areas of petroleum interest. For that purpose seismic spatio-temporal clustering has been applied to seismic data to identify potential distinct seismic regions in the area of interest. Results have been coalesced with two dimensional maps of underground faults from past surveys and seismic epicentres, having followed careful reallocation processing, have been used to provide information regarding the vertical extent of multiple underground faults in the region of interest. The end product is a three dimensional map of the possible underground location and extent of the seismically active parts of underground faults. Indexing terms: underground faults modelling, seismic data mining, 3D visualisation, active seismic source mapping, seismic hazard evaluation, dangerous phenomena modelling Acknowledgment This research work is supported by the ESPA Operational Programme, Education and Life Long Learning, Students Practical Placement Initiative. References [1] Alves, T.M., Kokinou, E. and Zodiatis, G.: 'A three-step model to assess shoreline and offshore susceptibility to oil spills: The South Aegean (Crete) as an analogue for confined marine basins', Marine Pollution Bulletin, In Press, 2014 [2] Ciappa, A., Costabile, S.: 'Oil spill hazard assessment using a reverse trajectory method for the Egadi marine protected area (Central Mediterranean Sea)', Marine Pollution Bulletin, vol. 84 (1-2), pp. 44-55, 2014 [3] Ganas, A., Karastathis, V., Moshou, A., Valkaniotis, S., Mouzakiotis

  16. Rifting an Archaean Craton: Insights from Seismic Anisotropy Patterns in E. Africa

    Science.gov (United States)

    Ebinger, C. J.; Tiberi, C.; Currie, C. A.; van Wijk, J.; Albaric, J.

    2016-12-01

    Few places worldwide offer opportunities to study active deformation of deeply-keeled cratonic lithosphere. The magma-rich Eastern rift transects the eastern edge of the Archaean Tanzania craton in northeastern Tanzania, which has been affected by a large-scale mantle upwelling. Abundant xenolith locales offer constraints on mantle age, composition, and physical properties. Our aim is to evaluate models for magmatic fluid-alteration (metasomatism) and deformation of mantle lithosphere along the edge of cratons by considering spatial variations in the direction and magnitude of seismic anisotropy, which is strongly influenced by mantle flow patterns along lithosphere-asthenosphere topography, fluid-filled cracks (e.g., dikes), and pre-existing mantle lithosphere strain fabrics. Waveforms of teleseismic earthquakes (SKS, SKKS) recorded on the 39-station CRAFTI-CoLiBREA broadband array in southern Kenya and northern Tanzania are used to determine the azimuth and amount of shear-wave splitting accrued as seismic waves pass through the uppermost mantle and lithosphere at the craton edge. Lower crustal earthquakes enable evaluation of seismic anisotropy throughout the crust along the rift flanks and beneath the heavily intruded Magadi and Natron basins, and the weakly intruded Manyara basin. Our results and those of earlier studies show a consistent N50E splitting direction within the craton, with delay times of ca. 1.5 s, and similar direction east of the rift in thinner Pan-African lithosphere. Stations within the rift zone are rotated to a N15-35E splitting, with the largest delay times of 2.5 s at the margin of the heavily intruded Magadi basin. The short length scale of variations and rift-parallel splitting directions are similar to patterns in the Main Ethiopian rift attributed to melt-filled cracks or oriented pockets rising from the base of the lithosphere. The widespread evidence for mantle metasomatism and magma intrusion to mid-crustal levels suggests that

  17. Effects of applying three-dimensional seismic isolation system on the seismic design of FBR

    International Nuclear Information System (INIS)

    Hirata, Kazuta; Yabana, Shuichi; Kanazawa, Kenji; Matsuda, Akihiro

    1997-01-01

    In this study conceptional three-dimensional seismic isolation system for fast breeder reactor (FBR) is proposed. Effects of applying three-dimensional seismic isolation system on the seismic design for the FBR equipment are evaluated quantitatively. From the evaluation, it is concluded following effects are expected by applying the three-dimensional seismic isolation system to the FBR and the effects are evaluated quantitatively. (1) Reduction of membrane thickness of the reactor vessel (2) Suppression of uplift of fuels by reducing vertical seismic response of the core (3) Reduction of the supports for the piping system (4) Three-dimensional base isolation system for the whole reactor building is advantageous to the combined isolation system of horizontal base isolation for the reactor building and vertical isolation for the equipment. (author)

