WorldWideScience

Sample records for sonju lake intrusion

  1. The Sonju Lake layered intrusion, northeast Minnesota: Internal structure and emplacement history inferred from magnetic fabrics

    Science.gov (United States)

    Maes, S.M.; Tikoff, B.; Ferre, E.C.; Brown, P.E.; Miller, J.D.

    2007-01-01

    The Sonju Lake intrusion (SLI), in northeastern Minnesota, is a layered mafic complex of Keweenawan age (1096.1 ?? 0.8 Ma) related to the Midcontinent rift. The cumulate paragenesis of the intrusion is recognized as broadly similar to the Skaergaard intrusion, a classic example of closed-system differentiation of a tholeiitic mafic magma. The SLI represents nearly closed-system differentiation through bottom-up fractional crystallization. Geochemical studies have identified the presence of a stratabound, 50-100 m thick zone anomalously enriched in Au + PGE. Similar to the PGE reefs of the Skaergaard intrusion, this PGE-enriched zone is hosted within oxide gabbro cumulates, about two-third of the way up from the base of the intrusion. We present a petrofabric study using the anisotropy of magnetic susceptibility (AMS) to investigate the emplacement and flow patterns within the Sonju Lake intrusion. Petrographic and electron microprobe studies, combined with AMS and hysteresis measurements indicate the primary source of the magnetic signal is pseudo-single domain (PSD) magnetite or titanomagnetite. Low field AMS was measured at 32 sites within the Sonju Lake intrusion, which provided information about primary igneous fabrics. The magnetic fabrics in the layered series of the Sonju Lake intrusion are consistent with sub-horizontal to inclined emplacement of the intrusion and show evidence that the cumulate layers were deposited in a dynamic environment. Well-aligned magnetic lineations, consistently plunging shallowly toward the southwest, indicate the source of the magma is a vertical sill-like feeder, presumably located beneath the Finland granite. The Finland granite acted as a density trap for the Sonju Lake magmas, forcing lateral flow of magma to the northeast. The strongly oblate magnetic shape fabrics indicate the shallowly dipping planar fabrics were enhanced by compaction of the crystal mush. ?? 2007 Elsevier B.V. All rights reserved.

  2. The geographical conditions of intensity of salty waters intrusions to coastal lakes on Polish Southern Baltic coast

    Science.gov (United States)

    Cieslinski, R.

    2009-04-01

    Lakes situated on the coast of the southern Baltic function in different conditions than those in which typically inland reservoirs occur. They are situated in the contact zone of two environments: land and sea. These reservoirs together with their direct catchments form specific hydrographic arrangement, in which the course of physical, chemical and biological processes depends on the fact which of these two environments exerts a stronger influence at a given moment. This is important as the lakes situated in the shore zone of the southern Baltic are not exposed to phenomena caused by constant tides, as it is the case in open seas (Ataie-Ashtiani et al., 1999), but only to extreme hydrometeorological conditions, which lead to the formation of the phenomenon of intrusions of sea waters and of damming the free outflow of potamic waters (Demirel, 2004; Cieśliński, Drwal, 2005). What should also be remembered are the local hydrographic, hydrological and morphometric conditions. As a result of intrusions, in the waters of coastal lakes, apart from inland waters there are also waters of sea origin. The proportions of these genetically distinct waters are variable and differ in individual lakes (Grassi, Netti, 2000; Drwal, Cieśliński, 2007). Despite the difference in the causal factor triggering the phenomenon of salt water intrusions, the effect is usually the same as that observed, for instance, in lakes and lagoons of seas with tides (Ishitobi et al., 1999; De Louw, Oude Essink, 2001) and poorly flushed lagoon (Hsing-Juh et al., 2006) or estuaries (Uncles et al., 2002), though the scale of qualitative changes is greater in the case of open seas than in half-closed and closed seas. The status of the research carried out so far enables proposing a hypothesis that chlorides concentrations, as the best indicators for establishing the occurrence of the phenomenon of intrusions, depend not only on the meteorological factor but in some of the lakes on various

  3. On the Salt Water Intrusion into the Durusu Lake, Istanbul: A Joint Central Loop TEM And Multi-Electrode ERT Field Survey

    Science.gov (United States)

    Ardali, Ayça Sultan; Tezkan, Bülent; Gürer, Aysan

    2018-02-01

    Durusu Lake is the biggest and most important freshwater source supplying drinking water to the European side of Istanbul. In this study, electrical resistivity tomography (ERT) and transient electromagnetic (TEM) measurements were applied to detect a possible salt water intrusion into the lake and to delineate the subsurface structure in the north of Durusu Lake. The ERT and TEM measurements were carried out along six parallel profiles extending from the sea coast to the lake shore on the dune barrier. TEM data were interpreted using different 1-D inversion methods such as Occam, Marquardt, and laterally constrained inversion (LCI). ERT data were interpreted using 2-D inversion techniques. The inversion results of ERT and TEM data were shown as resistivity depth sections including topography. The sand layer spreading over the basin has a resistivity of 150-400 Ωm with a thickness of 5-10 m. The sandy layer with clay, silt, and gravel has a resistivity of 15-100 Ωm and a thickness of 10-40 m followed by a clay layer of a resistivity below 10 Ωm. When the inversion of these data is interpreted along with the hydrogeology of the area, it is concluded that the salt water intrusion along the dune barrier is not common and occurs at a particular area where the distance between lake and sea is very close. Using information from boreholes around the lake, it was verified that the common conductive region at depths of 30 m or more consists of clay layers and clay lenses.

  4. Lower crustal intrusions beneath the southern Baikal Rift Zone

    DEFF Research Database (Denmark)

    Nielsen, Christoffer; Thybo, Hans

    2009-01-01

    centre. The BEST (Baikal Explosion Seismic Transect) project acquired a 360-km long, deep seismic, refraction/wide-angle reflection profile in 2002 across southern Lake Baikal. The data from this project is used for identification of large-scale crustal structures and modelling of the seismic velocities....../s and 7.9 km/s. We interpret this feature as resulting from mafic to ultra-mafic intrusions in the form of sills. Petrological interpretation of the velocity values suggests that the intrusions are sorted by fractional crystallization into plagioclase-rich low-velocity layers and pyroxene- and olivine...

  5. Effect of ultramafic intrusions and associated mineralized rocks on the aqueous geochemistry of the Tangle Lakes Area, Alaska: Chapter C in Studies by the U.S. Geological Survey in Alaska, 2011

    Science.gov (United States)

    Wang, Bronwen; Gough, Larry P.; Wanty, Richard B.; Lee, Gregory K.; Vohden, James; O’Neill, J. Michael; Kerin, L. Jack

    2013-01-01

    Stream water was collected at 30 sites within the Tangle Lakes area of the Delta mineral belt in Alaska. Sampling focused on streams near the ultramafic rocks of the Fish Lake intrusive complex south of Eureka Creek and the Tangle Complex area east of Fourteen Mile Lake, as well as on those within the deformed metasedimentary, metavolcanic, and intrusive rocks of the Specimen Creek drainage and drainages east of Eureka Glacier. Major, minor, and trace elements were analyzed in aqueous samples for this reconnaissance aqueous geochemistry effort. The lithologic differences within the study area are reflected in the major-ion chemistry of the water. The dominant major cation in streams draining mafic and ultramafic rocks is Mg2+; abundant Mg and low Ca in these streams reflect the abundance of Mg-rich minerals in these intrusions. Nickel and Cu are detected in 84 percent and 87 percent of the filtered samples, respectively. Nickel and Cu concentrations ranged from Ni life criteria; however, Cu concentrations exceed the hardness-based criteria for both chronic and acute exposure at some sites. The entire rare earth element (REE) suite is found in samples from the Specimen Creek sites MH5, MH4, and MH6 and, with the exception of Tb and Tm, at site MH14. These samples were all collected within drainages containing or downstream from Tertiary gabbro, diabase, and metagabbro (Trgb) exposures. Chondrite and source rock fractionation profiles for the aqueous samples were light rare earth element depleted, with negative Ce and Eu anomalies, indicating fractionation of the REE during weathering. Fractionation patterns indicate that the REE are primarily in the dissolved, as opposed to colloidal, phase.

  6. Oxygen isotope mapping and evaluation of paleo-hydrothermal systems associated with synvolcanic intrusion and VMS deposits

    International Nuclear Information System (INIS)

    Taylor, B.E

    2001-01-01

    Whole-rock oxygen isotope mapping provides a useful method for the delineation and quantitative evaluation of paleo-hydrothermal systems associated with syn-volcanic intrusions and volcanic-associated massive sulfide (VMS) deposits. During the course of a four-year study of regional alteration systems associated with VMS Deposits, four syn-volcanic intrusive complexes in Canada were mapped using stable isotope techniques. The complexes included Noranda, Quebec; Clifford-Ben Nevis, Ontario; Snow Lake, Manitoba, and Sturgeon Lake, Ontario. This study was regional in extent, involving large areas and large numbers of whole-rock samples: Noranda (625 km 2 ;≥600 samples, plus others (total = 1198); Sturgeon Lake (525 km 2 ; 452 samples); Clifford-Ben Nevis (160 km 2 ; 251 samples); and Snow Lake (84 km 2 ; 575 samples). Isotopic data on whole-rock carbonates and hydrous minerals were also collected. The regional isotopic studies were carried out in concert with other studies on mineral assemblages and mineral composition, and on associated intrusive and extrusive rocks. The Clifford-Ben Nevis area was selected as a control area, in as much as it contains no known VMS deposits; all other areas are well-known, productive VMS districts. Oxygen isotope maps are, in a sense, thermal maps, illustrating the paleo-distribution of heat and fluids, and offering a potential aid to exploration. The isotopic data may be contoured to reveal zones of 18 O depletion and enrichment, relative to unaltered rocks. Zones of δ 18 O≤60% comprise rocks that have reacted with seawater at high (e.g., 300+ o C) temperatures. The volume of foot-wall rocks isotopically-depleted by water/rock interaction during the life of one or more episodes of submarine hydrothermal activity is proportional to the amount of heat available from the syn-volcanic intrusive center. These altered rocks comprise the reaction zone often inferred to have supplied metals and other constituents for the VMS deposits

  7. Rubidium-strontium ages from the Oxford Lake-Knee Lake greenstone belt, northern Manitoba

    International Nuclear Information System (INIS)

    Clark, G.S.; Cheung, S.-P.

    1980-01-01

    Rb-Sr whole-rock ages have been determined for rocks from the Oxford Lake-Knee Lake-Gods Lake geenstone belt in the Superior Province of northeastern Manitoba. The age of the Magill Lake Pluton is 2455 +- 35 Ma(lambda 87 Rb = 1.42 x 10 -11 yr -1 ), with an initial 87 Sr/ 86 Sr ratio of 0.7078 +- 0.0043. This granite stock intrudes the Oxford Lake Group, so it is post-tectonic and probably related to the second, weaker stage of metamorphism. The age of the Bayly Lake Pluton is 2424 +- 74 Ma, with an initial 87 Sr/ 86 Sr ratio of 0.7029 +- 0.0001. This granodioritic batholith complex does not intrude the Oxford Lake Group. It is syn-tectonic and metamorphosed. The age of volcanic rocks of the Hayes River Group, from Goose Lake (30 km south of Gods Lake Narrows), is 2680 +- 125 Ma, with an initial 87 Sr/ 86 Sr ratio of 0.7014 +- 0.0009. The age for the Magill Lake and Bayly Lake Plutons can be interpreted as the minimum ages of granite intrusion in the area. The age for the Hayes River Group volcanic rocks is consistent with Rb-Sr ages of volcanic rocks from other Archean greenstone belts within the northwestern Superior Province. (auth)

  8. Tributaries affect the thermal response of lakes to climate change

    Science.gov (United States)

    Råman Vinnå, Love; Wüest, Alfred; Zappa, Massimiliano; Fink, Gabriel; Bouffard, Damien

    2018-01-01

    Thermal responses of inland waters to climate change varies on global and regional scales. The extent of warming is determined by system-specific characteristics such as fluvial input. Here we examine the impact of ongoing climate change on two alpine tributaries, the Aare River and the Rhône River, and their respective downstream peri-alpine lakes: Lake Biel and Lake Geneva. We propagate regional atmospheric temperature effects into river discharge projections. These, together with anthropogenic heat sources, are in turn incorporated into simple and efficient deterministic models that predict future water temperatures, river-borne suspended sediment concentration (SSC), lake stratification and river intrusion depth/volume in the lakes. Climate-induced shifts in river discharge regimes, including seasonal flow variations, act as positive and negative feedbacks in influencing river water temperature and SSC. Differences in temperature and heating regimes between rivers and lakes in turn result in large seasonal shifts in warming of downstream lakes. The extent of this repressive effect on warming is controlled by the lakes hydraulic residence time. Previous studies suggest that climate change will diminish deep-water oxygen renewal in lakes. We find that climate-related seasonal variations in river temperatures and SSC shift deep penetrating river intrusions from summer towards winter. Thus potentially counteracting the otherwise negative effects associated with climate change on deep-water oxygen content. Our findings provide a template for evaluating the response of similar hydrologic systems to on-going climate change.

  9. Tributaries affect the thermal response of lakes to climate change

    Directory of Open Access Journals (Sweden)

    L. Råman Vinnå

    2018-01-01

    Full Text Available Thermal responses of inland waters to climate change varies on global and regional scales. The extent of warming is determined by system-specific characteristics such as fluvial input. Here we examine the impact of ongoing climate change on two alpine tributaries, the Aare River and the Rhône River, and their respective downstream peri-alpine lakes: Lake Biel and Lake Geneva. We propagate regional atmospheric temperature effects into river discharge projections. These, together with anthropogenic heat sources, are in turn incorporated into simple and efficient deterministic models that predict future water temperatures, river-borne suspended sediment concentration (SSC, lake stratification and river intrusion depth/volume in the lakes. Climate-induced shifts in river discharge regimes, including seasonal flow variations, act as positive and negative feedbacks in influencing river water temperature and SSC. Differences in temperature and heating regimes between rivers and lakes in turn result in large seasonal shifts in warming of downstream lakes. The extent of this repressive effect on warming is controlled by the lakes hydraulic residence time. Previous studies suggest that climate change will diminish deep-water oxygen renewal in lakes. We find that climate-related seasonal variations in river temperatures and SSC shift deep penetrating river intrusions from summer towards winter. Thus potentially counteracting the otherwise negative effects associated with climate change on deep-water oxygen content. Our findings provide a template for evaluating the response of similar hydrologic systems to on-going climate change.

  10. Water circulation and recharge pathways of coastal lakes along the southern Baltic Sea in northern Poland

    Directory of Open Access Journals (Sweden)

    Cieśliński Roman

    2016-12-01

    Full Text Available The purpose of this paper is to describe water circulation patterns for selected lakes found along the Baltic coast in northern Poland and to determine primary recharge mechanisms or pathways that produce an influx or loss of lake water. A secondary purpose of the paper is to determine the magnitude of recharge for each studied source of water – river water influx, surface runoff from direct catchments, forced influx from polders surrounding lakes, and periodic marine water intrusions from the nearby Baltic Sea. It is also important to determine the magnitude of water outflow from lakes to the sea via existing linkages as well as to compare horizontal influx and outflow data. The study area consisted of five lakes located along the Baltic Sea in northern Poland: Łebsko, Gardno, Bukowo, Kopań, Resko Przymorskie. The main driving force of the studied lakes are large rivers that drain lake catchment areas and periodic brackish water intrusions by the Baltic Sea.

  11. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  12. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  13. Drivers of sulfide intrusion in Zostera muelleri in a moderately affected estuary in south-eastern Australia

    DEFF Research Database (Denmark)

    Holmer, Marianne; Bennett, William W.; Ferguson, Angus J. P.

    2017-01-01

    The seagrass Zostera muelleri Irmisch ex Asch. is abundant in estuaries in Australia and is under pressure from coastal developments. We studied sulfide intrusion in Z. muelleri along a gradient of anthropogenic impact at five stations in the Wallis Lake estuary, Australia. Results showed differe...

  14. Coastal Water Quality Modeling in Tidal Lake: Revisited with Groundwater Intrusion

    Science.gov (United States)

    Kim, C.

    2016-12-01

    A new method for predicting the temporal and spatial variation of water quality, with accounting for a groundwater effect, has been proposed and applied to a water body partially connected to macro-tidal coastal waters in Korea. The method consists of direct measurement of environmental parameters, and it indirectly incorporates a nutrients budget analysis to estimate the submarine groundwater fluxes. Three-dimensional numerical modeling of water quality has been used with the directly collected data and the indirectly estimated groundwater fluxes. The applied area is Saemangeum tidal lake that is enclosed by 33km-long sea dyke with tidal openings at two water gates. Many investigations of groundwater impact reveal that 10 50% of nutrient loading in coastal waters comes from submarine groundwater, particularly in the macro-tidal flat, as in the west coast of Korea. Long-term monitoring of coastal water quality signals the possibility of groundwater influence on salinity reversal and on the excess mass outbalancing the normal budget in Saemangeum tidal lake. In the present study, we analyze the observed data to examine the influence of submarine groundwater, and then a box model is demonstrated for quantifying the influx and efflux. A three-dimensional numerical model has been applied to reproduce the process of groundwater dispersal and its effect on the water quality of Saemangeum tidal lake. The results show that groundwater influx during the summer monsoon then contributes significantly, 20% more than during dry season, to water quality in the tidal lake.

  15. Doses resulting from intrusion into uranium tailings areas

    International Nuclear Information System (INIS)

    Walsh, M.L.

    1986-02-01

    In the future, it is conceivable that institutional controls of uranium tailings areas may cease to exist and individuals may intrude into these areas unaware of the potential radiation hazards. The objective of this study was to estimate the potential doses to the intruders for a comprehensive set of intrusion scenarios. Reference tailings areas in the Elliot Lake region of northern Ontario and in northern Saskatchewan were developed to the extent required to calculate radiation exposures. The intrusion scenarios for which dose calculations were performed, were categorized into the following classes: habitation of the tailings, agricultural activities, construction activities, and recreational activities. Realistic exposure conditions were specified and annual doses were calculated by applying standard dose conversion factors. The exposure estimates demonstrated that the annual doses resulting from recreational activities and from construction activities would be generally small, less than twenty millisieverts, while the habitational and agricultural activities could hypothetically result in doses of several hundred millisieverts. However, the probability of occurrence of these latter classes of scenarios is considered to be much lower than scenarios involving either construction or recreational activities

  16. Human intrusion: New ideas?

    International Nuclear Information System (INIS)

    Cooper, J.R.

    2002-01-01

    Inadvertent human intrusion has been an issue for the disposal of solid radioactive waste for many years. This paper discusses proposals for an approach for evaluating the radiological significance of human intrusion as put forward by ICRP with contribution from work at IAEA. The approach focuses on the consequences of the intrusion. Protective actions could, however, include steps to reduce the probability of human intrusion as well as the consequences. (author)

  17. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  18. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  19. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  20. Development and testing af a model for the supergene distribution of uranium and accompanying elements around a known uranium deposit associated with an alkaline intrusion

    International Nuclear Information System (INIS)

    Rose-Hansen, J.; Soerensen, H.

    1983-01-01

    The Ilimaussaq intrusion may be characterized as a geochemically abnormal region, since its rocks are strongly enriched in a number of rare elements, including elements which accompany uranium in deposits in other parts of the world. Examples are the rare earth metals, Nb, Ta, Be, Li, and metals as Cu, Pb, Zn, Mo and Sn. It was proposed to develop and test a model for the supergene distribution of uranium and accompanying elements around a known uranium deposit associated with an alkaline intrusion. The most promising results are those obtained by the PCA technique. For a more preliminary study of a region fjord and river sediments might be the sampling target. These sediments were found to be mixtures in which the proportion of material from the Ilimaussaq U-deposit could be evaluated by the PCA technique involving a distance function related to the loadings in the first principal dimen- sion of the elements characterizing the Ilimaussaq Intrusion. One of the major features of the material sampled in this study is the general high degree of preservation in the sub-arctic environment of the primary igneous mineralogy in the sediments, and in other areas, the structure of data should be investigated in order to test them in this respect. One obvious way is X-ray diffraction analysis. It was indicated that uranium is selectively absorbed on the organic material in lakes and is able to reflect the concentration of U in the lake waters, informing the ultimate potential of the drainage areas in question. It is however yet to be established whether the correlation of uranium and the organic material of the lake sediments actually reflects the long term U concentrations of the lake water. The use of the cluster analysis and discriminant analysis techniques proved to be of lesser value in this project. (author)

  1. Network Intrusion Forensic Analysis Using Intrusion Detection System

    OpenAIRE

    Manish Kumar; Dr. M. Hanumanthappa; Dr. T.V. Suresh Kumar

    2011-01-01

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investi...

  2. Count out your intrusions: Effects of verbal encoding on intrusive memories

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.

    2009-01-01

    Peri-traumatic information processing is thought to affect the development of intrusive trauma memories. This study aimed to replicate and improve the study by Holmes, Brewin, and Hennessy (2004, Exp. 3) on the role of peri-traumatic verbal processing in analogue traumatic intrusion development.

  3. Options for human intrusion

    International Nuclear Information System (INIS)

    Bauser, M.; Williams, R.

    1993-01-01

    This paper addresses options for dealing with human intrusion in terms of performance requirements and repository siting and design requirements. Options are presented, along with the advantages and disadvantages of certain approaches. At the conclusion, a conceptual approach is offered emphasizing both the minimization of subjective judgements concerning future human activity, and specification of repository requirements to minimize the likelihood of human intrusion and any resulting, harmful effects should intrusion occur

  4. Flood frequency matters: Why climate change degrades deep-water quality of peri-alpine lakes

    Science.gov (United States)

    Fink, Gabriel; Wessels, Martin; Wüest, Alfred

    2016-09-01

    Sediment-laden riverine floods transport large quantities of dissolved oxygen into the receiving deep layers of lakes. Hence, the water quality of deep lakes is strongly influenced by the frequency of riverine floods. Although flood frequency reflects climate conditions, the effects of climate variability on the water quality of deep lakes is largely unknown. We quantified the effects of climate variability on the potential shifts in the flood regime of the Alpine Rhine, the main catchment of Lake Constance, and determined the intrusion depths of riverine density-driven underflows and the subsequent effects on water exchange rates in the lake. A simplified hydrodynamic underflow model was developed and validated with observed river inflow and underflow events. The model was implemented to estimate underflow statistics for different river inflow scenarios. Using this approach, we integrated present and possible future flood frequencies to underflow occurrences and intrusion depths in Lake Constance. The results indicate that more floods will increase the number of underflows and the intensity of deep-water renewal - and consequently will cause higher deep-water dissolved oxygen concentrations. Vice versa, fewer floods weaken deep-water renewal and lead to lower deep-water dissolved oxygen concentrations. Meanwhile, a change from glacial nival regime (present) to a nival pluvial regime (future) is expected to decrease deep-water renewal. While flood frequencies are not expected to change noticeably for the next decades, it is most likely that increased winter discharge and decreased summer discharge will reduce the number of deep density-driven underflows by 10% and favour shallower riverine interflows in the upper hypolimnion. The renewal in the deepest layers is expected to be reduced by nearly 27%. This study underlines potential consequences of climate change on the occurrence of deep river underflows and water residence times in deep lakes.

  5. Numerical simulations of groundwater flow and solute transport in the Lake 233 aquifer

    Energy Technology Data Exchange (ETDEWEB)

    Klukas, M H; Moltyaner, G L

    1995-05-01

    A three-dimensional numerical flow model of the Lake 233 aquifer underlying the site of the proposed Intrusion Resistant Underground Structure (IRUS) for low level waste disposal is developed. A reference hydraulic conductivity distribution incorporating the key stratigraphic units and field estimates of recharge from Lake 233 are used as model input. The model was calibrated against the measured hydraulic head distribution, the flowpath of a historic {sup 90}Sr plume in the aquifer and measured groundwater velocities. (author). 23 refs., 4 tabs., 31 figs.

  6. Numerical simulations of groundwater flow and solute transport in the Lake 233 aquifer

    International Nuclear Information System (INIS)

    Klukas, M.H.; Moltyaner, G.L.

    1995-05-01

    A three-dimensional numerical flow model of the Lake 233 aquifer underlying the site of the proposed Intrusion Resistant Underground Structure (IRUS) for low level waste disposal is developed. A reference hydraulic conductivity distribution incorporating the key stratigraphic units and field estimates of recharge from Lake 233 are used as model input. The model was calibrated against the measured hydraulic head distribution, the flowpath of a historic 90 Sr plume in the aquifer and measured groundwater velocities. (author). 23 refs., 4 tabs., 31 figs

  7. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  8. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  9. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  10. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  11. Climate change induced salinisation of artificial lakes in the Netherlands and consequences for drinking water production.

    Science.gov (United States)

    Bonte, Matthijs; Zwolsman, John J G

    2010-08-01

    In this paper we present a modelling study to investigate the impacts of climate change on the chloride concentration and salinisation processes in two man-made freshwater lakes in the Netherlands, Lake IJsselmeer and Lake Markermeer. We used a transient compartmental chloride and water balance model to elucidate the salinisation processes occurring under present conditions and assess future salinisation under two climate forcing scenarios. The model results showed that the Rhine River is the dominant determinant for the chloride concentration in both lakes, followed by drainage of brackish groundwater from the surrounding polders. The results further show that especially during dry years, seawater intrusion through the tidal closure dam is an important source of chloride to Lake IJsselmeer. The results from the climatic forcing scenarios show that Lake IJsselmeer is especially vulnerable to climate-induced salinisation whereas effects on Lake Markermeer are relatively small. Peak chloride concentrations at the raw water intake of the Andijk drinking water facility on Lake IJsselmeer are projected to increase to values above 250 mg/l in the most far-reaching climate change scenario W+ in 2050 for dry years. This is well above the maximum allowable concentration of 150 mg/l for chloride in drinking water. Modelling showed that climate change impacts the chloride concentrations in a variety of ways: 1) an increasing occurrence of low river flows from summer to autumn reduces the dilution of the chloride that is emitted to the Rhine with a constant load thereby increasing its concentration; 2) increased open water evaporation and reduced rainfall during summer periods and droughts increases the chloride concentration in the water; and 3) rises in sea level increase seawater intrusion through the tidal closure dam of Lake IJsselmeer. The processes described here are likely to affect many other tidal rivers or lakes and should be considered when planning future raw

  12. Spatiotemporal assessment of water chemistry in intermittently open/closed coastal lakes of Southern Baltic

    Science.gov (United States)

    Astel, Aleksander M.; Bigus, Katarzyna; Obolewski, Krystian; Glińska-Lewczuk, Katarzyna

    2016-12-01

    Ionic profile, pH, electrolytic conductivity, chemical oxygen demand and concentration of selected heavy metals (Ni, Cu, Zn, Fe and Mn) were determined in water of 11 intermittently closed and open lakes and lagoons (ICOLLs) located in Polish coastline. Multidimensional data set was explored by the use of the self-organizing map (SOM) technique to avoid supervised and predictable division for fully isolated, partially and fully connected lakes. Water quality assessment based on single parameter's mean value allowed classification of majority of lakes to first or second class of purity according to regulation presenting classification approach applicable to uniform parts of surface waters. The SOM-based grouping revealed seven clusters comprising water samples of similar physico-chemical profile. Fully connected lakes were characterized by the highest concentration of components characteristic for sea salts (NaCl, MgCl2, MgSO4, CaSO4, K2SO4 and MgBr2), however spring samples from Łebsko were shifted to another cluster suggesting that intensive surface run-off and fresh-water inflow through Łupawa river decreases an impact of sea water intrusions. Forecasted characteristic of water collected in Resko Przymorskie lake was disturbed by high contamination by nitrites indicating accidental and local contamination due to usage of sodium nitrite for the curing of meat. Some unexpected sources of contamination was discovered in intermittently open and closed lakes. Presumably Zn contamination is due to use of wood preservatives to protect small wooden playgrounds or camping places spread around one of the lake, while increased concentration of Ni could be connected with grass and vegetation burning. Waters of Jamno lake are under the strongest anthropogenic impact due to inefficient removal of phosphates by waste water treatment plant and contamination by Fe and Mn caused by backwashing of absorption filters. Generally, the quality of ICOLLs' water was diversified, while

  13. Geophysical study of the Clear Lake region, California

    Energy Technology Data Exchange (ETDEWEB)

    Chapman, R.H.

    1975-01-01

    Results of geophysical studies in the Clear Lake region of California, north of San Francisco, have revealed a prominent, nearly circular negative gravity anomaly with an amplitude of more than 25 milligals (mgal) and an areal extent of approximately 250 square miles and, in addition, a number of smaller positive and negative anomalies. The major negative gravity anomaly is closely associated with the Clear Lake volcanic field and with an area characterized by hot springs and geothermal fields. However, the anomaly cannot be explained by mapped surface geologic features of the area. Aeromagnetic data in the Clear Lake region show no apparent correlation with the major negative gravity anomaly; the local magnetic field is affected principally by serpentine. An electrical resistivity low marks the central part of the gravity minimum, and a concentration of earthquake epicenters characterizes the Clear Lake volcanic field area. The primary cause of the major negative gravity anomaly is believed to be a hot intrusive mass, possibly a magma chamber, that may underlie the Clear Lake volcanic field and vicinity. This mass may serve as a source of heat for the geothermal phenomena in the area. Other smaller gravity anomalies in the Clear Lake region are apparently caused by near-surface geologic features, including relatively dense units of the Franciscan Formation and less dense Cenozoic sedimentary and volcanic rock units.

  14. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  15. The volcanic acidification of glacial Lake Caviahue, Province of Neuquen, Argentina

    Science.gov (United States)

    Varekamp, Johan C.

    2008-12-01

    Lake Caviahue (northern Patagonia, Argentina) is a large glacial lake acidified by volcanic fluids from Copahue volcano. The lake and the feeding rivers were sampled annually from 1997 till early 2006, including the eruptive period of 2000. Lake Caviahue waters evolved over time, with the most concentrated waters in 2000 during the eruptive period, followed by gradual dilution that was interrupted by renewed acidification in 2003-2004. Inversion of the lake water data and application of a dynamic non-steady state model for the lake provides our best quantitative estimates for the variation in element fluxes over the 9-year period. The model flux results agree well with most of the measured fluxes. The Copahue hydrothermal system had gently declining element fluxes between 1997 and mid-1999, although the lake was still becoming more concentrated. About 2-3 months before the 2000 eruption, element fluxes increased strongly, but the hydrothermal fluxes almost shutoff directly after the main eruptive events. The fluxes of several elements recovered post-2001, with an increase in element fluxes in 2003-2004; the lake became more dilute between 2004 and 2006. The intrusion of new magma into the hydrothermal system just prior to the 2000 eruption led to enhanced water rock interaction, with higher concentrations of the rock forming elements in the fluids, and the hot spring flow rate increased as a result of the higher pressure in the reservoir. The fluids became saturated in alunite and jarosite, and they were already saturated with anhydrite. Precipitation of these minerals possibly led to a decreased permeability of the hydrothermal reservoir, leading to the strongly reduced element fluxes just after the eruption. In addition, K, Al and S were retained in the newly precipitated minerals as well, further diminishing their export. The acidification in 2003-2004 may have resulted from a new small intrusion of magma or resulted from seismic activity that created new

  16. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  17. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  18. An international perspective on Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  19. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  20. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  1. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    Part of the stakeholder consultation addressed strategies that media audiences are developing to cope with pressures and intrusions in a changing media environment, characterised by digitalisation and interactive possibilities. We interviewed ten stakeholders representing interests such as content...... production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...... no consensual motivation, nor any clear avenue for action. Therefore, we have analysed different discursive positions that prevent acknowledging or taking action upon the pressures and intrusions that we presented to these stakeholders. The discursive positions are outlined below....

  2. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  3. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    International Conference on Computational Intelligence and Natural Computing, volume 2, pages 413–416, June 2009. • Rung Ching Chen, Kai -Fan Cheng, and...Chia-Fen Hsieh . “Using rough set and support vector machine for network intrusion detection.” International Journal of Network Security & Its...intrusion detection using FP tree rules.” Journal Of Advanced Networking and Applications, 1(1):30–39, 2009. • Ming-Yang Su, Gwo-Jong Yu , and Chun-Yuen

  4. From intrusive to oscillating thoughts.

    Science.gov (United States)

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  5. Bacterial diversity and composition during rain events with and without Saharan dust influence reaching a high mountain lake in the Alps.

    Science.gov (United States)

    Peter, Hannes; Hörtnagl, Paul; Reche, Isabel; Sommaruga, Ruben

    2014-12-01

    The diversity of airborne microorganisms that potentially reach aquatic ecosystems during rain events is poorly explored. Here, we used a culture-independent approach to characterize bacterial assemblages during rain events with and without Saharan dust influence arriving to a high mountain lake in the Austrian Alps. Bacterial assemblage composition differed significantly between samples with and without Saharan dust influence. Although alpha diversity indices were within the same range in both sample categories, rain events with Atlantic or continental origins were dominated by Betaproteobacteria, whereas those with Saharan dust intrusions were dominated by Gammaproteobacteria. The high diversity and evenness observed in all samples suggests that different sources of bacteria contributed to the airborne assemblage collected at the lake shore. During experiments with bacterial assemblages collected during rain events with Saharan dust influence, cell numbers rapidly increased in sterile lake water from initially ∼3 × 103 cell ml-1 to 3.6-11.1 x105 cells ml-1 within 4-5 days, and initially, rare taxa dominated at the end of the experiment. Our study documents the dispersal of viable bacteria associated to Saharan dust intrusions travelling northwards as far as 47° latitude.

  6. Intrusive trauma memory: A review and functional analysis

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.; Holmes, E.A.

    2009-01-01

    Our contribution to this special issue focuses on the phenomenon of intrusive trauma memory. While intrusive trauma memories can undoubtedly cause impairment, we argue that they may exist for a potentially adaptive reason. Theory and experimental research on intrusion development are reviewed and

  7. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  8. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  9. Rapid laccolith intrusion driven by explosive volcanic eruption.

    Science.gov (United States)

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  10. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  11. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  12. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  13. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  14. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  15. Intrusive Memories of Distressing Information: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Eva Battaglini

    Full Text Available Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42 viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13 demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13. Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC and dorsolateral prefrontal cortex (dlPFC, inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories.

  16. Monitoring the cooling of the 1959 Kīlauea Iki lava lake using surface magnetic measurements

    Science.gov (United States)

    Gailler, Lydie; Kauahikaua, James P.

    2017-01-01

    Lava lakes can be considered as proxies for small magma chambers, offering a unique opportunity to investigate magma evolution and solidification. Repeated magnetic ground surveys over more than 50 years each show a large vertical magnetic intensity anomaly associated with Kīlauea Iki Crater, partly filled with a lava lake during the 1959 eruption of Kīlauea Volcano (Island of Hawai’i). The magnetic field values recorded across the Kīlauea Iki crater floor and the cooling lava lake below result from three simple effects: the static remnant magnetization of the rocks forming the steep crater walls, the solidifying lava lake crust, and the hot, but shrinking, paramagnetic non-magnetic lens (>540 °C). We calculate 2D magnetic models to reconstruct the temporal evolution of the geometry of this non-magnetic body, its depth below the surface, and its thickness. Our results are in good agreement with the theoretical increase in thickness of the solidifying crust with time. Using the 2D magnetic models and the theoretical curve for crustal growth over a lava lake, we estimate that the former lava lake will be totally cooled below the Curie temperature in about 20 years. This study shows the potential of magnetic methods for detecting and monitoring magmatic intrusions at various scales.

  17. Deformation at Lava Lake Volcanoes: Lessons from Karthala

    Science.gov (United States)

    Biggs, J.; Rust, A.; Owens, C.

    2014-12-01

    To remain hot, permanent lava lakes require a continuous connection to a magma reservoir. Depending on the state of the conduit, changes in magma pressure could result in changes in the lake level (hydraulic head) or be accommodated elastically leading to surface deformation. Observing deformation is therefore key to understanding the plumbing system associated with lava lakes. However, the majority of the world's lava lakes lie in difficult socio-economic or remote locations meaning that there are few ground-based observations, and it is often necessary to rely on satellite imagery. Karthala volcano experienced a sequence of eruptions in April 2005, Nov 2005, May 2006 and Jan 2007. The first 3 took place at the Choungou Chahale crater, which typically contains either a water or lava lake; the last formed a new pit crater to the north. Satellite thermal imagery (Hirn et al, 2008) does not show an anomaly during the first eruption, which had a phreatomagmatic component, but large thermal anomalies, associated with an ephemeral lava lake were detected during the Nov 2005 and May 2006 eruptions. The final eruption produced a smaller anomaly attributed to a minor lava flow. Here we present InSAR observations from 2004-2010. We find no significant deformation associated with the first three eruptions, but the January 2007 eruption was associated with ~25 cm of deformation near the volcano's summit, characteristic of a dyke intrusion aligned with the northern rift zone. We also observe an unusual pattern deformation along the coast which may be attributed to rapid settling of soft sediment or recent volcanic deposits triggered by seismic activity. We propose that the first eruption cleared the reservoir-summit connection and interacted with the water in Choungou Chahale. The following eruptions formed a lava lake, but without causing deformation. By the final eruption, the conduit had become blocked and magma intruded along the rift zone causing deformation but no

  18. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  19. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  20. Human intrusion: issues concerning its assessment

    International Nuclear Information System (INIS)

    Grimwood, P.D.; Smith, G.M.

    1989-01-01

    The potential significance of human intrusion in the performance assessment of radioactive waste repositories has been increasingly recognized in recent years. It is however an area of assessment in which subjective judgments dominate. This paper identifies some of the issues involved. These include regulatory criteria, scenario development, probability assignment, consequence assessment and measures to mitigate human intrusion

  1. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  2. Magmatic intrusions in the lunar crust

    Science.gov (United States)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  3. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  4. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  5. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  6. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  7. Evidential reasoning research on intrusion detection

    Science.gov (United States)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  8. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  9. A Survey on Anomaly Based Host Intrusion Detection System

    Science.gov (United States)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  10. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  11. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  12. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    Science.gov (United States)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    We will present a detailed microstructural and geochemical study of reactive liquid flow in Unit 9 of the Rum Eastern Layered Intrusion. In the study region, Unit 9 comprises an underlying lens-like body of peridotite overlain by a sequence of troctolite and gabbro (termed allivalite), with some local and minor anorthosite. The troctolite is separated from the overlying gabbro by a distinct, sub-horizontal, undulose horizon (the major wavy horizon). Higher in the stratigraphy is another, similar, horizon (the minor wavy horizon) that separates relatively clinopyroxene-poor gabbro from an overlying gabbro. To the north of the peridotite lens, both troctolite and gabbro grade into poikilitic gabbro. Clinopyroxene habit in the allivalite varies from thin rims around olivine in troctolite, to equigranular crystals in gabbro, to oikocrysts in the poikilitic gabbro. The poikilitic gabbros contain multiple generations of clinopyroxene, with Cr-rich (~1.1 wt.% Cr2O3), anhedral cores with moderate REE concentrations (core1) overgrown by an anhedral REE-depleted second generation with moderate Cr (~0.7 wt.% Cr2O3) (core2). These composite cores are rimmed by Cr-poor (~0.2 wt.% Cr2O3) and REE-poor to moderate clinopyroxene. We interpret these microstructures as a consequence of two separate episodes of partial melting triggered by the intrusion of hot olivine-phyric picrite to form the discontinuous lenses that comprise the Unit 9 peridotite. Loss of clinopyroxene-saturated partial melt from the lower part of the allivalite immediately following the early stages of sill intrusion resulted in the formation of clinopyroxene-poor gabbro. The spatial extent of clinopyroxene loss is marked by the minor wavy horizon. A further partial melting event stripped out almost all clinopyroxene from the lowest allivalite, to form a troctolite, with the major wavy horizon marking the extent of melting during this second episode. The poikilitic gabbro formed from clinopyroxene-saturated melt

  13. A new intrusion prevention model using planning knowledge graph

    Science.gov (United States)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  14. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients

    Directory of Open Access Journals (Sweden)

    Usha Bapat

    2012-01-01

    Full Text Available To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients′ above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life

  15. Biological intrusion barriers for large-volume waste-disposal sites

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Cline, J.F.; Rickard, W.H.

    1982-01-01

    intrusion of plants and animals into shallow land burial sites with subsequent mobilization of toxic and radiotoxic materials has occured. Based on recent pathway modeling studies, such intrusions can contribute to the dose received by man. This paper describes past work on developing biological intrusion barrier systems for application to large volume waste site stabilization. State-of-the-art concepts employing rock and chemical barriers are discussed relative to long term serviceability and cost of application. The interaction of bio-intrusion barrier systems with other processes affecting trench cover stability are discussed to ensure that trench cover designs minimize the potential dose to man. 3 figures, 6 tables

  16. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    OpenAIRE

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumben...