  18. PARAMETERS OF KAMCHATKA SEISMICITY IN 2008

    Directory of Open Access Journals (Sweden)

    Vadim A. Saltykov

    2010-01-01

    Full Text Available The paper describes seismicity of Kamchatka for the period of 2008 and presents 2D distribution of background seismicity parameters calculated from data published in the Regional Catalogue of Kamchatka Earthquakes. Parameters under study are total released seismic energy, seismic activity A10, slope of recurrence graph γ, parameters of RTL, ΔS and Z-function methods, and clustering of earthquakes. Estimations of seismicity are obtained for a region bordered by latitude 50.5–56.5N, longitude 156E–167E, with depths to 300 km. Earthquakes of energy classes not less than 8.5 as per the Fedotov’s classification are considered. The total seismic energy released in 2008 is estimated. According to a function of annual seismic energy distribution, an amount of seismic energy released in 2008 was close to the median level (Fig. 1. Over 2/3 of the total amount of seismic energy released in 2008 resulted from three largest earthquakes (МW ≥ 5.9. About 5 percent of the total number of seismic events are comprised of grouped earthquakes, i.e. aftershocks and swarms. A schematic map of the largest earthquakes (МW ≥ 5.9 and grouped seismic events which occurred in 2008 is given in Fig. 2; their parameters are listed in Table 1. Grouped earthquakes are excluded from the catalogue. A map showing epicenters of independent earthquakes is given in Fig. 3. The slope of recurrence graph γ and seismic activity A10 is based on the Gutenberg-Richter law stating the fundamental property of seismic process. The recurrence graph slope is calculated from continuous exponential distribution of earthquakes by energy classes. Using γ is conditioned by observations that in some cases the slope of the recurrence graph decreases prior to a large earthquake. Activity A10 is calculated from the number of earthquakes N and recurrence graph slope γ. Average slopes of recurrence graph γ and seismic activity A10 for the area under study in 2008 are calculated; our

  19. Intrusion resistant underground structure (IRUS) - safety assessment and licensing

    International Nuclear Information System (INIS)

    Lange, B. A.

    1997-01-01

    This paper describes the safety goals, human exposure scenarios and critical groups, the syvac-nsure performance assessment code, groundwater pathway safety results, and inadvertent human intrusion of the IRUS. 2 tabs

  20. Testing a 1-D Analytical Salt Intrusion Model and the Predictive Equation in Malaysian Estuaries

    Science.gov (United States)

    Gisen, Jacqueline Isabella; Savenije, Hubert H. G.

    2013-04-01

    Little is known about the salt intrusion behaviour in Malaysian estuaries. Study on this topic sometimes requires large amounts of data especially if a 2-D or 3-D numerical models are used for analysis. In poor data environments, 1-D analytical models are more appropriate. For this reason, a fully analytical 1-D salt intrusion model, based on the theory of Savenije in 2005, was tested in three Malaysian estuaries (Bernam, Selangor and Muar) because it is simple and requires minimal data. In order to achieve that, site surveys were conducted in these estuaries during the dry season (June-August) at spring tide by moving boat technique. Data of cross-sections, water levels and salinity were collected, and then analysed with the salt intrusion model. This paper demonstrates a good fit between the simulated and observed salinity distribution for all three estuaries. Additionally, the calibrated Van der Burgh's coefficient K, Dispersion coefficient D0, and salt intrusion length L, for the estuaries also displayed a reasonable correlations with those calculated from the predictive equations. This indicates that not only is the salt intrusion model valid for the case studies in Malaysia but also the predictive model. Furthermore, the results from this study describe the current state of the estuaries with which the Malaysian water authority in Malaysia can make decisions on limiting water abstraction or dredging. Keywords: salt intrusion, Malaysian estuaries, discharge, predictive model, dispersion

  1. Moment magnitude determination of local seismic events recorded at selected Polish seismic stations

    Science.gov (United States)

    Wiejacz, Paweł; Wiszniowski, Jan

    2006-03-01

    The paper presents the method of local magnitude determination used at Polish seismic stations to report events originating in one of the four regions of induced seismicity in Poland or its immediate vicinity. The method is based on recalculation of the seismic moment into magnitude, whereas the seismic moment is obtained from spectral analysis. The method has been introduced at Polish seismic stations in the late 1990s but as of yet had not been described in full because magnitude discrepancies have been found between the results of the individual stations. The authors have performed statistics of these differences, provide their explanation and calculate station corrections for each station and each event source region. The limitations of the method are also discussed. The method is found to be a good and reliable method of local magnitude determination provided the limitations are observed and station correction applied.

  2. The Torres del Paine intrusion as a model for a shallow magma chamber

    Science.gov (United States)

    Baumgartner, Lukas; Bodner, Robert; Leuthold, Julien; Muntener, Othmar; Putlitz, Benita; Vennemann, Torsten

    2014-05-01

    The shallow magmatic Torres del Paine Intrusive Complex (TPIC) belongs to a series of sub-volcanic and plutonic igneous bodies in Southern Chile and Argentina. This trench-parallel belt is located in a transitional position between the Patagonia Batholith in the West, and the alkaline Cenozoic plateau lavas in the East. While volumetrically small amounts of magmatism started around 28 my ago in the Torres del Paine area, and a second period occurred between 17-16 Ma, it peaked with the TPIC 12.59-12.43 Ma ago. The spectacular cliffs of the Torres del Paine National park provide a unique opportunity to study the evolution of a very shallow magma chamber and the interaction with its host rocks. Intrusion depth can be estimated based on contact metamorphic assemblages and granite solidus thermobarometry to 750±250 bars, corresponding to an intrusion depth of ca. 3km, ca. 500m above the base of the intrusion. Hornblende thermobarometry in mafic rocks agrees well with these estimates (Leuthold et al., 2014). The TPIC is composed of a granitic laccolith emplaced over 90ka (Michel et al., 2008) in 3 major, several 100m thick sheets, forming an overall thickness of nearly 2 km. Contacts are sharp between sheets, with the oldest sheet on the top and the youngest on the bottom (Michel et al., 2008). The granitic laccolith is under-plated by a ca. 400m thick mafic laccolith, built up over ca. 50ka (Leuthold et al. 2012), constructed from the bottom up. Granitic and mafic sheets are themselves composed of multiple metric to decametric pulses, mostly with ductile contacts between them, resulting in outcrop patterns resembling braided stream sediments. The contact of the TPIC with the Cretaceous flysch sediments document intrusion mechanism. Pre-existing sub-horizontal fold axes are rotated in the roof of the TPIC, clearly demonstrating ballooning of the roof; no ballooning was observed in the footwall of the intrusion. Extension during ballooning of the roof is indicated by

  3. Use of the t-distribution to construct seismic hazard curves for seismic probabilistic safety assessments

    Energy Technology Data Exchange (ETDEWEB)

    Yee, Eric [KEPCO International Nuclear Graduate School, Dept. of Nuclear Power Plant Engineering, Ulsan (Korea, Republic of)

    2017-03-15

    Seismic probabilistic safety assessments are used to help understand the impact potential seismic events can have on the operation of a nuclear power plant. An important component to seismic probabilistic safety assessment is the seismic hazard curve which shows the frequency of seismic events. However, these hazard curves are estimated assuming a normal distribution of the seismic events. This may not be a strong assumption given the number of recorded events at each source-to-site distance. The use of a normal distribution makes the calculations significantly easier but may underestimate or overestimate the more rare events, which is of concern to nuclear power plants. This paper shows a preliminary exploration into the effect of using a distribution that perhaps more represents the distribution of events, such as the t-distribution to describe data. The integration of a probability distribution with potentially larger tails basically pushes the hazard curves outward, suggesting a different range of frequencies for use in seismic probabilistic safety assessments. Therefore the use of a more realistic distribution results in an increase in the frequency calculations suggesting rare events are less rare than thought in terms of seismic probabilistic safety assessment. However, the opposite was observed with the ground motion prediction equation considered.

  4. Use of the t-distribution to construct seismic hazard curves for seismic probabilistic safety assessments

    International Nuclear Information System (INIS)

    Yee, Eric

    2017-01-01

    Seismic probabilistic safety assessments are used to help understand the impact potential seismic events can have on the operation of a nuclear power plant. An important component to seismic probabilistic safety assessment is the seismic hazard curve which shows the frequency of seismic events. However, these hazard curves are estimated assuming a normal distribution of the seismic events. This may not be a strong assumption given the number of recorded events at each source-to-site distance. The use of a normal distribution makes the calculations significantly easier but may underestimate or overestimate the more rare events, which is of concern to nuclear power plants. This paper shows a preliminary exploration into the effect of using a distribution that perhaps more represents the distribution of events, such as the t-distribution to describe data. The integration of a probability distribution with potentially larger tails basically pushes the hazard curves outward, suggesting a different range of frequencies for use in seismic probabilistic safety assessments. Therefore the use of a more realistic distribution results in an increase in the frequency calculations suggesting rare events are less rare than thought in terms of seismic probabilistic safety assessment. However, the opposite was observed with the ground motion prediction equation considered