  17. Identification of Human Intrusion Types into Radwaste Disposal Facility

    International Nuclear Information System (INIS)

    Budi Setiawan

    2007-01-01

    Human intrusion has long been recognized as a potentially important post-closure safety issue for rad waste disposal facility. It is due to the difficulties in predicting future human activities. For the preliminary study of human intrusion, identification of human intrusion types need to be recognized and investigated also the approaching of problem solving must be known to predict the prevention act and accepted risk. (author)

  18. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  19. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  20. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  1. Heart rate, startle response, and intrusive trauma memories

    Science.gov (United States)

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  2. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  3. The appraisal of intrusive thoughts in relation to obsessional-compulsive symptoms.

    Science.gov (United States)

    Barrera, Terri L; Norton, Peter J

    2011-01-01

    Research has shown that although intrusive thoughts occur universally, the majority of individuals do not view intrusive thoughts as being problematic (Freeston, Ladouceur, Thibodeau, & Gagnon, 1991; Rachman & de Silva, 1978; Salkovskis & Harrison, 1984). Thus, it is not the presence of intrusive thoughts that leads to obsessional problems but rather some other factor that plays a role in the development of abnormal obsessions. According to the cognitive model of obsessive-compulsive disorder (OCD) put forth by Salkovskis (1985), the crucial factor that differentiates between individuals with OCD and those without is the individual's appraisal of the naturally occurring intrusive thoughts. This study aimed to test Salkovskis's model by examining the role of cognitive biases (responsibility, thought-action fusion, and thought control) as well as distress in the relationship between intrusive thoughts and obsessive-compulsive symptoms in an undergraduate sample of 326 students. An existing measure of intrusive thoughts (the Revised Obsessional Intrusions Inventory) was modified for this study to include a scale of distress associated with each intrusive thought in addition to the current frequency scale. When the Yale-Brown Obsessive-Compulsive Scale was used as the measure of OCD symptoms, a significant interaction effect of frequency and distress of intrusive thoughts resulted. Additionally, a significant three-way interaction of Frequency × Distress × Responsibility was found when the Obsessive Compulsive Inventory-Revised was used as the measure of OCD symptoms. These results indicate that the appraisal of intrusive thoughts is important in predicting OCD symptoms, thus providing support for Salkovskis's model of OCD.

  4. Time-scales of assembly and thermal history of a composite felsic pluton: constraints from the Emerald Lake area, northern Canadian Cordillera, Yukon

    Science.gov (United States)

    Coulson, Ian M.; Villeneuve, Mike E.; Dipple, Gregory M.; Duncan, Robert A.; Russell, James K.; Mortensen, James K.

    2002-05-01

    Knowledge of the time-scales of emplacement and thermal history during assembly of composite felsic plutons in the shallow crust are critical to deciphering the processes of crustal growth and magma chamber development. Detailed petrological and chemical study of the mid-Cretaceous, composite Emerald Lake pluton, from the northern Canadian Cordillera, Yukon Territory, coupled with U-Pb and 40Ar/ 39Ar geochronology, indicates that this pluton was intruded as a series of magmatic pulses. Intrusion of these pulses produced a strong petrological zonation from augite syenite, hornblende quartz syenite and monzonite, to biotite granite. Our data further indicate that multiple phases were emplaced and cooled to below the mineral closure temperatures over a time-scale on the order of the resolution of the 40Ar/ 39Ar technique (˜1 Myr), and that emplacement occurred at 94.3 Ma. Simple thermal modelling and heat conduction calculations were used to further constrain the temporal relationships within the intrusion. These calculations are consistent with the geochronology and show that emplacement and cooling were complete in less than 100 kyr and probably 70±5 kyr. These results demonstrate that production, transport and emplacement of the different phases of the Emerald Lake pluton occurred essentially simultaneously, and that these processes must also have been closely related in time and space. By analogy, these results provide insights into the assembly and petrogenesis of other complex intrusions and ultimately lead to an understanding of the processes involved in crustal development.

  5. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  6. Saharan dust intrusions in Spain: Health impacts and associated synoptic conditions.

    Science.gov (United States)

    Díaz, Julio; Linares, Cristina; Carmona, Rocío; Russo, Ana; Ortiz, Cristina; Salvador, Pedro; Trigo, Ricardo Machado

    2017-07-01

    A lot of papers have been published about the impact on mortality of Sahara dust intrusions in individual cities. However, there is a lack of studies that analyse the impact on a country and scarcer if in addition the analysis takes into account the meteorological conditions that favour these intrusions. The main aim is to examine the effect of Saharan dust intrusions on daily mortality in different Spanish regions and to characterize the large-scale atmospheric circulation anomalies associated with such dust intrusions. For determination of days with Saharan dust intrusions, we used information supplied by the Ministry of Agriculture, Food & Environment, it divides Spain into 9 main areas. In each of these regions, a representative province was selected. A time series analysis has been performed to analyse the relationship between daily mortality and PM 10 levels in the period from 01.01.04 to 31.12.09, using Poisson regression and stratifying the analysis by the presence or absence of Saharan dust advections. The proportion of days on which there are Saharan dust intrusions rises to 30% of days. The synoptic pattern is characterised by an anticyclonic ridge extending from northern Africa to the Iberian Peninsula. Particulate matter (PM) on days with intrusions are associated with daily mortality, something that does not occur on days without intrusions, indicating that Saharan dust may be a risk factor for daily mortality. In other cases, what Saharan dust intrusions do is to change the PM-related mortality behaviour pattern, going from PM 2.5 . A study such as the one conducted here, in which meteorological analysis of synoptic situations which favour Saharan dust intrusions, is combined with the effect on health at a city level, would seem to be crucial when it comes to analysing the differentiated mortality pattern in situations of Saharan dust intrusions. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. An evaluation of classification algorithms for intrusion detection ...

    African Journals Online (AJOL)

    An evaluation of classification algorithms for intrusion detection. ... Log in or Register to get access to full text downloads. ... Most of the available IDSs use all the 41 features in the network to evaluate and search for intrusive pattern in which ...

  8. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  9. Non-Intrusive Intelligibility Prediction Using a Codebook-Based Approach

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Kavalekalam, Mathew Shaji; Xenaki, Angeliki

    2017-01-01

    It could be beneficial for users of hearing aids if these were able to automatically adjust the processing according to the speech intelligibility in the specific acoustic environment. Most speech intelligibility metrics are intrusive, i.e., they require a clean reference signal, which is rarely...... a high correlation between the proposed non-intrusive codebookbased STOI (NIC-STOI) and the intrusive STOI indicating that NIC-STOI is a suitable metric for automatic classification of speech signals...

  10. Continuous gravity measurements reveal a low-density lava lake at Kīlauea Volcano, Hawai‘i

    Science.gov (United States)

    Carbone, Daniele; Poland, Michael P.; Patrick, Matthew R.; Orr, Tim R.

    2013-01-01

    On 5 March 2011, the lava lake within the summit eruptive vent at Kīlauea Volcano, Hawai‘i, began to drain as magma withdrew to feed a dike intrusion and fissure eruption on the volcanoʼs east rift zone. The draining was monitored by a variety of continuous geological and geophysical measurements, including deformation, thermal and visual imagery, and gravity. Over the first ∼14 hours of the draining, the ground near the eruptive vent subsided by about 0.15 m, gravity dropped by more than 100 μGal, and the lava lake retreated by over 120 m. We used GPS data to correct the gravity signal for the effects of subsurface mass loss and vertical deformation in order to isolate the change in gravity due to draining of the lava lake alone. Using a model of the eruptive vent geometry based on visual observations and the lava level over time determined from thermal camera data, we calculated the best-fit lava density to the observed gravity decrease — to our knowledge, the first geophysical determination of the density of a lava lake anywhere in the world. Our result, 950 +/- 300 kg m-3, suggests a lava density less than that of water and indicates that Kīlaueaʼs lava lake is gas-rich, which can explain why rockfalls that impact the lake trigger small explosions. Knowledge of such a fundamental material property as density is also critical to investigations of lava-lake convection and degassing and can inform calculations of pressure change in the subsurface magma plumbing system.

  11. Intrusion of Magmatic Bodies Into the Continental Crust: 3-D Numerical Models

    Science.gov (United States)

    Gorczyk, Weronika; Vogt, Katharina

    2018-03-01

    Magma intrusion is a major material transfer process in the Earth's continental crust. Yet the mechanical behavior of the intruding magma and its host are a matter of debate. In this study we present a series of numerical thermomechanical simulations on magma emplacement in 3-D. Our results demonstrate the response of the continental crust to magma intrusion. We observe change in intrusion geometries between dikes, cone sheets, sills, plutons, ponds, funnels, finger-shaped and stock-like intrusions, and injection time. The rheology and temperature of the host are the main controlling factors in the transition between these different modes of intrusion. Viscous deformation in the warm and deep crust favors host rock displacement and plutons at the crust-mantle boundary forming deep-seated plutons or magma ponds in the lower to middle crust. Brittle deformation in the cool and shallow crust induces cone-shaped fractures in the host rock and enables emplacement of finger- or stock-like intrusions at shallow or intermediate depth. Here the passage of magmatic and hydrothermal fluids from the intrusion through the fracture pattern may result in the formation of ore deposits. A combination of viscous and brittle deformation forms funnel-shaped intrusions in the middle crust. Intrusion of low-density magma may more over result in T-shaped intrusions in cross section with magma sheets at the surface.

  12. Nuisance alarm suppression techniques for fibre-optic intrusion detection systems

    Science.gov (United States)

    Mahmoud, Seedahmed S.; Visagathilagar, Yuvaraja; Katsifolis, Jim

    2012-02-01

    The suppression of nuisance alarms without degrading sensitivity in fibre-optic intrusion detection systems is important for maintaining acceptable performance. Signal processing algorithms that maintain the POD and minimize nuisance alarms are crucial for achieving this. A level crossings algorithm is presented for suppressing torrential rain-induced nuisance alarms in a fibre-optic fence-based perimeter intrusion detection system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr, and intrusion events can be detected simultaneously during rain periods. The use of a level crossing based detection and novel classification algorithm is also presented demonstrating the suppression of nuisance events and discrimination of nuisance and intrusion events in a buried pipeline fibre-optic intrusion detection system. The sensor employed for both types of systems is a distributed bidirectional fibre-optic Mach Zehnder interferometer.

  13. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  14. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  15. An ontology-based intrusion patterns classification system | Shonubi ...

    African Journals Online (AJOL)

    Studies have shown that computer intrusions have been on the increase in recent times. Many techniques and patterns are being used by intruders to gain access to data on host computer networks. In this work, intrusion patterns were identified and classified and inherent knowledge were represented using an ontology of ...

  16. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    Seawater intrusion; coastal aquifers; density-dependent flow and ... The seawater intrusion mechanism in coastal aquifers generally causes the occurrence of ... (4) The dynamic viscosity of the fluid does not change with respect to salinity and.

  17. A Machine Learning Based Intrusion Impact Analysis Scheme for Clouds

    Directory of Open Access Journals (Sweden)

    Junaid Arshad

    2012-01-01

    Full Text Available Clouds represent a major paradigm shift, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of on demand expandable computing infrastructures. However, Clouds introduce novel security challenges which need to be addressed to facilitate widespread adoption. This paper is focused on one such challenge - intrusion impact analysis. In particular, we highlight the significance of intrusion impact analysis for the overall security of Clouds. Additionally, we present a machine learning based scheme to address this challenge in accordance with the specific requirements of Clouds for intrusion impact analysis. We also present rigorous evaluation performed to assess the effectiveness and feasibility of the proposed method to address this challenge for Clouds. The evaluation results demonstrate high degree of effectiveness to correctly determine the impact of an intrusion along with significant reduction with respect to the intrusion response time.

  18. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    -intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results......Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non...

  19. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  20. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  1. Fate and transport of pathogens in lakes and reservoirs.

    Science.gov (United States)

    Brookes, Justin D; Antenucci, Jason; Hipsey, Matthew; Burch, Michael D; Ashbolt, Nicholas J; Ferguson, Christobel

    2004-07-01

    Outbreaks of water-borne disease via public water supplies continue to be reported in developed countries even though there is increased awareness of, and treatment for, pathogen contamination. Pathogen episodes in lakes and reservoirs are often associated with rain events, and the riverine inflow is considered to be major source of pathogens. Consequently, the behaviour of these inflows is of particular importance in determining pathogen transport and distribution. Inflows are controlled by their density relative to that of the lake, such that warm inflows will flow over the surface of the lake as a buoyant surface flow and cold, dense inflows will sink beneath the lake water where they will flow along the bathymetry towards the deepest point. The fate of pathogens is determined by loss processes including settling and inactivation by temperature, UV and grazing. The general trend is for the insertion timescale to be shortest, followed by sedimentation losses and temperature inactivity. The fate of Cryptosporidium due to UV light inactivation can occur at opposite ends of the scale, depending on the location of the oocysts in the water column and the extinction coefficient for UV light. For this reason, the extinction coefficient for UV light appears to be a vitally important parameter for determining the risk of Cryptosporidium contamination. For risk assessment of pathogens in supply reservoirs, it is important to understand the role of hydrodynamics in determining the timescale of transport to the off-take relative to the timescale of inactivation. The characteristics of the riverine intrusion must also be considered when designing a sampling program for pathogens. A risk management framework is presented that accounts for pathogen fate and transport for reservoirs.

  2. Intrusion problematic during water supply systems’ operation

    OpenAIRE

    Jesus Mora-Rodriguez, P. Amparo López-Jimenez, Helena M. Ramos

    2011-01-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuse...

  3. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection.

    Science.gov (United States)

    Hu, Weiming; Gao, Jun; Wang, Yanguo; Wu, Ou; Maybank, Stephen

    2014-01-01

    Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.

  4. Appraisal and control of sexual and non-sexual intrusive thoughts in university students.

    Science.gov (United States)

    Clark, D A; Purdon, C; Byers, E S

    2000-05-01

    This study examined differences in the appraisal and thought control strategies associated with the perceived control of unwanted sexual and non-sexual intrusive thoughts. Eleven appraisal dimensions, subjective physiological arousal and 10 thought control strategies were measured in 171 university students who were administered the Revised Obsessive Intrusions Inventory-Sex Version, a self-report measure of unwanted intrusive thoughts. Thought-action fusion (TAF) likelihood was a significant unique predictor of the perceived controllability of respondents' most upsetting sexual and non-sexual intrusive thought. Moreover greater subjective physiological arousal was a significant predictor of reduced control over sexual intrusions, whereas worry that one might act on an intrusive thought and greater effort to control the intrusion were significant unique predictors of the control of non-sexual intrusive thoughts. Various thought control strategies were more often used in response to non-sexual than sexual cognitions. The results are discussed in terms of the differential role of various appraisal processes in the control of unwanted sexual and non-sexual thoughts.

  5. Toddler inhibited temperament, maternal cortisol reactivity and embarrassment, and intrusive parenting.

    Science.gov (United States)

    Kiel, Elizabeth J; Buss, Kristin A

    2013-06-01

    The relevance of parenting behavior to toddlers' development necessitates a better understanding of the influences on parents during parent-child interactions. Toddlers' inhibited temperament may relate to parenting behaviors, such as intrusiveness, that predict outcomes later in childhood. The conditions under which inhibited temperament relates to intrusiveness, however, remain understudied. A multimethod approach would acknowledge that several levels of processes determine mothers' experiences during situations in which they witness their toddlers interacting with novelty. As such, the current study examined maternal cortisol reactivity and embarrassment about shyness as moderators of the relation between toddlers' inhibited temperament and maternal intrusive behavior. Participants included 92 24-month-old toddlers and their mothers. Toddlers' inhibited temperament and maternal intrusiveness were measured observationally in the laboratory. Mothers supplied saliva samples at the beginning of the laboratory visit and 20 minutes after observation. Maternal cortisol reactivity interacted with inhibited temperament in relation to intrusive behavior, such that mothers with higher levels of cortisol reactivity were observed to be more intrusive with more highly inhibited toddlers. Embarrassment related to intrusive behavior as a main effect. These results highlight the importance of considering child characteristics and psychobiological processes in relation to parenting behavior. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  6. Source characteristics and tectonic setting of mafic-ultramafic intrusions in North Xinjiang, NW China: Insights from the petrology and geochemistry of the Lubei mafic-ultramafic intrusion

    Science.gov (United States)

    Chen, Bao-Yun; Yu, Jin-Jie; Liu, Shuai-Jie

    2018-05-01

    The newly discovered Lubei sulfide-bearing mafic-ultramafic intrusion forms the western extension of the Huangshan-Jin'erquan mafic-ultramafic intrusion belt in East Tianshan, NW China. The Lubei intrusion comprises hornblende peridotite, lherzolite, and harzburgite in its southern portion, gabbro in its middle portion, and hornblende gabbro in its northern portion. Intrusive relationships indicate that three magma pulses were involved in the formation of the intrusion, and that they were likely evolved from a common primitive magma. Estimated compositions of the Lubei primitive magma are similar to those of island arc calc-alkaline basalt except for the low Na2O and CaO contents of the Lubei primitive magma. This paper reports on the mineral compositions, whole-rock major and trace element contents, and Rb-Sr and Sm-Nd isotopic compositions of the Lubei intrusion, and a zircon LA-MC-ICP-MS U-Pb age for hornblende gabbro. The Lubei intrusion is characterized by enrichment in large-ion lithophile elements, depletion in high-field-strength elements, and marked negative Nb and Ta anomalies, with enrichment in chondrite-normalized light rare earth elements. It exhibits low (87Sr/86Sr)i ratios of 0.70333-0.70636 and low (143Nd/144Nd)i ratios of 0.51214-0.51260, with positive εNd values of +4.01 to +6.33. LA-ICP-MS U-Pb zircon ages yielded a weighted-mean age of 287.9 ± 1.6 Ma for the Lubei intrusion. Contemporaneous mafic-ultramafic intrusions in different tectonic domains in North Xinjiang show similar geological and geochemical signatures to the Lubei intrusion, suggesting a source region of metasomatized mantle previously modified by hydrous fluids from the slab subducted beneath the North Xinjiang region in the early Permian. Metasomatism of the mantle was dominated by hydrous fluids and was related to subduction of the Paleo-Asian oceanic lithosphere during the Paleozoic. Sr-Nd-Pb isotopic compositions suggest that the mantle source was a mixture of depleted mid

  7. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS.

  8. LIMNOLOGY, LAKE BASINS, LAKE WATERS

    Directory of Open Access Journals (Sweden)

    Petre GÂŞTESCU

    2009-06-01

    Full Text Available Limnology is a border discipline between geography, hydrology and biology, and is also closely connected with other sciences, from it borrows research methods. Physical limnology (the geography of lakes, studies lake biotopes, and biological limnology (the biology of lakes, studies lake biocoenoses. The father of limnology is the Swiss scientist F.A. Forel, the author of a three-volume entitled Le Leman: monographie limnologique (1892-1904, which focuses on the geology physics, chemistry and biology of lakes. He was also author of the first textbook of limnology, Handbuch der Seenkunde: allgemeine Limnologie,(1901. Since both the lake biotope and its biohydrocoenosis make up a single whole, the lake and lakes, respectively, represent the most typical systems in nature. They could be called limnosystems (lacustrine ecosystems, a microcosm in itself, as the American biologist St.A. Forbes put it (1887.

  9. Unique Challenges in WiFi Intrusion Detection

    OpenAIRE

    Milliken, Jonny

    2014-01-01

    The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more deta...

  10. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  11. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  12. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...... the intersection of IDSs and blockchains. In particular, we introduce the background of intrusion detection and blockchain, discuss the applicability of blockchain to intrusion detection, and identify open challenges in this direction....

  13. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M.; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N.; Mazzoni, Elvis; Pappas, Ilias O.; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M. S.; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS. PMID:27994566

  14. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Directory of Open Access Journals (Sweden)

    Agata Błachnio

    2016-12-01

    Full Text Available The increase in the number of users of social networking sites has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2,628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Measure, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively and low context (positively; of the personality variables, conscientiousness and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of social networking sites (SNS.

  15. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor .... and after amplification is finally read by a digital multimeter (Fluke make: 179 true ... To study the response of the present FO refractometer, propylene glycol has been ... values of all the samples were initially measured by Abbe's refractometer.

  16. U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland

    DEFF Research Database (Denmark)

    Þórarinsson, Sigurjón Böðvar; Holm, Paul Martin; Tappe, Sebatstian

    2016-01-01

    Several major tholeiitic (e.g. the Skaergaard intrusion) and alkaline (e.g. the Kangerlussuaq Syenite) intrusive complexes of the North Atlantic Large Igneous Province are exposed along the Kangerlussuaq Fjord in East Greenland. The Kærven Complex forms a satellite intrusion to the Kangerlussuaq ...

  17. A survey of intrusion detection techniques in Cloud

    OpenAIRE

    Modi, C.; Patel, D.; Patel, H.; Borisaniya, B.; Patel, A.; Rajarajan, M.

    2013-01-01

    Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and...

  18. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  19. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  20. Association between intrusive negative autobiographical memories and depression: A meta-analytic investigation.

    Science.gov (United States)

    Mihailova, Stella; Jobson, Laura

    2018-02-23

    The study investigated several associations between depression and intrusive negative autobiographical memories. A systematic literature search identified 23 eligible studies (N = 2,582), which provided 59 effect sizes. Separate meta-analyses indicated that depression was moderately, positively associated with intrusive memory frequency, memory distress, maladaptive memory appraisals, memory avoidance, and memory rumination. Intrusive memory vividness was not significantly associated with depression. There were insufficient data to examine the relationship between depression and memory vantage perspective. Between-study heterogeneity was high for intrusive memory frequency and memory avoidance, and the percentage of females in studies significantly moderated the relationship between these variables and depression. An additional exploratory meta-analysis (3 studies; N = 257) indicated that intrusive memories were experienced more frequently by those with posttraumatic stress disorder than those with depression. Overall, the findings suggest that intrusive memories warrant clinical attention as they may contribute to the maintenance of depressive symptomatology. Copyright © 2018 John Wiley & Sons, Ltd.

  1. Intensively exploited Mediterranean aquifers: resilience and proximity to critical points of seawater intrusion

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2013-11-01

    We investigate here seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta Aquifer, the Israel Coastal Aquifer and the Cyprus Akrotiri Aquifer. Using a generalized analytical sharp-interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future sea intrusion forcings. We identify two different critical limits of sea intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete sea intrusion upto the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that sea intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that the advance of seawater currently seriously threatens the Nile Delta Aquifer and the Israel Coastal Aquifer. The Cyprus Akrotiri Aquifer is currently somewhat less threatened by increased seawater intrusion.

  2. Intensively exploited Mediterranean aquifers: resilience to seawater intrusion and proximity to critical thresholds

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2014-05-01

    We investigate seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta, Israel Coastal and Cyprus Akrotiri aquifers. Using a generalized analytical sharp interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future seawater intrusion forcings. We identify two different critical limits of seawater intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete seawater intrusion up to the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that seawater intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that (a) the intruding seawater currently seriously threatens the Nile Delta aquifer, (b) in the Israel Coastal aquifer the sharp interface toe approaches the well location and (c) the Cyprus Akrotiri aquifer is currently somewhat less threatened by increased seawater intrusion.

  3. Hazard Models From Periodic Dike Intrusions at Kı¯lauea Volcano, Hawai`i

    Science.gov (United States)

    Montgomery-Brown, E. K.; Miklius, A.

    2016-12-01

    The persistence and regular recurrence intervals of dike intrusions in the East Rift Zone (ERZ) of Kı¯lauea Volcano lead to the possibility of constructing a time-dependent intrusion hazard model. Dike intrusions are commonly observed in Kı¯lauea Volcano's ERZ and can occur repeatedly in regions that correlate with seismic segments (sections of rift seismicity with persistent definitive lateral boundaries) proposed by Wright and Klein (USGS PP1806, 2014). Five such ERZ intrusions have occurred since 1983 with inferred locations downrift of the bend in Kı¯lauea's ERZ, with the first (1983) being the start of the ongoing ERZ eruption. The ERZ intrusions occur on one of two segments that are spatially coincident with seismic segments: Makaopuhi (1993 and 2007) and Nāpau (1983, 1997, and 2011). During each intrusion, the amount of inferred dike opening was between 2 and 3 meters. The times between ERZ intrusions for same-segment pairs are all close to 14 years: 14.07 (1983-1997), 14.09 (1997-2011), and 13.95 (1993-2007) years, with the Nāpau segment becoming active about 3.5 years after the Makaopuhi segment in each case. Four additional upper ERZ intrusions are also considered here. Dikes in the upper ERZ have much smaller opening ( 10 cm), and have shorter recurrence intervals of 8 years with more variability. The amount of modeled dike opening during each of these events roughly corresponds to the amount of seaward south flank motion and deep rift opening accumulated in the time between events. Additionally, the recurrence interval of 14 years appears to be unaffected by the magma surge of 2003-2007, suggesting that flank motion, rather than magma supply, could be a controlling factor in the timing and periodicity of intrusions. Flank control over the timing of magma intrusions runs counter to the historical research suggesting that dike intrusions at Kı¯lauea are driven by magma overpressure. This relatively free sliding may have resulted from decreased

  4. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  5. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  6. Multisensor Fusion for Intrusion Detection and Situational Awareness

    OpenAIRE

    Hallstensen, Christoffer V

    2017-01-01

    Cybercrime damage costs the world several trillion dollars annually. And al-though technical solutions to protect organizations from hackers are being con-tinuously developed, criminals learn fast to circumvent them. The question is,therefore, how to create leverage to protect an organization by improving in-trusion detection and situational awareness? This thesis seeks to contribute tothe prior art in intrusion detection and situational awareness by using a multi-sensor data fusion...

  7. When Intrusion Detection Meets Blockchain Technology: A Review

    OpenAIRE

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju; Wang, Yu; Han, Jinguang

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness ...

  8. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes

    Science.gov (United States)

    L., Passarelli; E., Rivalta; A., Shuler

    2014-01-01

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process. PMID:24469260

  9. Data Fusion for Network Intrusion Detection: A Review

    Directory of Open Access Journals (Sweden)

    Guoquan Li

    2018-01-01

    Full Text Available Rapid progress of networking technologies leads to an exponential growth in the number of unauthorized or malicious network actions. As a component of defense-in-depth, Network Intrusion Detection System (NIDS has been expected to detect malicious behaviors. Currently, NIDSs are implemented by various classification techniques, but these techniques are not advanced enough to accurately detect complex or synthetic attacks, especially in the situation of facing massive high-dimensional data. Besides, the inherent defects of NIDSs, namely, high false alarm rate and low detection rate, have not been effectively solved. In order to solve these problems, data fusion (DF has been applied into network intrusion detection and has achieved good results. However, the literature still lacks thorough analysis and evaluation on data fusion techniques in the field of intrusion detection. Therefore, it is necessary to conduct a comprehensive review on them. In this article, we focus on DF techniques for network intrusion detection and propose a specific definition to describe it. We review the recent advances of DF techniques and propose a series of criteria to compare their performance. Finally, based on the results of the literature review, a number of open issues and future research directions are proposed at the end of this work.

  10. Efficient cooling of rocky planets by intrusive magmatism

    Science.gov (United States)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  11. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  12. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  13. Microplastic pollution in lakes and lake shoreline sediments - A case study on Lake Bolsena and Lake Chiusi (central Italy).

    Science.gov (United States)

    Fischer, Elke Kerstin; Paglialonga, Lisa; Czech, Elisa; Tamminga, Matthias

    2016-06-01

    Rivers and effluents have been identified as major pathways for microplastics of terrestrial sources. Moreover, lakes of different dimensions and even in remote locations contain microplastics in striking abundances. This study investigates concentrations of microplastic particles at two lakes in central Italy (Lake Bolsena, Lake Chiusi). A total number of six Manta Trawls have been carried out, two of them one day after heavy winds occurred on Lake Bolsena showing effects on particle distribution of fragments and fibers of varying size categories. Additionally, 36 sediment samples from lakeshores were analyzed for microplastic content. In the surface waters 2.68 to 3.36 particles/m(3) (Lake Chiusi) and 0.82 to 4.42 particles/m(3) (Lake Bolsena) were detected, respectively. Main differences between the lakes are attributed to lake characteristics such as surface and catchment area, depth and the presence of local wind patterns and tide range at Lake Bolsena. An event of heavy winds and moderate rainfall prior to one sampling led to an increase of concentrations at Lake Bolsena which is most probable related to lateral land-based and sewage effluent inputs. The abundances of microplastic particles in sediments vary from mean values of 112 (Lake Bolsena) to 234 particles/kg dry weight (Lake Chiusi). Lake Chiusi results reveal elevated fiber concentrations compared to those of Lake Bolsena what might be a result of higher organic content and a shift in grain size distribution towards the silt and clay fraction at the shallow and highly eutrophic Lake Chiusi. The distribution of particles along different beach levels revealed no significant differences. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  15. Conjunctive Management of Multi-Aquifer System for Saltwater Intrusion Mitigation

    Science.gov (United States)

    Tsai, F. T. C.; Pham, H. V.

    2015-12-01

    Due to excessive groundwater withdrawals, many water wells in Baton Rouge, Louisiana experience undesirable chloride concentration because of saltwater intrusion. The study goal is to develop a conjunctive management framework that takes advantage of the Baton Rouge multi-aquifer system to mitigate saltwater intrusion. The conjunctive management framework utilizes several hydraulic control techniques to mitigate saltwater encroachment. These hydraulic control approaches include pumping well relocation, freshwater injection, saltwater scavenging, and their combinations. Specific objectives of the study are: (1) constructing scientific geologic architectures of the "800-foot" sand, the "1,000-foot" sand, the "1,200-foot" sand, the "1,500-foot" sand, the "1,700-foot" sand, and the "2,000-foot" sand, (2) developing scientific saltwater intrusion models for these sands. (3) using connector wells to draw native groundwater from one sand and inject to another sand to create hydraulic barriers to halt saltwater intrusion, (4) using scavenger wells or well couples to impede saltwater intrusion progress and reduce chloride concentration in pumping wells, and (5) reducing cones of depression by relocating and dispersing pumping wells to different sands. The study utilizes optimization techniques and newest LSU high performance computing (HPC) facilities to derive solutions. The conjunctive management framework serves as a scientific tool to assist policy makers to solve the urgent saltwater encroachment issue in the Baton Rouge area. The research results will help water companies as well as industries in East Baton Rouge Parish and neighboring parishes by reducing their saltwater intrusion threats, which in turn would sustain Capital Area economic development.

  16. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  17. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  18. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  19. Review on assessment methodology for human intrusion into a repository for radioactive waste

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility

  20. Review on assessment methodology for human intrusion into a repository for radioactive waste

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-09-15

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility.

  1. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  2. Computational neural network regression model for Host based Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Gautam

    2016-09-01

    Full Text Available The current scenario of information gathering and storing in secure system is a challenging task due to increasing cyber-attacks. There exists computational neural network techniques designed for intrusion detection system, which provide security to single machine and entire network's machine. In this paper, we have used two types of computational neural network models, namely, Generalized Regression Neural Network (GRNN model and Multilayer Perceptron Neural Network (MPNN model for Host based Intrusion Detection System using log files that are generated by a single personal computer. The simulation results show correctly classified percentage of normal and abnormal (intrusion class using confusion matrix. On the basis of results and discussion, we found that the Host based Intrusion Systems Model (HISM significantly improved the detection accuracy while retaining minimum false alarm rate.

  3. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  4. Intrusion mechanics according to Burstone with the NiTi-SE-steel uprighting spring.

    Science.gov (United States)

    Sander, F G; Wichelhaus, A; Schiemann, C

    1996-08-01

    Intrusion mechanics according to Burstone can be regarded as a practicable method for the intrusion of incisors. 1. By applying the NiTi-SE-steel uprighting spring, relatively constant forces can be exerted over a large range of intrusion on both sides of the anterior tooth archwire. 2. By bending a 150 degrees tip-back bend or a curvature into the steel portion, the uprighting spring presented here is brought into the plastic range of the characteristic curve of force. 3. Application of sliding hooks on the intrusion spring permits readjustment for force transfer onto the anterior archwire. 4. Connecting the anterior archwire with the posterior elements by means of a steel ligature can be recommended only in some cases, because sagittally directed forces may be produced. 5. The adult patients presented showed an average intrusion of 0.6 mm/month, if a linear connection was presupposed. 6. An intrusive effect on the incisors could first be detected clinically after 6 to 8 weeks. 7. Application of a torque-key proves especially useful in controlling the incisor position during intrusion in order to avoid unnecessary radiography. 8. Actual prediction of the centre of resistance with the help of a cephalometric radiograph proved not to be feasible. 9. The calculated maximal intrusion of the mandibular incisors was 7 mm. 10. The torque-segmented archwire with crimped hooks and pseudoelastic springs between the molars and the crimped hooks proved very effective for retrusion and intrusion of maxillary incisors. The maxillary anterior teeth can be retruded by a total of 7 mm without readjustment. 11. Constant moments and forces could be transferred by applying preformed arch wires and segmented arch wires.

  5. Analogue modelling on the interaction between shallow magma intrusion and a strike-slip fault: Application on the Middle Triassic Monzoni Intrusive Complex (Dolomites, Italy)

    Science.gov (United States)

    Michail, Maria; Coltorti, Massimo; Gianolla, Piero; Riva, Alberto; Rosenau, Matthias; Bonadiman, Costanza; Galland, Olivier; Guldstrand, Frank; Thordén Haug, Øystein; Rudolf, Michael; Schmiedel, Tobias

    2017-04-01

    The southwestern part of the Dolomites in Northern Italy has undergone a short-lived Ladinian (Middle Triassic) tectono-magmatic event, forming a series of significant magmatic features. These intrusive bodies deformed and metamorphosed the Permo-Triassic carbonate sedimentary framework. In this study we focus on the tectono-magmatic evolution of the shallow shoshonitic Monzoni Intrusive Complex of this Ladinian event (ca 237 Ma), covering an area of 20 km^2. This NW-SE elongated intrusive structure (5 km length) shows an orogenic magmatic affinity which is in contrast to the tectonic regime at the time of intrusion. Strain analysis shows anorogenic transtensional displacement in accordance with the ENE-WSW extensional pattern in the central Dolomites during the Ladinian. Field interpretations led to a detailed description of the regional stratigraphic sequence and the structural features of the study area. However, the geodynamic context of this magmatism and the influence of the inherited strike-slip fault on the intrusion, are still in question. To better understand the specific natural prototype and the general mechanisms of magma emplacement in tectonically active areas, we performed analogue experiments defined by, but not limited to, first order field observations. We have conducted a systematic series of experiments in different tectonic regimes (static conditions, strike-slip, transtension). We varied the ratio of viscous to brittle stresses between magma and country rock, by injecting Newtonian fluids both of high and low viscosity (i.e. silicone oil/vegetable oil) into granular materials of varying cohesion (sand, silica flour, glass beads). The evolving surface and side view of the experiments were monitored by photogrammetric techniques for strain analyses and topographic evolution. In our case, the combination of the results from field and analogue experiments brings new insights regarding the tectonic regime, the geometry of the intrusive body, and

  6. Late Neoproterozoic layered mafic intrusion of arc-affinity in the Arabian-Nubian Shield: A case study from the Shahira layered mafic intrusion, southern Sinai, Egypt

    Energy Technology Data Exchange (ETDEWEB)

    Azer, M.K.; Obeid, M.A.; Gahalan, H.A.

    2016-07-01

    The Shahira Layered Mafic Intrusion (SLMI), which belongs to the late Neoproterozoic plutonic rocks of the Arabian-Nubian Shield, is the largest layered mafic intrusion in southern Sinai. Field relations indicate that it is younger than the surrounding metamorphic rocks and older than the post-orogenic granites. Based on variation in mineral paragenesis and chemical composition, the SLMI is distinguished into pyroxene-hornblende gabbro, hornblende gabbro and diorite lithologies. The outer zone of the mafic intrusion is characterized by fine-grained rocks (chilled margin gabbroic facies), with typical subophitic and/or microgranular textures. Different rock units from the mafic intrusion show gradational boundaries in between. They show some indications of low grade metamorphism, where primary minerals are transformed into secondary ones. Geochemically, the Shahira layered mafic intrusion is characterized by enrichment in LILE relative to HFSE (e.g. Nb, P, Zr, Ti, Y), and LREE relative to HREE [(La/Lu)n= 4.75–8.58], with subalkaline characters. It has geochemical characteristics of pre-collisional arc-type environment. The geochemical signature of the investigated gabbros indicates partial melting of mantle wedge in a volcanic-arc setting, being followed by fractional crystallization and crustal contamination. Fractional crystallization processes played a vital role during emplacement of the Shahira intrusion and evolution of its mafic and intermediate rock units. The initial magma was evolved through crystallization of hornblende which was caused by slight increasing of H2O in the magma after crystallization of liquidus olivine, pyroxene and Ca-rich plagioclase. The gabbroic rocks crystallized at pressures between 4.5 and 6.9kbar (~15–20km depth). Whereas, the diorites yielded the lowest crystallization pressure between 1.0 to 4.4Kbar (<10km depth). Temperature was estimated by several geothermometers, which yielded crystallization temperatures ranging from 835

  7. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  8. Floor-fractured craters on the Moon: an evidence of past intrusive magmatic activity

    Science.gov (United States)

    Thorey, C.; Michaut, C.

    2012-12-01

    Floor-fractured lunar craters (FFC's) are a class of craters modified by post impact mechanisms. They are defined by distinctive shallow, often plate-like or convex floors, wide floor moats and radial, concentric and polygonal floor-fractures, suggesting an endogenous process of modification. Two main mechanisms have been proposed to account for such observations : 1) viscous relaxation and 2) spreading of magmatic intrusions at depth below the crater. Here, we propose to test the case of magmatic intrusions. We develop a model for the dynamics of magma spreading below an elastic crust with a crater-like topography and above a rigid horizontal surface. Results show first that the lithostatic pressure increase at the crater rim prevents the intrusion from spreading horizontally giving rise to intrusion thickening and to an uplift of the crater floor. Second, the deformation of the overlying crust exerts a strong control on the intrusion shape, and hence, on the nature of the crater floor uplift. As the deformation can only occur over a minimum flexural wavelength noted Λ, the intrusion shape shows a bell-shaped geometry for crater radius smaller than 3Λ, or a flat top with smooth edges for crater radius larger than 3Λ. For given crustal elastic properties, the crust flexural wavelength increases with the intrusion depth. Therefore, for a large intrusion depth or small crater size, we observe a convex uplift of the crater floor. On the contrary, for a small intrusion depth or large crater size, the crater floor undergoes a piston-like uplift and a circular moat forms just before the rim. The depth of the moat is controlled by the thickening of the crust at the crater rim. On the contrary to viscous relaxation models, our model is thus able to reproduce most of the features of FFC's, including small-scale features. Spreading of a magmatic intrusion at depth can thus be considered as the main endogenous mechanism at the origin of the deformations observed at FFC

  9. Terrestrial CDOM in Lakes of Yamal Peninsula: Connection to Lake and Lake Catchment Properties

    Directory of Open Access Journals (Sweden)

    Yury Dvornikov

    2018-01-01

    Full Text Available In this study, we analyze interactions in lake and lake catchment systems of a continuous permafrost area. We assessed colored dissolved organic matter (CDOM absorption at 440 nm (a(440CDOM and absorption slope (S300–500 in lakes using field sampling and optical remote sensing data for an area of 350 km2 in Central Yamal, Siberia. Applying a CDOM algorithm (ratio of green and red band reflectance for two high spatial resolution multispectral GeoEye-1 and Worldview-2 satellite images, we were able to extrapolate the a(λCDOM data from 18 lakes sampled in the field to 356 lakes in the study area (model R2 = 0.79. Values of a(440CDOM in 356 lakes varied from 0.48 to 8.35 m−1 with a median of 1.43 m−1. This a(λCDOM dataset was used to relate lake CDOM to 17 lake and lake catchment parameters derived from optical and radar remote sensing data and from digital elevation model analysis in order to establish the parameters controlling CDOM in lakes on the Yamal Peninsula. Regression tree model and boosted regression tree analysis showed that the activity of cryogenic processes (thermocirques in the lake shores and lake water level were the two most important controls, explaining 48.4% and 28.4% of lake CDOM, respectively (R2 = 0.61. Activation of thermocirques led to a large input of terrestrial organic matter and sediments from catchments and thawed permafrost to lakes (n = 15, mean a(440CDOM = 5.3 m−1. Large lakes on the floodplain with a connection to Mordy-Yakha River received more CDOM (n = 7, mean a(440CDOM = 3.8 m−1 compared to lakes located on higher terraces.

  10. Influence of crystallised igneous intrusions on fault nucleation and reactivation during continental extension

    Science.gov (United States)

    Magee, Craig; McDermott, Kenneth G.; Stevenson, Carl T. E.; Jackson, Christopher A.-L.