  5. Approaches in anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, S.; Di Pietro, R.; Mancini, L.V.

    2008-01-01

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  6. Approaches in Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  7. State of the Practice of Intrusion Detection Technologies

    Science.gov (United States)

    2000-01-01

    functions, procedures, and scripts, an Oracle database structure, Borne shell scripts, and configuration files which together communicate with ASIM Sensor...34Plugging the Holes in eCommerce Leads to 135% Growth in the Intrusion Detection and Vulnerability Assessment Software Market," PRNewswire. August

  8. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D. L.; Michlich, B. J.

    2000-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute nuclear technology and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested

  9. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D.L.; Micklich, B.J.

    2001-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute 'nuclear technology' and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested. (author)

  10. Technologies, Methodologies and Challenges in Network Intrusion Detection and Prevention Systems

    Directory of Open Access Journals (Sweden)

    Nicoleta STANCIU

    2013-01-01

    Full Text Available This paper presents an overview of the technologies and the methodologies used in Network Intrusion Detection and Prevention Systems (NIDPS. Intrusion Detection and Prevention System (IDPS technologies are differentiated by types of events that IDPSs can recognize, by types of devices that IDPSs monitor and by activity. NIDPSs monitor and analyze the streams of network packets in order to detect security incidents. The main methodology used by NIDPSs is protocol analysis. Protocol analysis requires good knowledge of the theory of the main protocols, their definition, how each protocol works.

  11. LIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios; Krontiris, Ioannis; Dimitriou, Tassos

    2008-01-01

    to achieve a more autonomic and complete defense mechanism, even against attacks that have not been anticipated in advance. In this paper, we present a lightweight intrusion detection system, called LIDeA, designed for wireless sensor networks. LIDeA is based on a distributed architecture, in which nodes......Wireless sensor networks are vulnerable to adversaries as they are frequently deployed in open and unattended environments. Preventive mechanisms can be applied to protect them from an assortment of attacks. However, more sophisticated methods, like intrusion detection systems, are needed...

  12. Seismic hazard assessment of Iran

    Directory of Open Access Journals (Sweden)

    M. Ghafory-Ashtiany

    1999-06-01

    Full Text Available The development of the new seismic hazard map of Iran is based on probabilistic seismic hazard computation using the historical earthquakes data, geology, tectonics, fault activity and seismic source models in Iran. These maps have been prepared to indicate the earthquake hazard of Iran in the form of iso-acceleration contour lines, and seismic hazard zoning, by using current probabilistic procedures. They display the probabilistic estimates of Peak Ground Acceleration (PGA for the return periods of 75 and 475 years. The maps have been divided into intervals of 0.25 degrees in both latitudinal and longitudinal directions to calculate the peak ground acceleration values at each grid point and draw the seismic hazard curves. The results presented in this study will provide the basis for the preparation of seismic risk maps, the estimation of earthquake insurance premiums, and the preliminary site evaluation of critical facilities.

  13. Thermodynamics of water intrusion in nanoporous hydrophobic solids.

    Science.gov (United States)

    Cailliez, Fabien; Trzpit, Mickael; Soulard, Michel; Demachy, Isabelle; Boutin, Anne; Patarin, Joël; Fuchs, Alain H

    2008-08-28

    We report a joint experimental and molecular simulation study of water intrusion in silicalite-1 and ferrerite zeolites. The main conclusion of this study is that water condensation takes place through a genuine first-order phase transition, provided that the interconnected pores structure is 3-dimensional. In the extreme confinement situation (ferrierite zeolite), condensation takes place through a continuous transition, which is explained by a shift of both the first-order transition line and the critical point with increasing confinement. The present findings are at odds with the common belief that conventional phase transitions cannot take place in microporous solids such as zeolites. The most important features of the intrusion/extrusion process can be understood in terms of equilibrium thermodynamics considerations. We believe that these findings are very general for hydrophobic solids, i.e. for both nonwetting as well as wetting water-solid interface systems.

  14. Seismic qualification of multiple interconnected safety-related cabinets in a high seismic zone

    International Nuclear Information System (INIS)

    Khan, M.R.; Chen, W.H.W.; Wang, T.Y.

    1993-01-01

    Certain safety-related multiple, interconnected electrical cabinets and the devices contained therein are required to perform their intended safety functions during and after a design basis seismic event. In general, seismic testing is performed to ensure the structural integrity of the cabinets and the functionality of their associated devices. Constrained by the shake table capacity, seismic testing is usually performed only for a limited number of interconnected cabinets. Also, original shake table tests performed usually did not provide detailed response information at various locations inside the cabinets. For operational and maintenance purposes, doors and panels of some cabinets may need to be opened while the adjacent cabinets are required to remain functional. In addition, in-cabinet response spectra need to be generated for the seismic qualification of new devices and the replacement parts. Consequently, seismic analysis of safety-related multiple, interconnected cabinets is frequently required for configurations which are different from the original tested conditions. This paper presents results of seismic tests of three interconnected safety-related cabinets and finite element analyses performed to compare the analytical results with those obtained from the cabinet seismic tests. Parametric analyses are performed to determine how many panels and doors can be opened while the adjacent cabinets still remain functional. The study indicates that for cabinets located in a high seismic zone, the critical damping of the cabinet is significantly higher than 5% to 7% typically used in qualifying electrical equipment. For devices mounted on the cabinet doors to performed their intended safety function, it requires stiffening of doors and that these doors be properly bolted to the cabinet frame. It also shows that even though doors and panels bolted to the cabinet frame are the primary seismic resistant element of the cabinet, opening of a limited number of them

  15. Development of a Real-Time GPS/Seismic Displacement Meter: Seismic Component and Communications

    Science.gov (United States)

    Vernon, F.; Bock, Y.

    2002-12-01

    In two abstracts, we report on an ongoing effort to develop an Integrated Real-Time GPS/Seismic System for Orange and Western Riverside Counties, California, spanning three major strike-slip faults in southern California (San Andreas, San Jacinto, and Elsinore) and significant populations and civilian infrastructure. The system relying on existing GPS and seismic networks will collect and analyze GPS and seismic data for the purpose of estimating and disseminating real-time positions and total ground displacements (dynamic, as well as static) covering all phases of the seismic cycle, from fractions of seconds to years. Besides its intrinsic scientific use as a real-time displacement meter (transducer), the GPS/Seismic System will be a powerful tool for local and state decision makers for risk mitigation, disaster management, and structural monitoring (dams, bridges, and buildings). Furthermore, the GPS/Seismic System will become an integral part of California's spatial referencing and positioning infrastructure, which is complicated by tectonic motion, seismic displacements, and land subsidence. This development is taking place under the umbrella of the California Spatial Reference Center, in partnership with local (The Counties, Riverside County Flood and Water Conservation District, Southern California Metropolitan Water District), state (Caltrans), and Federal agencies (NGS, NASA, USGS), the geophysics community (SCEC2/SCIGN), and the private sector (RBF Consulting). The project is leveraging considerable funding, resources, and research and development from SCIGN, CSRC and two NSF-funded IT projects at UCSD and SDSU: RoadNet (Real-Time Observatories, Applications and Data Management Network) and the High Performance Wireless Research and Education Network (HPWREN). These two projects are funded to develop both the wireless networks and the integrated, seamless, and transparent information management system that will deliver seismic, geodetic, oceanographic

  16. Correlation Processing Of Local Seismic Data: Applications for Autonomous Sensor Deployments

    Energy Technology Data Exchange (ETDEWEB)

    Dodge, D A

    2010-11-16

    Excavation and operation of an underground facility is likely to produce an extensive suite of seismic signals observable at the surface for perhaps several km. Probably a large fraction of such signals will be correlated, so the design of a monitoring framework should include consideration of a correlation processing capability. Correlation detectors have been shown to be significantly more sensitive than beam-forming power detectors. Although correlation detectors have a limited detection footprint, they can be generalized into multi-rank subspace detectors which are sensitive over a much larger range of source mechanisms and positions. Production of subspace detectors can be automated, so their use in an autonomous framework may be contemplated. Waveform correlation also can be used to produce very high precision phase picks which may be jointly inverted to simultaneously relocate groups of events. The relative precision of the resulting hypocenters is sufficient to visualize structural detail at a scale of less than a few tens of meters. Three possible correlation processor systems are presented. All use a subspace signal detection framework. The simplest system uses a single-component sensor and is capable of detection and classification of signals. The most complicated system uses many sensors deployed around the facility, and is capable of detection, classification, and high-precision source location. Data from a deep underground mine are presented to demonstrate the applicability of correlation processing to monitoring an underground facility. Although the source region covers an area of about 600m by 580m, all but two of the events form clusters at a threshold of 0.7. All the events could have been detected and classified by the subspace detection framework, and high-precision picks can be computed for all cluster members.