    2014-05-01

    Continental rifting is commonly accommodated by the nucleation of normal faults, slip on pre-existing fault surfaces and/or magmatic intrusion. Because crystallised igneous intrusions are pervasive in many rift basins and are commonly more competent (i.e. higher shear strengths and Young's moduli) than the host rock, it is theoretically plausible that they locally intersect and modify the mechanical properties of pre-existing normal faults. We illustrate the influence that crystallised igneous intrusions may have on fault reactivation using a conceptual model and observations from field and subsurface datasets. Our results show that igneous rocks may initially resist failure, and promote the preferential reactivation of favourably-oriented, pre-existing faults that are not spatially-associated with solidified intrusions. Fault segments situated along strike from laterally restricted fault-intrusion intersections may similarly be reactivated. This spatial and temporal control on strain distribution may generate: (1) supra-intrusion folds in the hanging wall; (2) new dip-slip faults adjacent to the igneous body; or (3) sub-vertical, oblique-slip faults oriented parallel to the extension direction. Importantly, stress accumulation within igneous intrusions may eventually initiate failure and further localise strain. The results of our study have important implications for the structural of sedimentary basins and the subsurface migration of hydrocarbons and mineral-bearing fluids.

  11. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  12. Time, space, and composition relations among northern Nevada intrusive rocks and their metallogenic implications

    Science.gov (United States)

    duBray, E.A.

    2007-01-01

    Northern Nevada contains ∼360 igneous intrusions subequally distributed among three age groups: middle Tertiary, Cretaceous, and Jurassic. These intrusions are dominantly granodiorite and monzogranite, although some are more mafic. Major-oxide and trace-element compositions of intrusion age groups are remarkably similar, forming compositional arrays that are continuous, overlapping, and essentially indistinguishable. Within each age group, compositional diversity is controlled by a combination of fractional crystallization and two-component mixing. Mafic intrusions represent mixing of mantle-derived magma and assimilated continental crust, whereas intermediate to felsic intrusions evolved by fractional crystallization. Several petrologic parameters suggest that the northern Nevada intrusion age groups formed in a variety of subduction-related, magmatic arc settings: Jurassic intrusions were likely formed during backarc, slab-window magmatism related to breakoff of the Mezcalera plate; Cretaceous magmatism was related to rapid, shallow subduction of the Farallon plate and consequent inboard migration of arc magmatism; and Tertiary magmatism initially swept southward into northern Nevada in response to foundering of the Farallon plate and was followed by voluminous Miocene bimodal magmatism associated with backarc continental rifting.

  13. Intrusive fathering, children's self-regulation and social skills: a mediation analysis.

    Science.gov (United States)

    Stevenson, M; Crnic, K

    2013-06-01

    Fathers have unique influences on children's development, and particularly in the development of social skills. Although father-child relationship influences on children's social competence have received increased attention in general, research on fathering in families of children with developmental delays (DD) is scant. This study examined the pathway of influence among paternal intrusive behaviour, child social skills and child self-regulatory ability, testing a model whereby child regulatory behaviour mediates relations between fathering and child social skills. Participants were 97 families of children with early identified DD enrolled in an extensive longitudinal study. Father and mother child-directed intrusiveness was coded live in naturalistic home observations at child age 4.5, child behaviour dysregulation was coded from a video-taped laboratory problem-solving task at child age 5, and child social skills were measured using independent teacher reports at child age 6. Analyses tested for mediation of the relationship between fathers' intrusiveness and child social skills by child behaviour dysregulation. Fathers' intrusiveness, controlling for mothers' intrusiveness and child behaviour problems, was related to later child decreased social skills and this relationship was mediated by child behaviour dysregulation. Intrusive fathering appears to carry unique risk for the development of social skills in children with DD. Findings are discussed as they related to theories of fatherhood and parenting in children with DD, as well as implications for intervention and future research. © 2012 The Authors. Journal of Intellectual Disability Research © 2012 John Wiley & Sons Ltd, MENCAP & IASSID.

  14. Aspects of cold intrusions over Greece during autumn

    Science.gov (United States)

    Mita, Constantina; Marinaki, Aggeliki; Zeini, Konstantina; Konstantara, Metaxia

    2010-05-01

    This study is focused on the description of atmospheric disturbances that caused intense cold intrusions over Greece during autumn for a period of 25 years (1982-2006). The study was based on data analysis from the meteorological station network of the Hellenic National Meteorological Service (HNMS) and the European Centre for Medium Range Weather Forecasts (ECMWF). Initially, the days with temperature at the isobaric surface of 850 hPa less or equal to the mean temperature for the 10-day period the day under investigation belongs to are isolated, composing a new confined data set which was further used. An event of intense cold intrusion is identified based on a subjective set of criteria, considering the temperature decrease at the level of 850 hPa and its duration. In particular, the criteria that were used to identify a cold intrusion were: temperature variation between two successive days at the isobaric level of 850 hPa being equal or greater than 50 C at least once during the event and duration of the event of at least two successive days with continuous temperature decrease. Additionally, the synoptic analysis of the atmospheric disturbances involved using weather charts from ECMWF, revealed that all cases were related to low pressure systems at the level of 500 hPa, accompanied by cold air masses. Moreover, a methodology proposed to classify the cold intrusions based on general circulation characteristics of the atmosphere, resulted in seven major categories. More than half of the events belong in two categories, originated northwest of the greater Greek area (Greece and parts of neighbouring countries), between 400 and 600 N. Further analysis indicated that the frequency of events increases from September to November and the majority of the events lasted two to three days. Additionally, the non-parametric Mann-Kendall test was used for the investigation of the statistical significance of the trends appearing in the results. The tests revealed that over

  15. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    Science.gov (United States)

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  16. The evolution of Interior Intrusion Detection Technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  17. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  18. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  19. Evaluation of of μ-controller PIR Intrusion Detector | Eludire | West ...

    African Journals Online (AJOL)

    When there is intrusion, a piezo speaker beeps and also a visual indicator with light emitting diode blinks to indicate intrusion. For security, cost effectiveness and access control to certain areas of homes, offices and industries this system is a better replacement to human surveillance needed around our valuable goods and ...

  20. Intrusive thoughts in obsessive-compulsive disorder and eating disorder patients: a differential analysis.

    Science.gov (United States)

    García-Soriano, Gemma; Roncero, Maria; Perpiñá, Conxa; Belloch, Amparo

    2014-05-01

    The present study aims to compare the unwanted intrusions experienced by obsessive-compulsive (OCD) and eating disorder (ED) patients, their appraisals, and their control strategies and analyse which variables predict the intrusions' disruption and emotional disturbance in each group. Seventy-nine OCD and 177 ED patients completed two equivalent self-reports designed to assess OCD-related and ED-related intrusions, their dysfunctional appraisals, and associated control strategies. OCD and ED patients experienced intrusions with comparable frequency and emotional disturbance, but OCD patients experienced greater disruption. Differences appeared between groups on some appraisals and control strategies. Intolerance to uncertainty (OCD group) and thought importance (ED group) predicted their respective emotional disturbance and disruption. Additionally, control importance (OCD group) and thought-action fusion moral (OCD and ED groups) predicted their emotional disturbance. OCD and ED share the presence of intrusions; however, different variables explain why they are disruptive and emotionally disturbing. Cognitive intrusions require further investigation as a transdiagnostic variable. Copyright © 2014 John Wiley & Sons, Ltd and Eating Disorders Association.

  1. Effect of winds and waves on salt intrusion in the Pearl River estuary

    Science.gov (United States)

    Gong, Wenping; Lin, Zhongyuan; Chen, Yunzhen; Chen, Zhaoyun; Zhang, Heng

    2018-02-01

    Salt intrusion in the Pearl River estuary (PRE) is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST) modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  2. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  3. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  4. Effects of heat-flow and hydrothermal fluids from volcanic intrusions on authigenic mineralization in sandstone formations

    Directory of Open Access Journals (Sweden)

    Wolela Ahmed

    2002-06-01

    Full Text Available Volcanic intrusions and hydrothermal activity have modified the diagenetic minerals. In the Ulster Basin, UK, most of the authigenic mineralization in the Permo-Triassic sandstones pre-dated tertiary volcanic intrusions. The hydrothermal fluids and heat-flow from the volcanic intrusions did not affect quartz and feldspar overgrowths. However, clay mineral-transformation, illite-smectite to illite and chlorite was documented near the volcanic intrusions. Abundant actinolite, illite, chlorite, albite and laumontite cementation of the sand grains were also documented near the volcanic intrusions. The abundance of these cementing minerals decreases away from the volcanic intrusions.In the Hartford Basin, USA, the emplacement of the volcanic intrusions took place simultaneous with sedimentation. The heat-flow from the volcanic intrusions and hydrothermal activity related to the volcanics modified the texture of authigenic minerals. Microcrystalline mosaic albite and quartz developed rather than overgrowths and crystals near the intrusions. Chlorite clumps and masses were also documented with microcrystalline mosaic albite and quartz. These features are localized near the basaltic intrusions. Laumontite is also documented near the volcanic intrusions. The reservoir characteristics of the studied sandstone formations are highly affected by the volcanic and hydrothermal fluids in the Hartford and the Ulster Basin. The porosity dropped from 27.4 to zero percent and permeability from 1350 mD to 1 mD.

  5. Pukala intrusion, its age and connection to hydrothermal alteration in Orivesi, southwestern Finland

    Directory of Open Access Journals (Sweden)

    Matti Talikka

    2005-01-01

    Full Text Available The Pukala intrusion is situated in the Paleoproterozoic Svecofennian domain of the Fennoscandian Shield in the contact region between the Central Finland Granitoid Complex and the Tampere Belt. The acid subvolcanic intrusion, which is in contact or close to severalaltered domains, mainly consists of porphyritic granodiorite and trondhjemite. The Pukala intrusion was emplaced into volcanic sequence in an island-arc or fore-arc setting before or during the early stages of the main regional deformation phase of the Svecofennian orogeny. On the basis of the geochemical data, the Pukala intrusion is a peraluminous volcanic-arc granitoid. After crystallisation at 1896±3 Ma, multiphase deformation and metamorphismcaused alteration, recrystallisation, and orientation of the minerals, and tilted the intrusion steeply towards south. The 1851±5 Ma U-Pb age for titanite is connected to the late stages of the Svecofennian tectonometamorphic evolution of the region. Several hydrothermally altered domains are located in the felsic and intermediate metavolcanic rocks of the Tampere Belt within less than one kilometre south of the Pukala intrusion. Alteration is divided into three basic types: partial silica alteration, chlorite-sericite±silica alteration, and sericite alteration in shear zones. The first two types probably formed during the emplacement and crystallisation of the Pukala intrusion, and the third is linked to late shearing. Intense sericitisation and comb quartz bands in the contact of theintrusion and the altered domain at Kutemajärvi suggest that the hydrothermal system was driven by the Pukala intrusion.

  6. Study of tributary inflows in Lake Iseo with a rotating physical model

    Directory of Open Access Journals (Sweden)

    Marco Pilotti

    2014-03-01

    , whilst in the far field the current driven by the inflows keeps moving along the western shore. On the basis of these results one could expect that the north-western part of the lake between Castro and Lovere, although not aligned with the tributaries’ axes, is more sensitive to accumulation effects related to river-borne pollution. The results obtained with the physical model are critically compared with data obtained from different sources: the trajectory of a lagrangian drogue; a map of reflectivity data from the lake floor; a map of water turbidity at the intrusion depth. The findings are also confirmed by the results of a 3D numerical model of the lake.

  7. Hydrologic Monitoring and Water Balance Modeling in West and Seven Palm Lake Drainages in the Florida Everglades

    Science.gov (United States)

    Allen, J.; Whitman, D.; Price, R.

    2016-02-01

    In the Florida Everglades, sea level rise and reduced freshwater inputs have altered the hydrologic and chemical conditions in coastal estuaries. Brackish coastal groundwater discharge, an inland intrusion of submarine groundwater discharge, has been shown to occur seasonally along the coastal wetlands of the Everglades. This brackish groundwater is enriched in total phosphorus, the limiting nutrient in the Everglades. A major component of the Comprehensive Everglades Restoration Plan is to increase freshwater delivery to the southern coastal Everglades and adjacent bays, in an effort to restore a salinity and nutrient regime conducive for the development of submerged aquatic vegetation. This study is being conducted in the estuarine lakes of the Everglades that are connected to Florida Bay. Water quality in these lakes has diminished over time, potentially due to increased nutrient deliveries from coastal groundwater discharge. Current hydrologic and chemical conditions are being established within the lakes in order to gain a better understanding of the effects of restoration efforts through time. Water budgets are being constructed on daily, monthly and annual time steps to estimate the groundwater-surface water interaction term. In addition, hydrologic and topographic data from the Everglades Depth Estimation Network is being utilized in order to calculate water budgets for the lakes region spanning ten years prior to the study period. Water chemistry in the lakes and groundwater is also being monitored to determine the influence of groundwater-surface water exchange on salinity and nutrient conditions in the lakes. The results of this study can be used to assess the influence of restoration efforts on the hydrochemical conditions of downstream coastal areas affected by coastal groundwater discharge and sea level rise.

  8. Engineering evaluation of intrusion prevention strategies for single-shell tanks

    International Nuclear Information System (INIS)

    Jenkins, C.E.

    1994-01-01

    In this study, previously implemented actions to prevent liquid intrusion into out-of-service single-shell tanks (SSTs), i.e., interim isolation or partial interim isolation, are investigated and expanded to identify additional cost-effective intrusion prevention techniques that could be reasonably taken until SSTs are ready for waste retrieval. Possible precipitation, groundwater, and condensation pathways and internal tank connections that could provide possible pathways for liquids are examined. Techniques to block identified potential pathways are developed and costed to determine the potential benefit to costed trade-offs for implementing the techniques. (Note: Surveillance data show increased waste surface levels for several SSTs that indicate possible liquid intrusion despite interim isolation activities.)

  9. Cellular Neural Network-Based Methods for Distributed Network Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Kang Xie

    2015-01-01

    Full Text Available According to the problems of current distributed architecture intrusion detection systems (DIDS, a new online distributed intrusion detection model based on cellular neural network (CNN was proposed, in which discrete-time CNN (DTCNN was used as weak classifier in each local node and state-controlled CNN (SCCNN was used as global detection method, respectively. We further proposed a new method for design template parameters of SCCNN via solving Linear Matrix Inequality. Experimental results based on KDD CUP 99 dataset show its feasibility and effectiveness. Emerging evidence has indicated that this new approach is affordable to parallelism and analog very large scale integration (VLSI implementation which allows the distributed intrusion detection to be performed better.

  10. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  11. Sanctuaries for lake trout in the Great Lakes

    Science.gov (United States)

    Stanley, Jon G.; Eshenroder, Randy L.; Hartman, Wilbur L.

    1987-01-01

    Populations of lake trout, severely depleted in Lake Superior and virtually extirpated from the other Great Lakes because of sea lamprey predation and intense fishing, are now maintained by annual plantings of hatchery-reared fish in Lakes Michigan, Huron, and Ontario and parts of Lake Superior. The extensive coastal areas of the Great Lakes and proximity to large populations resulted in fishing pressure on planted lake trout heavy enough to push annual mortality associated with sport and commercial fisheries well above the critical level needed to reestablish self-sustaining stocks. The interagency, international program for rehabilitating lake trout includes controlling sea lamprey abundance, stocking hatchery-reared lake trout, managing the catch, and establishing sanctuaries where harvest is prohibited. Three lake trout sanctuaries have been established in Lake Michigan: the Fox Island Sanctuary of 121, 500 ha, in the Chippewa-Ottawa Treaty fishing zone in the northern region of the lake; the Milwaukee Reef Sanctuary of 160, 000 ha in midlake, in boundary waters of Michigan and Wisconsin; and Julian's Reef Sanctuary of 6, 500 ha, in Illinois waters. In northern Lake Huron, Drummond Island Sanctuary of 55, 000 ha is two thirds in Indian treaty-ceded waters in Michigan and one third in Ontario waters of Canada. A second sanctuary, Six Fathom Bank-Yankee Reef Sanctuary, in central Lake Huron contains 168, 000 ha. Sanctuary status for the Canadian areas remains to be approved by the Provincial government. In Lake Superior, sanctuaries protect the spawning grounds of Gull Island Shoal (70, 000 ha) and Devils Island Shoal (44, 000 ha) in Wisconsin's Apostle Island area. These seven sanctuaries, established by the several States and agreed upon by the States, Indian tribes, the U.S. Department of the Interior, and the Province of Ontario, contribute toward solving an interjurisdictional fishery problem.

  12. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  13. Sexually intrusive behaviour following brain injury: approaches to assessment and rehabilitation.

    Science.gov (United States)

    Bezeau, Scott C; Bogod, Nicholas M; Mateer, Catherine A

    2004-03-01

    Sexually intrusive behaviour, which may range from inappropriate commentary to rape, is often observed following a traumatic brain injury. It may represent novel behaviour patterns or an exacerbation of pre-injury personality traits, attitudes, and tendencies. Sexually intrusive behaviour poses a risk to staff and residents of residential facilities and to the community at large, and the development of a sound assessment and treatment plan for sexually intrusive behaviour is therefore very important. A comprehensive evaluation is best served by drawing on the fields of neuropsychology, forensic psychology, and cognitive rehabilitation. The paper discusses the types of brain damage that commonly lead to sexually intrusive behaviour, provides guidance for its assessment, and presents a three-stage treatment model. The importance of a multidisciplinary approach to both assessment and treatment is emphasized. Finally, a case example is provided to illustrate the problem and the possibilities for successful management.

  14. The evolution of interior intrusion detection technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combination developed when commercial sensors were unavailable and the future application of expert systems. 5 refs

  15. The evolution of interior intrusion detection technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-01-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the U.S. Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). The authors also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  16. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  17. Incorporation of Fine-Grained Sediment Erodibility Measurements into Sediment Transport Modeling, Capitol Lake, Washington

    Science.gov (United States)

    Stevens, Andrew W.; Gelfenbaum, Guy; Elias, Edwin; Jones, Craig

    2008-01-01

    Capitol Lake was created in 1951 with the construction of a concrete dam and control gate that prevented salt-water intrusion into the newly formed lake and regulated flow of the Deschutes River into southern Puget Sound. Physical processes associated with the former tidally dominated estuary were altered, and the dam structure itself likely caused an increase in retention of sediment flowing into the lake from the Deschutes River. Several efforts to manage sediment accumulation in the lake, including dredging and the construction of sediment traps upriver, failed to stop the lake from filling with sediment. The Deschutes Estuary Feasibility Study (DEFS) was carried out to evaluate the possibility of removing the dam and restoring estuarine processes as an alternative ongoing lake management. An important component of DEFS was the creation of a hydrodynamic and sediment transport model of the restored Deschutes Estuary. Results from model simulations indicated that estuarine processes would be restored under each of four restoration alternatives, and that over time, the restored estuary would have morphological features similar to the predam estuary. The model also predicted that after dam-removal, a large portion of the sediment eroded from the lake bottom would be deposited near the Port of Olympia and a marina located in lower Budd Inlet seaward of the present dam. The volume of sediment transported downstream was a critical piece of information that managers needed to estimate the total cost of the proposed restoration project. However, the ability of the model to predict the magnitude of sediment transport in general and, in particular, the volume of sediment deposition in the port and marina was limited by a lack of information on the erodibility of fine-grained sediments in Capitol Lake. Cores at several sites throughout Capitol Lake were collected between October 31 and November 1, 2007. The erodibility of sediments in the cores was later determined in the

  18. Numerical modeling of seawater intrusion in Zhoushuizi district of Dalian City, China

    Science.gov (United States)

    Zhao, J.; Lin, J.; Wu, J.

    2013-12-01

    A three-dimensional heterogeneous density-dependent numerical model was constructed to simulate the seawater intrusion process in coastal aquifers in Zhoushuizi Region, Dalian City. Model calibration was achieved through a prediction-correction method by adjusting the zonation and values of hydrogeologic parameters until the calculated heads and concentrations matched the observed values. Model validation results also showed that it was reasonable under current data conditions. Then the calibrated and validated model was applied to predict the dynamics and trend of seawater intrusion according to the current groundwater abstraction conditions in this study area 30 years after 2010. Prediction results showed that overall seawater intrusion in the future would be even more severe. Actually, with the growing of the population and development of the economy, the demand for ground water will be increasing continuously so that the problem of seawater intrusion may be more serious than that predicted by the modelin this study. Better strategies for reasonably governing exploitation of groundwater in the study area can be further developed by using this three-dimensional seawater intrusion model.

  19. The assessment of human intrusion into underground repositories for radioactive waste Volume 2: Appendices

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Ashton, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  20. Evolution of alkaline lakes - Lake Van case study

    Science.gov (United States)

    Tillman Meyer, Felix; Viehberg, Finn; Bahroun, Sonya; Wolf, Annabel; Immenhauser, Adrian; Kwiecien, Ola

    2017-04-01

    Lake Van in Eastern Anatolia (Turkey) is the largest terminal soda lake on Earth. The lake sedimentary profile covers ca. 600 ka (Stockhecke et al. 2014) Based on lithological changes, the presence of freshwater microfossils and close-to-freshwater pH value in the pore water, members of ICDP PALEOVAN concluded that Lake Van might have started as an open lake. Here we show paleontological and geochemical evidence in favour of this idea and constrain the time, when Lake Van likely transformed into a closed lake. Additionally we provide the first conceptual model of how this closure may have happened. Our archives of choice are inorganic and biogenic carbonates, separated by wet sieving. We identified microfossil assemblages (fraction > 125 µm) and performed high-resolution oxygen isotope (delta18O) and elemental (Mg/Ca, Sr/Ca) analyses of the fraction plants growing in the photic zone as food supply. These two aspects point to an increasing salinity in a shallowing lake. The delta18O values of inorganic carbonates are relatively low during the initial phase of Lake Van and increase abruptly (ca. 7‰) after 530 ka BP. At approximately the same time combination of Sr/Ca and Mg/Ca data suggest first occurrence of aragonite. Again, these findings suggest geochemical changes of the lake water concurrent with transition documented by microfossils. Comparison between Lake Van and Lake Ohrid (Lacey et al. 2016) delta18O data, precludes regional climate change (e.g.: increased evaporation) as the main driver of observed changes. With no evidence for increased volcanic or tectonic activity (e.g.: tephra layers, deformation structures, slumping) in the Lake Van sedimentary profile around 530 ka, it seems unlikely that a pyroclastic flow blocked the outflow of the lake. Alternatively, a portion of inflow has been diverged which might have caused a change in the hydrological balance and lake level falling below its outlet. However, as no geomorphological data confirming this

  1. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    International Nuclear Information System (INIS)

    Bernot, P.

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  2. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungwon Lee

    2009-05-01

    Full Text Available TheIP-based Ubiquitous Sensor Network (IP-USN is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System called RIDES (Robust Intrusion DEtection System for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  3. Effect of winds and waves on salt intrusion in the Pearl River estuary

    Directory of Open Access Journals (Sweden)

    W. Gong

    2018-02-01

    Full Text Available Salt intrusion in the Pearl River estuary (PRE is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  4. Treatment of Intrusive Suicidal Imagery Using Eye Movements

    Directory of Open Access Journals (Sweden)

    Jaël S. van Bentum

    2017-06-01

    Full Text Available Suicide and suicidal behavior are major public health concerns, and affect 3–9% of the population worldwide. Despite increased efforts for national suicide prevention strategies, there are still few effective interventions available for reducing suicide risk. In this article, we describe various theoretical approaches for suicide ideation and behavior, and propose to examine the possible effectiveness of a new and innovative preventive strategy. A model of suicidal intrusion (mental imagery related to suicide, also referred to as suicidal flash-forwards is presented describing one of the assumed mechanisms in the etiology of suicide and the mechanism of therapeutic change. We provide a brief rationale for an Eye Movement Dual Task (EMDT treatment for suicidal intrusions, describing techniques that can be used to target these suicidal mental images and thoughts to reduce overall behavior. Based on the available empirical evidence for the mechanisms of suicidal intrusions, this approach appears to be a promising new treatment to prevent suicidal behavior as it potentially targets one of the linking pins between suicidal ideation and suicidal actions.

  5. Numerical Continuation Methods for Intrusive Uncertainty Quantification Studies

    Energy Technology Data Exchange (ETDEWEB)

    Safta, Cosmin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Najm, Habib N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Phipps, Eric Todd [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-09-01

    Rigorous modeling of engineering systems relies on efficient propagation of uncertainty from input parameters to model outputs. In recent years, there has been substantial development of probabilistic polynomial chaos (PC) Uncertainty Quantification (UQ) methods, enabling studies in expensive computational models. One approach, termed ”intrusive”, involving reformulation of the governing equations, has been found to have superior computational performance compared to non-intrusive sampling-based methods in relevant large-scale problems, particularly in the context of emerging architectures. However, the utility of intrusive methods has been severely limited due to detrimental numerical instabilities associated with strong nonlinear physics. Previous methods for stabilizing these constructions tend to add unacceptably high computational costs, particularly in problems with many uncertain parameters. In order to address these challenges, we propose to adapt and improve numerical continuation methods for the robust time integration of intrusive PC system dynamics. We propose adaptive methods, starting with a small uncertainty for which the model has stable behavior and gradually moving to larger uncertainty where the instabilities are rampant, in a manner that provides a suitable solution.

  6. Bathymetry of Lake Erie and Lake Saint Clair

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Bathymetry of Lake Erie and Lake Saint Clair has been compiled as a component of a NOAA project to rescue Great Lakes lake floor geological and geophysical data and...

  7. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  8. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  9. Prevention and analysis of hacker's intrusion

    International Nuclear Information System (INIS)

    Liu Baoxu; An Dehai; Xu Rongsheng

    2000-01-01

    The author analyzes the behavior characteristics and relevant technologies about the hacker's intrusion, and gives some corresponding solutions pertinently. To the recent events about hackers, the author gives detailed introduction and puts forward the relevant advice and valuable consideration

  10. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  11. Capability for intrusion detection at nuclear fuel sites

    International Nuclear Information System (INIS)

    1978-03-01

    A safeguards vulnerability assessment was conducted at three separate licensed nuclear processing facilities. Emphasis was placed on: (1) performance of the total intrusion detection system, and (2) vulnerability of the system to compromise by insiders. The security guards were interviewed to evaluate their effectiveness in executing their duties in accordance with the plant's security plan and to assess their knowledge regarding the operation of the security equipment. A review of the training schedule showed that the guards, along with the other plant employees, are required to periodically attend in-plant training sessions. The vulnerability assessments continued with interviews of the personnel responsible for maintaining the security equipment, with discussions of detector false alarm and maintenance problems. The second part of the vulnerability assessments was to evaluate the effectiveness of the intrusion detection systems including the interior and the perimeter sensors, CCTV surveillance devices and the exterior lighting. Two types of perimeter detectors are used at the sites, a fence disturbance sensor and an infrared barrier type detector. Infrared barrier type detectors have a higher probability of detection, especially in conjunction with dedicated CCTV cameras. The exterior lights satisfy the 0.2 footcandle illumination requirement. The interior intrusion detection systems included ultrasonic motion detectors, microwave motion detectors,balanced magnetic switches, and CCTV cameras. Entrance doors to the materials access areas and vital areas are protected with balanced magnetic switches. The interior intrusion detection systems at the three nuclear processing sites are considered satisfactory with the exception of the areas protected with ultrasonic motion detectors

  12. Magmatic sill intrusions beneath El Hierro Island following the 2011-2012 submarine eruption

    Science.gov (United States)

    Benito-Saz, María Á.; Sigmundsson, Freysteinn; Parks, Michelle M.; García-Cañada, Laura; Domínguez Cerdeña, Itahiza

    2016-04-01

    El Hierro, the most southwestern island of Canary Islands, Spain, is a volcano rising from around 3600 m above the ocean floor and up to of 1500 m above sea level. A submarine eruption occurred off the coast of El Hierro in 2011-2012, which was the only confirmed eruption in the last ~ 600 years. Activity continued after the end of the eruption with six magmatic intrusions occurring between 2012-2014. Each of these intrusions was characterized by hundreds of earthquakes and 3-19 centimeters of observed ground deformation. Ground displacements at ten continuous GPS sites were initially inverted to determine the optimal source parameters (location, geometry, volume/pressure change) that best define these intrusions from a geodetic point of view. Each intrusive period appears to be associated with the formation of a separate sill, with inferred volumes between 0.02 - 0.3 km3. SAR images from the Canadian RADARSAT-2 satellite and the Italian Space Agency COSMO-SkyMed constellation have been used to produce high-resolution detailed maps of line-of-sight displacements for each of these intrusions. These data have been combined with the continuous GPS observations and a joint inversion undertaken to gain further constraints on the optimal source parameters for each of these separate intrusive events. The recorded activity helps to understand how an oceanic intraplate volcanic island grows through repeated sill intrusions; well documented by seismic, GPS and InSAR observations in the case of the El Hierro activity.

  13. Work Zone Intrusion Report Interface Design

    Science.gov (United States)

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  14. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  15. Lake whitefish diet, condition, and energy density in Lake Champlain and the lower four Great Lakes following dreissenid invasions

    Science.gov (United States)

    Herbst, Seth J.; Marsden, J. Ellen; Lantry, Brian F.

    2013-01-01

    Lake Whitefish Coregonus clupeaformis support some of the most valuable commercial freshwater fisheries in North America. Recent growth and condition decreases in Lake Whitefish populations in the Great Lakes have been attributed to the invasion of the dreissenid mussels, zebra mussels Dreissena polymorpha and quagga mussels D. bugensis, and the subsequent collapse of the amphipod, Diporeia, a once-abundant high energy prey source. Since 1993, Lake Champlain has also experienced the invasion and proliferation of zebra mussels, but in contrast to the Great Lakes, Diporeia were not historically abundant. We compared the diet, condition, and energy density of Lake Whitefish from Lake Champlain after the dreissenid mussel invasion to values for those of Lake Whitefish from Lakes Michigan, Huron, Erie, and Ontario. Lake Whitefish were collected using gill nets and bottom trawls, and their diets were quantified seasonally. Condition was estimated using Fulton's condition factor (K) and by determining energy density. In contrast to Lake Whitefish from some of the Great Lakes, those from Lake Champlain Lake Whitefish did not show a dietary shift towards dreissenid mussels, but instead fed primarily on fish eggs in spring, Mysis diluviana in summer, and gastropods and sphaeriids in fall and winter. Along with these dietary differences, the condition and energy density of Lake Whitefish from Lake Champlain were high compared with those of Lake Whitefish from Lakes Michigan, Huron, and Ontario after the dreissenid invasion, and were similar to Lake Whitefish from Lake Erie; fish from Lakes Michigan, Huron, and Ontario consumed dreissenids, whereas fish from Lake Erie did not. Our comparisons of Lake Whitefish populations in Lake Champlain to those in the Great Lakes indicate that diet and condition of Lake Champlain Lake Whitefish were not negatively affected by the dreissenid mussel invasion.

  16. Preliminary evaluation of solution-mining intrusion into a salt-dome repository

    International Nuclear Information System (INIS)

    1981-06-01

    This report is the product of the work of an ONWI task force to evaluate inadvertant human intrusion into a salt dome repository by solution mining. It summarizes the work in the following areas: a general review of the levels of defense that could reduce both the likelihood and potential consequences of human intrusion into a salt dome repository; evaluation of a hypothetical intrusion scenario and its consequences; recommendation for further studies. The conclusions of this task force report can be summarized as follows: (1) it is not possible at present to establish with certainty that solution mining is credible as a human-intrusion event. The likelihood of such an intrusion will depend on the effectiveness of the preventive measures; (2) an example analysis based on the realistic approach is presented in this report; it concluded that the radiological consequences are strongly dependent upon the mode of radionuclide release from the waste form, time after emplacement, package design, impurities in the host salt, the amount of a repository intercepted, the solution mining cavity form, the length of time over which solution mining occurs, the proportion of contaminated salt source for human consumption compared to other sources, and the method of salt purification for culinary purposes; (3) worst case scenarios done by other studies suggest considerable potential for exposures to man while preliminary evaluations of more realistic cases suggest significantly reduced potential consequences. Mathematical model applications to process systems, guided by more advanced assumptions about human intrusion into geomedia, will shed more light on the potential for concerns and the degree to which mitigative measures will be required

  17. Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection

    Science.gov (United States)

    Elfers, Carsten; Horstmann, Mirko; Sohr, Karsten; Herzog, Otthein

    Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine learning techniques have been proposed. However, one critical issue is that the amount of reference data that contains serious intrusions is very sparse. In this paper we present an inference process with linear chain conditional random fields that aims to solve this problem by using domain knowledge about the alerts of different intrusion sensors represented in an ontology.

  18. Computer Game Play Reduces Intrusive Memories of Experimental Trauma via Reconsolidation-Update Mechanisms.

    Science.gov (United States)

    James, Ella L; Bonsall, Michael B; Hoppitt, Laura; Tunbridge, Elizabeth M; Geddes, John R; Milton, Amy L; Holmes, Emily A

    2015-08-01

    Memory of a traumatic event becomes consolidated within hours. Intrusive memories can then flash back repeatedly into the mind's eye and cause distress. We investigated whether reconsolidation-the process during which memories become malleable when recalled-can be blocked using a cognitive task and whether such an approach can reduce these unbidden intrusions. We predicted that reconsolidation of a reactivated visual memory of experimental trauma could be disrupted by engaging in a visuospatial task that would compete for visual working memory resources. We showed that intrusive memories were virtually abolished by playing the computer game Tetris following a memory-reactivation task 24 hr after initial exposure to experimental trauma. Furthermore, both memory reactivation and playing Tetris were required to reduce subsequent intrusions (Experiment 2), consistent with reconsolidation-update mechanisms. A simple, noninvasive cognitive-task procedure administered after emotional memory has already consolidated (i.e., > 24 hours after exposure to experimental trauma) may prevent the recurrence of intrusive memories of those emotional events. © The Author(s) 2015.

  19. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  20. Magmatic Diversity of the Wehrlitic Intrusions in the Oceanic Lower Crust of the Northern Oman Ophiolite

    Science.gov (United States)

    Kaneko, R.; Adachi, Y.; Miyashita, S.

    2014-12-01

    The Oman ophiolite extends along the east coast of Oman, and is the world's largest and best-preserved slice of obducted oceanic lithosphere. The magmatic history of this ophiolite is complex and is generally regarded as having occurred in three stages (MOR magmatism, subduction magmatism and intraplate magmatism). Wehrlitic intrusions constitute an important element of oceanic lower crust of the ophiolite, and numerous intrusions cut gabbro units in the northern Salahi block of this ophiolite. In this study area, we identified two different types of wehrlitic intrusions. One type of the intrusions mainly consists of dunite, plagioclase (Pl) wehrlite and mela-olivine (Ol) gabbro, in which the crystallization sequence is Ol followed by the contemporaneous crystallization of Pl and clinopyroxene (Cpx). This type is called "ordinary" wehrlitic intrusions and has similar mineral compositions to host gabbros (Adachi and Miyashita 2003; Kaneko et al. 2014). Another type of the intrusions is a single intrusion that crops out in an area 250 m × 150 m along Wadi Salahi. This intrusion consists of Pl-free "true" wehrlite, in which the crystallization sequence is Ol and then Cpx. The forsterite contents (Fo%) of Ol from the "ordinary" wehrlitic intrusions and "true" wehrlitic intrusions have ranges of 90.8-87.0 (NiO = 0.36-0.13 wt%) and 84.7 (NiO = 0.31 wt%), respectively. Cr numbers (Cr#) of Cr-spinel from the "true" wehrlitic intrusions show higher Cr# value of 0.85 than those of the "ordinary" wehrlitic intrusions (0.48-0.64). But the former is characterized by very high Fe3+ values (YFe3+ = 0.49-0.68). Kaneko et al. (2014) showed that the "ordinary" ubiquitous type has similar features to MOR magmatism and the depleted type in the Fizh block (Adachi and Miyashita 2003) links to subduction magmatism. These types are distinguished by their mineral chemistries (TiO2 and Na2O contents of Cpx). The TiO2 and Na2O contents of Cpx from the "true" wehrlitic intrusions have 0

  1. Glacial lake inventory and lake outburst potential in Uzbekistan.

    Science.gov (United States)

    Petrov, Maxim A; Sabitov, Timur Y; Tomashevskaya, Irina G; Glazirin, Gleb E; Chernomorets, Sergey S; Savernyuk, Elena A; Tutubalina, Olga V; Petrakov, Dmitriy A; Sokolov, Leonid S; Dokukin, Mikhail D; Mountrakis, Giorgos; Ruiz-Villanueva, Virginia; Stoffel, Markus

    2017-08-15

    Climate change has been shown to increase the number of mountain lakes across various mountain ranges in the World. In Central Asia, and in particular on the territory of Uzbekistan, a detailed assessment of glacier lakes and their evolution over time is, however lacking. For this reason we created the first detailed inventory of mountain lakes of Uzbekistan based on recent (2002-2014) satellite observations using WorldView-2, SPOT5, and IKONOS imagery with a spatial resolution from 2 to 10m. This record was complemented with data from field studies of the last 50years. The previous data were mostly in the form of inventories of lakes, available in Soviet archives, and primarily included localized in-situ data. The inventory of mountain lakes presented here, by contrast, includes an overview of all lakes of the territory of Uzbekistan. Lakes were considered if they were located at altitudes above 1500m and if lakes had an area exceeding 100m 2 . As in other mountain regions of the World, the ongoing increase of air temperatures has led to an increase in lake number and area. Moreover, the frequency and overall number of lake outburst events have been on the rise as well. Therefore, we also present the first outburst assessment with an updated version of well-known approaches considering local climate features and event histories. As a result, out of the 242 lakes identified on the territory of Uzbekistan, 15% are considered prone to outburst, 10% of these lakes have been assigned low outburst potential and the remainder of the lakes have an average level of outburst potential. We conclude that the distribution of lakes by elevation shows a significant influence on lake area and hazard potential. No significant differences, by contrast, exist between the distribution of lake area, outburst potential, and lake location with respect to glaciers by regions. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. Environmental data processor of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Rogers, M.S.

    1977-06-01

    A data acquisition system oriented specifically toward collection and processing of various meteorological and environmental parameters has been designed around a National Semiconductor IMP-16 microprocessor, This system, called the Environmental Data Processor (EDP), was developed specifically for use with the Adaptive Intrusion Data System (AIDS) in a perimeter intrusion alarm evaluation, although its design is sufficiently general to permit use elsewhere. This report describes in general detail the design of the EDP and its interaction with other AIDS components

  3. Cultural syndromes and age moderate the emotional impact of illness intrusiveness in rheumatoid arthritis.

    Science.gov (United States)

    Devins, Gerald M; Gupta, Anita; Cameron, Jill; Woodend, Kirsten; Mah, Kenneth; Gladman, Dafna

    2009-02-01

    The authors investigated cultural syndromes (multidimensional vectors comprising culturally based attitudes, values, and beliefs) and age as moderators of the emotional impact of illness intrusiveness--illness-induced lifestyle disruptions--in rheumatoid arthritis (RA) and examined illness intrusiveness effects in total and separately for three life domains (relationships and personal development, intimacy, and instrumental). People with RA (n = 105) completed the Illness Intrusiveness Ratings, Individualism-Collectivism, and Center for Epidemiologic Studies--Depression scales in a one-on-one interview. Controlling for disease and background characteristics, the association between illness intrusiveness (total score and the Relationships and Personal Development subscale) and distress was inverse when young adults with RA endorsed high horizontal individualism. Illness intrusiveness into intimacy was associated with increased distress, and this intensified when respondents endorsed high vertical individualism, horizontal collectivism, vertical collectivism, or low horizontal individualism. The negative emotional impact of illness intrusiveness into intimacy diminished with increasing age. Given an aging and increasingly pluralistic society, diversity can no longer be ignored in addressing the psychosocial impact of chronic, disabling disease.

  4. Expert judgement on inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Hora, S.C.; von Winterfeldt, D.; Trauth, K.M.

    1991-12-01

    Four expert-judgment teams have developed analyses delineating possible future societies in the next 10,000 years in the vicinity of the Waste Isolation Pilot Plant (WIPP). Expert-judgment analysis was used to address the question of future societies because neither experimentation, observation, nor modeling can resolve such uncertainties. Each of the four, four-member teams, comprised of individuals with expertise in the physical, social, or political sciences, developed detailed qualitative assessments of possible future societies. These assessments include detailed discussions of the underlying physical and societal factors that would influence society and the likely modes of human-intrusion at the WIPP, as well as the probabilities of intrusion. Technological development, population growth, economic development, conservation of information, persistence of government control, and mitigation of danger from nuclear waste were the factors the teams believed to be most important. Likely modes of human-intrusion were categorized as excavation, disposal/storage, tunneling, drilling, and offsite activities. Each team also developed quantitative assessments by providing probabilities of various alternative futures, of inadvertent human intrusion, and in some cases, of particular modes of intrusion. The information created throughout this study will be used in conjunction with other types of information, including experimental data, calculations from physical principles and computer models, and perhaps other judgments, as input to ''performance assessment.'' The more qualitative results of this study will be used as input to another expert panel considering markers to deter inadvertent human intrusion at the WIPP

  5. Intrusion detection techniques for plant-wide network in a nuclear power plant

    International Nuclear Information System (INIS)

    Rajasekhar, P.; Shrikhande, S.V.; Biswas, B.B.; Patil, R.K.

    2012-01-01

    Nuclear power plants have a lot of critical data to be sent to the operator workstations. A plant wide integrated communication network, with high throughput, determinism and redundancy, is required between the workstations and the field. Switched Ethernet network is a promising prospect for such an integrated communication network. But for such an integrated system, intrusion is a major issue. Hence the network should have an intrusion detection system to make the network data secure and enhance the network availability. Intrusion detection is the process of monitoring the events occurring in a network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of network security policies, acceptable user policies, or standard security practices. This paper states the various intrusion detection techniques and approaches which are applicable for analysis of a plant wide network. (author)

  6. Elemental composition of a deep sediment core from Lake Stocksjoen in the Forsmark area

    Energy Technology Data Exchange (ETDEWEB)

    Stroemgren, Maarten [Umeaa Univ. (Sweden). Dept. of Ecology and Environmental Sciences; Brunberg, Anna-Kristina [Uppsala Univ. (Sweden). Dept. of Ecology and Evolution/Limnology

    2006-10-15

    A deep sediment core was taken from Lake Stocksjoen, situated within the Forsmark site investigation area. The 55 cm long sediment core, representing the entire history of the lake (approx 430 years) was sliced in 5 cm portions and analysed for various chemical elements, using ICP-MS technique. In total, 54 different elements - classified as main elements, heavy metals and trace elements - were analysed. In general terms, three different patterns of stratigraphy were derived from all the analysed elements. Calcium, manganese, lead and mercury occurred in highest concentrations in the upper sediments (<30 cm depth). Phosphorus, zinc, cadmium, antimony, tin and strontium occurred in more even proportions throughout the sediment core. All the other elements were substantially reduced in the upper parts (<30 cm) compared to the deeper parts of the sediment core. Metals that are considered as airborne pollutants were found in low or moderate concentrations. This is in concert with other investigations of pollutants that have been performed in the Forsmark area. The sediment of Lake Stocksjoen is highly organic, and has been so during the entire history of the lake. Much of the organic Material seems to be refractory and less susceptible for mineralisation and respiration during the prevailing environmental conditions. This corresponds well with the characteristic gelatinous cyanophycee gyttja found in the lower parts of the sediment core. Although speculative, the pronounced changes in elemental composition of the sediment at 30 cm depth may correspond to the final isolation of the lake from the Baltic Sea, which occurred approximately 230 years ago. The deeper parts (below 30 cm depth) thus may represent the time period with regular intrusions of brackish water into the lake basin. One important factor governing the environmental conditions and the resulting elemental composition of the sediment is the unusually thick 'microbial mat', which is characteristic

  7. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    Sulfide intrusion in seagrasses represents a global threat to seagrasses and thereby an important parameter in resilience of seagrass ecosystems. In contrast seegrasses colonize and grow in hostile sediments, where they are constantly exposed to invasion of toxic gaseous sulfide. Remarkably little...... strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis, tracing sulfur compounds combined with ecosystem parameters we found different spatial, intraspecific and interspecific strategies to cope with sulfidic sediments. 1...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  8. Radiological risks due to intrusion into a deep bedrock repository

    International Nuclear Information System (INIS)

    Nordlinder, S.; Bergstroem, U.; Edlund, O.

    1999-01-01

    The Swedish concept for disposal of high-level waste is a deep (500 m) bedrock repository (SFL) protected by multiple barriers that isolate the waste from the environment for such a long time that the physical decay will cause a substantial reduction of the radioactivity. The aim of concentration and isolation of high-level waste is to reduce the radiation risk. Intrusion in the repository may introduce a small residual risk to individuals. A risk analysis was performed comprising dose assessment and probabilities of occurrence. Intrusions may be considered to take place either due to conscious actions or by actions without any knowledge about the repository. For conscious intrusion it may be assumed that there will be enough knowledge to manage the radiation situation in a professional manner. Several reasons for making inadvertent intrusion are possible. Independently of the purpose, the most probable initial way of coming into contact with the radioactive material is by deep drilling. Examples of causes for drilling could be general scientific purposes or exploitation of geothermal energy. Dose assessments were made for intrusion due to inclined drilling directly into a canister, and drilling near an initially malfunctioning canister from which radionuclides have leaked into the groundwater. For the former case, external pathways were considered due to exposure from a core of the canister with fuel and contaminated bore dust. The most common drilling method is with water flushing for removal of bore dust, which will not cause any substantial transfer of radionuclides to air. For the second case, it was assumed that there was a well in the vicinity. The only pathway considered was therefore consumption of water because it dominates the exposure. The highest dose rates to man were, as expected, obtained by drilling into the canister. Dose rates decrease with time after closure. During the first time the relatively short-lived radionuclides Cs-137 and Sr-90 give

  9. Sill intrusion in volcanic calderas: implications for vent opening probability

    Science.gov (United States)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    Calderas show peculiar behaviors with remarkable dynamic processes, which do not often culminate in eruptions. Observations and studies conducted in recent decades have shown that the most common cause of unrest in the calderas is due to magma intrusion; in particular, the intrusion of sills at shallow depths. Monogenic cones, with large areal dispersion, are quite common in the calderas, suggesting that the susceptibility analysis based on geological features, is not strictly suitable for estimating the vent opening probability in calderas. In general, the opening of a new eruptive vent can be regarded as a rock failure process. The stress field in the rocks that surrounds and tops the magmatic reservoirs plays an important role in causing the rock failure and creating the path that magma can follow towards the surface. In this conceptual framework, we approach the problem of getting clues about the probability of vent opening in volcanic calderas through the study of the stress field produced by the intrusion of magma, in particular, by the intrusion of a sill. We simulate the intrusion of a sill free to expand radially, with shape and dimensions which vary with time. The intrusion process is controlled by the elastic response of the rock plate above the sill, which bends because of the intrusion, and by gravity, that drives the magma towards the zones where the thickness of the sill is smaller. We calculated the stress field in the plate rock above the sill. We found that at the bottom of the rock plate above the sill the maximum intensity of tensile stress is concentrated at the front of the sill and spreads radially with it, over time. For this reason, we think that the front of the spreading sill is prone to open for eruptive vents. Even in the central area of the sill the intensity of stress is relatively high, but at the base of the rock plate stress is compressive. Under isothermal conditions, the stress soon reaches its maximum value (time interval

  10. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  11. THE PALEOPROTEROZOIC IMANDRA-VARZUGA RIFTING STRUCTURE (KOLA PENINSULA: INTRUSIVE MAGMATISM AND MINERAGENY

    Directory of Open Access Journals (Sweden)

    V. V. Chashchin

    2014-01-01

    Full Text Available The article provides data on the structure of the Paleoproterozoic intercontinental Imandra-Varzuga rifting structure (IVS and compositions of intrusive formations typical of the early stage of the IVS development and associated mineral resources. IVS is located in the central part of the Kola region. Its length is about 350 km, and its width varies from 10 km at the flanks to 50 km in the central part. IVS contains an association of the sedimentary-volcanic, intrusive and dyke complexes. It is a part of a large igneous Paleoproterozoic province of the Fennoscandian Shield spreading for a huge area (about 1 million km2, which probably reflects the settings of the head part of the mantle plume. Two age groups of layered intrusions were associated with the initial stage of the IVS development. The layered intrusions of the Fedorovo-Pansky and Monchegorsk complexes (about 2.50 Ga are confined to the northern flank and the western closure of IVS, while intrusions of the Imandra complex (about 2.45 Ga are located at the southern flank of IVS. Intrusions of older complexes are composed of rock series from dunite to gabbro and anorthosites (Monchegorsk complex and from orthopyroxenite to gabbro and anorthosites (Fedorovo-Pansky complex. Some intrusions of this complexes reveal features of multiphase ones. The younger Imandra complex intrusions (about 2.45 Ga are stratified from orthopyroxenite to ferrogabbro. Their important feature is comagmatical connection with volcanites. All the intrusive complexes have the boninite-like mantle origin enriched by lithophyle components. Rocks of these two complexеs with different age have specific geochemical characteristics. In the rocks of the Monchegorsk and Fedorovo-Pansky complexes, the accumulation of REE clearly depends on the basicity of the rocks, the spectrum of REE is non-fractionated and ‘flat’, and the Eu positive anomaly is slightly manifested. In the rocks of the Imandra complex, the level of

  12. Facebook intrusion, fear of missing out, narcissism, and life satisfaction: A cross-sectional study.

    Science.gov (United States)

    Błachnio, Agata; Przepiórka, Aneta

    2018-01-01

    Facebook is one of the most popular social networking sites. The present paper examines the relations between fear of missing out, narcissism, Facebook intrusion, and life satisfaction. We hypothesized that the fear of missing out and narcissism would play a significant role in Facebook intrusion. The participants in the study were 360 Polish users of Facebook. We administered the Facebook Intrusion Scale, the Fear of Missing Out Scale, the Narcissistic Personality Inventory, and the Satisfaction with Life Scale. The results showed that a high level of fear of missing out and high narcissism are predictors of Facebook intrusion, while a low level of fear of missing out and high narcissism are related to satisfaction with life. Our findings provide a more comprehensive picture of the predictors of Facebook intrusion and reveal interesting patterns. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  14. An armored-cable-based fiber Bragg grating sensor array for perimeter fence intrusion detection

    Science.gov (United States)

    Hao, Jianzhong; Dong, Bo; Varghese, Paulose; Phua, Jiliang; Foo, Siang Fook

    2012-01-01

    In this paper, an armored-cable-based optical fiber Bragg grating (FBG) sensor array, for perimeter fence intrusion detection, is demonstrated and some of the field trial results are reported. The field trial was conducted at a critical local installation in Singapore in December 2010. The sensor array was put through a series of both simulated and live intrusion scenarios to test the stability and suitability of operation in the local environmental conditions and to determine its capabilities in detecting and reporting these intrusions accurately to the control station. Such a sensor array can provide perimeter intrusion detection with fine granularity and preset pin-pointing accuracy. The various types of intrusions included aided or unaided climbs, tampering and cutting of the fence, etc. The unique sensor packaging structure provides high sensitivity, crush resistance and protection against rodents. It is also capable of resolving nuisance events such as rain, birds sitting on the fence or seismic vibrations. These sensors are extremely sensitive with a response time of a few seconds. They can be customized for a desired spatial resolution and pre-determined sensitivity. Furthermore, it is easy to cascade a series of such sensors to monitor and detect intrusion events over a long stretch of fence line. Such sensors can be applied to real-time intrusion detection for perimeter security, pipeline security and communications link security.

  15. Lake-level frequency analysis for Devils Lake, North Dakota

    Science.gov (United States)

    Wiche, Gregg J.; Vecchia, Aldo V.

    1996-01-01

    Two approaches were used to estimate future lake-level probabilities for Devils Lake. The first approach is based on an annual lake-volume model, and the second approach is based on a statistical water mass-balance model that generates seasonal lake volumes on the basis of seasonal precipitation, evaporation, and inflow. Autoregressive moving average models were used to model the annual mean lake volume and the difference between the annual maximum lake volume and the annual mean lake volume. Residuals from both models were determined to be uncorrelated with zero mean and constant variance. However, a nonlinear relation between the residuals of the two models was included in the final annual lakevolume model.Because of high autocorrelation in the annual lake levels of Devils Lake, the annual lake-volume model was verified using annual lake-level changes. The annual lake-volume model closely reproduced the statistics of the recorded lake-level changes for 1901-93 except for the skewness coefficient. However, the model output is less skewed than the data indicate because of some unrealistically large lake-level declines. The statistical water mass-balance model requires as inputs seasonal precipitation, evaporation, and inflow data for Devils Lake. Analysis of annual precipitation, evaporation, and inflow data for 1950-93 revealed no significant trends or long-range dependence so the input time series were assumed to be stationary and short-range dependent.Normality transformations were used to approximately maintain the marginal probability distributions; and a multivariate, periodic autoregressive model was used to reproduce the correlation structure. Each of the coefficients in the model is significantly different from zero at the 5-percent significance level. Coefficients relating spring inflow from one year to spring and fall inflows from the previous year had the largest effect on the lake-level frequency analysis.Inclusion of parameter uncertainty in the model

  16. Lake trout in northern Lake Huron spawn on submerged drumlins

    Science.gov (United States)

    Riley, Stephen C.; Binder, Thomas; Wattrus, Nigel J.; Faust, Matthew D.; Janssen, John; Menzies, John; Marsden, J. Ellen; Ebener, Mark P.; Bronte, Charles R.; He, Ji X.; Tucker, Taaja R.; Hansen, Michael J.; Thompson, Henry T.; Muir, Andrew M.; Krueger, Charles C.

    2014-01-01

    Recent observations of spawning lake trout Salvelinus namaycush near Drummond Island in northern Lake Huron indicate that lake trout use drumlins, landforms created in subglacial environments by the action of ice sheets, as a primary spawning habitat. From these observations, we generated a hypothesis that may in part explain locations chosen by lake trout for spawning. Most salmonines spawn in streams where they rely on streamflows to sort and clean sediments to create good spawning habitat. Flows sufficient to sort larger sediment sizes are generally lacking in lakes, but some glacial bedforms contain large pockets of sorted sediments that can provide the interstitial spaces necessary for lake trout egg incubation, particularly if these bedforms are situated such that lake currents can penetrate these sediments. We hypothesize that sediment inclusions from glacial scavenging and sediment sorting that occurred during the creation of bedforms such as drumlins, end moraines, and eskers create suitable conditions for lake trout egg incubation, particularly where these bedforms interact with lake currents to remove fine sediments. Further, these bedforms may provide high-quality lake trout spawning habitat at many locations in the Great Lakes and may be especially important along the southern edge of the range of the species. A better understanding of the role of glacially-derived bedforms in the creation of lake trout spawning habitat may help develop powerful predictors of lake trout spawning locations, provide insight into the evolution of unique spawning behaviors by lake trout, and aid in lake trout restoration in the Great Lakes.

  17. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments....

  18. Working group 4B - human intrusion: Design/performance requirements

    International Nuclear Information System (INIS)

    Channell, J.

    1993-01-01

    There is no summary of the progress made by working group 4B (Human Intrusion: Design/performance Requirements) during the Electric Power Research Institute's EPRI Workshop on the technical basis of EPA HLW Disposal Criteria, March 1993. This group was to discuss the waste disposal standard, 40 CFR Part 191, in terms of the design and performance requirements of human intrusion. Instead, because there were so few members, they combined with working group 4A and studied the three-tier approach to evaluating postclosure performance

  19. Lake sturgeon population characteristics in Rainy Lake, Minnesota and Ontario

    Science.gov (United States)

    Adams, W.E.; Kallemeyn, L.W.; Willis, D.W.

    2006-01-01

    Rainy Lake contains a native population of lake sturgeon Acipenser fulvescens that has been largely unstudied. The aims of this study were to document the population characteristics of lake sturgeon in Rainy Lake and to relate environmental factors to year-class strength for this population. Gill-netting efforts throughout the study resulted in the capture of 322 lake sturgeon, including 50 recaptures. Lake sturgeon in Rainy Lake was relatively plump and fast growing compared with a 32-population summary. Population samples were dominated by lake sturgeon between 110 and 150 cm total length. Age–structure analysis of the samples indicated few younger (<10 years) lake sturgeon, but the smallest gill net mesh size used for sampling was 102 mm (bar measure) and would not retain small sturgeon. Few lake sturgeon older than age 50 years were captured, and maximum age of sampled fish was 59 years. Few correlations existed between lake sturgeon year-class indices and both annual and monthly climate variables, except that mean June air temperature was positively correlated with year-class strength. Analysis of Rainy Lake water elevation and resulting lake sturgeon year-class strength indices across years yielded consistent but weak negative correlations between late April and early June, when spawning of lake sturgeon occurs. The baseline data collected in this study should allow Rainy Lake biologists to establish more specific research questions in the future.

  20. Data mining approach to web application intrusions detection

    Science.gov (United States)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  1. AdaBoost-based algorithm for network intrusion detection.

    Science.gov (United States)

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  2. Mental Imagery and Posttraumatic Stress Disorder: a neuroimaging and experimental psychopathology approach to intrusive memories of trauma

    Directory of Open Access Journals (Sweden)

    Ian A Clark

    2015-07-01

    Full Text Available This hypothesis and theory paper presents a pragmatic framework to help bridge the clinical presentation and neuroscience of intrusive memories following psychological trauma. Intrusive memories are a hallmark symptom of Posttraumatic Stress Disorder. However, key questions, including those involving aetiology remain. In particular, we know little about the brain mechanisms involved in why only some moments of the trauma return as intrusive memories while others do not. We first present an overview of the patient experience of intrusive memories and the neuroimaging studies that have investigated intrusive memories in PTSD patients. Next, one mechanism of how to model intrusive memories in the laboratory, the trauma film paradigm, is examined. In particular, we focus on studies combining the trauma film paradigm with neuroimaging. Stemming from the clinical presentation and our current understanding of the processes involved in intrusive memories, we propose a framework in which an intrusive memory comprises five component parts; autobiographical (trauma memory, involuntary recall, negative emotions, attention hijacking and mental imagery. Each component part is considered in turn, both behaviourally and from a brain imaging perspective. A mapping of these five components onto our understanding of the brain is described. Unanswered questions that exist in our understanding of intrusive memories are considered using the proposed framework. Overall, we suggest that mental imagery is key to bridging the experience, memory and intrusive recollection of the traumatic event. Further, we suggest that by considering the brain mechanisms involved in the component parts of an intrusive memory, in particular mental imagery, we may be able to aid the development of a firmer bridge between patients’ experiences of intrusive memories and the clinical neuroscience behind them.

  3. A 5-year follow-up case of multiple intrusive luxative injuries

    Directory of Open Access Journals (Sweden)

    Seema Thakur

    2012-01-01

    Full Text Available Introduction: Traumatic intrusive luxation is one of the most severe forms of dental injuries, usually affecting the maxillary incisors. The consequence of such an occurrence is a high risk of healing complications such as pulp necrosis, external inflammatory resorption, and external replacement resorption (ankylosis. Case Report: This report presents a case of severe intrusive luxation of multiple anterior teeth in an 11-year-old girl. The teeth were repositioned successfully by endodontic and orthodontic management. The case was monitored for 5 years. Discussion: Depending on the severity of the injury, different clinical approaches for treatment of intrusive luxation may be used. Despite the variety of treatment modalities, rehabilitation of intruded teeth is always a challenge and a multidisciplinary approach is important to achieve a successful result. In this case, intruded teeth were endodontically treated with multiple calcium hydroxide dressings and repositioned orthodontically. The follow-up of such cases is very important as the repair process after intrusion is complex. After 5 years, no clinical or radiographic pathology was detected.

  4. A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing

    DEFF Research Database (Denmark)

    Wang, Yu; Xie, Lin; Li, Wenjuan

    2017-01-01

    Nowadays, cyber threats (e.g., intrusions) are distributed across various networks with the dispersed networking resources. Intrusion detection systems (IDSs) have already become an essential solution to defend against a large amount of attacks. With the development of cloud computing, a modern IDS...

  5. Geochemical characteristics and tectonic setting of the Tuerkubantao mafic-ultramafic intrusion in West Junggar, Xinjiang, China

    Directory of Open Access Journals (Sweden)

    Yufeng Deng

    2015-03-01

    Full Text Available Mineral chemistry, whole-rock major oxide, and trace element compositions have been determined for the Tuerkubantao mafic-ultramafic intrusion, in order to understand the early Paleozoic tectonic evolution of the West Junggar orogenic belt at the southern margin of the Central Asian orogenic belt. The Tuerkubantao mafic-ultramafic intrusion is a well-differentiated complex comprising peridotite, olivine pyroxenite, gabbro, and diorite. The ultramafic rocks are mostly seen in the central part of the intrusion and surrounded by mafic rocks. The Tuerkubantao intrusive rocks are characterized by enrichment of large ion lithophile elements and depleted high field strength elements relative to N-MORB. In addition, the Tuerkubantao intrusion displays relatively low Th/U and Nb/U (1.13–2.98 and 2.53–7.02, respectively and high La/Nb and Ba/Nb (1.15–4.19 and 37.7–79.82, respectively. These features indicate that the primary magma of the intrusion was derived from partial melting of a previously metasomatized mantle source in a subduction setting. The trace element patterns of peridotites, gabbros, and diorite in the Tuerkubantao intrusion have sub-parallel trends, suggesting that the different rock types are related to each other by differentiation of the same primary magma. The intrusive contact between peridotite and gabbro clearly suggest that the Tuerkubantao is not a fragment of an ophiolite. However, the Tuerkubantao intrusion displays many similarities with Alaskan-type mafic-ultramafic intrusions along major sutures of Phanerozoic orogenic belts. Common features include their geodynamic setting, internal lithological zoning, and geochemistry. The striking similarities indicate that the middle Devonian Tuerkubantao intrusion likely formed in a subduction-related setting similar to that of the Alaskan-type intrusions. In combination with the Devonian magmatism and porphyry mineralization, we propose that subduction of the oceanic slab has

  6. The assessment of human intrusion into underground repositories for radioactive waste Volume 1: Main report

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Asthon, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  7. Zooplankton communities in a large prealpine lake, Lake Constance: comparison between the Upper and the Lower Lake

    Directory of Open Access Journals (Sweden)

    Gerhard MAIER

    2005-08-01

    Full Text Available The zooplankton communities of two basins of a large lake, Lake Constance, were compared during the years 2002 and 2003. The two basins differ in morphology, physical and chemical conditions. The Upper Lake basin has a surface area of 470 km2, a mean depth of 100 and a maximum depth of 250 m; the Lower Lake basin has a surface area of 62 km2, a mean depth of only 13 and a maximum depth of 40 m. Nutrient, chlorophyll-a concentrations and mean temperatures are somewhat higher in the Lower than in the Upper Lake. Total abundance of rotifers (number per m2 lake surface was higher and rotifer development started earlier in the year in the Lower than in the Upper Lake. Total abundance of crustaceans was higher in the Upper Lake in the year 2002; in the year 2003 no difference in abundance could be detected between the lake basins, although in summer crustacean abundance was higher in the Lower than in the Upper Lake. Crustacean communities differed significantly between lake basins while there was no apparent difference in rotifer communities. In the Lower Lake small crustaceans, like Bosmina spp., Ceriodaphnia pulchella and Thermocyclops oithonoides prevailed. Abundance (number per m2 lake surface of predatory cladocerans, large daphnids and large copepods was much lower in the Lower than in the Upper Lake, in particular during the summer months. Ordination with nonmetric multidimensional scaling (NMS separated communities of both lakes along gradients that correlated with temperature and chlorophyll a concentration. Clutches of copepods were larger in the Lower than in the Upper Lake. No difference could be detected in clutch size of large daphnids between lake basins. Our results show that zooplankton communities in different basins of Lake Constance can be very different. They further suggest that the lack of large crustaceans in particular the lack of large predatory cladocerans in the Lower Lake can have negative effects on growth and

  8. EU-project AEROJET. Non-intrusive measurements of aircraft engine exhaust emissions

    Energy Technology Data Exchange (ETDEWEB)

    Schaefer, K.; Heland, J. [Fraunhofer-Inst. fuer Atmosphaerische Umweltforschung (IFU), Garmisch-Partenkirchen (Germany); Burrows, R. [Rolls-Royce Ltd. (United Kingdom). Engine Support Lab.; Bernard, M. [AUXITROL, S.A. (France). Aerospace Equipment Div.; Bishop, G. [British Aerospace (United Kingdom). Sowerby Research Centre; Lindermeir, E. [Deutsche Forschungsanstalt fuer Luft- und Raumfahrt e. V. (DLR), Bonn (Germany). Inst. fuer Optoelektronik; Lister, D.H. [Defence and Research Agency, Hants (United Kingdom). Propulsion and Development Dept.; Wiesen, P. [Bergische Univ. Wuppertal (Gesamthochshule) (Germany); Hilton, M. [University of Reading (United Kingdom). Dept. of Physics

    1997-12-31

    The main goal of the AEROJET programme is to demonstrate the equivalence of remote measurement techniques to conventional extractive methods for both gaseous and particulate measurements. The different remote measurement techniques are compared and calibrated. A demonstrator measurement system for exhaust gases, temperature and particulates including data-analysis software is regarded as result of this project. Non-intrusive measurements are the method of choice within the AEROJET project promising to avoid the disadvantages of the gas sampling techniques which are currently used. Different ground based non-intrusive measurement methods are demonstrated during a final evaluation phase. Several non-intrusive techniques are compared with conventional gas sampling and analysis techniques. (R.P.) 3 refs.

  9. EU-project AEROJET. Non-intrusive measurements of aircraft engine exhaust emissions

    Energy Technology Data Exchange (ETDEWEB)

    Schaefer, K; Heland, J [Fraunhofer-Inst. fuer Atmosphaerische Umweltforschung (IFU), Garmisch-Partenkirchen (Germany); Burrows, R [Rolls-Royce Ltd. (United Kingdom). Engine Support Lab.; Bernard, M [AUXITROL, S.A. (France). Aerospace Equipment Div.; Bishop, G [British Aerospace (United Kingdom). Sowerby Research Centre; Lindermeir, E [Deutsche Forschungsanstalt fuer Luft- und Raumfahrt e. V. (DLR), Bonn (Germany). Inst. fuer Optoelektronik; Lister, D H [Defence and Research Agency, Hants (United Kingdom). Propulsion and Development Dept.; Wiesen, P [Bergische Univ. Wuppertal (Gesamthochshule) (Germany); Hilton, M [University of Reading (United Kingdom). Dept. of Physics

    1998-12-31

    The main goal of the AEROJET programme is to demonstrate the equivalence of remote measurement techniques to conventional extractive methods for both gaseous and particulate measurements. The different remote measurement techniques are compared and calibrated. A demonstrator measurement system for exhaust gases, temperature and particulates including data-analysis software is regarded as result of this project. Non-intrusive measurements are the method of choice within the AEROJET project promising to avoid the disadvantages of the gas sampling techniques which are currently used. Different ground based non-intrusive measurement methods are demonstrated during a final evaluation phase. Several non-intrusive techniques are compared with conventional gas sampling and analysis techniques. (R.P.) 3 refs.

  10. Data Mining for Intrusion Detection

    Science.gov (United States)

    Singhal, Anoop; Jajodia, Sushil

    Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This chapter discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested.

  11. Lake trout rehabilitation in Lake Erie: a case history

    Science.gov (United States)

    Cornelius, Floyd C.; Muth, Kenneth M.; Kenyon, Roger

    1995-01-01

    Native lake trout (Salvelinus namaycush) once thrived in the deep waters of eastern Lake Erie. The impact of nearly 70 years of unregulated exploitation and over 100 years of progressively severe cultural eutrophication resulted in the elimination of lake trout stocks by 1950. Early attempts to restore lake trout by stocking were unsuccessful in establishing a self-sustaining population. In the early 1980s, New York's Department of Environmental Conservation, Pennsylvania's Fish and Boat Commission, and the U.S. Fish and Wildlife Service entered into a cooperative program to rehabilitate lake trout in the eastern basin of Lake Erie. After 11 years of stocking selected strains of lake trout in U.S. waters, followed by effective sea lamprey control, lake trout appear to be successfully recolonizing their native habitat. Adult stocks have built up significantly and are expanding their range in the lake. Preliminary investigations suggest that lake trout reproductive habitat is still adequate for natural reproduction, but natural recruitment has not been documented. Future assessments will be directed toward evaluation of spawning success and tracking age-class cohorts as they move through the fishery.

  12. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  13. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.

    Science.gov (United States)

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  14. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  15. Microbiology of Lonar Lake and other soda lakes

    Science.gov (United States)

    Paul Antony, Chakkiath; Kumaresan, Deepak; Hunger, Sindy; Drake, Harold L; Murrell, J Colin; Shouche, Yogesh S

    2013-01-01

    Soda lakes are saline and alkaline ecosystems that are believed to have existed throughout the geological record of Earth. They are widely distributed across the globe, but are highly abundant in terrestrial biomes such as deserts and steppes and in geologically interesting regions such as the East African Rift valley. The unusual geochemistry of these lakes supports the growth of an impressive array of microorganisms that are of ecological and economic importance. Haloalkaliphilic Bacteria and Archaea belonging to all major trophic groups have been described from many soda lakes, including lakes with exceptionally high levels of heavy metals. Lonar Lake is a soda lake that is centered at an unusual meteorite impact structure in the Deccan basalts in India and its key physicochemical and microbiological characteristics are highlighted in this article. The occurrence of diverse functional groups of microbes, such as methanogens, methanotrophs, phototrophs, denitrifiers, sulfur oxidizers, sulfate reducers and syntrophs in soda lakes, suggests that these habitats harbor complex microbial food webs that (a) interconnect various biological cycles via redox coupling and (b) impact on the production and consumption of greenhouse gases. Soda lake microorganisms harbor several biotechnologically relevant enzymes and biomolecules (for example, cellulases, amylases, ectoine) and there is the need to augment bioprospecting efforts in soda lake environments with new integrated approaches. Importantly, some saline and alkaline lake ecosystems around the world need to be protected from anthropogenic pressures that threaten their long-term existence. PMID:23178675

  16. Illness intrusiveness among survivors of autologous blood and marrow transplantation.

    Science.gov (United States)

    Schimmer, A D; Elliott, M E; Abbey, S E; Raiz, L; Keating, A; Beanlands, H J; McCay, E; Messner, H A; Lipton, J H; Devins, G M

    2001-12-15

    Illness-induced disruptions to lifestyles, activities, and interests (i.e., illness intrusiveness) compromise subjective well-being. The authors measured illness intrusiveness in autologous blood and bone marrow transplantation (ABMT) survivors and compared the results with survivors of solid organ transplants. Forty-four of 64 consecutive ABMT survivors referred to the University of Toronto ABMT long-term follow-up clinic completed the Illness Intrusiveness Ratings Scale (IIRS), the Affect Balance Scale (ABS), the Atkinson Life Happiness Rating (ATKLH), the Beck Hopelessness Scale (BHS), and the Center for Epidemiologic Studies Depression (CES-D) Scale. Mean time from ABMT to evaluation was 4.6 +/- 2.8 years. All patients were in remission or had stable disease at the time of evaluation. Autologous blood and bone marrow transplantation patients' IIRS scores were compared with scores reported by recipients of kidney (n = 357), liver (n = 150), lung (n = 77), and heart (n = 60) transplants. Mean IIRS score for the 44 ABMT patients was 37.2 +/- 17 (maximum possible score, 91; minimum possible score, 13). Higher IIRS scores correlated with lower scores on the ABS (r = -0.54; P work, financial situation, and active recreation. Despite achieving a remission after ABMT, patients continue to experience illness intrusiveness compromising subjective well-being. Copyright 2001 American Cancer Society.

  17. Strontium isotopic geochemistry of intrusive rocks, Puerto Rico, Greater Antilles

    International Nuclear Information System (INIS)

    Jones, L.M.; Kesler, S.E.

    1980-01-01

    The strontium isotope geochemistry is given for three Puerto Rican intrusive rocks: the granodioritic Morovis and San Lorenzo plutons and the Rio Blanco stock of quartz dioritic composition. The average calculated initial 87 Sr/ 86 Sr ratios are 0.70370, 0.70355 and 0.70408, respectively. In addition, the San Lorenzo data establish a whole-rock isochron of 71 +- 2 m.y., which agrees with the previously reported K-Ar age of 73 m.y. Similarity of most of the intrusive rocks in the Greater Antilles with respect to their strontium isotopic geochemistry regardless of their major element composition indicates that intrusive magmas with a wide range of composition can be derived from a single source material. The most likely source material, in view of the available isotopic data, is the mantle wedge overlying the subduction zone. (orig.)

  18. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  19. Individual differences in spatial configuration learning predict the occurrence of intrusive memories.

    Science.gov (United States)

    Meyer, Thomas; Smeets, Tom; Giesbrecht, Timo; Quaedflieg, Conny W E M; Girardelli, Marta M; Mackay, Georgina R N; Merckelbach, Harald

    2013-03-01

    The dual-representation model of posttraumatic stress disorder (PTSD; Brewin, Gregory, Lipton, & Burgess, Psychological Review, 117, 210-232 2010) argues that intrusions occur when people fail to construct context-based representations during adverse experiences. The present study tested a specific prediction flowing from this model. In particular, we investigated whether the efficiency of temporal-lobe-based spatial configuration learning would account for individual differences in intrusive experiences and physiological reactivity in the laboratory. Participants (N = 82) completed the contextual cuing paradigm, which assesses spatial configuration learning that is believed to depend on associative encoding in the parahippocampus. They were then shown a trauma film. Afterward, startle responses were quantified during presentation of trauma reminder pictures versus unrelated neutral and emotional pictures. PTSD symptoms were recorded in the week following participation. Better configuration learning performance was associated with fewer perceptual intrusions, r = -.33, p .46) and had no direct effect on intrusion-related distress and overall PTSD symptoms, rs > -.12, ps > .29. However, configuration learning performance tended to be associated with reduced physiological responses to unrelated negative images, r = -.20, p = .07. Thus, while spatial configuration learning appears to be unrelated to affective responding to trauma reminders, our overall findings support the idea that the context-based memory system helps to reduce intrusions.

  20. Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

    OpenAIRE

    Jingyu Wang; xuefeng Zheng; Dengliang Luo

    2011-01-01

    Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources and reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. In order to address the problem of intrusion tolerance of cloud computing platform and sensitive data in...

  1. Formation of thick stratiform Fe-Ti oxide layers in layered intrusion and frequent replenishment of fractionated mafic magma: Evidence from the Panzhihua intrusion, SW China

    Science.gov (United States)

    Song, Xie-Yan; Qi, Hua-Wen; Hu, Rui-Zhong; Chen, Lie-Meng; Yu, Song-Yue; Zhang, Jia-Fei

    2013-03-01

    Panzhihua intrusion is one of the largest layered intrusions that hosts huge stratiform Fe-Ti oxide layers in the central part of the Emeishan large igneous province, SW China. Up to 60 m thick stratiform massive Fe-Ti oxide layers containing 85 modal% of magnetite and ilmenite and overlying magnetite gabbro compose cyclic units of the Lower Zone of the intrusion. The cyclic units of the Middle Zone consist of magnetite gabbro and overlying gabbro. In these cyclic units, contents of Fe2O3(t), TiO2 and Cr and Fe3+/Ti4+ ratio of the rocks decrease upward, Cr content of magnetite and forsterite percentage of olivine decrease as well. The Upper Zone consists of apatite gabbro characterized by enrichment of incompatible elements (e.g., 12-18 ppm La, 20-28 ppm Y) and increasing of Fe3+/Ti4+ ratio (from 1.3 to 2.3) upward. These features indicate that the Panzhihua intrusion was repeatedly recharged by more primitive magma and evolved magmas had been extracted. Calculations using MELTS indicate that extensive fractionation of olivine and clinopyroxene in deep level resulted in increasing Fe and Ti contents in the magma. When these Fe-Ti-enriched magmas were emplaced along the base of the Panzhihua intrusion, Fe-Ti oxides became an early crystallization phase, leading to a residual magma of lower density. We propose that the unusually thick stratiform Fe-Ti oxide layers resulted from coupling of gravity settling and sorting of the crystallized Fe-Ti oxides from Fe-Ti-enriched magmas and frequent magma replenishment along the floor of the magma chamber.

  2. Intrusive Images in Psychological Disorders

    Science.gov (United States)

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  3. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    International Nuclear Information System (INIS)

    P. Bernot

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  4. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  5. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  6. Fracturing of doleritic intrusions and associated contact zones: Implications for fluid flow in volcanic basins

    Science.gov (United States)

    Senger, Kim; Buckley, Simon J.; Chevallier, Luc; Fagereng, Åke; Galland, Olivier; Kurz, Tobias H.; Ogata, Kei; Planke, Sverre; Tveranger, Jan

    2015-02-01

    Igneous intrusions act as both carriers and barriers to subsurface fluid flow and are therefore expected to significantly influence the distribution and migration of groundwater and hydrocarbons in volcanic basins. Given the low matrix permeability of igneous rocks, the effective permeability in- and around intrusions is intimately linked to the characteristics of their associated fracture networks. Natural fracturing is caused by numerous processes including magma cooling, thermal contraction, magma emplacement and mechanical disturbance of the host rock. Fracturing may be locally enhanced along intrusion-host rock interfaces, at dyke-sill junctions, or at the base of curving sills, thereby potentially enhancing permeability associated with these features. In order to improve our understanding of fractures associated with intrusive bodies emplaced in sedimentary host rocks, we have investigated a series of outcrops from the Karoo Basin of the Eastern Cape province of South Africa, where the siliciclastic Burgersdorp Formation has been intruded by various intrusions (thin dykes, mid-sized sheet intrusions and thick sills) belonging to the Karoo dolerite. We present a quantified analysis of fracturing in- and around these igneous intrusions based on five outcrops at three individual study sites, utilizing a combination of field data, high-resolution lidar virtual outcrop models and image processing. Our results show a significant difference between the three sites in terms of fracture orientation. The observed differences can be attributed to contrasting intrusion geometries, outcrop geometry (for lidar data) and tectonic setting. Two main fracture sets were identified in the dolerite at two of the sites, oriented parallel and perpendicular to the contact respectively. Fracture spacing was consistent between the three sites, and exhibits a higher degree of variation in the dolerites compared to the host rock. At one of the study sites, fracture frequency in the

  7. Holocene Lake-Level Fluctuations of Lake Aricota, Southern Peru

    Science.gov (United States)

    Placzek, Christa; Quade, Jay; Betancourt, Julio L.

    2001-09-01

    Lacustrine deposits exposed around Lake Aricota, Peru (17° 22‧S), a 7.5-km2 lake dammed by debris flows, provide a middle to late Holocene record of lake-level fluctuations. Chronological context for shoreline deposits was obtained from radiocarbon dating of vascular plant remains and other datable material with minimal 14C reservoir effects (<350 yr). Diatomites associated with highstands several meters above the modern lake level indicate wet episodes. Maximum Holocene lake level was attained before 6100 14C yr B.P. and ended ∼2700 14C yr B.P. Moderately high lake levels occurred at 1700 and 1300 14C yr B.P. The highstand at Lake Aricota during the middle Holocene is coeval with a major lowstand at Lake Titicaca (16°S), which is only 130 km to the northeast and shares a similar climatology. Comparisons with other marine and terrestrial records highlight emerging contradictions over the nature of mid-Holocene climate in the central Andes.

  8. Intrusive Images in Psychological Disorders

    OpenAIRE

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in th...

  9. Distribution of Natural Radioactivity and some Trace Elements in the Aquatic Ecosystem of Manzala Lake, Egypt

    International Nuclear Information System (INIS)

    Aly, A. I. M.; Eweida, E. A.; Hamed, M. A.

    2007-01-01

    The hydrochemical composition of Manzala lake water (average TDS = 2550 ppm) reflects the effects of several factors and recharge sources: drainage water discharge, waste water load, sea water intrusion, bathometry and evaporation rate. The concentrations of nitrate and phosphate acquire considerably high values, which indicate a high degree of pollution and eutrification. The results of the lake water analyses obtained by ICP-MS and ICP- AES, show that the concentrations of Sr, Al, Fe and P are higher than those of V, Cr, Mn, Co, Cu, Rb, Y, Zr, Mo, Ba, La, Ce, Eu, Ti, Pb, U and Zn (μ/L). In general, their concentrations increase toward the southeastern part of the lake according to the following descending order: Sr FePMn > BaV > Rb >Cu > Co > Pb > Mo. The chemical composition of the bottom sediments shows that Al, Mn, Sr, Ba and V (averages = 5.7 mg/g and 1124, 679, 290 and 121 ppm, respectively) have the highest concentrations, while U, Mo, Cs, Sb and Tl (averages = 4, 3, 0.79, 0.20 and 0.19 ppm, respectively) have the lowest concentrations. The concentrations of most determined elements increase toward the southeastern and northwestern parts of the lake. This may indicate the effect of the industrial, agricultural and domestic waste disposal through Bahr El Baqar drain at SE and Mohib drain at NW, in addition to the adsorption effect of clay-rich sediments of the lake. The average specific activities of 226 Ra ( 238 U series), 232 Th and 40 K in bottom sediments of the lake were 13.78, 12.53 and 217.74 Bq/kg, while the mean values of 40 K in surface and bottom waters were 0.96 and 0.95 Bq/L, respectively. The average specific activity of 137 Cs in bottom sediments was 4.39 Bq/kg. The obtained results show that the distribution coefficients (K d s) of most elements for bottom sediments of the lake were in the range of the recommended IAEA values, with the exception of some other values. This may be attributed to the influence of the different polluted waters

  10. The diversity of benthic mollusks of Lake Victoria and Lake Burigi ...

    African Journals Online (AJOL)

    Molluscan diversity, abundance and distribution in sediments of Lake Victoria and its satellite lake, Lake Burigi, were investigated. The survey was carried out in January and February 2002 for Lake Victoria and in March and April 2002 for Lake Burigi. Ten genera were recorded from four zones of Lake Victoria while only ...