  17. Seismic risk assessment of a BWR

    International Nuclear Information System (INIS)

    Wells, J.E.; Bernreuter, D.L.; Chen, J.C.; Lappa, D.A.; Chuang, T.Y.; Murray, R.C.; Johnson, J.J.

    1987-01-01

    The simplified seismic risk methodology developed in the USNRC Seismic Safety Margins Research Program (SSMRP) was demonstrated by its application to the Zion nuclear power plant (PWR). The simplified seismic risk methodology was developed to reduce the costs associated with a seismic risk analysis while providing adequate results. A detailed model of Zion, including systems analysis models (initiating events, event trees, and fault trees), SSI and structure models, and piping models, was developed and used in assessing the seismic risk of the Zion nuclear power plant (FSAR). The simplified seismic risk methodology was applied to the LaSalle County Station nuclear power plant, a BWR; to further demonstrate its applicability, and if possible, to provide a basis for comparing the seismic risk from PWRs and BWRs. (orig./HP)

  18. Seismic isolation in New Zealand

    International Nuclear Information System (INIS)

    Skinner, R.I.; Robinson, W.H.; McVerry, G.H.

    1989-01-01

    Bridges, buildings, and industrial equipment can be given increased protection from earthquake damage by limiting the earthquake attack through seismic isolation. A broad summary of the seismic responses of base-isolated structures is of considerable assistance for their preliminary design. Seismic isolation as already used in New Zealand consists of a flexible base or support combined with some form of energy-dissipating device, usually involving the hysteretic working of steel or lead. This paper presents examples of the New Zealand experience, where seismic isolation has been used for 42 bridges, 3 buildings, a tall chimney, and high-voltage capacitor banks. Additional seismic response factors, which may be important for nuclear power plants, are also discussed briefly

  19. Predicting Seawater Intrusion in Coastal Groundwater Boreholes Using Self-Potential Data

    Science.gov (United States)

    Graham, M.; MacAllister, D. J.; Jackson, M.; Vinogradov, J.; Butler, A. P.

    2017-12-01

    Many coastal groundwater abstraction wells are under threat from seawater intrusion: this is exacerbated in summer by low water tables and increased abstraction. Existing hydrochemistry or geophysical techniques often fail to predict the timing of intrusion events. We investigate whether the presence and transport of seawater can influence self-potentials (SPs) measured within groundwater boreholes, with the aim of using SP monitoring to provide early warning of saline intrusion. SP data collection: SP data were collected from a coastal groundwater borehole and an inland borehole (> 60 km from the coast) in the Seaford Chalk of southern England. The SP gradient in the inland borehole was approximately 0.05 mV/m, while that in the coastal borehole varied from 0.16-0.26 mV/m throughout the monitoring period. Spectral analysis showed that semi-diurnal fluctuations in the SP gradient were several orders of magnitude higher at the coast than inland, indicating a strong influence from oceanic tides. A characteristic decrease in the gradient, or precursor, was observed in the coastal borehole several days prior to seawater intrusion. Modelling results: Hydrodynamic transport and geoelectric modelling suggest that observed pressure changes (associated with the streaming potential) are insufficient to explain either the magnitude of the coastal SP gradient or the semi-diurnal SP fluctuations. By contrast, a model of the exclusion-diffusion potential closely matches these observations and produces a precursor similar to that observed in the field. Sensitivity analysis suggests that both a sharp saline front and spatial variations in the exclusion efficiency arising from aquifer heterogeneities are necessary to explain the SP gradient observed in the coastal borehole. The presence of the precursor in the model depends also on the presence and depth of fractures near the base of the borehole. Conclusions: Our results indicate that SP monitoring, combined with hydrodynamic

  20. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    Science.gov (United States)

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...