  11. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    Science.gov (United States)

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation

    Directory of Open Access Journals (Sweden)

    Basant Subba

    2016-06-01

    Full Text Available Present Intrusion Detection Systems (IDSs for MANETs require continuous monitoring which leads to rapid depletion of a node's battery life. To address this issue, we propose a new IDS scheme comprising a novel cluster leader election process and a hybrid IDS. The cluster leader election process uses the Vickrey–Clarke–Groves mechanism to elect the cluster leader which provides the intrusion detection service. The hybrid IDS comprises a threshold based lightweight module and a powerful anomaly based heavyweight module. Initially, only the lightweight module is activated. The decision to activate the heavyweight module is taken by modeling the intrusion detection process as an incomplete information non-cooperative game between the elected leader node and the potential malicious node. Simulation results show that the proposed scheme significantly reduces the IDS traffic and overall power consumption in addition to maintaining a high detection rate and accuracy.

  13. Effective use of surface-water management to control saltwater intrusion

    Science.gov (United States)

    Hughes, J. D.; White, J.

    2012-12-01

    The Biscayne aquifer in southeast Florida is susceptible to saltwater intrusion and inundation from rising sea-level as a result of high groundwater withdrawal rates and low topographic relief. Groundwater levels in the Biscayne aquifer are managed by an extensive canal system that is designed to control flooding, supply recharge to municipal well fields, and control saltwater intrusion. We present results from an integrated surface-water/groundwater model of a portion of the Biscayne aquifer to evaluate the ability of the existing managed surface-water control network to control saltwater intrusion. Surface-water stage and flow are simulated using a hydrodynamic model that solves the diffusive-wave approximation of the depth-integrated shallow surface-water equations. Variable-density groundwater flow and fluid density are solved using the Oberbeck--Boussinesq approximation of the three-dimensional variable-density groundwater flow equation and a sharp interface approximation, respectively. The surface-water and variable-density groundwater domains are implicitly coupled during each Picard iteration. The Biscayne aquifer is discretized into a multi-layer model having a 500-m square horizontal grid spacing. All primary and secondary surface-water features in the active model domain are discretized into segments using the 500-m square horizontal grid. A 15-year period of time is simulated and the model includes 66 operable surface-water control structures, 127 municipal production wells, and spatially-distributed daily internal and external hydrologic stresses. Numerical results indicate that the existing surface-water system can be effectively used in many locations to control saltwater intrusion in the Biscayne aquifer resulting from increases in groundwater withdrawals or sea-level rise expected to occur over the next 25 years. In other locations, numerical results indicate surface-water control structures and/or operations may need to be modified to control

  14. Lake Morphometry for NHD Lakes in Great Lakes Region 4 HUC

    Data.gov (United States)

    U.S. Environmental Protection Agency — Lake morphometry metrics are known to influence productivity in lakes and are important for building various types of ecological and environmental models of lentic...

  15. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring.

    Science.gov (United States)

    Alcalá, José M; Ureña, Jesús; Hernández, Álvaro; Gualda, David

    2017-02-11

    The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN) are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs), which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN) prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM), is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people' demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented.

  16. A Simulation-Optimization Model for Seawater Intrusion Management at Pingtung Coastal Area, Taiwan

    Directory of Open Access Journals (Sweden)

    Po-Syun Huang

    2018-02-01

    Full Text Available The coastal regions of Pingtung Plain in southern Taiwan rely on groundwater as their main source of fresh water for aquaculture, agriculture, domestic, and industrial sectors. The availability of fresh groundwater is threatened by unsustainable groundwater extraction and the over-pumpage leads to the serious problem of seawater intrusion. It is desired to find appropriate management strategies to control groundwater salinity and mitigate seawater intrusion. In this study, a simulation–optimization model has been presented to solve the problem of seawater intrusion along the coastal aquifers in Pingtung Plain and the objective is using injection well barriers and minimizing the total injection rate based on the pre-determined locations of injection barriers. The SEAWAT code is used to simulate the process of seawater intrusion and the surrogate model of artificial neural networks (ANNs is used to approximate the seawater intrusion (SWI numerical model to increase the computational efficiency during the optimization process. The heuristic optimization scheme of differential evolution (DE algorithm is selected to identify the global optimal management solution. Two different management scenarios, one is the injection barriers located along the coast and the other is the injection barrier located at the inland, are considered and the optimized results show that the deployment of injection barriers at the inland is more effective to reduce total dissolved solids (TDS concentrations and mitigate seawater intrusion than that along the coast. The computational time can be reduced by more than 98% when using ANNs to replace the numerical model and the DE algorithm has been confirmed as a robust optimization scheme to solve groundwater management problems. The proposed framework can identify the most reliable management strategies and provide a reference tool for decision making with regard to seawater intrusion remediation.

  17. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  18. Respon Konsumen pada Mobile Advergames: Intrusiveness dan Irritation

    Directory of Open Access Journals (Sweden)

    Sony Kusumasondjaja

    2016-12-01

    Full Text Available Abstract. Increasing adoption of mobile advergames to deliver marketing messages has not been followed by empirical findings to support its effectiveness. This research attempts to examine the effect of mobile advergames intrusiveness on consumer irritation, attitudes, and purchase intention. This investigation on mobile advergame effectiveness was based on the increasing use of mobile media to deliver marketing messages to consumers from different demographic background. Conceptual framework was developed based on Advertising Avoidance Theory. For data collection, self-administered survey was conducted by adopting purposive sampling involving 213 respondents residing in Surabaya who have had experience in playing mobile game as respondents. Results indicate that intrusiveness positively affects consumer irritation. Consumer irritation negatively affects attitude towards the mobile advergames and attitude towards the advertised product. The better the consumer attitude towards the mobile advergames, the more positive the attitude towards the advertised product. Moreover, the more positive the attitude towards the advertised product, the greater the consumer intention to purchase. Interestingly, consumer attitude toward the mobile advergames has insignificant influence on purchase intention. Findings of the study offer significant contribution to marketing practices using mobile advergames as media placement in their advertising strategy. Keywords: intrusiveness, irritation, mobile advergames, attitude, advertising

  19. Last glacial megafaunal death assemblage and early human occupation at Lake Menindee, southeastern Australia

    Science.gov (United States)

    Cupper, Matthew L.; Duncan, Jacqui

    2006-09-01

    The Tedford subfossil locality at Lake Menindee preserves a diverse assemblage of marsupials, monotremes and placental rodents. Of the 38 mammal taxa recorded at the site, almost a third are of extinct megafauna. Some of the bones are articulated or semi-articulated and include almost complete skeletons, indicating that aeolian sediments rapidly buried the animals following death. New optical ages show the site dates to the early part of the last glacial (55,700 ± 1300 yr weighted mean age). This is close to the 51,200-39,800 yr Australia-wide extinction age for megafauna suggested by Roberts et al. [2001, Science 292:1888-1892], but like all previous researchers, we cannot conclusively determine whether humans were implicated in the deaths of the animals. Although an intrusive hearth at the site dating to 45,100 ± 1400 yr ago is the oldest evidence of human occupation of the Darling River, no artifacts were identified in situ within the sub-fossil-bearing unit. Non-anthropogenic causes, such as natural senescence or ecosystem stress due to climatic aridity, probably explain the mortality of the faunal assemblage at Lake Menindee.

  20. Spatial and temporal genetic diversity of lake whitefish (Coregonus clupeaformis (Mitchill)) from Lake Huron and Lake Erie

    Science.gov (United States)

    Stott, Wendylee; Ebener, Mark P.; Mohr, Lloyd; Hartman, Travis; Johnson, Jim; Roseman, Edward F.

    2013-01-01

    Lake whitefish (Coregonus clupeaformis (Mitchill)) are important commercially, culturally, and ecologically in the Laurentian Great Lakes. Stocks of lake whitefish in the Great Lakes have recovered from low levels of abundance in the 1960s. Reductions in abundance, loss of habitat and environmental degradation can be accompanied by losses of genetic diversity and overall fitness that may persist even as populations recover demographically. Therefore, it is important to be able to identify stocks that have reduced levels of genetic diversity. In this study, we investigated patterns of genetic diversity at microsatellite DNA loci in lake whitefish collected between 1927 and 1929 (historical period) and between 1997 and 2005 (contemporary period) from Lake Huron and Lake Erie. Genetic analysis of lake whitefish from Lakes Huron and Erie shows that the amount of population structuring varies from lake to lake. Greater genetic divergences among collections from Lake Huron may be the result of sampling scale, migration patterns and demographic processes. Fluctuations in abundance of lake whitefish populations may have resulted in periods of increased genetic drift that have resulted in changes in allele frequencies over time, but periodic genetic drift was not severe enough to result in a significant loss of genetic diversity. Migration among stocks may have decreased levels of genetic differentiation while not completely obscuring stock boundaries. Recent changes in spatial boundaries to stocks, the number of stocks and life history characteristics of stocks further demonstrate the potential of coregonids for a swift and varied response to environmental change and emphasise the importance of incorporating both spatial and temporal considerations into management plans to ensure that diversity is preserved.

  1. The effect of destination linked feature selection in real-time network intrusion detection

    CSIR Research Space (South Africa)

    Mzila, P

    2013-07-01

    Full Text Available techniques in the network intrusion detection system (NIDS) is the feature selection technique. The ability of NIDS to accurately identify intrusion from the network traffic relies heavily on feature selection, which describes the pattern of the network...

  2. Smart container UWB sensor system for situational awareness of intrusion alarms

    Science.gov (United States)

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.; Leach, Jr., Richard R.; Vigars, Mark L.

    2013-06-11

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability may also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system

  3. Seasonal variations in water quality of an oxbow lake in response to multiple short-time pulses of flooding (Jataí Ecological Station--Mogi-Guaçu River, Luiz Antonio, SP-Brazil).

    Science.gov (United States)

    Krusche, A V; Mozeto, A A

    1999-01-01

    Mogi-Guaçu River is a six-order floodplain river in the upper Paraná River Basin, Southern Brazil. Its yearly discharge varies from a minimum of 100 m3.s-1 to a maximum of 600 m3.s-1. Diogo Lake is a shallow lake located at its floodplain within the Jataí Ecological Station (Luiz Antonio, São Paulo State) and is connected throughout the year to the river through a narrow and shallow channel. The main finding of this study is that the river hidrology controls the annual variations in lake hydrochemistry through a series of hydraulic effects related to oscillations in river discharge. Lake water quality is a resultant of differential contribution from local and regional watersheds. During the low water period, lake water quality is determined by inputs from Cafundó Creek, which drains the local watershed into the lake. Raising the river level during the rain season results in the damming of lake and culminates with the entrance of river waters into the plain. The geochemistry of waters in this system is determined by weathering of sandstones with basalt intrusions. Waters are acidic (river pH = 6.00 to 7.02 and stream-lake pH = 5.15 to 6.7) and dominant cations are Na+ and K+. Major anions are almost exclusively represented by bicarbonate and an unknown concentration of organic acid anions. The overall ionic load of these soft waters in the system is therefore very low.

  4. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    Science.gov (United States)

    Ganapathy, S.; Yogesh, P.; Kannan, A.

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. PMID:23056036

  5. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    Science.gov (United States)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  6. Energy density of lake whitefish Coregonus clupeaformis in Lakes Huron and Michigan

    Science.gov (United States)

    Pothoven, S.A.; Nalepa, T.F.; Madenjian, C.P.; Rediske, R.R.; Schneeberger, P.J.; He, J.X.

    2006-01-01

    We collected lake whitefish Coregonus clupeaformis off Alpena and Tawas City, Michigan, USA in Lake Huron and off Muskegon, Michigan USA in Lake Michigan during 2002–2004. We determined energy density and percent dry weight for lake whitefish from both lakes and lipid content for Lake Michigan fish. Energy density increased with increasing fish weight up to 800 g, and then remained relatively constant with further increases in fish weight. Energy density, adjusted for weight, was lower in Lake Huron than in Lake Michigan for both small (≤800 g) and large fish (>800 g). Energy density did not differ seasonally for small or large lake whitefish or between adult male and female fish. Energy density was strongly correlated with percent dry weight and percent lipid content. Based on data from commercially caught lake whitefish, body condition was lower in Lake Huron than Lake Michigan during 1981–2003, indicating that the dissimilarity in body condition between the lakes could be long standing. Energy density and lipid content in 2002–2004 in Lake Michigan were lower than data for comparable sized fish collected in 1969–1971. Differences in energy density between lakes were attributed to variation in diet and prey energy content as well as factors that affect feeding rates such as lake whitefish density and prey abundance.

  7. Time to face it! Facebook intrusion and the implications for romantic jealousy and relationship satisfaction.

    Science.gov (United States)

    Elphinston, Rachel A; Noller, Patricia

    2011-11-01

    Young people's exposure to social network sites such as Facebook is increasing, along with the potential for such use to complicate romantic relationships. Yet, little is known about the overlaps between the online and offline worlds. We extended previous research by investigating the links between Facebook intrusion, jealousy in romantic relationships, and relationship outcomes in a sample of undergraduates currently in a romantic relationship. A Facebook Intrusion Questionnaire was developed based on key features of technological (behavioral) addictions. An eight-item Facebook Intrusion Questionnaire with a single-factor structure was supported; internal consistency was high. Facebook intrusion was linked to relationship dissatisfaction, via jealous cognitions and surveillance behaviors. The results highlight the possibility of high levels of Facebook intrusion spilling over into romantic relationships, resulting in problems such as jealousy and dissatisfaction. The results have implications for romantic relationships and for Facebook users in general.

  8. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  9. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  10. Effects of lake trout refuges on lake whitefish and cisco in the Apostle Islands Region of Lake Superior

    Science.gov (United States)

    Zuccarino-Crowe , Chiara M.; Taylor, William W.; Hansen, Michael J.; Seider, Michael J.; Krueger, Charles C.

    2016-01-01

    Lake trout refuges in the Apostle Islands region of Lake Superior are analogous to the concept of marine protected areas. These refuges, established specifically for lake trout (Salvelinus namaycush) and closed to most forms of recreational and commercial fishing, were implicated as one of several management actions leading to successful rehabilitation of Lake Superior lake trout. To investigate the potential significance of Gull Island Shoal and Devils Island Shoal refuges for populations of not only lake trout but also other fish species, relative abundances of lake trout, lake whitefish (Coregonus clupeaformis), and cisco (Coregonus artedi) were compared between areas sampled inside versus outside of refuge boundaries. During 1982–2010, lake trout relative abundance was higher and increased faster inside the refuges, where lake trout fishing was prohibited, than outside the refuges. Over the same period, lake whitefish relative abundance increased faster inside than outside the refuges. Both evaluations provided clear evidence that refuges protected these species. In contrast, trends in relative abundance of cisco, a prey item of lake trout, did not differ significantly between areas inside and outside the refuges. This result did not suggest indirect or cascading refuge effects due to changes in predator levels. Overall, this study highlights the potential of species-specific refuges to benefit other fish species beyond those that were the refuges' original target. Improved understanding of refuge effects on multiple species of Great Lakes fishes can be valuable for developing rationales for refuge establishment and predicting associated fish community-level effects.

  11. Maternal intrusiveness, family financial means, and anxiety across childhood in a large multiphase sample of community youth

    Science.gov (United States)

    Cooper-Vince, Christine E.; Pincus, Donna B.; Comer, Jonathan S.

    2013-01-01

    Intrusive parenting has been positively associated with child anxiety, although examinations of this relationship to date have been largely confined to middle to upper middle class families and have rarely used longitudinal designs. With several leading interventions for child anxiety emphasizing the reduction of parental intrusiveness, it is critical to determine whether the links between parental intrusiveness and child anxiety broadly apply to families of all financial means, and whether parental intrusiveness prospectively predicts the development of child anxiety. This study employed latent growth curve analysis to evaluate the interactive effects of maternal intrusiveness and financial means on the developmental trajectory of child anxiety from 1st grade to age 15 in 1,121 children (50.7% male) and their parents from the NICHD SECCYD. The overall model was found to provide good fit, revealing that early maternal intrusiveness and financial means did not impact individual trajectories of change in child anxiety, which were stable from 1st to 5th grade, and then decrease from 5th grade to age 15. Cross-sectional analyses also examined whether family financial means moderated contemporaneous relationships between maternal intrusiveness and child anxiety in 3rd and 5th grades. The relationship between maternal intrusiveness and child anxiety was moderated by family financial means for 1st graders, with stronger links found among children of lower family financial means, but not for 3rd and 5th graders. Neither maternal intrusiveness nor financial means in 1st grade predicted subsequent changes in anxiety across childhood. Findings help elucidate for whom and when maternal intrusiveness has the greatest link with child anxiety and can inform targeted treatment efforts. PMID:23929005

  12. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  13. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  14. Quartz-molybdenite veins in the Priestly Lake granodiorite, north-central Maine

    Science.gov (United States)

    Ayuso, Robert A.; Shank, Stephen G.

    1983-01-01

    Quartz-molybdenite veins up to 15 cm in width occur in fine to medium-grained porphyritic biotite-hornblende granodiorite at Priestly Lake north-central Maine. An area of about 150 m x 150 m contains quartz-molybdenite veins; a larger area is characterized by barren quartz veins. Quartz-molybdenite veins are concentrated within the most felsic variants of the intrusion as suggested by lower mafic mineral contents. The pluton has a narrow range in SiO2 (67-70 wt.%), major oxides, and in trace-element compositions. Molybdenite occurs as coarse grained clusters in pockets within the quartz veins, and fills fractures in the quartz veins and host rocks. Disseminated molybdenite in the granodiorite is relatively rare and occurs only in the area characterized by a high density of quartz veins (up to 50 veins per square meter). Alteration envelopes along the quartz veins are very thin or absent, although in some areas the granodiorite appears to be selectively and pervasively altered. Sericite, chlorite, epidote, calcite, pyrite, and quartz are concentrated near the quartz-molybdenite veins. Many of the field and geochemical characteristics of the Priestly Lake pluton are unlike those of major molybdenum-producing areas (Climax, Henderson, Urad). For example, the area of alteration seems to be of limited extent, the host rock is not intensely altered hydrothermally at the surface, the density of fractures is rather low in the mineralized area, and the amount of disseminated molybdenite appears to be small. However, the Priestly Lake pluton may be a small fraction of a concealed batholith as suggested by geophysical data. It is conceivable that the type of mineralization at the surface might be the expression of more extensive molybdenite mineralization at depth. The quartz-molybdenite veins in the Priestly Lake pluton are significant because they indicate that potential molybdenum sources for producing mineralized granites were available at depth. Future studies should be

  15. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  16. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  17. On emulation-based network intrusion detection systems

    NARCIS (Netherlands)

    Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; Etalle, S.; Stavrou, A.; Bos, H.; Portokalidis, G.

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity.

  18. Pre-Stressor Interference Control and Intrusive Memories

    NARCIS (Netherlands)

    Verwoerd, J.; Wessel, I.; De Jong, P.J.; Nieuwenhuis, Maurice; Huntjens, R.J.C.

    Although intrusive imagery is a common response in the aftermath of a stressful or traumatic event, only a minority of trauma victims show persistent re-experiencing and related psychopathology. Individual differences in pre-trauma executive control possibly play a critical role. Therefore, this

  19. How Intrusion Detection Can Improve Software Decoy Applications

    National Research Council Canada - National Science Library

    Monteiro, Valter

    2003-01-01

    This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack...

  20. Hazards of volcanic lakes: analysis of Lakes Quilotoa and Cuicocha, Ecuador

    Directory of Open Access Journals (Sweden)

    G. Gunkel

    2008-01-01

    Full Text Available Volcanic lakes within calderas should be viewed as high-risk systems, and an intensive lake monitoring must be carried out to evaluate the hazard of potential limnic or phreatic-magmatic eruptions. In Ecuador, two caldera lakesLakes Quilotoa and Cuicocha, located in the high Andean region >3000 a.s.l. – have been the focus of these investigations. Both volcanoes are geologically young or historically active, and have formed large and deep calderas with lakes of 2 to 3 km in diameter, and 248 and 148 m in depth, respectively. In both lakes, visible gas emissions of CO2 occur, and an accumulation of CO2 in the deep water body must be taken into account.

    Investigations were carried out to evaluate the hazards of these volcanic lakes, and in Lake Cuicocha intensive monitoring was carried out for the evaluation of possible renewed volcanic activities. At Lake Quilotoa, a limnic eruption and diffuse CO2 degassing at the lake surface are to be expected, while at Lake Cuicocha, an increased risk of a phreatic-magmatic eruption exists.

  1. Perceptual processing during trauma, priming and the development of intrusive memories

    Science.gov (United States)

    Sündermann, Oliver; Hauschildt, Marit; Ehlers, Anke

    2013-01-01

    Background Intrusive reexperiencing in posttraumatic stress disorder (PTSD) is commonly triggered by stimuli with perceptual similarity to those present during the trauma. Information processing theories suggest that perceptual processing during the trauma and enhanced perceptual priming contribute to the easy triggering of intrusive memories by these cues. Methods Healthy volunteers (N = 51) watched neutral and trauma picture stories on a computer screen. Neutral objects that were unrelated to the content of the stories briefly appeared in the interval between the pictures. Dissociation and data-driven processing (as indicators of perceptual processing) and state anxiety during the stories were assessed with self-report questionnaires. After filler tasks, participants completed a blurred object identification task to assess priming and a recognition memory task. Intrusive memories were assessed with telephone interviews 2 weeks and 3 months later. Results Neutral objects were more strongly primed if they occurred in the context of trauma stories than if they occurred during neutral stories, although the effect size was only moderate (ηp2=.08) and only significant when trauma stories were presented first. Regardless of story order, enhanced perceptual priming predicted intrusive memories at 2-week follow-up (N = 51), but not at 3 months (n = 40). Data-driven processing, dissociation and anxiety increases during the trauma stories also predicted intrusive memories. Enhanced perceptual priming and data-driven processing were associated with lower verbal intelligence. Limitations It is unclear to what extent these findings generalize to real-life traumatic events and whether they are specific to negative emotional events. Conclusions The results provide some support for the role of perceptual processing and perceptual priming in reexperiencing symptoms. PMID:23207970

  2. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring

    Directory of Open Access Journals (Sweden)

    José M. Alcalá

    2017-02-01

    Full Text Available The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs, which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM, is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people’ demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented.

  3. Internet use, Facebook intrusion, and depression: Results of a cross-sectional study.

    Science.gov (United States)

    Błachnio, A; Przepiórka, A; Pantic, I

    2015-09-01

    Facebook has become a very popular social networking platform today, particularly among adolescents and young adults, profoundly changing the way they communicate and interact. However, some reports have indicated that excessive Facebook use might have detrimental effects on mental health and be associated with certain psychological problems. Because previous findings on the relationship between Facebook addiction and depression were not unambiguous, further investigation was required. The main objective of our study was to examine the potential associations between Internet use, depression, and Facebook intrusion. A total of 672 Facebook users took part in the cross-sectional study. The Facebook Intrusion Questionnaire and the Center for Epidemiologic Studies Depression Scale were used. For collecting the data, the snowball sampling procedure was used. We showed that depression can be a predictor of Facebook intrusion. Our results provides additional evidence that daily Internet use time in minutes, gender, and age are also predictors of Facebook intrusion: that Facebook intrusion can be predicted by being male, young age, and an extensive number of minutes spent online. On the basis of this study, it is possible to conclude that there are certain demographic - variables, such as age, gender, or time spent online - that may help in outlining the profile of a user who may be in danger of becoming addicted to Facebook. This piece of knowledge may serve for prevention purposes. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  4. Geohydrologic reconnaissance of Lake Mead National Recreation Area; Las Vegas Wash to Opal Mountain, Nevada

    Science.gov (United States)

    Laney, R.L.

    1981-01-01

    The study is a geohydrologic reconnaissance of about 170 square miles in the Lake Mead National Recreation Area from Las Vegas Wash to Opal Mountain, Nevada. The study is one of a series that describes the geohydrology of the recreation area and that indentifies areas where water supplies can be developed. Precipitation in this arid area is about 5 inches per year. Streamflow is seasonal and extremely variable except for that in the Colorado River, which adjoins the area. Pan evaporation is more than 20 times greater than precipitation; therefore, regional ground-water supplies are meager except near the Colorado River, Lake Mead, and Lake Mohave. Large ground-water supplies can be developed near the river and lakes, and much smaller supplies may be obtained in a few favorable locations farther from the river and lakes. Ground water in most of the areas probably contains more than 1,000 milligrams per liter of dissolved solids, but water that contains less than 1,000 milligrams per liter of dissolved solids can be obtained within about 1 mile of the lakes. Crystalline rocks of metamorphic, intrusive and volcanic origin crop out in the area. These rocks are overlain by conglomerate and mudstone of the Muddy Creek Formation, gravel and conglomerate of the older alluvium, and sand and gravel of the Chemehuevi Formation and younger alluvium. The crystalline rocks, where sufficiently fractured, yield water to springs and would yield small amounts of water to favorably located wells. The poorly cemented and more permeable beds of the older alluvium, Chemehuevi Formation, and younger alluvium are the better potential aquifers, particularly along the Colorado River and Lakes Mead and Mohave. Thermal springs in the gorge of the Colorado River south of Hoover Dam discharge at least 2,580 acre-feet per year of water from the volcanic rocks and metamorphic and plutonic rocks. The discharge is much greater than could be infiltrated in the drainage basin above the springs

  5. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  6. Context-aware local Intrusion Detection in SCADA systems : a testbed and two showcases

    NARCIS (Netherlands)

    Chromik, Justyna Joanna; Haverkort, Boudewijn R.H.M.; Remke, Anne Katharina Ingrid; Pilch, Carina; Brackmann, Pascal; Duhme, Christof; Everinghoff, Franziska; Giberlein, Artur; Teodorowicz, Thomas; Wieland, Julian

    2017-01-01

    This paper illustrates the use of a testbed that we have developed for context-aware local intrusion detection. This testbed is based on the co-simulation framework Mosaik and allows for the validation of local intrusion detection mechanisms at field stations in power distribution networks. For two

  7. THE GEOMORPHOLOGIC FEATURES OF INTRUSIVE MAGMATIC STRUCTURES FROM BÂRGĂU MOUNTAINS (EASTERN CARPATHIANS, ROMANIA

    Directory of Open Access Journals (Sweden)

    Ioan Bâca

    2016-08-01

    Full Text Available Igneous intrusive structures from Bârgău Mountains belong to the group of central Neogene volcanic chain of the Eastern Carpathians of Romania. The evolution of the relief developed on these structures are three main stages: the stage of injection of structures (Pannonian, the stage of uncovering of igneous intrusive bodies from Oligo-Miocene sedimentary cover (Pliocene, and the stage of subaerial modeling of magmatic bodies (Pliocene-current.In those circumstances, the geodiversity of intrusive magmatic structures from Bârgău Mountains is represented by several types of landforms such as: polycyclic landforms (erosional levels, structural landforms (the configuration of igneous intrusive structures, petrographic landforms (andesites, lithological contact, fluvial landforms (valleys, slopes, ridges, periglacial landforms (cryogenic and crionival landforms, biogenic and anthropogenic landforms. This study highlights certain features of the landforms modeled on igneous intrusive bodies with the aim of developing some strategy for tourism recovery by local and county authorities.

  8. Geophysics and geochemistry techniques in seawater intrusion monitoring and mapping at Kerpan, Kedah

    International Nuclear Information System (INIS)

    Bashillah Baharuddin; Nazrul Hizam Yusoff; Abdul Rahim Samsudin

    2002-01-01

    Lately, groundwater contamination has become a public concern. Seawater intrusion is not a new issue, and only it started to magnetize attention from lots of parties since at also a contributor to groundwater contamination. Therefore a study about seawater intrusion is carried out and the selected area is Kerpan, Kedah. This information is useful particularly in agriculture because any contamination that cause by chlorine (seawater) intrusion can affect crops production. For Kerpan Project, two modernized electric resistivity survey instruments, the Terrameter SAS 4000 and SAS 300C are used which provide image profiles. This profiles have the capability to access a comprehensive geological interpretation by examine subsurface electric characteristics such as resistivity, permittivity and chargeability (John, 1997). At Kerpan, Kedah a study about salinity in canals was also carried out to monitor if there is any seawater intrusion that can get through the canals. The study was done since that the canals are directly to the sea. Instrument for this study is STD 12-plus. (Author)

  9. Intrusion recognition for optic fiber vibration sensor based on the selective attention mechanism

    Science.gov (United States)

    Xu, Haiyan; Xie, Yingjuan; Li, Min; Zhang, Zhuo; Zhang, Xuewu

    2017-11-01

    Distributed fiber-optic vibration sensors receive extensive investigation and play a significant role in the sensor panorama. A fiber optic perimeter detection system based on all-fiber interferometric sensor is proposed, through the back-end analysis, processing and intelligent identification, which can distinguish effects of different intrusion activities. In this paper, an intrusion recognition based on the auditory selective attention mechanism is proposed. Firstly, considering the time-frequency of vibration, the spectrogram is calculated. Secondly, imitating the selective attention mechanism, the color, direction and brightness map of the spectrogram is computed. Based on these maps, the feature matrix is formed after normalization. The system could recognize the intrusion activities occurred along the perimeter sensors. Experiment results show that the proposed method for the perimeter is able to differentiate intrusion signals from ambient noises. What's more, the recognition rate of the system is improved while deduced the false alarm rate, the approach is proved by large practical experiment and project.

  10. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    spatiotemporal relations to form complex events which model the intrusion patterns. ... Wireless sensor networks; complex event processing; event stream; ...... of the 2006 ACM SIGMOD International Conference on Management of Data, 407– ...

  11. Principles of lake sedimentology

    International Nuclear Information System (INIS)

    Janasson, L.

    1983-01-01

    This book presents a comprehensive outline on the basic sedimentological principles for lakes, and focuses on environmental aspects and matters related to lake management and control-on lake ecology rather than lake geology. This is a guide for those who plan, perform and evaluate lake sedimentological investigations. Contents abridged: Lake types and sediment types. Sedimentation in lakes and water dynamics. Lake bottom dynamics. Sediment dynamics and sediment age. Sediments in aquatic pollution control programmes. Subject index

  12. Changes in abundance and spatial distribution of geese molting near Teshekpuk Lake, Alaska: Interspecific competition or ecological change?

    Science.gov (United States)

    Flint, P.L.; Mallek, E.J.; King, R.J.; Schmutz, J.A.; Bollinger, K.S.; Derksen, D.V.

    2008-01-01

    Goose populations molting in the Teshekpuk Lake Special Area of the National Petroleum Reserve-Alaska have changed in size and distribution over the past 30 years. Black brant (Branta bernicla nigricans) are relatively stable in numbers but are shifting from large, inland lakes to salt marshes. Concurrently, populations of greater white-fronted geese (Anser albifrons frontalis) have increased seven fold. Populations of Canada geese (Branta canadensis and/or B. hutchinsii) are stable with little indication of distributional shifts. The lesser snow goose (Anser caerulescens caerulescens) population is proportionally small, but increasing rapidly. Coastline erosion of the Beaufort Sea has altered tundra habitats by allowing saltwater intrusion, which has resulted in shifts in composition of forage plant species. We propose two alternative hypotheses for the observed shift in black brant distribution. Ecological change may have altered optimal foraging habitats for molting birds, or alternatively, interspecific competition between black brant and greater white-fronted geese may be excluding black brant from preferred habitats. Regardless of the causative mechanism, the observed shifts in species distributions are an important consideration for future resource planning. ?? 2007 Springer-Verlag.

  13. Biological intrusion of low-level-waste trench covers

    Science.gov (United States)

    Hakonson, T. E.; Gladney, E. S.

    The long-term integrity of low-level waste shallow land burialsites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. The need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatment is demonstrated. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and sil overburden depth.

  14. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  15. Wave Induced Saline Intrusion in Sea Outfalls

    DEFF Research Database (Denmark)

    Larsen, Torben; Burrows, Richard

    1989-01-01

    Experimental and numerical studies have shown that the influence of wave increases the tendency of saline intrusion in multi-riser sea outfalls. The flow field in the diffusor under such unsteady and inhomogeneous circumstances is in general very complex, but when sufficient wave energy is dissip...

  16. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  17. Lake Afdera: a threatened saline lake in Ethiopia | Getahun | SINET ...

    African Journals Online (AJOL)

    Lake Afdera is a saline lake located in the Afar region, Northern Ethiopia. Because of its inaccessibility it is one of the least studied lakes of the country. It supports life including three species of fish of which two are endemic. Recently, reports are coming out that this lake is used for salt extraction. This paper gives some ...

  18. Full distributed fiber optical sensor for intrusion detection in application to buried pipelines

    Science.gov (United States)

    Gao, Jianzhong; Jiang, Zhuangde; Zhao, Yulong; Zhu, Li; Zhao, Guoxian

    2005-11-01

    Based on the microbend effect of optical fiber, a distributed sensor for real-time continuous monitoring of intrusion in application to buried pipelines is proposed. The sensing element is a long cable with a special structure made up of an elastic polymer wire, an optical fiber, and a metal wire. The damage point is located with an embedded optical time domain reflectometry (OTDR) instrument. The intrusion types can be indicated by the amplitude of output voltage. Experimental results show that the detection system can alarm adequately under abnormal load and can locate the intrusion point within 22.4 m for distance of 3.023 km.

  19. Distributed fiber optic moisture intrusion sensing system

    Science.gov (United States)

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  20. Multilayer Statistical Intrusion Detection in Wireless Networks

    Science.gov (United States)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  1. Medication Adherence using Non-intrusive Wearable Sensors

    Directory of Open Access Journals (Sweden)

    T. H. Lim

    2017-12-01

    Full Text Available Activity recognition approaches have been applied in home ambient systems to monitor the status and well- being of occupant especially for home care systems. With the advancement of embedded wireless sensing devices, various applications have been proposed to monitor user´s activities and maintain a healthy lifestyle. In this paper, we propose and evaluate a Smart Medication Alert and Treatment Electronic Systems (SmartMATES using a non-intrusive wearable activity recognition sensing system to monitor and alert an user for missing medication prescription. Two sensors are used to collect data from the accelerometer and radio transceiver. Based on the data collected, SmartMATES processes the data and generate a model for the various actions including taking medication. We have evaluated the SmartMATES on 9 participants. The results show that the SmartMATES can identify and prevent missing dosage in a less intrusive way than existing mobile application and traditional approaches.

  2. Nuclear waste disposal facility intrusion: an archeologist's perspective

    International Nuclear Information System (INIS)

    Virginia, C.; Christie, L.

    1981-01-01

    A scenario is presented for the intrusion of a shallow land burial site by archeologists from a future generation. A description is given for the potential widespread exposure and contamination of populations by recovered artifacts

  3. A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Wenchao Li

    2014-01-01

    abnormal nodes from normal nodes by observing their abnormal behaviors, and we analyse parameter selection and error rate of the intrusion detection system. The paper elaborates on the design and implementation of the detection system. This system has achieved efficient, rapid intrusion detection by improving the wireless ad hoc on-demand distance vector routing protocol (Ad hoc On-Demand Distance the Vector Routing, AODV. Finally, the test results show that: the system has high detection accuracy and speed, in accordance with the requirement of wireless sensor network intrusion detection.

  4. Gas flushing through hyper-acidic crater lakes: the next steps within a reframed monitoring time window

    Science.gov (United States)

    Rouwet, Dmitri

    2016-04-01

    Tracking variations in the chemical composition, water temperature and pH of brines from peak-activity crater lakes is the most obvious way to forecast phreatic activity. Volcano monitoring intrinsically implies a time window of observation that should be synchronised with the kinetics of magmatic processes, such as degassing and magma intrusion. To decipher "how much time ago" a variation in degassing regime actually occurred before eventually being detected in a crater lake is key, and depends on the lake water residence time. The above reasoning assumes that gas is preserved as anions in the lake water (SO4, Cl, F anions), in other words, that scrubbing of acid gases is complete and irreversible. Less is true. Recent work has confirmed, by direct MultiGas measurement from evaporative plumes, that even the strongest acid in liquid medium (i.e. SO2) degasses from hyper-acidic crater lakes. The less strong acid HCl has long been recognised as being more volatile than hydrophyle in extremely acidic solutions (pH near 0), through a long-term steady increase in SO4/Cl ratios in the vigorously evaporating crater lake of Poás volcano. We now know that acidic gases flush through hyper-acidic crater lake brines, but we don't know to which extend (completely or partially?), and with which speed. The chemical composition hence only reflects a transient phase of the gas flushing through the lake. In terms of volcanic surveillance this brings the advantage that the monitoring time window is definitely shorter than defined by the water chemistry, but yet, we do not know how much shorter. Empirical experiments by Capaccioni et al. (in press) have tried to tackle this kinetic problem for HCl degassing from a "lab-lake" on the short-term (2 days). With this state of the art in mind, two new monitoring strategies can be proposed to seek for precursory signals of phreatic eruptions from crater lakes: (1) Tracking variations in gas compositions, fluxes and ratios between species in

  5. Coplanar capacitance sensors for detecting water intrusion in composite structures

    International Nuclear Information System (INIS)

    Nassr, Amr A; El-Dakhakhni, Wael W; Ahmed, Wael H

    2008-01-01

    Composite materials are becoming more affordable and widely used for retrofitting, rehabilitating and repairing reinforced concrete structures designed and constructed under older specifications. However, the mechanical properties and long-term durability of composite materials may degrade severely in the presence of water intrusion. This study presents a new non-destructive evaluation (NDE) technique for detecting the water intrusion in composite structures by evaluating the dielectric properties of different composite system constituent materials. The variation in the dielectric signatures was employed to design a coplanar capacitance sensor with high sensitivity to detect such defects. An analytical model was used to study the effect of the sensor geometry on the output signal and to optimize sensor design. A finite element model was developed to validate analytical results and to evaluate other sensor design-related parameters. Experimental testing of a concrete specimen wrapped with composite laminate and containing a series of pre-induced water intrusion defects was conducted in order to validate the concept of the new technique. Experimental data showed excellent agreement with the finite element model predictions and confirmed sensor performance

  6. An Automata Based Intrusion Detection Method for Internet of Things

    Directory of Open Access Journals (Sweden)

    Yulong Fu

    2017-01-01

    Full Text Available Internet of Things (IoT transforms network communication to Machine-to-Machine (M2M basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.

  7. Water quality of Lake Austin and Town Lake, Austin, Texas

    Science.gov (United States)

    Andrews, Freeman L.; Wells, Frank C.; Shelby, Wanda J.; McPherson, Emma

    1988-01-01

    Lake Austin and Town Lake are located on the Colorado River in Travis County, central Texas, and serve as a source of water for municipal and industrial water supplies, electrical-power generation, and recreation for more than 500,000 people in the Austin metropolitan area. Lake Austin, located immediately downstream of Lake Travis, extends for more than 20 miles into the western edge of the city of Austin. Town Lake extends through the downtown area of the city of Austin for nearly 6 miles where the Colorado River is impounded by Longhorn Dam.

  8. Simulation of sea water intrusion in coastal aquifers

    Indian Academy of Sciences (India)

    dependent miscible flow and transport modelling approach for simulation of seawater intrusion in coastal aquifers. A nonlinear optimization-based simulation methodology was used in this study. Various steady state simulations are performed for a ...

  9. Evaluation of intrusion sensors and video assessment in areas of restricted passage

    International Nuclear Information System (INIS)

    Hoover, C.E.; Ringler, C.E.

    1996-04-01

    This report discusses an evaluation of intrusion sensors and video assessment in areas of restricted passage. The discussion focuses on applications of sensors and video assessment in suspended ceilings and air ducts. It also includes current and proposed requirements for intrusion detection and assessment. Detection and nuisance alarm characteristics of selected sensors as well as assessment capabilities of low-cost board cameras were included in the evaluation

  10. Root resorption after orthodontic intrusion and extrusion:.

    NARCIS (Netherlands)

    Han, G.; Huang, S.; Hoff, J.W. Von den; Zeng, X.; Kuijpers-Jagtman, A.M.

    2005-01-01

    The aim of this investigation was to compare root resorption in the same individual after application of continuous intrusive and extrusive forces. In nine patients (mean age 15.3 years), the maxillary first premolars were randomly intruded or extruded with a continuous force of 100 cN for eight

  11. Refuge Lake Reclassification in 620 Minnesota Cisco Lakes under Future Climate Scenarios

    Directory of Open Access Journals (Sweden)

    Liping Jiang

    2017-09-01

    Full Text Available Cisco (Coregonus artedi is the most common coldwater stenothermal fish in Minnesota lakes. Water temperature (T and dissolved oxygen (DO in lakes are important controls of fish growth and reproduction and likely change with future climate warming. Built upon a previous study, this study uses a modified method to identify which of 620 cisco lakes in Minnesota can still support cisco populations under future climate and therefore be classified as cisco refuge lakes. The previous study used oxythermal stress parameter TDO3, the temperature at DO of 3 mg/L, simulated only from deep virtual lakes to classify 620 cisco lakes. Using four categories of virtual but representative cisco lakes in modified method, a one-dimensional water quality model MINLAKE2012 was used to simulate daily T and DO profiles in 82 virtual lakes under the past (1961–2008 and two future climate scenarios. A multiyear average of 31-day largest TDO3 over variable benchmark (VB periods, AvgATDO3VB, was calculated from simulated T and DO profiles using FishHabitat2013. Contour plots of AvgATDO3VB for four categories of virtual lakes were then developed to reclassify 620 cisco lakes into Tier 1 (AvgATDO3VB < 11 °C or Tier 2 refuge lakes, and Tier 3 non-refuge lakes (AvgATDO3VB > 17 °C. About 20% of 620 cisco lakes are projected to be refuge lakes under future climate scenarios, which is a more accurate projection (improving the prediction accuracy by ~6.5% from the previous study since AvgATDO3VB was found to vary by lake categories.

  12. Externalizing symptoms, effortful control, and intrusive parenting: A test of bidirectional longitudinal relations during early childhood.

    Science.gov (United States)

    Eisenberg, Nancy; Taylor, Zoe E; Widaman, Keith F; Spinrad, Tracy L

    2015-11-01

    At approximately 30, 42, and 54 months of age (N = 231), the relations among children's externalizing symptoms, intrusive maternal parenting, and children's effortful control (EC) were examined. Both intrusive parenting and low EC have been related to psychopathology, but children's externalizing problems and low EC might affect the quality of parenting and one another. Mothers' intrusive behavior with their children was assessed with observations, children's EC was measured with mothers' and caregivers' reports, and children's externalizing symptoms were assessed with mothers', fathers', and caregivers' reports. In a structural equation panel model, bidirectional relations between intrusive parenting and EC were found: EC at 30 and 42 months predicted low levels of intrusive parenting a year later, controlling for prior levels of parenting and vice versa. Moreover, high levels of children's externalizing problems at both 30 and 42 months negatively predicted EC a year later, controlling for prior levels of EC. Although externalizing problems positively predicted high EC over time, this appeared to be a suppression effect because these variables had a strong negative pattern in the zero-order correlations. Moreover, when controlling for the stability of intrusive parenting, EC, and externalizing (all exhibited significant stability across time) and the aforementioned cross-lagged predictive paths, EC and externalizing problems were still negatively related within the 54-month assessment. The findings are consistent with the view that children's externalizing behavior undermines their EC and contributes to intrusive mothering and that relations between intrusive parenting and EC are bidirectional across time. Thus, interventions that focus on modifying children's externalizing problems (as well as the quality of parenting) might affect the quality of parenting they receive and, hence, subsequent problems with adjustment.

  13. Watershed vs. within-lake drivers of nitrogen: phosphorus dynamics in shallow lakes.

    Science.gov (United States)

    Ginger, Luke J; Zimmer, Kyle D; Herwig, Brian R; Hanson, Mark A; Hobbs, William O; Small, Gaston E; Cotner, James B

    2017-10-01

    Research on lake eutrophication often identifies variables affecting amounts of phosphorus (P) and nitrogen (N) in lakes, but understanding factors influencing N:P ratios is important given its influence on species composition and toxin production by cyanobacteria. We sampled 80 shallow lakes in Minnesota (USA) for three years to assess effects of watershed size, proportion of watershed as both row crop and natural area, fish biomass, and lake alternative state (turbid vs. clear) on total N : total P (TN : TP), ammonium, total dissolved phosphorus (TDP), and seston stoichiometry. We also examined N:P stoichiometry in 20 additional lakes that shifted states during the study. Last, we assessed the importance of denitrification by measuring denitrification rates in sediment cores from a subset of 34 lakes, and by measuring seston δ 15 N in four additional experimental lakes before and after they were experimentally manipulated from turbid to clear states. Results showed alternative state had the largest influence on overall N:P stoichiometry in these systems, as it had the strongest relationship with TN : TP, seston C:N:P, ammonium, and TDP. Turbid lakes had higher N at given levels of P than clear lakes, with TN and ammonium 2-fold and 1.4-fold higher in turbid lakes, respectively. In lakes that shifted states, TN was 3-fold higher in turbid lakes, while TP was only 2-fold higher, supporting the notion N is more responsive to state shifts than is P. Seston δ 15 N increased after lakes shifted to clear states, suggesting higher denitrification rates may be important for reducing N levels in clear states, and potential denitrification rates in sediment cores were among the highest recorded in the literature. Overall, our results indicate lake state was a primary driver of N:P dynamics in shallow lakes, and lakes in clear states had much lower N at a given level of P relative to turbid lakes, likely due to higher denitrification rates. Shallow lakes are often

  14. Changes in Rongbuk lake and Imja lake in the Everest region of Himalaya

    Science.gov (United States)

    Chen, W.; Doko, T.; Liu, C.; Ichinose, T.; Fukui, H.; Feng, Q.; Gou, P.

    2014-12-01

    The Himalaya holds the world record in terms of range and elevation. It is one of the most extensively glacierized regions in the world except the Polar Regions. The Himalaya is a region sensitive to climate change. Changes in the glacial regime are indicators of global climate changes. Since the second half of the last century, most Himalayan glaciers have melted due to climate change. These changes directly affected the changes of glacial lakes in the Himalayan region due to the glacier retreat. New glacial lakes are formed, and a number of them have expanded in the Everest region of the Himalayas. This paper focuses on the two glacial lakes which are Imja Lake, located at the southern slope, and Rongbuk Lake, located at the northern slope in the Mt. Everest region, Himalaya to present the spatio-temporal changes from 1976 to 2008. Topographical conditions between two lakes were different (Kruskal-Wallis test, p < 0.05). Rongbuk Lake was located at 623 m higher than Imja Lake, and radiation of Rongbuk Lake was higher than the Imja Lake. Although size of Imja Lake was larger than the Rongbuk Lake in 2008, the growth speed of Rongbuk Lake was accelerating since 2000 and exceeds Imja Lake in 2000-2008. This trend of expansion of Rongbuk Lake is anticipated to be continued in the 21st century. Rongbuk Lake would be the biggest potential risk of glacial lake outburst flood (GLOF) at the Everest region of Himalaya in the future.

  15. Multi-User Low Intrusive Occupancy Detection

    Directory of Open Access Journals (Sweden)

    Azkario Rizky Pratama

    2018-03-01

    Full Text Available Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS of BLE (Bluetooth Low Energy nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach.

  16. Geologic Mapping in Nogal Peak Quadrangle: Geochemistry, Intrusive Relations and Mineralization in the Sierra Blanca Igneous Complex, New Mexico

    Science.gov (United States)

    Goff, F.; Kelley, S. A.; Lawrence, J. R.; Cikowski, C. T.; Krier, D. J.; Goff, C. J.; McLemore, V. T.

    2011-12-01

    Nogal Peak quadrangle is located in the northern Sierra Blanca Igneous Complex (SBIC) and contains most of the White Mountain Wilderness (geologic map is available at http://geoinfo.nmt.edu/publications/maps/geologic/ofgm/details.cfml?Volume=134). The geology of the quad consists of a late Eocene to Oligocene volcanic pile (Sierra Blanca Volcanics, mostly alkali basalt to trachyte) intruded by a multitude of dikes, plugs and three stocks: Rialto, 31.4 Ma (mostly syenite), Three Rivers, ca. 29 to 27 Ma (quartz syenite intruded by subordinate alkali granite), and Bonito Lake, 26.6 Ma (mostly monzonite). Three Rivers stock is partially surrounded by alkali rhyolites that geochemically resemble the alkali granites. The circular shape of the stock and surrounding rhyolites suggests they form the root of a probable caldera. SBIC rocks have compositions typical of those found within the Rocky Mountain alkaline belt and those associated with continental rift zone magmatism. Because the volcanic host rocks are deeply eroded, intrusive relations with the stocks are well exposed. Most contacts at stock margins are near vertical. Roof pendants are common near some contacts and stoped blocks up to 700 m long are found within the Three Rivers stock. Contacts, pendants and stoped blocks generally display some combination of hornfelsing, brecciation, fracturing, faulting and mineralization. Sierra Blanca Volcanics display hydrothermal alteration increasing from argillic in the NW sector of the quad to high-temperature porpylitic near stock margins. Retrograde phyllic alteration occurs within breccia pipes and portions of the stocks. Mineral deposits consist of four types: Placer Au, fissure veins (mostly Ag-Pb-Zn±Au), breccia pipes (Au-Mo-Cu), and porphyry Mo-Cu. A singular pipe on the SW margin of Bonito Lake stock contains sapphire-lazulite-alunite. Although Au has been intermittently mined in the quad since 1865, best production of Au originated around the turn of the last

  17. Ant colony induced decision trees for intrusion detection

    CSIR Research Space (South Africa)

    Botes, FH

    2017-06-01

    Full Text Available platform. Intrusion Detection Systems (IDS) analyse network traffic to identify suspicious patterns with the intention to compromise the system. Practitioners train classifiers to classify the data within different categories e.g. malicious or normal...

  18. Lake-wide distribution of Dreissena in Lake Michigan, 1999

    Science.gov (United States)

    Fleischer, Guy W.; DeSorcie, Timothy J.; Holuszko, Jeffrey D.

    2001-01-01

    The Great Lakes Science Center has conducted lake-wide bottom trawl surveys of the fish community in Lake Michigan each fall since 1973. These systematic surveys are performed at depths of 9 to 110 m at each of seven index sites around Lake Michigan. Zebra mussel (Dreissena polymorpha) populations have expanded to all survey locations and at a level to sufficiently contribute to the bottom trawl catches. The quagga (Dreissena bugensis), recently reported in Lake Michigan, was likely in the catches though not recognized. Dreissena spp. biomass ranged from about 0.6 to 15 kg/ha at the various sites in 1999. Dreissenid mussels were found at depths of 9 to 82 m, with their peak biomass at 27 to 46 m. The colonization of these exotic mussels has ecological implications as well as potential ramifications on the ability to sample fish consistently and effectively with bottom trawls in Lake Michigan.

  19. Free to love? The role of intrusive parenting for young adult children's romantic relationship quality.

    Science.gov (United States)

    Parise, Miriam; Manzi, Claudia; Donato, Silvia; Iafrate, Raffaella

    2017-01-01

    Intrusive parenting is a form of boundary disturbance in the parent-child relationship which has been consistently associated with children's maladjustment. The present study examines the role of intrusive parenting for young adult children's romantic relationship quality. Relying on data from a two-wave longitudinal study among young couples in transition to marriage in Italy, we investigated the link between young adults' perceived intrusive parenting and change in their romantic relationship quality from 6 months before marriage to 18 months after marriage, as well as the mediating role of change in the capacity to include the partner in the self. Data were analyzed using actor-partner interdependence modeling. Perceived intrusive parenting negatively predicted change in inclusion of the other in the self and change in romantic relationship quality for both partners. For females, change in their capacity of inclusion of the other in the self fully mediated the association between their perceived intrusive parenting and change in their own and partner's relationship quality. Limitations and implications for practice are discussed.

  20. Evolution of Th and U whole-rock contents in the Ilimaussaq intrusion

    International Nuclear Information System (INIS)

    Bailey, J.C.; Rose-Hansen, J.; Soerensen, H.

    1981-01-01

    Thorium and uranium values of a large collction of representative samples taken from all rock types of the Ilimaussaq alkaline intrusion, South Greenland, are presented. The values are largely obtained by laboratory gamma-ray spectrometric (GRS) analysis. The results are discussed in relation to current knowledge and ideas on the petrologic evolution of the Ilimaussaq intrusion. It is concluded that (1) Rocks from the Ilimaussaq alkaline intrusion evolve to extremely high Th and U contents; (2) The evolution is characterised by appearance of low-Th/U cumulates due to the appearance of low-Th/U eudialyte as a liquidus phase; (3) Fractionation of the observed cumulus assemblages fails to explain all features of the Th-U evolution; (4) Losses of mobile fluids, rich in Th/U, occur in the final stages. (BP)

  1. Active Low Intrusion Hybrid Monitor for Wireless Sensor Networks.

    Science.gov (United States)

    Navia, Marlon; Campelo, Jose C; Bonastre, Alberto; Ors, Rafael; Capella, Juan V; Serrano, Juan J

    2015-09-18

    Several systems have been proposed to monitor wireless sensor networks (WSN). These systems may be active (causing a high degree of intrusion) or passive (low observability inside the nodes). This paper presents the implementation of an active hybrid (hardware and software) monitor with low intrusion. It is based on the addition to the sensor node of a monitor node (hardware part) which, through a standard interface, is able to receive the monitoring information sent by a piece of software executed in the sensor node. The intrusion on time, code, and energy caused in the sensor nodes by the monitor is evaluated as a function of data size and the interface used. Then different interfaces, commonly available in sensor nodes, are evaluated: serial transmission (USART), serial peripheral interface (SPI), and parallel. The proposed hybrid monitor provides highly detailed information, barely disturbed by the measurement tool (interference), about the behavior of the WSN that may be used to evaluate many properties such as performance, dependability, security, etc. Monitor nodes are self-powered and may be removed after the monitoring campaign to be reused in other campaigns and/or WSNs. No other hardware-independent monitoring platforms with such low interference have been found in the literature.

  2. Large Lakes Dominate CO2 Evasion From Lakes in an Arctic Catchment

    Science.gov (United States)

    Rocher-Ros, Gerard; Giesler, Reiner; Lundin, Erik; Salimi, Shokoufeh; Jonsson, Anders; Karlsson, Jan

    2017-12-01

    CO2 evasion from freshwater lakes is an important component of the carbon cycle. However, the relative contribution from different lake sizes may vary, since several parameters underlying CO2 flux are size dependent. Here we estimated the annual lake CO2 evasion from a catchment in northern Sweden encompassing about 30,000 differently sized lakes. We show that areal CO2 fluxes decreased rapidly with lake size, but this was counteracted by the greater overall coverage of larger lakes. As a result, total efflux increased with lake size and the single largest lake in the catchment dominated the CO2 evasion (53% of all CO2 evaded). By contrast, the contribution from the smallest ponds (about 27,000) was minor (evasion at the landscape scale.

  3. A model for the dynamics of crater-centered intrusion: Application to lunar floor-fractured craters

    Science.gov (United States)

    Thorey, Clément; Michaut, Chloé

    2014-01-01

    Lunar floor-fractured craters are a class of craters modified by post-impact mechanisms. They are defined by distinctive shallow floors that are convex or plate-like, sometimes with a wide floor moat bordering the wall region. Radial, concentric, and polygonal floor fractures suggest an endogenous process of modification. Two mechanisms have been proposed to account for such deformations: viscous relaxation and spreading of a magma intrusion at depth below the crater. To test the second assumption and bring more constraints on the intrusion process, we develop a model for the dynamics of magma spreading below an elastic overlying layer with a crater-like topography. As predicted in earlier more qualitative studies, the increase in lithostatic pressure at the crater wall zone prevents the intrusion from spreading laterally, leading to the thickening of the intrusion. Additionally, our model shows that the final crater floor appearance after the uplift, which can be convex or flat, with or without a circular moat bordering the wall zone, depends on the elastic thickness of the layer overlying the intrusion and on the crater size. Our model provides a simple formula to derive the elastic thickness of the overlying layer hence a minimum estimate for the intrusion depth. Finally, our model suggests that crust redistribution by cratering must have controlled magma ascent below most of these craters.

  4. Lake Michigan lake trout PCB model forecast post audit

    Science.gov (United States)

    Scenario forecasts for total PCBs in Lake Michigan (LM) lake trout were conducted using the linked LM2-Toxics and LM Food Chain models, supported by a suite of additional LM models. Efforts were conducted under the Lake Michigan Mass Balance Study and the post audit represents th...

  5. Biological intrusion of low-level-waste trench covers

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Gladney, E.S.

    1981-01-01

    The long-term integrity of low-level waste shallow land burial sites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. Past research on low-level waste shallow land burial methods has emphasized physical (i.e., water infiltration, soil erosion) and chemical (radionuclide leaching) processes that can cause waste site failure and subsequent radionuclide transport. The purpose of this paper is to demonstrate the need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatments. Plants and animals not only can transport radionuclides to the ground surface via root systems and soil excavated from the cover profile by animal burrowing activities, but they modify physical and chemical processes within the cover profile by changing the water infiltration rates, soil erosion rates and chemical composition of the soil. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and soil overburden depth. The rate of biological intrusion through the various barrier materials is being evaluated through the use of activatable stable tracers

  6. Intrusive images and voluntary memory for affective pictures: contextualization and dual-task interference.

    Science.gov (United States)

    Krans, Julie; Langner, Oliver; Reinecke, Andrea; Pearson, David G

    2013-12-01

    The present study addressed the role of context information and dual-task interference during the encoding of negative pictures on intrusion development and voluntary recall. Healthy participants were shown negative pictures with or without context information. Pictures were either viewed alone or concurrently with a visuospatial or verbal task. Participants reported their intrusive images of the pictures in a diary. At follow-up, perceptual and contextual memory was tested. Participants in the context group reported more intrusive images and perceptual voluntary memory than participants in the no context group. No effects of the concurrent tasks were found on intrusive image frequency, but perceptual and contextual memory was affected according to the cognitive load of the task. The analogue method cannot be generalized to real-life trauma and the secondary tasks may differ in cognitive load. The findings challenge a dual memory model of PTSD but support an account in which retrieval strategy, rather than encoding processes, accounts for the experience of involuntary versus voluntary recall. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. QOS and Control-Theoretic Techniques for Intrusion Tolerance

    National Research Council Canada - National Science Library

    Ye, Nong

    2004-01-01

    ...), even in the face of intrusions. This report examines two host-based resources, a router and a web server, and presents simulated models of modifications that can be made to these resources to make them QoS-capable...

  8. Innovative methods to reduce salt water intrusion in harbours

    Science.gov (United States)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  9. The role of pegmatites and acid fluids for REE/HFSE mobilization in the Strange Lake peralkaline granitic pluton, Canada

    Science.gov (United States)

    Gysi, A. P.; Williams-Jones, A.

    2012-12-01

    The Strange Lake pluton in Canada is a mid-Proterozoic peralkaline granitic intrusion that is host to a world-class rare earth element (REE), yttrium (Y) and high-field strength element (HFSE) deposit containing more than 50 Mt ore at >1.5 wt.% REE and >3 wt.% Zr. The highest REE/HFSE concentrations are found in pegmatite-rich zones characterized by intense alteration. Previous studies of Strange Lake and other peralkaline and alkaline intrusions, such as Khan Bogd (Mongolia) and Tamazeght (Morocco) plutons have shown that hydrothermal alteration may play an important role in the mobility of the REE/HFSE. However, the fluid chemistry and conditions of alteration (i.e., P, T, pH, fO2, ligand activity) in these systems still need to be constrained to evaluate the importance and scale of such hydrothermal mobilization. We present new data from the B-zone, a pegmatite-rich zone located in NW Strange Lake. The pegmatites are generally zoned and form two main types. The border-type pegmatites consist of quartz, K-feldspar and hematized aegirine, whereas volatile-rich pegmatites consist of hydrothermal quartz and fluorite. Transitions between both types were also observed, with the K-feldspar being partly altered and replaced by Al-Si-rich phyllosilicates. The heavy (H)REE and Zr were primarily concentrated in zirconosilicates such as elpidite, now pseudomorphed by zircon or gittinsite, whereas light (L)REE and Y were concentrated in REE-F-(CO2)-minerals such as fluocerite and bastnäsite. Textural and mineralogical observations indicate that these minerals are primary and were partly to completely leached upon fluid-rock interaction in the pegmatites. Secondary phases include Ca-F-Y-rich minerals, mainly hydrothermal fluorite, that fill vugs and replaced primary REEHFSE minerals. The presence of hydrothermal fluorite veins, micro-veins, vugs and micro-breccia in the most altered parts of the B-zone are interpreted to reflect interaction of the rocks with a F-rich fluid

  10. Using Satellite Imagery to Monitor the Major Lakes; Case Study Lake Hamun

    Science.gov (United States)

    Norouzi, H.; Islam, R.; Bah, A.; AghaKouchak, A.

    2015-12-01

    Proper lakes function can ease the impact of floods and drought especially in arid and semi-arid regions. They are important environmentally and can directly affect human lives. Better understanding of the effect of climate change and human-driven changes on lakes would provide invaluable information for policy-makers and local people. As part of a comprehensive study, we aim to monitor the land-cover/ land-use changes in the world's major lakes using satellite observations. As a case study, Hamun Lake which is a pluvial Lake, also known as shallow Lake, located on the south-east of Iran and adjacent to Afghanistan, and Pakistan borders is investigated. The Lake is the main source of resources (agriculture, fishing and hunting) for the people around it and politically important in the region since it is shared among three different countries. The purpose of the research is to find the Lake's area from 1972 to 2015 and to see if any drought or water resources management has affected the lake. Analyzing satellites imagery from Landsat shows that the area of the Lake changes seasonally and intra-annually. Significant seasonal effects are found in 1975,1977, 1987, 1993, 1996, 1998, 2000, 2009 and 2011, as well as, substantial amount of shallow water is found throughout the years. The precipitation records as well as drought historical records are studied for the lake's basin. Meteorological studies suggest that the drought, decrease of rainfalls in the province and the improper management of the Lake have caused environmental, economic and geographical consequences. The results reveal that lake has experienced at least two prolong dryings since 1972 which drought cannot solely be blamed as main forcing factor.Proper lakes function can ease the impact of floods and drought especially in arid and semi-arid regions. They are important environmentally and can directly affect human lives. Better understanding of the effect of climate change and human-driven changes on lakes

  11. Evidence of a sewer vapor transport pathway at the USEPA vapor intrusion research duplex

    Science.gov (United States)

    The role of sewer lines as preferential pathways for vapor intrusion is poorly understood. Although the importance of sewer lines for volatile organic compound (VOC) transport has been documented at a small number of sites with vapor intrusion, sewer lines are not routinely sampl...

  12. Wireless sensing without sensors—an experimental study of motion/intrusion detection using RF irregularity

    International Nuclear Information System (INIS)

    Lee, Pius W Q; Tan, Hwee-Pink; Seah, Winston K G; Yao, Zexi

    2010-01-01

    Motion and intrusion detection are often cited as wireless sensor network (WSN) applications with typical configurations comprising clusters of wireless nodes equipped with motion sensors to detect human motion. Currently, WSN performance is subjected to several constraints, namely radio irregularity and finite on-board computation/energy resources. Radio irregularity in radio frequency (RF) propagation rises to a higher level in the presence of human activity due to the absorption effect of the human body. In this paper, we investigate the feasibility of monitoring RF transmission for the purpose of intrusion detection through experimentation. With empirical data obtained from the Crossbow TelosB platform in several different environments, the impact of human activity on the signal strength of RF signals in a WSN is evaluated. We then propose a novel approach to intrusion detection by turning a constraint in WSN, namely radio irregularity, into an advantage for the purpose of intrusion detection, using signal fluctuations to detect the presence of human activity within the WSN. Unlike RF fingerprinting, the 'intruders' here neither transmit nor receive any RF signals. By enabling existing wireless infrastructures to serve as intrusion detectors instead of deploying numerous costly sensors, this approach shows great promise for providing novel solutions

  13. Type D personality, stress coping strategies and self-efficacy as predictors of Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Czuczwar, Stanisław Jerzy

    2017-07-01

    Recently, Facebook has become one of the most popular social networking sites. People use it more and more often. A number of studies have recently addressed the issue of excessive Facebook use, showing this phenomenon to be a spreading problem. The main aim of the present study was to examine whether Type D personality, self-efficacy and coping strategies are related to Facebook intrusion. The participants were 882 students of Polish universities, all of them Facebook users (72% women, mean age: 22.25 years, SD =2.06). We used the Facebook Intrusion Questionnaire, the Facebook Intensity Scale, the General Self-Efficacy Scale, the Coping Inventory for Stressful Situations, and the Type D Scale. We applied the pen-and-paper procedure. Our results indicate that emotion-oriented and avoidance-oriented strategies of coping in stressful situations are predictors of Facebook intrusion and Facebook intensity. The relations between both Facebook intrusion and intensity and social inhibition are significant only when emotion-oriented coping strategy is controlled. The knowledge of whether coping strategies in stressful situations, such as focus on emotions or avoidance, are related to Facebook intrusion might be useful for clinical purposes. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.

  14. Prediction of changes due to mandibular autorotation following miniplate-anchored intrusion of maxillary posterior teeth in open bite cases.

    Science.gov (United States)

    Kassem, Hassan E; Marzouk, Eiman S

    2018-05-14

    Prediction of the treatment outcome of various orthodontic procedures is an essential part of treatment planning. Using skeletal anchorage for intrusion of posterior teeth is a relatively novel procedure for the treatment of anterior open bite in long-faced subjects. Data were analyzed from lateral cephalometric radiographs of a cohort of 28 open bite adult subjects treated with intrusion of the maxillary posterior segment with zygomatic miniplate anchorage. Mean ratios and regression equations were calculated for selected variables before and after intrusion. Relative to molar intrusion, there was approximately 100% vertical change of the hard and soft tissue mention and 80% horizontal change of the hard and soft tissue pogonion. The overbite deepened two folds with 60% increase in overjet. The lower lip moved forward about 80% of the molar intrusion. Hard tissue pogonion and mention showed the strongest correlations with molar intrusion. There was a general agreement between regression equations and mean ratios at 3 mm molar intrusion. This study attempted to provide the clinician with a tool to predict the changes in key treatment variables following skeletally anchored maxillary molar intrusion and autorotation of the mandible.

  15. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against

  16. Potential for saltwater intrusion into the lower Tamiami aquifer near Bonita Springs, southwestern Florida

    Science.gov (United States)

    Shoemaker, W. Barclay; Edwards, K. Michelle

    2003-01-01

    A study was conducted to examine the potential for saltwater intrusion into the lower Tamiami aquifer beneath Bonita Springs in southwestern Florida. Field data were collected, and constant- and variable-density ground-water flow simulations were performed that: (1) spatially quantified modern and seasonal stresses, (2) identified potential mechanisms of saltwater intrusion, and (3) estimated the potential extent of saltwater intrusion for the area of concern. MODFLOW and the inverse modeling routine UCODE were used to spatially quantify modern and seasonal stresses by calibrating a constant-density ground-water flow model to field data collected in 1996. The model was calibrated by assuming hydraulic conductivity parameters were accurate and by estimating unmonitored ground-water pumpage and potential evapotranspiration with UCODE. Uncertainty in these estimated parameters was quantified with 95-percent confidence intervals. These confidence intervals indicate more uncertainty (or less reliability) in the estimates of unmonitored ground-water pumpage than estimates of pan-evaporation multipliers, because of the nature and distribution of observations used during calibration. Comparison of simulated water levels, streamflows, and net recharge with field data suggests the model is a good representation of field conditions. Potential mechanisms of saltwater intrusion into the lower Tamiami aquifer include: (1) lateral inland movement of the freshwater-saltwater interface from the southwestern coast of Florida; (2) upward leakage from deeper saline water-bearing zones through natural upwelling and upconing, both of which could occur as diffuse upward flow through semiconfining layers, conduit flow through karst features, or pipe flow through leaky artesian wells; (3) downward leakage of saltwater from surface-water channels; and (4) movement of unflushed pockets of relict seawater. Of the many potential mechanisms of saltwater intrusion, field data and variable

  17. Working memory and inhibitory control across the life span: Intrusion errors in the Reading Span Test.

    Science.gov (United States)

    Robert, Christelle; Borella, Erika; Fagot, Delphine; Lecerf, Thierry; de Ribaupierre, Anik

    2009-04-01

    The aim of this study was to examine to what extent inhibitory control and working memory capacity are related across the life span. Intrusion errors committed by children and younger and older adults were investigated in two versions of the Reading Span Test. In Experiment 1, a mixed Reading Span Test with items of various list lengths was administered. Older adults and children recalled fewer correct words and produced more intrusions than did young adults. Also, age-related differences were found in the type of intrusions committed. In Experiment 2, an adaptive Reading Span Test was administered, in which the list length of items was adapted to each individual's working memory capacity. Age groups differed neither on correct recall nor on the rate of intrusions, but they differed on the type of intrusions. Altogether, these findings indicate that the availability of attentional resources influences the efficiency of inhibition across the life span.

  18. Repeated magmatic intrusions at El Hierro Island following the 2011-2012 submarine eruption

    Science.gov (United States)

    Benito-Saz, Maria A.; Parks, Michelle M.; Sigmundsson, Freysteinn; Hooper, Andrew; García-Cañada, Laura

    2017-09-01

    After more than 200 years of quiescence, in July 2011 an intense seismic swarm was detected beneath the center of El Hierro Island (Canary Islands), culminating on 10 October 2011 in a submarine eruption, 2 km off the southern coast. Although the eruption officially ended on 5 March 2012, magmatic activity continued in the area. From June 2012 to March 2014, six earthquake swarms, indicative of magmatic intrusions, were detected underneath the island. We have studied these post-eruption intrusive events using GPS and InSAR techniques to characterize the ground surface deformation produced by each of these intrusions, and to determine the optimal source parameters (geometry, location, depth, volume change). Source inversions provide insight into the depth of the intrusions ( 11-16 km) and the volume change associated with each of them (between 0.02 and 0.13 km3). During this period, > 20 cm of uplift was detected in the central-western part of the island, corresponding to approximately 0.32-0.38 km3 of magma intruded beneath the volcano. We suggest that these intrusions result from deep magma migrating from the mantle, trapped at the mantle/lower crust discontinuity in the form of sill-like bodies. This study, using joint inversion of GPS and InSAR data in a post-eruption period, provides important insight into the characteristics of the magmatic plumbing system of El Hierro, an oceanic intraplate volcanic island.

  19. The relationship between loss of parents in the holocaust, intrusive memories, and distress among child survivors.

    Science.gov (United States)

    Letzter-Pouw, Sonia; Werner, Perla

    2012-04-01

    The prevalence of intrusive memories of the Holocaust and their relationship to distress was examined among 272 child survivors in Israel. Using attachment theory as a conceptual framework, the authors also examined the effects of type of experience and loss of parents in the Holocaust, psychological resources, other life events, and sociodemographic characteristics on distress and symptomatic behavior. Eighty five percent of the participants reported suffering from intrusive memories. Structural equation modeling showed that survivors who lost one or both parents in the Holocaust suffered more distress because of more intrusive memories. These findings suggest that intrusive memories may be part of unfinished mourning processes related to the loss of parents in the Holocaust. © 2012 American Orthopsychiatric Association.

  20. Notes on saltwater intrusion and trace element distribution in Metro Manila groundwaters

    International Nuclear Information System (INIS)

    Santos, G. Jr.; Ramos, A.F.; Fernandez, L.G.; Almoneda, R.V.; Garcia, T.Y.; Cruz, C.C.; Petrache, C.A.; Andal, T.T.; Alcantara, E.

    1989-01-01

    Preliminary analyses of waters for uranium and other trace elements from deepwells operated by the Metropolitan Waterworks and Sewerage System (MWSS) in Metro Manila were performed. Uranium, which ranged from 0.2 ppb to 6 ppb, was correlated with saltwater intrusion. Values >=0.8 ppb for uranium were considered indicative of saline water intrusion in the aquifers. Saline water intrusions in Malabon, Navotas, Paranaque, Las Pinas, Bacoor, Imus, Kawit, Pasig, Antipolo, San Mateo, Taguig, Cainta, Taytay, Alabang and Muntinlupa were noted. Most of these areas were also identified by MWSS as being affected by saltwater intrusion. Tritium values ranged from 0 (below detection limits) to 44 tritium units. Except for one well in Muntinlupa, all the values obtained were below the lower limit of detection of 30.83 T.U. Mercury contents in six well locations had values above the maximum limit set by the National Standards for Drinking Water. Four wells exceeded the permissible level for manganese while two wells had iron concentrations greater than the National Standards. Other trace element concentrations such as Cr, Pb, Zn, Co and Ni either did not exceed their permissible levels or were not included in the National Standards. (Auth.). 6 refs.; 1 tab.; 3 figs

  1. Spatial distribution of seepage at a flow-through lake: Lake Hampen, Western Denmark

    DEFF Research Database (Denmark)

    Kidmose, Jacob Baarstrøm; Engesgaard, Peter Knudegaard; Nilsson, Bertel

    2011-01-01

    recharge patiern of the lake and relating these to the geologic history of the lake. Recharge of the surrounding aquifer by lake water occurs off shore in a narrow zone, as measured from lake–groundwater gradients. A 33-m-deep d18O profi le at the recharge side shows a lake d18O plume at depths...... that corroborates the interpretation of lake water recharging off shore and moving down gradient. Inclusion of lake bed heterogeneity in the model improved the comparison of simulated and observed discharge to the lake. The apparent age of the discharging groundwater to the lake was determined by CFCs, resulting...

  2. Acoustic emission intrusion detector

    International Nuclear Information System (INIS)

    Carver, D.W.; Whittaker, J.W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal

  3. Intrusion resistant underground structure (IRUS) - safety assessment and licensing

    International Nuclear Information System (INIS)

    Lange, B. A.

    1997-01-01

    This paper describes the safety goals, human exposure scenarios and critical groups, the syvac-nsure performance assessment code, groundwater pathway safety results, and inadvertent human intrusion of the IRUS. 2 tabs

  4. A Nuisance Alarm Data System for evaluation of intrusion detectors

    International Nuclear Information System (INIS)

    Ream, W.K.

    1990-01-01

    A Nuisance Alarm Data System (NADS) was developed to gather long-term background alarm data on exterior intrusion detectors as part of their evaluation. Since nuisance alarms play an important part in the selection of intrusion detectors for use at Department of Energy (DOE) facilities, an economical and reliable way to monitor and record these alarms was needed. NADS consists of an IBM personal computer and printer along with other commercial units to communicate with the detectors, to gather weather data, and to record video for assessment. Each alarm, its assessment, and the weather conditions occurring at alarm time are placed into a data base that is used in the evaluation of the detector. The operating software is written in Turbo Pascal for easy maintenance and modification. A portable system, based on the NADS design, has been built and shipped to other DOE locations to do on-site alarm monitoring. This has been valuable for the comparison of different detectors in the on-site environment and for testing new detectors when the appropriate conditions do not exist or cannot be simulated at the Exterior Intrusion Detection Testbed

  5. Testing a 1-D Analytical Salt Intrusion Model and the Predictive Equation in Malaysian Estuaries

    Science.gov (United States)

    Gisen, Jacqueline Isabella; Savenije, Hubert H. G.

    2013-04-01

    Little is known about the salt intrusion behaviour in Malaysian estuaries. Study on this topic sometimes requires large amounts of data especially if a 2-D or 3-D numerical models are used for analysis. In poor data environments, 1-D analytical models are more appropriate. For this reason, a fully analytical 1-D salt intrusion model, based on the theory of Savenije in 2005, was tested in three Malaysian estuaries (Bernam, Selangor and Muar) because it is simple and requires minimal data. In order to achieve that, site surveys were conducted in these estuaries during the dry season (June-August) at spring tide by moving boat technique. Data of cross-sections, water levels and salinity were collected, and then analysed with the salt intrusion model. This paper demonstrates a good fit between the simulated and observed salinity distribution for all three estuaries. Additionally, the calibrated Van der Burgh's coefficient K, Dispersion coefficient D0, and salt intrusion length L, for the estuaries also displayed a reasonable correlations with those calculated from the predictive equations. This indicates that not only is the salt intrusion model valid for the case studies in Malaysia but also the predictive model. Furthermore, the results from this study describe the current state of the estuaries with which the Malaysian water authority in Malaysia can make decisions on limiting water abstraction or dredging. Keywords: salt intrusion, Malaysian estuaries, discharge, predictive model, dispersion

  6. Aquatic macrophyte richness in Danish lakes in relation to alkalinity, transparency, and lake area

    DEFF Research Database (Denmark)

    Vestergaard, Ole Skafte; Sand-Jensen, Kaj

    2000-01-01

    We examined the relationship between environmental factors and the richness of submerged macrophytes species in 73 Danish lakes, which are mainly small, shallow, and have mesotrophic to hypertrophic conditions. We found that mean species richness per lake was only 4.5 in acid lakes of low...... alkalinity but 12.3 in lakes of high alkalinity due to a greater occurrence of the species-rich group of elodeids. Mean species richness per lake also increased significantly with increasing Secchi depth. No significant relationship between species richness and lake surface area was observed among the entire...... group of lakes or a subset of eutrophic lakes, as the growth of submerged macrophytes in large lakes may be restricted by wave action in shallow water and light restriction in deep water. In contrast, macrophyte species richness increased with lake surface area in transparent lakes, presumably due...

  7. The Torres del Paine intrusion as a model for a shallow magma chamber

    Science.gov (United States)

    Baumgartner, Lukas; Bodner, Robert; Leuthold, Julien; Muntener, Othmar; Putlitz, Benita; Vennemann, Torsten

    2014-05-01

    The shallow magmatic Torres del Paine Intrusive Complex (TPIC) belongs to a series of sub-volcanic and plutonic igneous bodies in Southern Chile and Argentina. This trench-parallel belt is located in a transitional position between the Patagonia Batholith in the West, and the alkaline Cenozoic plateau lavas in the East. While volumetrically small amounts of magmatism started around 28 my ago in the Torres del Paine area, and a second period occurred between 17-16 Ma, it peaked with the TPIC 12.59-12.43 Ma ago. The spectacular cliffs of the Torres del Paine National park provide a unique opportunity to study the evolution of a very shallow magma chamber and the interaction with its host rocks. Intrusion depth can be estimated based on contact metamorphic assemblages and granite solidus thermobarometry to 750±250 bars, corresponding to an intrusion depth of ca. 3km, ca. 500m above the base of the intrusion. Hornblende thermobarometry in mafic rocks agrees well with these estimates (Leuthold et al., 2014). The TPIC is composed of a granitic laccolith emplaced over 90ka (Michel et al., 2008) in 3 major, several 100m thick sheets, forming an overall thickness of nearly 2 km. Contacts are sharp between sheets, with the oldest sheet on the top and the youngest on the bottom (Michel et al., 2008). The granitic laccolith is under-plated by a ca. 400m thick mafic laccolith, built up over ca. 50ka (Leuthold et al. 2012), constructed from the bottom up. Granitic and mafic sheets are themselves composed of multiple metric to decametric pulses, mostly with ductile contacts between them, resulting in outcrop patterns resembling braided stream sediments. The contact of the TPIC with the Cretaceous flysch sediments document intrusion mechanism. Pre-existing sub-horizontal fold axes are rotated in the roof of the TPIC, clearly demonstrating ballooning of the roof; no ballooning was observed in the footwall of the intrusion. Extension during ballooning of the roof is indicated by

  8. Approaches in anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, S.; Di Pietro, R.; Mancini, L.V.

    2008-01-01

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  9. Approaches in Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  10. State of the Practice of Intrusion Detection Technologies

    Science.gov (United States)

    2000-01-01

    functions, procedures, and scripts, an Oracle database structure, Borne shell scripts, and configuration files which together communicate with ASIM Sensor...34Plugging the Holes in eCommerce Leads to 135% Growth in the Intrusion Detection and Vulnerability Assessment Software Market," PRNewswire. August

  11. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D. L.; Michlich, B. J.

    2000-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute nuclear technology and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested

  12. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D.L.; Micklich, B.J.

    2001-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute 'nuclear technology' and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested. (author)

  13. Nuclear-power-plant perimeter-intrusion alarm systems

    International Nuclear Information System (INIS)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981

  14. LakeMIP Kivu: evaluating the representation of a large, deep tropical lake by a set of one-dimensional lake models

    Directory of Open Access Journals (Sweden)

    WIM Thiery

    2014-02-01

    Full Text Available The African great lakes are of utmost importance for the local economy (fishing, as well as being essential to the survival of the local people. During the past decades, these lakes experienced fast changes in ecosystem structure and functioning, and their future evolution is a major concern. In this study, for the first time a set of one-dimensional lake models are evaluated for Lake Kivu (2.28°S; 28.98°E, East Africa. The unique limnology of this meromictic lake, with the importance of salinity and subsurface springs in a tropical high-altitude climate, presents a worthy challenge to the seven models involved in the Lake Model Intercomparison Project (LakeMIP. Meteorological observations from two automatic weather stations are used to drive the models, whereas a unique dataset, containing over 150 temperature profiles recorded since 2002, is used to assess the model's performance. Simulations are performed over the freshwater layer only (60 m and over the average lake depth (240 m, since salinity increases with depth below 60 m in Lake Kivu and some lake models do not account for the influence of salinity upon lake stratification. All models are able to reproduce the mixing seasonality in Lake Kivu, as well as the magnitude and seasonal cycle of the lake enthalpy change. Differences between the models can be ascribed to variations in the treatment of the radiative forcing and the computation of the turbulent heat fluxes. Fluctuations in wind velocity and solar radiation explain inter-annual variability of observed water column temperatures. The good agreement between the deep simulations and the observed meromictic stratification also shows that a subset of models is able to account for the salinity- and geothermal-induced effects upon deep-water stratification. Finally, based on the strengths and weaknesses discerned in this study, an informed choice of a one-dimensional lake model for a given research purpose becomes possible.

  15. On the relation between crustal deformation and seismicity during the 2012-2014 magmatic intrusions in El Hierro island.

    Science.gov (United States)

    Domínguez Cerdeña, Itahiza; García-Cañada, Laura; Ángeles Benito Saz, María; Del Fresno, Carmen

    2017-04-01

    The last volcanic eruption in the Canary Islands took place in 2011 less than 2 km offshore El Hierro island, after 3 months of measuring surface deformation (up to 5 cm) and locating more than 10 000 earthquakes. In the two years following the end of the submarine eruption on 5 March 2012, six deep magmatic intrusions were recorded beneath the island. Despite the short time duration of these intrusions, these events have been more energetic that the 2011 pre-eruptive intrusive event but none of them ended in a new eruption. These post-eruptive reactivations are some of the few examples in the world of well monitored magmatic intrusions related with monogenetic volcanism. In order to understand these processes we have analyzed the geodetic and seismic data with different techniques. First, we did a joint hypocentral relocation of the six seismic swarms, including more than 6 300 events, to analyze the relative distribution of the earthquakes from different intrusions. The uncertainties of the earthquakes relocations was reduced to an average value of 300 m. New earthquakes' distribution shows the alignments of the different intrusions and a temporal migration of the events to larger depths. Moreover, we show the results of the ground deformation using GPS data from the network installed on the island (for each of the six intrusive events) and their inversion considering spherical models. In most of the intrusions the optimal source model was shallower and southern than the corresponding seismicity hypocenters. The intruded magma volume ranges from 0.02 to 0.13 km3. Finally, we also computed the b value from the Gutenberg Richter equation by means of a bootstrap method. The spatial and temporal evolution of the b value for the seismicity show a clear correlation with the temporal evolution of the crustal deformation. The six magma intrusions can be grouped, depending on their location, in three pairs each one associated with each of the three active rifts of El

  16. Technologies, Methodologies and Challenges in Network Intrusion Detection and Prevention Systems

    Directory of Open Access Journals (Sweden)

    Nicoleta STANCIU

    2013-01-01

    Full Text Available This paper presents an overview of the technologies and the methodologies used in Network Intrusion Detection and Prevention Systems (NIDPS. Intrusion Detection and Prevention System (IDPS technologies are differentiated by types of events that IDPSs can recognize, by types of devices that IDPSs monitor and by activity. NIDPSs monitor and analyze the streams of network packets in order to detect security incidents. The main methodology used by NIDPSs is protocol analysis. Protocol analysis requires good knowledge of the theory of the main protocols, their definition, how each protocol works.

  17. LIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios; Krontiris, Ioannis; Dimitriou, Tassos

    2008-01-01

    to achieve a more autonomic and complete defense mechanism, even against attacks that have not been anticipated in advance. In this paper, we present a lightweight intrusion detection system, called LIDeA, designed for wireless sensor networks. LIDeA is based on a distributed architecture, in which nodes......Wireless sensor networks are vulnerable to adversaries as they are frequently deployed in open and unattended environments. Preventive mechanisms can be applied to protect them from an assortment of attacks. However, more sophisticated methods, like intrusion detection systems, are needed...

  18. Thermodynamics of water intrusion in nanoporous hydrophobic solids.

    Science.gov (United States)

    Cailliez, Fabien; Trzpit, Mickael; Soulard, Michel; Demachy, Isabelle; Boutin, Anne; Patarin, Joël; Fuchs, Alain H

    2008-08-28

    We report a joint experimental and molecular simulation study of water intrusion in silicalite-1 and ferrerite zeolites. The main conclusion of this study is that water condensation takes place through a genuine first-order phase transition, provided that the interconnected pores structure is 3-dimensional. In the extreme confinement situation (ferrierite zeolite), condensation takes place through a continuous transition, which is explained by a shift of both the first-order transition line and the critical point with increasing confinement. The present findings are at odds with the common belief that conventional phase transitions cannot take place in microporous solids such as zeolites. The most important features of the intrusion/extrusion process can be understood in terms of equilibrium thermodynamics considerations. We believe that these findings are very general for hydrophobic solids, i.e. for both nonwetting as well as wetting water-solid interface systems.

  19. The hydrogeochemical and isotopic investigations of the two-layered Shiraz aquifer in the northwest of Maharlou saline lake, south of Iran

    Science.gov (United States)

    Tajabadi, Mehdi; Zare, Mohammad; Chitsazan, Manouchehr

    2018-03-01

    Maharlou saline lake is the outlet of Shiraz closed basin in southern Iran, surrounded by several disconnected alluvial fresh water aquifers. These aquifers in the west and northwest of the lake are recharged by karstic anticlines such as Kaftarak in the north and Barmshour in the south. Here groundwater salinity varies along the depth so that better quality water is located below brackish or saline waters. The aim of this study is to investigate the reason for the salinity anomaly and the origin of the fresher groundwater in lower depth. Hence, the change in groundwater salinity along depth has been investigated by means of a set of geoelectrical, hydrogeological, hydrogeochemical, and environmental isotopes data. The interpretation of geoelectrical profiles and hydrogeological data indicates that the aquifer in the southeast of Shiraz plain is a two-layer aquifer separated by a fine-grained (silt and clay) layer with an approximate thickness of 40 m at the depth of about 100-120 m. Hydrgeochemistry showed that the shallow aquifer is recharged by Kaftarak karstic anticline and is affected by the saline lake water. The lake water fraction varies in different parts from zero for shallow aquifer close to the karstic anticlines to ∼70 percent in the margin of the lake. The deep aquifer is protected from the intrusion of saline lake water due to the presence of the above-mentioned confining layer with lake water fraction of zero. The stable isotopes signatures also indicate that the 'fresh' groundwater belonging to the deep aquifer is not subject to severe evaporation or mixing which is typical of the karstic water of the area. It is concluded that the characteristics of the deep aquifer are similar to those of the karstic carbonate aquifer. This karstic aquifer is most probably the Barmshour carbonated anticline buried under the shallow aquifer in the southern part. It may also be the extension of the Kaftarak anticline in the northern part.

  20. Predicting Seawater Intrusion in Coastal Groundwater Boreholes Using Self-Potential Data

    Science.gov (United States)

    Graham, M.; MacAllister, D. J.; Jackson, M.; Vinogradov, J.; Butler, A. P.

    2017-12-01

    Many coastal groundwater abstraction wells are under threat from seawater intrusion: this is exacerbated in summer by low water tables and increased abstraction. Existing hydrochemistry or geophysical techniques often fail to predict the timing of intrusion events. We investigate whether the presence and transport of seawater can influence self-potentials (SPs) measured within groundwater boreholes, with the aim of using SP monitoring to provide early warning of saline intrusion. SP data collection: SP data were collected from a coastal groundwater borehole and an inland borehole (> 60 km from the coast) in the Seaford Chalk of southern England. The SP gradient in the inland borehole was approximately 0.05 mV/m, while that in the coastal borehole varied from 0.16-0.26 mV/m throughout the monitoring period. Spectral analysis showed that semi-diurnal fluctuations in the SP gradient were several orders of magnitude higher at the coast than inland, indicating a strong influence from oceanic tides. A characteristic decrease in the gradient, or precursor, was observed in the coastal borehole several days prior to seawater intrusion. Modelling results: Hydrodynamic transport and geoelectric modelling suggest that observed pressure changes (associated with the streaming potential) are insufficient to explain either the magnitude of the coastal SP gradient or the semi-diurnal SP fluctuations. By contrast, a model of the exclusion-diffusion potential closely matches these observations and produces a precursor similar to that observed in the field. Sensitivity analysis suggests that both a sharp saline front and spatial variations in the exclusion efficiency arising from aquifer heterogeneities are necessary to explain the SP gradient observed in the coastal borehole. The presence of the precursor in the model depends also on the presence and depth of fractures near the base of the borehole. Conclusions: Our results indicate that SP monitoring, combined with hydrodynamic

  1. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    Science.gov (United States)

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...

  2. Individual differences in experiencing intrusive memories : The role of the ability to resist proactive interference

    NARCIS (Netherlands)

    Verwoerd, Johan; Wessel, Ineke; de Jong, Peter J.

    This study explored whether a relatively poor ability to resist or inhibit interference from irrelevant information in working memory is associated with experiencing undesirable intrusive memories. Non-selected participants (N = 91) completed a self-report measure of intrusive memories, and carried

  3. Animal intrusion status report for fiscal year 1990

    International Nuclear Information System (INIS)

    Landeen, D.S.

    1991-03-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion work conducted by Westinghouse Hanford Company in fiscal year 1990 regarding small mammals and water infiltration. An animal intrusion lysimeter facility was constructed and installed in fiscal year 1988. The facility consists of two outer boxes buried at grade that serve as receptacles for six animal intrusion lysimeters. Small burrowing mammals common to the Hanford Site environs are introduced over a 3- to 4-month period. Supplemental precipitation is added to three of the lysimeters with a rainulator at a rate equivalent to a 100-year storm. Soil moisture samples are taken before and after each test, and soil moisture measurements are also taken with a hydroprobe during the test period. During fiscal year 1990, tests three and four were completed and test five was initiated. Results of test three (summer treatment), which used Townsend ground squirrels and pocket gophers, indicated that the additional 1.5 inches of precipitation that was added with the rainulator was lost during this test. The plots that did not receive any additional precipitation all lost water (5 to 6 percent). Results from test four (winter treatment), which used pocket gophers and pocket mice, indicated that all of the lysimeters except one gained water. The two control lysimeters (rainulator plots and nonrainulator lysimeters with no animals) gained more water than their corresponding animal burrow lysimeters. 4 refs., 9 figs., 3 tabs

  4. Methane emissions from permafrost thaw lakes limited by lake drainage.

    NARCIS (Netherlands)

    van Huissteden, J.; Berrittella, C.; Parmentier, F.J.W.; Mi, Y.; Maximov, T.C.; Dolman, A.J.

    2011-01-01

    Thaw lakes in permafrost areas are sources of the strong greenhouse gas methane. They develop mostly in sedimentary lowlands with permafrost and a high excess ground ice volume, resulting in large areas covered with lakes and drained thaw-lake basins (DTLBs; refs,). Their expansion is enhanced by

  5. Petrology of the Sutherland commanage melilite intrusives

    International Nuclear Information System (INIS)

    Viljoen, K.S.

    1990-01-01

    The petrology of the Sutherland Commonage olivine melilitite intrusives have been investigated using petrographic and chemical methods. The results of the geochemical study suggest that the Commonage melilites were derived by the melting of a recently metasomatised region of the asthenosphere, probably under the influence of an ocean-island-type hotspot situated in the lower mantle

  6. Great Lakes Bathymetry

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Bathymetry of Lakes Michigan, Erie, Saint Clair, Ontario and Huron has been compiled as a component of a NOAA project to rescue Great Lakes lake floor geological and...

  7. Lake and lake-related drainage area parameters for site investigation program

    Energy Technology Data Exchange (ETDEWEB)

    Blomqvist, P.; Brunberg, A.K. [Uppsala Univ. (Sweden). Dept. of Limnology; Brydsten, L [Umeaa Univ. (Sweden). Dept. of Ecology and Environmental Science

    2000-09-01

    In this paper, a number of parameters of importance to a preliminary determination of the ecological function of lakes are presented. The choice of parameters have been made with respect to a model for the determination of the nature conservation values of lakes which is currently being developed by the authors of this report, but is also well suited for a general description of the lake type and the functioning of the inherent ecosystem. The parameters have been divided into five groups: (1) The location of the object relative important gradients in the surrounding nature; (2) The lake catchment area and its major constituents; (3) The lake morphometry; (4) The lake ecosystem; (5) Human-induced damages to the lake ecosystem. The first two groups, principally based on the climate, hydrology, geology and vegetation of the catchment area represent parameters that can be used to establish the rarity and representativity of the lake, and will in the context of site investigation program be used as a basis for generalisation of the results. The third group, the lake morphometry parameters, are standard parameters for the outline of sampling programmes and for calculations of the physical extension of different key habitats in the system. The fourth group, the ecosystem of the lake, includes physical, chemical and biological parameters required for determination of the stratification pattern, light climate, influence from the terrestrial ecosystem of the catchment area, trophic status, distribution of key habitats, and presence of fish and rare fauna and flora in the lake. In the context of site investigation program, the parameters in these two groups will be used for budget calculations of the flow of energy and material in the system. The fifth group, finally, describes the degree on anthropogenic influence on the ecosystem and will in the context of site investigation programmes be used to judge eventual malfunctioning within the entire, or parts of, the lake

  8. Lake and lake-related drainage area parameters for site investigation program

    International Nuclear Information System (INIS)

    Blomqvist, P.; Brunberg, A.K.; Brydsten, L

    2000-09-01

    In this paper, a number of parameters of importance to a preliminary determination of the ecological function of lakes are presented. The choice of parameters have been made with respect to a model for the determination of the nature conservation values of lakes which is currently being developed by the authors of this report, but is also well suited for a general description of the lake type and the functioning of the inherent ecosystem. The parameters have been divided into five groups: 1) The location of the object relative important gradients in the surrounding nature; 2) The lake catchment area and its major constituents; 3) The lake morphometry; 4) The lake ecosystem; 5) Human-induced damages to the lake ecosystem. The first two groups, principally based on the climate, hydrology, geology and vegetation of the catchment area represent parameters that can be used to establish the rarity and representativity of the lake, and will in the context of site investigation program be used as a basis for generalisation of the results. The third group, the lake morphometry parameters, are standard parameters for the outline of sampling programmes and for calculations of the physical extension of different key habitats in the system. The fourth group, the ecosystem of the lake, includes physical, chemical and biological parameters required for determination of the stratification pattern, light climate, influence from the terrestrial ecosystem of the catchment area, trophic status, distribution of key habitats, and presence of fish and rare fauna and flora in the lake. In the context of site investigation program, the parameters in these two groups will be used for budget calculations of the flow of energy and material in the system. The fifth group, finally, describes the degree on anthropogenic influence on the ecosystem and will in the context of site investigation programmes be used to judge eventual malfunctioning within the entire, or parts of, the lake ecosystem

  9. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  10. Evaluation of the radiological consequences of a human intrusion in a granite formation

    International Nuclear Information System (INIS)

    Mejon-Goula, M.J.; Cernes, A.

    1989-07-01

    The methodology used in France for the evaluation of the radiological consequences associated to a nuclear waste repository in a deep geological formation is the deterministic one. This means that, in addition to the calculations in connection with the ''normal'' scenario, a limited number of ''altered'' scenarios, representing the different families of plausible scenarios and corresponding to the most important consequences resulting from there families, have to be taken into account. Among them, the human intrusion scenario is an important one. In a study performed inside the CEC PAGIS project and also for a french expert group (Goguel group) which carried out a methodologic work for the national site selection procedure, results concerning the quantification of the radiological consequences of a human intrusion have been obtained without attempting at the evaluation of its probability. The intrusion time ranged from 1 000 to 100 000 years and different contamination scenarios were taken into account. It was assumed that the intrusion led to the creation of a 100 cubic meters edge cubic cavity in the immediate vicinity to the repository. Using the description of the Auriat site realized for PAGIS, the calculation was performed in three steps: - calculation of the evolution of the repository until the intrusion time, - computation of the supposed instantaneous new flow distribution after the intrusion, - computation of the dose rate, using the mean volumic activity in the cavity walls and the outgoing flow rate. Three exposure scenarios were considered: - a worker in the mine exposed to by external irradiation and contaminated by inhalation of radioactive materials, -an animal drinking in the vicinity during the mining operation, - gardening after the closure of the mine. With the exception of the worker scenario (the dose rate may reach 10 -2 Sv/year, which is comparable with the normal exposure in a granite mine), the other dose rates were found to be quite low

  11. A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features

    Directory of Open Access Journals (Sweden)

    P. Amudha

    2015-01-01

    Full Text Available Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony (MABC with Enhanced Particle Swarm Optimization (EPSO to predict the intrusion detection problem. The algorithms are combined together to find out better optimization results and the classification accuracies are obtained by 10-fold cross-validation method. The purpose of this paper is to select the most relevant features that can represent the pattern of the network traffic and test its effect on the success of the proposed hybrid classification algorithm. To investigate the performance of the proposed method, intrusion detection KDDCup’99 benchmark dataset from the UCI Machine Learning repository is used. The performance of the proposed method is compared with the other machine learning algorithms and found to be significantly different.

  12. A Comprehensive Review and meta-analysis on Applications of Machine Learning Techniques in Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Manojit Chattopadhyay

    2018-05-01

    Full Text Available Securing a machine from various cyber-attacks has been of serious concern for researchers, statutory bodies such as governments, business organizations and users in both wired and wireless media. However, during the last decade, the amount of data handling by any device, particularly servers, has increased exponentially and hence the security of these devices has become a matter of utmost concern. This paper attempts to examine the challenges in the application of machine learning techniques to intrusion detection. We review different inherent issues in defining and applying the machine learning techniques to intrusion detection. We also attempt to identify the best technological solution for changing usage pattern by comparing different machine learning techniques on different datasets and summarizing their performance using various performance metrics. This paper highlights the research challenges and future trends of intrusion detection in dynamic scenarios of intrusion detection problems in diverse network technologies.

  13. Stochastic Tools for Network Intrusion Detection

    OpenAIRE

    Yu, Lu; Brooks, Richard R.

    2017-01-01

    With the rapid development of Internet and the sharp increase of network crime, network security has become very important and received a lot of attention. We model security issues as stochastic systems. This allows us to find weaknesses in existing security systems and propose new solutions. Exploring the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantages of the system weaknesses. We propose a hybrid network security scheme including intrusion detecti...

  14. Executive functions in adolescents with spina bifida: relations with autonomy development and parental intrusiveness.

    Science.gov (United States)

    Tuminello, Elizabeth R; Holmbeck, Grayson N; Olson, Rick

    2012-01-01

    The current study was part of a larger longitudinal investigation and examined the relation of parent-report and performance measures of executive functioning (EF) with measures of behavioral and emotional autonomy and parental intrusiveness in adolescents with and without spina bifida (SB; n=65 in a comparison sample and 61 in an SB sample; M age=14.55, SD=0.63). For both groups, higher levels of parent-reported EF problems predicted higher levels of observed child dependency and lower levels of teacher-reported intrinsic motivation. Higher scores on performance EF measures predicted lower levels of observed child dependency and observed maternal intrusiveness for both groups. In adolescents with SB only, higher performance EF scores predicted higher intrinsic motivation and emotional autonomy from both mother and father and predicted lower levels of observed paternal intrusiveness. While causal conclusions cannot be drawn, EFs appear to be closely related to autonomy development and parental intrusiveness, particularly for adolescents with SB. These results suggest that the inclusion of EF training in interventions targeting adolescents with SB may be beneficial for autonomy development.

  15. A Dynamical Downscaling study over the Great Lakes Region Using WRF-Lake: Historical Simulation

    Science.gov (United States)

    Xiao, C.; Lofgren, B. M.

    2014-12-01

    As the largest group of fresh water bodies on Earth, the Laurentian Great Lakes have significant influence on local and regional weather and climate through their unique physical features compared with the surrounding land. Due to the limited spatial resolution and computational efficiency of general circulation models (GCMs), the Great Lakes are geometrically ignored or idealized into several grid cells in GCMs. Thus, the nested regional climate modeling (RCM) technique, known as dynamical downscaling, serves as a feasible solution to fill the gap. The latest Weather Research and Forecasting model (WRF) is employed to dynamically downscale the historical simulation produced by the Geophysical Fluid Dynamics Laboratory-Coupled Model (GFDL-CM3) from 1970-2005. An updated lake scheme originated from the Community Land Model is implemented in the latest WRF version 3.6. It is a one-dimensional mass and energy balance scheme with 20-25 model layers, including up to 5 snow layers on the lake ice, 10 water layers, and 10 soil layers on the lake bottom. The lake scheme is used with actual lake points and lake depth. The preliminary results show that WRF-Lake model, with a fine horizontal resolution and realistic lake representation, provides significantly improved hydroclimates, in terms of lake surface temperature, annual cycle of precipitation, ice content, and lake-effect snowfall. Those improvements suggest that better resolution of the lakes and the mesoscale process of lake-atmosphere interaction are crucial to understanding the climate and climate change in the Great Lakes region.

  16. [Characterizing chromophoric dissolved organic matter (CDOM) in Lake Honghu, Lake Donghu and Lake Liangzihu using excitation-emission matrices (EEMs) fluorescence and parallel factor analysis (PARAFAC)].

    Science.gov (United States)

    Zhou, Yong-Qiang; Zhang, Yun-Lin; Niu, Cheng; Wang, Ming-Zhu

    2013-12-01

    Little is known about DOM characteristics in medium to large sized lakes located in the middle and lower reaches of Yangtze River, like Lake Honghu, Lake Donghu and Lake Liangzihu. Absorption, fluorescence and composition characteristics of chromophoric dissolved organic matter (CDOM) are presented using the absorption spectroscopy, the excitation-emission ma trices (EEMs) fluorescence and parallel factor analysis (PARAFAC) model based on the data collected in Sep-Oct. 2007 including 15, 9 and 10 samplings in Lake Honghu, Lake Donghu and Lake Liangzihu, respectively. CDOM absorption coefficient at 350 nm a(350) coefficient in Lake Honghu was significantly higher than those in Lake Donghu and Lake Liangzihu (t-test, pCDOM spectral slope in the wavelength range of 280-500 nm (S280-500) and a(350) (R2 =0. 781, p<0. 001). The mean value of S280-500 in Lake Honghu was significantly lower than those in Lake Donghu (t-test, pLake Liangzihu (t-test, p<0. 001). The mean value of spectral slope ratio SR in Lake Honghu was also significantly lower than those in Lake Donghu and Lake Liangzihu (t-test, p<0. 05). Two humic-like (C1, C2) and two protein-like fluorescent components (C3, C4) were identified by PARAFAC model, among which significant positive correlations were found between C1 and C2 (R2 =0. 884, p<0. 001), C3 and C4 (R2 =0. 677, p<0.001), respectively, suggesting that the sources of the two humic-like components as well as the two protein-like components were similar. However, no significant correlation has been found between those 4 fluorescent components and DOC concentration. Th e fluorescenceindices of FI255 (HIX), Fl265, FI310 (BIX) and Fl370 in Lake Donghu were all significantly higher than those in Lake Liangzihu (t-test, p <0.05) and Lake Honghu (t-test, p<0. 01), indicating that the eutrophication status in Lake Donghu was higher than Lake Honghu and Lake Liangzihu.

  17. Geophysical characterization of saltwater intrusion in a coastal aquifer: The case of Martil-Alila plain (North Morocco)

    Science.gov (United States)

    Himi, Mahjoub; Tapias, Josefiina; Benabdelouahab, Sara; Salhi, Adil; Rivero, Luis; Elgettafi, Mohamed; El Mandour, Abdenabi; Stitou, Jamal; Casas, Albert

    2017-02-01

    Several factors can affect the quantity and the quality of groundwater resources, but in coastal aquifers seawater intrusion is often the most significant issue regarding freshwater supply. Further, saltwater intrusion is a worldwide issue because about seventy percent of the world's population lives in coastal regions. Generally, fresh groundwater not affected by saltwater intrusion is characterized by low salinity and therefore low electrical conductivity (EC) values. Consequently, high values of EC in groundwater along the coastline are usually associated to seawater intrusion. This effect is amplified if the coastal aquifer is overexploited with a subsequent gradual displacement of the freshwater-saltwater interface towards the continent. Delineation of marine intrusion in coastal aquifers has traditionally relied upon observation wells and collection of water samples. This approach may miss important hydrologic features related to saltwater intrusion in areas where access is difficult and where wells are widely spaced. Consequently, the scarcity of sampling points and sometimes their total absence makes the number of data available limited and most of the time not representative for mapping the spatial and temporal variability of groundwater salinity. In this study, we use a series of geophysical methods for characterizing the aquifer geometry and the extension of saltwater intrusion in the Martil-Alila coastal region (Morocco) as a complement to geological and hydrogeochemical data. For this reason, we carried out three geophysical surveys: Gravity, Electrical Resistivity and Frequency Domain Electromagnetic. The geometry of the basin has been determined from the interpretation of a detailed gravity survey. Electrical resistivity models derived from vertical electrical soundings allowed to characterize the vertical and the lateral extensions of aquifer formations. Finally, frequency domain electromagnetic methods allowed delineating the extension of the

  18. Geochemistry and tectonic implications of the Early Carboniferous Keketuobie intrusion in the West Junggar foldbelt, NW China

    Science.gov (United States)

    Deng, Yu-Feng; Yuan, Feng; Zhou, Taofa; Hollings, Pete; Zhang, Dayu

    2018-06-01

    The Keketuobie intrusion is situated in the northern part of the West Junggar foldbelt at the southern margin of the Central Asian Orogeic Belt. The intrusion consists of medium- to coarse-grained gabbro, fine-grained gabbro and diorite. Igneous zircons from the medium- to coarse-grained gabbro yielded a LA-ICP-MS U-Pb age of 320.8 ± 5.7 Ma, indicating that the intrusion was emplaced in the Early Carboniferous. The intrusive contact between the medium- to coarse-grained gabbro and the fine-grained gabbro indicates they formed from distinct magma pulses. Magnetite crystals from the fine-grained gabbro have lower V2O3 but higher TiO2 and Al2O3 contents than those of the medium- to coarse-grained gabbro, suggesting that the fine-grained gabbro crystallized in a relatively higher fO2 and temperature magma than the medium- to coarse-grained gabbro. The Keketuobie intrusive rocks are characterized by enriched large ion lithophile elements and depleted high field strength elements relative to N-MORB with restricted (87Sr/86Sr)t ratios (0.70370-0.70400) and εNd(t) values (+5.85 to +6.97). The petrography and geochemistry are comparable to those of subduction-related volcanic rocks. The trace elements and isotopic compositions of the mafic intrusive rocks suggest that the primary magmas were derived from mixing of metasomatized lithospheric mantle and depleted asthenospheric melts, perhaps triggered by slab break-off. The Keketuobie intrusion is younger than adjacent ophiolite sequences, island arc volcanic rocks and porphyry deposits, but predates the post-collisional A-type granites and bimodal volcanic rocks in the district, suggesting that the Keketuobie intrusion likely formed in a syn-collisional setting.

  19. Paleomagnetic record of a geomagnetic field reversal from late miocene mafic intrusions, southern nevada.

    Science.gov (United States)

    Ratcliff, C D; Geissman, J W; Perry, F V; Crowe, B M; Zeitler, P K

    1994-10-21

    Late Miocene (about 8.65 million years ago) mafic intrusions and lava flows along with remagnetized host rocks from Paiute Ridge, southern Nevada, provide a high-quality paleomagnetic record of a geomagnetic field reversal. These rocks yield thermoremanent magnetizations with declinations of 227 degrees to 310 degrees and inclinations of -7 degrees to 49 degrees , defining a reasonably continuous virtual geomagnetic pole path over west-central Pacific longitudes. Conductive cooling estimates for the intrusions suggest that this field transition, and mafic magmatism, lasted only a few hundred years. Because this record comes principally from intrusive rocks, rather than sediments or lavas, it is important in demonstrating the longitudinal confinement of the geomagnetic field during a reversal.

  20. THE TECTONICS STRESS AND STRAIN FIELD MODELING ADJUSTED FOR EVOLUTION OF GEOLOGICAL STRUCTURES (SAILAG INTRUSION, EASTERN SAYAN

    Directory of Open Access Journals (Sweden)

    V. N. Voytenko

    2013-01-01

    Full Text Available The article describes a tectonophysical model showing evolution of structures in the Sailag granodiorite massif in relation to its gold-bearing capacity. The model takes into account the load patterns according to geological data, accumulated deformation, and gravity stresses. This model provides for updating the structural-geological model showing development of the intrusion body and the ore field. Forecasted are destruction patterns in the apical and above-dome parts of the massif  in the intrusion and contraction phase, formation of the long-term shear zone at the steeply dipping slope of the intrusion body, and subvertical fractures associated with the long-term shear zone and vertical mechanical ‘layering’ of the intrusive body.  

  1. Longitudinal Relations of Intrusive Parenting and Effortful Control to Ego-Resiliency during Early Childhood

    Science.gov (United States)

    Taylor, Zoe E.; Eisenberg, Nancy; Spinrad, Tracy L.; Widaman, Keith F.

    2013-01-01

    Longitudinal relations among ego-resiliency (ER), effortful control (EC), and observed intrusive parenting were examined at 18, 30, and 42 months of age ("Ns" = 256, 230, and 210) using structural equation modeling. Intrusive parenting at 18 and 30 months negatively predicted EC a year later, over and above earlier levels. EC at…

  2. PERFORMANCE COMPARISON FOR INTRUSION DETECTION SYSTEM USING NEURAL NETWORK WITH KDD DATASET

    Directory of Open Access Journals (Sweden)

    S. Devaraju

    2014-04-01

    Full Text Available Intrusion Detection Systems are challenging task for finding the user as normal user or attack user in any organizational information systems or IT Industry. The Intrusion Detection System is an effective method to deal with the kinds of problem in networks. Different classifiers are used to detect the different kinds of attacks in networks. In this paper, the performance of intrusion detection is compared with various neural network classifiers. In the proposed research the four types of classifiers used are Feed Forward Neural Network (FFNN, Generalized Regression Neural Network (GRNN, Probabilistic Neural Network (PNN and Radial Basis Neural Network (RBNN. The performance of the full featured KDD Cup 1999 dataset is compared with that of the reduced featured KDD Cup 1999 dataset. The MATLAB software is used to train and test the dataset and the efficiency and False Alarm Rate is measured. It is proved that the reduced dataset is performing better than the full featured dataset.

  3. Eating-related Intrusive Thoughts Inventory: exploring the dimensionality of eating disorder symptoms.

    Science.gov (United States)

    Perpiñá, Conxa; Roncero, María; Belloch, Amparo; Sánchez-Reales, Sergio

    2011-08-01

    The aims of this study were, first, to examine the structure and validity of the Eating-related Intrusive Thoughts Inventory (INPIAS), a self-report questionnaire designed to assess eating disorders related to intrusive thoughts (EDITs), and second, to explore the existence of a continuum ranging from normal to abnormal thought intrusions related to eating, weight, and shape. Participants were 574 (408 women) nonclinical community individuals. Analyses revealed that EDITs can be clustered into three sets: appearance-dieting, need to exercise, and thoughts-impulses related to eating disorders. EDITs' consequences showed a two-factor structure: emotional consequences/personal meaning and thought-action fusion responsibility; and four factors of strategies: "anxiety," suppression, obsessive-compulsive rituals, and distraction. The sample was then divided according to reported restrained eating. The High dietary restraint group reported a higher frequency of EDITs, whereas differences in the other factors were mediated by depression, anxiety, and obsessionality. The results suggest that eating disorder-related cognitions are experienced by nonclinical individuals, and distributed on a continuum.

  4. Abstracting massive data for lightweight intrusion detection in computer networks

    KAUST Repository

    Wang, Wei

    2016-10-15

    Anomaly intrusion detection in big data environments calls for lightweight models that are able to achieve real-time performance during detection. Abstracting audit data provides a solution to improve the efficiency of data processing in intrusion detection. Data abstraction refers to abstract or extract the most relevant information from the massive dataset. In this work, we propose three strategies of data abstraction, namely, exemplar extraction, attribute selection and attribute abstraction. We first propose an effective method called exemplar extraction to extract representative subsets from the original massive data prior to building the detection models. Two clustering algorithms, Affinity Propagation (AP) and traditional . k-means, are employed to find the exemplars from the audit data. . k-Nearest Neighbor (k-NN), Principal Component Analysis (PCA) and one-class Support Vector Machine (SVM) are used for the detection. We then employ another two strategies, attribute selection and attribute extraction, to abstract audit data for anomaly intrusion detection. Two http streams collected from a real computing environment as well as the KDD\\'99 benchmark data set are used to validate these three strategies of data abstraction. The comprehensive experimental results show that while all the three strategies improve the detection efficiency, the AP-based exemplar extraction achieves the best performance of data abstraction.

  5. Salt Intrusion in the Tweed Estuary

    Science.gov (United States)

    Uncles, R. J.; Stephens, J. A.

    1996-09-01

    Results are presented from a 2-week field programme in the Tweed Estuary, U.K. Maximum values of the empirically based Estuarine Richardson Number, Ri E, occurred during neap tides, and minimum values occurred during spring tides. Estimated values of Ri Evaried between 0·3 and 2·3, suggesting the occurrence of partially mixed to stratified conditions, depending on tidal state and freshwater inflow. These relatively large values of Ri Ewere consistent with both observed strong salinity stratification and large salt fluxes due to vertical shear transport. Low values (0·5) values in the halocline. A velocity maximum occurred within the halocline during the early flood. Wave-like spatial oscillations of the halocline occurred on the ebb. The oscillation troughs were situated above deep holes located just down-estuary of the rail and old road bridges. There was an indication that the constricted flow between the bridges' arches resulted in enhanced mixing of near-surface waters and a thickening of the halocline. It is also possible that these wave-like structures were stationary, near-critical internal lee waves, triggered by the deep holes. Trapping of high-salinity waters occurred on the ebb. Saline pools were isolated within a deep hole or deeper section of bed by the falling halocline. When the salt wedge moved further down-estuary, the ' trapped ' waters were subjected to strongly ebbing, overlying freshwater, and were subsequently entrained and flushed. The salinity intrusion was a strong function of spring-neap tidal state and a weaker function of freshwater inflow. The estimated salinity intrusion varied from about 4·7 to 7·6 km during the fieldwork period. The strong dependence on tidal range followed from the comparable lengths of the tidal excursion and salinity intrusion. Long excursion lengths were also partly responsible for the short residence (or flushing) times and their strong dependence on spring-neap tidal state. For typical summer freshwater

  6. Acceptance- and imagery-based strategies can reduce chocolate cravings: A test of the elaborated-intrusion theory of desire.

    Science.gov (United States)

    Schumacher, Sophie; Kemps, Eva; Tiggemann, Marika

    2017-06-01

    The elaborated-intrusion theory of desire proposes that craving is a two-stage process whereby initial intrusions about a desired target are subsequently elaborated with mental imagery. The present study tested whether the craving reduction strategies of cognitive defusion and guided imagery could differentially target the intrusion and elaboration stages, respectively, and thus differentially impact the craving process. Participants were randomly assigned to a cognitive defusion, a guided imagery or a mind-wandering control condition. Pre- and post-intervention chocolate-related thoughts, intrusiveness of thoughts, vividness of imagery, craving intensity, and chocolate consumption were compared. Experiment 1 recruited a general sample of young women (n = 94), whereas Experiment 2 recruited a sample of chocolate cravers who wanted to reduce their chocolate consumption (n = 97). Across both experiments, cognitive defusion lowered intrusiveness of thoughts, vividness of imagery and craving intensity. Guided imagery reduced chocolate-related thoughts, intrusiveness, vividness and craving intensity for chocolate cravers (Experiment 2), but not for the general sample (Experiment 1). There were no group differences in chocolate consumption in either experiment. Results add to existing evidence supporting the elaborated-intrusion theory of desire in the food domain, and suggest that acceptance- and imagery-based techniques have potential for use in combatting problematic cravings. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. Climate Change and Saltwater Intrusion along the Eastern ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Eastern Mediterranean is highly vulnerable to saltwater intrusion into the freshwater aquifers along its coasts. The degradation of these aquifers would result in serious socioeconomic consequence to people living there. This project will investigate how climate change is affecting the salinity of coastal aquifers at several ...

  8. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    the Earth that includes accretion and dispersal of supercontinents, viz., Columbia (Rogers and. Santosh 2002; Zhao et al 2004) and Rodinia. Keywords. Chhattisgarh Supergroup; Singhora Group; diabasic intrusive; geochemistry and age. J. Earth Syst. Sci. 120, No. 2, April 2011, pp. 223–236 c Indian Academy of Sciences.

  9. Trauma Films, Information Processing, and Intrusive Memory Development

    Science.gov (United States)

    Holmes, Emily A.; Brewin, Chris R.; Hennessy, Richard G.

    2004-01-01

    Three experiments indexed the effect of various concurrent tasks, while watching a traumatic film, on intrusive memory development. Hypotheses were based on the dual-representation theory of posttraumatic stress disorder (C. R. Brewin, T. Dalgleish, & S. Joseph, 1996). Nonclinical participants viewed a trauma film under various encoding conditions…

  10. Deglaciation, lake levels, and meltwater discharge in the Lake Michigan basin

    Science.gov (United States)

    Colman, Steven M.; Clark, J.A.; Clayton, L.; Hansel, A.K.; Larsen, C.E.

    1994-01-01

    The deglacial history of the Lake Michigan basin, including discharge and routing of meltwater, is complex because of the interaction among (1) glacial retreats and re-advances in the basin (2) the timing of occupation and the isostatic adjustment of lake outlets and (3) the depositional and erosional processes that left evidence of past lake levels. In the southern part of the basin, a restricted area little affected by differential isostasy, new studies of onshore and offshore areas allow refinement of a lake-level history that has evolved over 100 years. Important new data include the recognition of two periods of influx of meltwater from Lake Agassiz into the basin and details of the highstands gleaned from sedimentological evidence. Major disagreements still persist concerning the exact timing and lake-level changes associated with the Algonquin phase, approximately 11,000 BP. A wide variety of independent data suggests that the Lake Michigan Lobe was thin, unstable, and subject to rapid advances and retreats. Consequently, lake-level changes were commonly abrupt and stable shorelines were short-lived. The long-held beliefs that the southern part of the basin was stable and separated from deformed northern areas by a hinge-line discontinuity are becoming difficult to maintain. Numerical modeling of the ice-earth system and empirical modeling of shoreline deformation are both consistent with observed shoreline tilting in the north and with the amount and pattern of modern deformation shown by lake-level gauges. New studies of subaerial lacustrine features suggest the presence of deformed shorelines higher than those originally ascribed to the supposed horizontal Glenwood level. Finally, the Lake Michigan region as a whole appears to behave in a similar manner to other areas, both local (other Great Lakes) and regional (U.S. east coast), that have experienced major isostatic changes. Detailed sedimentological and dating studies of field sites and additional

  11. Acute effects of alcohol on intrusive memory development and viewpoint dependence in spatial memory support a dual representation model.

    Science.gov (United States)

    Bisby, James A; King, John A; Brewin, Chris R; Burgess, Neil; Curran, H Valerie

    2010-08-01

    A dual representation model of intrusive memory proposes that personally experienced events give rise to two types of representation: an image-based, egocentric representation based on sensory-perceptual features; and a more abstract, allocentric representation that incorporates spatiotemporal context. The model proposes that intrusions reflect involuntary reactivation of egocentric representations in the absence of a corresponding allocentric representation. We tested the model by investigating the effect of alcohol on intrusive memories and, concurrently, on egocentric and allocentric spatial memory. With a double-blind independent group design participants were administered alcohol (.4 or .8 g/kg) or placebo. A virtual environment was used to present objects and test recognition memory from the same viewpoint as presentation (tapping egocentric memory) or a shifted viewpoint (tapping allocentric memory). Participants were also exposed to a trauma video and required to detail intrusive memories for 7 days, after which explicit memory was assessed. There was a selective impairment of shifted-view recognition after the low dose of alcohol, whereas the high dose induced a global impairment in same-view and shifted-view conditions. Alcohol showed a dose-dependent inverted "U"-shaped effect on intrusions, with only the low dose increasing the number of intrusions, replicating previous work. When same-view recognition was intact, decrements in shifted-view recognition were associated with increases in intrusions. The differential effect of alcohol on intrusive memories and on same/shifted-view recognition support a dual representation model in which intrusions might reflect an imbalance between two types of memory representation. These findings highlight important clinical implications, given alcohol's involvement in real-life trauma. Copyright 2010 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.

  12. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  13. Feature Selection of Network Intrusion Data using Genetic Algorithm and Particle Swarm Optimization

    Directory of Open Access Journals (Sweden)

    Iwan Syarif

    2016-12-01

    Full Text Available This paper describes the advantages of using Evolutionary Algorithms (EA for feature selection on network intrusion dataset. Most current Network Intrusion Detection Systems (NIDS are unable to detect intrusions in real time because of high dimensional data produced during daily operation. Extracting knowledge from huge data such as intrusion data requires new approach. The more complex the datasets, the higher computation time and the harder they are to be interpreted and analyzed. This paper investigates the performance of feature selection algoritms in network intrusiona data. We used Genetic Algorithms (GA and Particle Swarm Optimizations (PSO as feature selection algorithms. When applied to network intrusion datasets, both GA and PSO have significantly reduces the number of features. Our experiments show that GA successfully reduces the number of attributes from 41 to 15 while PSO reduces the number of attributes from 41 to 9. Using k Nearest Neighbour (k-NN as a classifier,the GA-reduced dataset which consists of 37% of original attributes, has accuracy improvement from 99.28% to 99.70% and its execution time is also 4.8 faster than the execution time of original dataset. Using the same classifier, PSO-reduced dataset which consists of 22% of original attributes, has the fastest execution time (7.2 times faster than the execution time of original datasets. However, its accuracy is slightly reduced 0.02% from 99.28% to 99.26%. Overall, both GA and PSO are good solution as feature selection techniques because theyhave shown very good performance in reducing the number of features significantly while still maintaining and sometimes improving the classification accuracy as well as reducing the computation time.

  14. Great Lakes

    Science.gov (United States)

    Edsall, Thomas A.; Mac, Michael J.; Opler, Paul A.; Puckett Haecker, Catherine E.; Doran, Peter D.

    1998-01-01

    The Great Lakes region, as defined here, includes the Great Lakes and their drainage basins in Minnesota, Wisconsin, Illinois, Indiana, Ohio, Pennsylvania, and New York. The region also includes the portions of Minnesota, Wisconsin, and the 21 northernmost counties of Illinois that lie in the Mississippi River drainage basin, outside the floodplain of the river. The region spans about 9º of latitude and 20º of longitude and lies roughly halfway between the equator and the North Pole in a lowland corridor that extends from the Gulf of Mexico to the Arctic Ocean.The Great Lakes are the most prominent natural feature of the region (Fig. 1). They have a combined surface area of about 245,000 square kilometers and are among the largest, deepest lakes in the world. They are the largest single aggregation of fresh water on the planet (excluding the polar ice caps) and are the only glacial feature on Earth visible from the surface of the moon (The Nature Conservancy 1994a).The Great Lakes moderate the region’s climate, which presently ranges from subarctic in the north to humid continental warm in the south (Fig. 2), reflecting the movement of major weather masses from the north and south (U.S. Department of the Interior 1970; Eichenlaub 1979). The lakes act as heat sinks in summer and heat sources in winter and are major reservoirs that help humidify much of the region. They also create local precipitation belts in areas where air masses are pushed across the lakes by prevailing winds, pick up moisture from the lake surface, and then drop that moisture over land on the other side of the lake. The mean annual frost-free period—a general measure of the growing-season length for plants and some cold-blooded animals—varies from 60 days at higher elevations in the north to 160 days in lakeshore areas in the south. The climate influences the general distribution of wild plants and animals in the region and also influences the activities and distribution of the human

  15. Lakes, Lagerstaetten, and Evolution

    Science.gov (United States)

    Kordesch, E. G.; Park, L. E.

    2001-12-01

    The diversity of terrestrial systems is estimated to be greater than in the marine realm. However no hard data yet exists to substantiate this claim. Ancient lacustrine deposits may preserve an exceptionally diverse fossil fauna and aid in determining continental faunal diversities. Fossils preserved in lake deposits, especially those with exceptional preservation (i.e. Konservat Lagerstaetten), may represent a dependable method for determining species diversity changes in the terrestrial environment because of their faunal completeness. Important Konservat Lagerstaetten, such as the Green River Formation (US) and Messel (Germany), both Eocene in age, are found in lake sediments and show a remarkable faunal diversity for both vertebrates and invertebrates. To date information from nearly 25 lake lagerstaetten derived from different types of lake basins from the Carboniferous to the Miocene have been collected and described. Carboniferous sites derive from the cyclothems of Midcontinent of the US while many Cenozoic sites have been described from North and South America as well as Europe and Australia. Asian sites contain fossils from the Mesozoic and Cenozoic. With this data, insight into the evolutionary processes associated with lake systems can be examined. Do lakes act as unique evolutionary crucibles in contrast to marine systems? The speciation of cichlid fishes in present-day African lakes appears to be very high and is attributed to the diversity of environments found in large rift lakes. Is this true of all ancient lakes or just large rift lakes? The longevity of a lake system may be an important factor in allowing speciation and evolutionary processes to occur; marine systems are limited only in the existence of environments as controlled by tectonics and sea level changes, on the order of tens of millions of years. Rift lakes are normally the longest lived in the millions of years. Perhaps there are only certain types of lakes in which speciation of

  16. Suspended-sediment budget, flow distribution, and lake circulation for the Fox Chain of Lakes in Lake and McHenry Counties, Illinois, 1997-99

    Science.gov (United States)

    Schrader, David L.; Holmes, Robert R.

    2000-01-01

    The Fox Chain of Lakes is a glacial lake system in McHenry and Lake Counties in northern Illinois and southern Wisconsin. Sedimentation and nutrient overloading have occurred in the lake system since the first dam was built (1907) in McHenry to raise water levels in the lake system. Using data collected from December 1, 1997, to June 1, 1999, suspended-sediment budgets were constructed for the most upstream lake in the system, Grass Lake, and for the lakes downstream from Grass Lake. A total of 64,900 tons of suspended sediment entered Grass Lake during the study, whereas a total of 70,600 tons of suspended sediment exited the lake, indicating a net scour of 5,700 tons of sediment. A total of 44,100 tons of suspended sediment was measured exiting the Fox Chain of Lakes at Johnsburg, whereas 85,600 tons entered the system downstream from Grass Lake. These suspended-sediment loads indicate a net deposition of 41,500 tons downstream from Grass Lake, which represents a trapping efficiency of 48.5 percent. A large amount of recreational boating takes place on the Fox Chain of Lakes during summer months, and suspended-sediment load was observed to rise from 110 tons per day to 339 tons per day during the 1999 Memorial Day weekend (May 26 ?31, 1999). Presumably, this rise was the result of the boating traffic because no other hydrologic event is known to have occurred that might have caused the rise. This study covers a relatively short period and may not represent the long-term processes of the Fox Chain of Lakes system, although the sediment transport was probably higher than an average year. The bed sediments found on the bottom of the lakes are composed of mainly fine particles in the silt-clay range. The Grass Lake sediments were characterized as black peat with an organic content of between 9 and 18 percent, and the median particle size ranged from 0.000811 to 0.0013976 inches. Other bed material samples were collected at streamflow-gaging stations on the

  17. Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network

    DEFF Research Database (Denmark)

    Isah, Abdullahi

    The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria.......The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria....

  18. 33 CFR 162.220 - Hoover Dam, Lake Mead, and Lake Mohave (Colorado River), Ariz.-Nev.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Hoover Dam, Lake Mead, and Lake... REGULATIONS § 162.220 Hoover Dam, Lake Mead, and Lake Mohave (Colorado River), Ariz.-Nev. (a) Lake Mead and... the axis of Hoover Dam and that portion of Lake Mohave (Colorado River) extending 4,500 feet...

  19. Experimental Study of Nuclear Security System Components for Achieving the Intrusion Process via Sensor's Network System

    International Nuclear Information System (INIS)

    EL-Kafas, A.A.

    2011-01-01

    Cluster sensors are one of nuclear security system components which are used to detect any intrusion process of the nuclear sites. In this work, an experimental measuring test for sensor performance and procedures are presented. Sensor performance testing performed to determine whether a particular sensor will be acceptable in a proposed design. We have access to a sensors test field in which the sensor of interest is already properly installed and the parameters have been set to optimal levels by preliminary testing. The glass-breakage (G.B) and open door (O.D) sensors construction, operation and design for the investigated nuclear site are explained. Intrusion tests were carried out inside the field areas of the sensors to evaluate the sensor performance during the intrusion process. Experimental trials were performed for achieving the intrusion process via sensor network system. The performance and intrusion senses of cluster sensors inside the internal zones was recorded and evaluated. The obtained results explained that the tested and experimented G.B sensors have a probability of detection P (D) value 65% founded, and 80% P (D) of Open-door sensor

  20. First evidence of successful natural reproduction by planted lake trout in Lake Huron

    Science.gov (United States)

    Nester, Robert T.; Poe, Thomas P.

    1984-01-01

    Twenty-two lake trout (Salvelinus namaycush) swim-up fry, 24-27 mm long, were captured with emergent fry traps and a tow net in northwestern Lake Huron on a small nearshore reef off Alpena, Michigan, between May 10 and June 1, 1982. These catches represent the first evidence of successful production of swim-up fry by planted, hatchery-reared lake trout in Lake Huron since the lake trout rehabilitation program began in 1973.

  1. Estimation of lake water - groundwater interactions in meromictic mining lakes by modelling isotope signatures of lake water.

    Science.gov (United States)

    Seebach, Anne; Dietz, Severine; Lessmann, Dieter; Knoeller, Kay

    2008-03-01

    A method is presented to assess lake water-groundwater interactions by modelling isotope signatures of lake water using meteorological parameters and field data. The modelling of delta(18)O and deltaD variations offers information about the groundwater influx into a meromictic Lusatian mining lake. Therefore, a water balance model is combined with an isotope water balance model to estimate analogies between simulated and measured isotope signatures within the lake water body. The model is operated with different evaporation rates to predict delta(18)O and deltaD values in a lake that is only controlled by weather conditions with neither groundwater inflow nor outflow. Comparisons between modelled and measured isotope values show whether the lake is fed by the groundwater or not. Furthermore, our investigations show that an adaptation of the Craig and Gordon model [H. Craig, L.I. Gordon. Deuterium and oxygen-18 variations in the ocean and the marine atmosphere. In Stable Isotopes in Oceanographic Studies and Paleotemperature, Spoleto, E. Tongiorgi (Ed.), pp. 9-130, Consiglio Nazionale delle Ricerche, Laboratorio di Geologia Nucleare, Pisa (1965).] to specific conditions in temperate regions seems necessary.

  2. Playing the computer game Tetris prior to viewing traumatic film material and subsequent intrusive memories: Examining proactive interference.

    Science.gov (United States)

    James, Ella L; Lau-Zhu, Alex; Tickle, Hannah; Horsch, Antje; Holmes, Emily A

    2016-12-01

    Visuospatial working memory (WM) tasks performed concurrently or after an experimental trauma (traumatic film viewing) have been shown to reduce subsequent intrusive memories (concurrent or retroactive interference, respectively). This effect is thought to arise because, during the time window of memory consolidation, the film memory is labile and vulnerable to interference by the WM task. However, it is not known whether tasks before an experimental trauma (i.e. proactive interference) would also be effective. Therefore, we tested if a visuospatial WM task given before a traumatic film reduced intrusions. Findings are relevant to the development of preventative strategies to reduce intrusive memories of trauma for groups who are routinely exposed to trauma (e.g. emergency services personnel) and for whom tasks prior to trauma exposure might be beneficial. Participants were randomly assigned to 1 of 2 conditions. In the Tetris condition (n = 28), participants engaged in the computer game for 11 min immediately before viewing a 12-min traumatic film, whereas those in the Control condition (n = 28) had no task during this period. Intrusive memory frequency was assessed using an intrusion diary over 1-week and an Intrusion Provocation Task at 1-week follow-up. Recognition memory for the film was also assessed at 1-week. Compared to the Control condition, participants in the Tetris condition did not report statistically significant difference in intrusive memories of the trauma film on either measure. There was also no statistically significant difference in recognition memory scores between conditions. The study used an experimental trauma paradigm and findings may not be generalizable to a clinical population. Compared to control, playing Tetris before viewing a trauma film did not lead to a statistically significant reduction in the frequency of later intrusive memories of the film. It is unlikely that proactive interference, at least with this task

  3. Misuse and intrusion detection at Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1995-04-01

    An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in system audit records, in system vulnerability postures, and in other evidence found through active system testing. Since 1989 we have implemented a misuse and intrusion detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter, or NADIR. NADIR currently audits a Kerberos distributed authentication system, file activity on a mass, storage system, and four Cray supercomputers that run the UNICOS operating system. NADIR summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations, As NADIR is constantly evolving, this paper reports its development to date.

  4. Lake Sturgeon, Acipenser fulvescens, movements in Rainy Lake, Minnesota and Ontario

    Science.gov (United States)

    Adams, W.E.; Kallemeyn, L.W.; Willis, D.W.

    2006-01-01

    Rainy Lake, Minnesota-Ontario, contains a native population of Lake Sturgeon (Acipenser fulvescens) that has gone largely unstudied. The objective of this descriptive study was to summarize generalized Lake Sturgeon movement patterns through the use of biotelemetry. Telemetry data reinforced the high utilization of the Squirrel Falls geographic location by Lake Sturgeon, with 37% of the re-locations occurring in that area. Other spring aggregations occurred in areas associated with Kettle Falls, the Pipestone River, and the Rat River, which could indicate spawning activity. Movement of Lake Sturgeon between the Seine River and the South Arm of Rainy Lake indicates the likelihood of one integrated population on the east end of the South Arm. The lack of re-locations in the Seine River during the months of September and October may have been due to Lake Sturgeon moving into deeper water areas of the Seine River and out of the range of radio telemetry gear or simply moving back into the South Arm. Due to the movements between Minnesota and Ontario, coordination of management efforts among provincial, state, and federal agencies will be important.

  5. Determining lake surface water temperatures worldwide using a tuned one-dimensional lake model (FLake, v1)

    Science.gov (United States)

    Layden, Aisling; MacCallum, Stuart N.; Merchant, Christopher J.

    2016-06-01

    A tuning method for FLake, a one-dimensional (1-D) freshwater lake model, is applied for the individual tuning of 244 globally distributed large lakes using observed lake surface water temperatures (LSWTs) derived from along-track scanning radiometers (ATSRs). The model, which was tuned using only three lake properties (lake depth, snow and ice albedo and light extinction coefficient), substantially improves the measured mean differences in various features of the LSWT annual cycle, including the LSWTs of saline and high altitude lakes, when compared to the observed LSWTs. Lakes whose lake-mean LSWT persists below 1 °C for part of the annual cycle are considered to be seasonally ice-covered. For trial seasonally ice-covered lakes (21 lakes), the daily mean and standard deviation (2σ) of absolute differences between the modelled and observed LSWTs are reduced from 3.07 °C ± 2.25 °C to 0.84 °C ± 0.51 °C by tuning the model. For all other trial lakes (14 non-ice-covered lakes), the improvement is from 3.55 °C ± 3.20 °C to 0.96 °C ± 0.63 °C. The post tuning results for the 35 trial lakes (21 seasonally ice-covered lakes and 14 non-ice-covered lakes) are highly representative of the post-tuning results of the 244 lakes. For the 21 seasonally ice-covered lakes, the modelled response of the summer LSWTs to changes in snow and ice albedo is found to be statistically related to lake depth and latitude, which together explain 0.50 (R2adj, p = 0.001) of the inter-lake variance in summer LSWTs. Lake depth alone explains 0.35 (p = 0.003) of the variance. Lake characteristic information (snow and ice albedo and light extinction coefficient) is not available for many lakes. The approach taken to tune the model, bypasses the need to acquire detailed lake characteristic values. Furthermore, the tuned values for lake depth, snow and ice albedo and light extinction coefficient for the 244 lakes provide some guidance on improving FLake LSWT modelling.

  6. Human intrusion into geologic repositories for high-level radioactive waste: potential and prevention

    Energy Technology Data Exchange (ETDEWEB)

    Cameron, F X [Nuclear Regulatory Commission, Washington, DC (USA). Office of Nuclear Regulatory Research

    1981-12-01

    Isolation of high-level radioactive waste over long periods of time requires protection not only from natural events and processes, but also from the deliberate or inadvertent activities of future societies. This paper evaluates the likelihood of inadvertent human intrusion due to the loss of societal memory of the repository site. In addition measures to prevent inadvertent intrusion, and to guide future societies in any decision to deliberately intrude into the repository are suggested.

  7. Management of multiple intrusive luxative injuries: A case report with 7-year follow-up

    Directory of Open Access Journals (Sweden)

    Seema Thakur

    2014-01-01

    Full Text Available This report presents a case of severe intrusive luxation of multiple anterior teeth in an 11-year-old girl. The teeth were repositioned successfully by endodontic and orthodontic management. The case was monitored for 7 years. Depending on the severity of the injury, different clinical approaches for treatment of intrusive luxation may be used. Despite the variety of treatment modalities, rehabilitation of intruded teeth is always a challenge and a multidisciplinary approach is important to achieve a successful result. In this case, intruded teeth were endodontically treated with multiple calcium hydroxide dressings and repositioned orthodontically. The follow-up of such cases is very important as the repair process after intrusion is complex. After 7 years, no clinical or radiographic pathology was detected.

  8. Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid.

    Science.gov (United States)

    Li, Yuancheng; Qiu, Rixuan; Jing, Sitong

    2018-01-01

    Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can't satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy.

  9. Geochemical monitoring of volcanic lakes. A generalized box model for active crater lakes

    Directory of Open Access Journals (Sweden)

    Franco Tassi

    2011-06-01

    Full Text Available

    In the past, variations in the chemical contents (SO42−, Cl−, cations of crater lake water have not systematically demonstrated any relationships with eruptive activity. Intensive parameters (i.e., concentrations, temperature, pH, salinity should be converted into extensive parameters (i.e., fluxes, changes with time of mass and solutes, taking into account all the internal and external chemical–physical factors that affect the crater lake system. This study presents a generalized box model approach that can be useful for geochemical monitoring of active crater lakes, as highly dynamic natural systems. The mass budget of a lake is based on observations of physical variations over a certain period of time: lake volume (level, surface area, lake water temperature, meteorological precipitation, air humidity, wind velocity, input of spring water, and overflow of the lake. This first approach leads to quantification of the input and output fluxes that contribute to the actual crater lake volume. Estimating the input flux of the "volcanic" fluid (Qf- kg/s –– an unmeasurable subsurface parameter –– and tracing its variations with time is the major focus during crater lake monitoring. Through expanding the mass budget into an isotope and chemical budget of the lake, the box model helps to qualitatively characterize the fluids involved. The (calculated Cl− content and dD ratio of the rising "volcanic" fluid defines its origin. With reference to continuous monitoring of crater lakes, the present study provides tips that allow better calculation of Qf in the future. At present, this study offers the most comprehensive and up-to-date literature review on active crater lakes.

  10. Water-quality and lake-stage data for Wisconsin lakes, water year 2014

    Science.gov (United States)

    Manteufel, S. Bridgett; Robertson, Dale M.

    2017-05-25

    IntroductionThe U.S. Geological Survey (USGS), in cooperation with local and other agencies, collects data at selected lakes throughout Wisconsin. These data, accumulated over many years, provide a database for developing an improved understanding of the water quality of lakes. To make these data available to interested parties outside the USGS, the data are published annually in this report series. The locations of water-quality and lake-stage stations in Wisconsin for water year 2014 are shown in figure 1. A water year is the 12-month period from October 1 through September 30. It is designated by the calendar year in which it ends. Thus, the periodOctober 1, 2013, through September 30, 2014, is called “water year 2014.”The purpose of this report is to provide information about the chemical and physical characteristics of Wisconsin lakes. Data that have been collected at specific lakes, and information to aid in the interpretation of those data, are included in this report. Data collected include measurements of in-lake water quality and lake stage. Time series of Secchi depths, surface total phosphorus, and chlorophyll a concentrations collected during nonfrozen periods are included for many lakes. Graphs of vertical profiles of temperature, dissolved oxygen, pH, and specific conductance are included for sites where these parameters were measured. Descriptive information for each lake includes the location of the lake, area of the lake’s watershed, period for which data are available, revisions to previously published records, and pertinent remarks. Additional data, such as streamflow and water quality in tributary and outlet streams of some of the lakes, are published online at http://nwis.waterdata.usgs.gov/wi/nwis.Water-resources data, including stage and discharge data at most streamflow-gaging stations, are available online. The Wisconsin Water Science Center’s home page is at https://www.usgs.gov/centers/wisconsin-water-science-center. Information

  11. Integrated Remote Sensing and Geophysical Investigations of the Geodynamic Activities at Lake Magadi, Southern Kenyan Rift

    Directory of Open Access Journals (Sweden)

    Akinola Adesuji Komolafe

    2012-01-01

    Full Text Available The tectonic lineaments and thermal structure of Lake Magadi, southern Kenyan rift system, were investigated using ASTER data and geophysical methods. Five N-S faults close to known hot springs were identified for geoelectric ground investigation. Aeromagnetic data were employed to further probe faults at greater depths and determine the Curie-point depth. Results indicate a funnel-shaped fluid-filled (mostly saline hydrothermal zone with relatively low resistivity values of less than 1 Ω-m, separated by resistive structures to the west and east, to a depth of 75 m along the resistivity profiles. There was evidence of saline hydrothermal fluid flow toward the surface through the fault splays. The observed faults extend from the surface to a depth of 7.5 km and are probably the ones that bound the graben laterally. They serve as major conduits for the upward heat flux in the study area. The aeromagnetics spectral analysis also revealed heat source emplacement at a depth of about 12 km. The relative shallowness implies a high geothermal gradient evidenced in the surface manifestations of hot springs along the lake margins. Correlation of the heat source with the hypocenters showed that the seismogenetic zone exists directly above the magmatic intrusion, forming the commencement of geodynamic activities.

  12. Hysteretic behavior in seawater intrusion in response to discontinuous drought periods

    Science.gov (United States)

    Salandin, P.; Darvini, G.

    2017-12-01

    The seawater intrusion (SWI) represents a relevant problem for communities living in many coastal regions and in small islands, where the amount of fresh water available for human consumption or irrigation purposes depends on the equilibrium between the natural groundwater recharge from precipitations and the surrounding sea. This issue is exacerbated by climate changes, and, as a consequence, the reduction of natural groundwater recharge and the decrease the seaward flows of fresh water rather than sea level rise, as recently demonstrated by Ketabchi et al. (2016), leads to magnify the seawater intrusion into coastal aquifers. The temporal fluctuation of the fresh water table level are a natural consequence of the interaction of the aquifer with a water body or due to the seasonal replenishment of the water table. The severe and prolonged drought phenomena as that observed in last years in some areas of the Mediterranean, as over the central western Mediterranean basin, Italy and Spain, where a decreasing trend in total precipitation was detected (Alpert et al., 2002) in addition to the rise in temperature, enlarges the variation of the freshwater flux and can magnify the progression of the saline wedge. In the present study we demonstrate that the presence of varying boundary constraints or forcing factors may lead to hysteretic behavior in saltwater intrusion, showing dependence of the saline wedge on historic conditions. Therefore, the dynamic behavior of SWI may depend on both the present and past forcing conditions. To this aim different transient simulations supported by evidences deduced from a physical model are carried out to assess the presence of the hysteretic effects in the SWI phenomenon and to evaluate its influence in the management of the coastal aquifers for both the rational exploitation and the corrected management of water resources. About 70% of the world's population dwells in coastal zones. Therefore the optimal exploitation of fresh

  13. Multi-Use Non-Intrusive Flow Characterization System (FCS), Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The innovation is a Multi-Use Non-Intrusive Flow Characterization System (FCS) for densified, normal boiling point, and two-phase cryogenic flows, capable of...

  14. Lake Michigan lake trout PCB model forecast post audit (oral presentation)

    Science.gov (United States)

    Scenario forecasts for total PCBs in Lake Michigan (LM) lake trout were conducted using the linked LM2-Toxics and LM Food Chain models, supported by a suite of additional LM models. Efforts were conducted under the Lake Michigan Mass Balance Study and the post audit represents an...

  15. Simulating Lake-Groundwater Interactions During Decadal Climate Cycles: Accounting For Variable Lake Area In The Watershed

    Science.gov (United States)

    Virdi, M. L.; Lee, T. M.

    2009-12-01

    The volume and extent of a lake within the topo-bathymetry of a watershed can change substantially during wetter and drier climate cycles, altering the interaction of the lake with the groundwater flow system. Lake Starr and other seepage lakes in the permeable sandhills of central Florida are vulnerable to climate changes as they rely exclusively on rainfall and groundwater for inflows in a setting where annual rainfall and recharge vary widely. The groundwater inflow typically arrives from a small catchment area bordering the lake. The sinkhole origin of these lakes combined with groundwater pumping from underlying aquifers further complicate groundwater interactions. Understanding the lake-groundwater interactions and their effects on lake stage over multi-decadal climate cycles is needed to manage groundwater pumping and public expectation about future lake levels. The interdependence between climate, recharge, changing lake area and the groundwater catchment pose unique challenges to simulating lake-groundwater interactions. During the 10-year study period, Lake Starr stage fluctuated more than 13 feet and the lake surface area receded and expanded from 96 acres to 148 acres over drier and wetter years that included hurricanes, two El Nino events and a La Nina event. The recently developed Unsaturated Zone Flow (UZF1) and Lake (LAK7) packages for MODFLOW-2005 were used to simulate the changing lake sizes and the extent of the groundwater catchment contributing flow to the lake. The lake area was discretized to occupy the largest surface area at the highest observed stage and then allowed to change size. Lake cells convert to land cells and receive infiltration as receding lake area exposes the underlying unsaturated zone to rainfall and recharge. The unique model conceptualization also made it possible to capture the dynamic size of the groundwater catchment contributing to lake inflows, as the surface area and volume of the lake changed during the study

  16. Lake Granbury and Lake Whitney Assessment Initiative Final Scientific/Technical Report Summary

    Energy Technology Data Exchange (ETDEWEB)

    Harris, B. L. [Texas AgriLife Research, College Station, TX (United States); Roelke, Daniel [Texas AgriLife Research, College Station, TX (United States); Brooks, Bryan [Texas AgriLife Research, College Station, TX (United States); Grover, James [Texas AgriLife Research, College Station, TX (United States)

    2010-10-11

    A team of Texas AgriLife Research, Baylor University and University of Texas at Arlington researchers studied the biology and ecology of Prymnesium parvum (golden algae) in Texas lakes using a three-fold approach that involved system-wide monitoring, experimentation at the microcosm and mesocosm scales, and mathematical modeling. The following are conclusions, to date, regarding this organism's ecology and potential strategies for mitigation of blooms by this organism. In-lake monitoring revealed that golden algae are present throughout the year, even in lakes where blooms do not occur. Compilation of our field monitoring data with data collected by Texas Parks and Wildlife and Brazos River Authority (a period spanning a decade) revealed that inflow and salinity variables affect bloom formations. Thresholds for algae populations vary per lake, likely due to adaptations to local conditions, and also to variations in lake-basin morphometry, especially the presence of coves that may serve as hydraulic storage zones for P. parvum populations. More specifically, our in-lake monitoring showed that the highly toxic bloom that occurred in Lake Granbury in the winter of 2006/2007 was eliminated by increased river inflow events. The bloom was flushed from the system. The lower salinities that resulted contributed to golden algae not blooming in the following years. However, flushing is not an absolute requirement for bloom termination. Laboratory experiments have shown that growth of golden algae can occur at salinities ~1-2 psu but only when temperatures are also low. This helps to explain why blooms are possible during winter months in Texas lakes. Our in-lake experiments in Lake Whitney and Lake Waco, as well as our laboratory experiments, revealed that cyanobacteria, or some other bacteria capable of producing algicides, were able to prevent golden algae from blooming. Identification of this organism is a high priority as it may be a key to managing golden algae

  17. AMDIS Case Conference: Intrusive Medication Safety Alerts.

    Science.gov (United States)

    Graham, J; Levick, D; Schreiber, R

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center's dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  18. AMDIS Case Conference: Intrusive Medication Safety Alerts

    OpenAIRE

    Graham, J.; Levick, D.; Schreiber, R.

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center’s dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  19. WIPP performance assessment: impacts of human intrusion

    International Nuclear Information System (INIS)

    Anderson, D.R.; Hunter, R.L.; Bertram-Howery, S.G.; Lappin, A.R.

    1989-01-01

    The Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico is a research and development facility that may become the USA's first and only mined geologic repository for transuranic waste. Human intrusion into the WIPP repository after closure has been shown by preliminary sensitivity analyses and calculations of consequences to be an important, and perhaps the most important, factor in long-term repository performance

  20. Intrusions in story recall: when over-learned information interferes with episodic memory recall. Evidence from Alzheimer's disease.

    Science.gov (United States)

    De Anna, Francesca; Attali, Eve; Freynet, Laurence; Foubert, Lucie; Laurent, Aurore; Dubois, Bruno; Dalla Barba, Gianfranco

    2008-03-01

    Patients with Alzheimer's disease (AD) suffer from distortions of memory. Among such distortions, intrusions in memory tests are frequently observed. In this study we describe the performance of a group of mild AD patients and a group of normal controls on the recall of three different types of stories: a previously unknown story, a well-known fairy-tale (Cinderella), and a modified well-known fairy-tale (Little Red Riding Hood is not eaten by the wolf). The aim of our study was to test the hypothesis that in patients who tend to produce intrusions, over-learned information interferes with episodic recall, i.e., the retrieval of specific, unique past episodes. AD patients produced significantly more intrusions in the recall of the modified fairy-tale compared to the recall of the two other stories. Intrusions in the recall of the modified fairy-tale always consisted of elements of the original version of the story. We suggest that in AD patients intrusions may be traced back to the interference of strongly represented, over-learned information in episodic memory recall.

  1. USEPA consideration of human intrusion in setting radioactive waste disposal standards

    International Nuclear Information System (INIS)

    Egan, D.J.; Hadlock, C.R.

    1989-01-01

    In 1985, the United States Environmental Protection Agency (USEPA) promulgated standards for the disposal of spent nuclear fuel and high-level and transuranic radioactive wastes (40 CFR Part 191). These standards placed limits, called containment requirements, on the projected releases of radioactivity due to both normal and accidental events for 10,000 years after disposal. The standards also contained qualitative assurance requirements that described the role foreseen for both active and passive institutional controls. They included both requirements for such institutional controls and limitations on the ways that they could be relied upon. This paper describes these assumptions about institutional controls made by the USEPA, and it discusses the types of future societies that would be consistent with such assumptions. The paper also reviews the USEPA's approach towards assessing the long-term performance of mined geologic repositories. In these assessments, the risks caused by inadvertent human intrusion into the area of a repository usually dominate the risks projected from other release scenarios. The assumptions made about inadvertent intrusion are discussed, and they are related to the policies regarding institutional controls. The disposal standards that the USEPA promulgated in 1985 were overturned by a Federal court in 1987, and the Agency is now preparing revised standards for public review and comment. These are expected to by published in 1990. However, the approaches regarding institutional controls and human intrusion are expected to remain the same as those used in 1985. Some paragraphs (selected by the NEA Secretariat) of 40 CFR Part 191, subpart B (as of 1985 version) with particular relevance to human intrusion are cited

  2. Pectin methyl esterase inhibits intrusive and symplastic cell growth in developing wood cells of Populus.

    Science.gov (United States)

    Siedlecka, Anna; Wiklund, Susanne; Péronne, Marie-Amélie; Micheli, Fabienne; Lesniewska, Joanna; Sethson, Ingmar; Edlund, Ulf; Richard, Luc; Sundberg, Björn; Mellerowicz, Ewa J

    2008-02-01

    Wood cells, unlike most other cells in plants, grow by a unique combination of intrusive and symplastic growth. Fibers grow in diameter by diffuse symplastic growth, but they elongate solely by intrusive apical growth penetrating the pectin-rich middle lamella that cements neighboring cells together. In contrast, vessel elements grow in diameter by a combination of intrusive and symplastic growth. We demonstrate that an abundant pectin methyl esterase (PME; EC 3.1.1.11) from wood-forming tissues of hybrid aspen (Populus tremula x tremuloides) acts as a negative regulator of both symplastic and intrusive growth of developing wood cells. When PttPME1 expression was up- and down-regulated in transgenic aspen trees, the PME activity in wood-forming tissues was correspondingly altered. PME removes methyl ester groups from homogalacturonan (HG) and transgenic trees had modified HG methylesterification patterns, as demonstrated by two-dimensional nuclear magnetic resonance and immunostaining using PAM1 and LM7 antibodies. In situ distributions of PAM1 and LM7 epitopes revealed changes in pectin methylesterification in transgenic trees that were specifically localized in expanding wood cells. The results show that en block deesterification of HG by PttPME1 inhibits both symplastic growth and intrusive growth. PttPME1 is therefore involved in mechanisms determining fiber width and length in the wood of aspen trees.

  3. Geophysical investigation of sentinel lakes in Lake, Seminole, Orange, and Volusia Counties, Florida

    Science.gov (United States)

    Reich, Christopher; Flocks, James; Davis, Jeffrey

    2012-01-01

    This study was initiated in cooperation with the St. Johns River Water Management District (SJRWMD) to investigate groundwater and surface-water interaction in designated sentinel lakes in central Florida. Sentinel lakes are a SJRWMD established set of priority water bodies (lakes) for which minimum flows and levels (MFLs) are determined. Understanding both the structure and lithology beneath these lakes can ultimately lead to a better understanding of the MFLs and why water levels fluctuate in certain lakes more so than in other lakes. These sentinel lakes have become important water bodies to use as water-fluctuation indicators in the SJRWMD Minimum Flows and Levels program and will be used to define long-term hydrologic and ecologic performance measures. Geologic control on lake hydrology remains poorly understood in this study area. Therefore, the U.S. Geological Survey investigated 16 of the 21 water bodies on the SJRWMD priority list. Geologic information was obtained by the tandem use of high-resolution seismic profiling (HRSP) and direct-current (DC) resistivity profiling to isolate both the geologic framework (structure) and composition (lithology). Previous HRSP surveys from various lakes in the study area have been successful in identifying karst features, such as subsidence sinkholes. However, by using this method only, it is difficult to image highly irregular or chaotic surfaces, such as collapse sinkholes. Resistivity profiling was used to complement HRSP by detecting porosity change within fractured or collapsed structures and increase the ability to fully characterize the subsurface. Lake Saunders (Lake County) is an example of a lake composed of a series of north-south-trending sinkholes that have joined to form one lake body. HRSP shows surface depressions and deformation in the substrate. Resistivity data likewise show areas in the southern part of the lake where resistivity shifts abruptly from approximately 400 ohm meters (ohm-m) along the

  4. Improving Accuracy of Intrusion Detection Model Using PCA and optimized SVM

    Directory of Open Access Journals (Sweden)

    Sumaiya Thaseen Ikram

    2016-06-01

    Full Text Available Intrusion detection is very essential for providing security to different network domains and is mostly used for locating and tracing the intruders. There are many problems with traditional intrusion detection models (IDS such as low detection capability against unknown network attack, high false alarm rate and insufficient analysis capability. Hence the major scope of the research in this domain is to develop an intrusion detection model with improved accuracy and reduced training time. This paper proposes a hybrid intrusiondetection model by integrating the principal component analysis (PCA and support vector machine (SVM. The novelty of the paper is the optimization of kernel parameters of the SVM classifier using automatic parameter selection technique. This technique optimizes the punishment factor (C and kernel parameter gamma (γ, thereby improving the accuracy of the classifier and reducing the training and testing time. The experimental results obtained on the NSL KDD and gurekddcup dataset show that the proposed technique performs better with higher accuracy, faster convergence speed and better generalization. Minimum resources are consumed as the classifier input requires reduced feature set for optimum classification. A comparative analysis of hybrid models with the proposed model is also performed.

  5. A Novel Algorithm for Intrusion Detection Based on RASL Model Checking

    Directory of Open Access Journals (Sweden)

    Weijun Zhu

    2013-01-01

    Full Text Available The interval temporal logic (ITL model checking (MC technique enhances the power of intrusion detection systems (IDSs to detect concurrent attacks due to the strong expressive power of ITL. However, an ITL formula suffers from difficulty in the description of the time constraints between different actions in the same attack. To address this problem, we formalize a novel real-time interval temporal logic—real-time attack signature logic (RASL. Based on such a new logic, we put forward a RASL model checking algorithm. Furthermore, we use RASL formulas to describe attack signatures and employ discrete timed automata to create an audit log. As a result, RASL model checking algorithm can be used to automatically verify whether the automata satisfy the formulas, that is, whether the audit log coincides with the attack signatures. The simulation experiments show that the new approach effectively enhances the detection power of the MC-based intrusion detection methods for a number of telnet attacks, p-trace attacks, and the other sixteen types of attacks. And these experiments indicate that the new algorithm can find several types of real-time attacks, whereas the existing MC-based intrusion detection approaches cannot do that.

  6. Great Lakes Literacy Principles

    Science.gov (United States)

    Fortner, Rosanne W.; Manzo, Lyndsey

    2011-03-01

    Lakes Superior, Huron, Michigan, Ontario, and Erie together form North America's Great Lakes, a region that contains 20% of the world's fresh surface water and is home to roughly one quarter of the U.S. population (Figure 1). Supporting a $4 billion sport fishing industry, plus $16 billion annually in boating, 1.5 million U.S. jobs, and $62 billion in annual wages directly, the Great Lakes form the backbone of a regional economy that is vital to the United States as a whole (see http://www.miseagrant.umich.edu/downloads/economy/11-708-Great-Lakes-Jobs.pdf). Yet the grandeur and importance of this freshwater resource are little understood, not only by people in the rest of the country but also by many in the region itself. To help address this lack of knowledge, the Centers for Ocean Sciences Education Excellence (COSEE) Great Lakes, supported by the U.S. National Science Foundation and the National Oceanic and Atmospheric Administration, developed literacy principles for the Great Lakes to serve as a guide for education of students and the public. These “Great Lakes Literacy Principles” represent an understanding of the Great Lakes' influences on society and society's influences on the Great Lakes.

  7. Human impact on lake ecosystems: the case of Lake Naivasha, Kenya

    African Journals Online (AJOL)

    Lake Naivasha is a wetland of national and international importance. However, it is under constant anthropogenic pressures, which include the quest for socioeconomic development within the lake ecosystem itself as well as other activities within the catchment. The lake is an important source of fresh water in an otherwise ...

  8. Lake whitefish and Diporeia spp. in the Great lakes: an overview

    Science.gov (United States)

    Nalepa, Thomas F.; Mohr, Lloyd C.; Henderson, Bryan A.; Madenjian, Charles P.; Schneeberger, Philip J.

    2005-01-01

    Because of growing concern in the Great Lakes over declines in abundance and growth of lake whitefish (Coregonus clupeaformis) and declines in abundance of the benthic amphipod Diporeia spp., a workshop was held to examine past and current trends, to explore trophic links, and to discuss the latest research results and needs. The workshop was divided into sessions on the status of populations in each of the lakes, bioenergetics and trophic dynamics, and exploitation and management. Abundance, growth, and condition of whitefish populations in Lakes Superior and Erie are stable and within the range of historical means, but these variables are declining in Lakes Michigan and Ontario and parts of Lake Huron. The loss of Diporeia spp., a major food item of whitefish, has been a factor in observed declines, particularly in Lake Ontario, but density-dependent factors also likely played a role in Lakes Michigan and Huron. The loss of Diporeia spp. is temporally linked to the introduction and proliferation of dreissenid mussels, but a direct cause for the negative response of Diporeia spp. has not been established. Given changes in whitefish populations, age-structured models need to be re-evaluated. Other whitefish research needs to include a better understanding of what environmental conditions lead to strong year-classes, improved aging techniques, and better information on individual population (stock) structure. Further collaborations between assessment biologists and researchers studying the lower food web would enhance an understanding of links between trophic levels.

  9. Novel Non-Intrusive Vibration Monitoring System for Turbopumps, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — AI Signal Research, Inc. proposes to develop a Non-Intrusive Vibration Measurement System (NI-VMS) for turbopumps which will provide effective on-board/off-board...

  10. Novel Non-Intrusive Vibration Monitoring System for Turbopumps, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — ASRI proposes to develop an advanced and commercially viable Non-Intrusive Vibration Monitoring System (NI-VMS) which can provide effective on-line/off-line engine...

  11. Dating of authigenic clays related to igneous intrusions in Hunter Valley Coals

    International Nuclear Information System (INIS)

    Zwingmann, H.

    2000-01-01

    The Sydney Basin is composed mainly of Permian and Triassic marine and non-marine clastic sedimentary strata together with economically significant coal deposits and volumetrically minor igneous rocks. Many of these igneous rocks are also economically significant not only for their use in the construction industry but also for their deleterious effects on coal mining, particularly in underground mines utilising longwall extraction systems. Igneous activity in the Sydney Basin ranges from Early Permian to Tertiary in age and although episodic in nature, activity was unlikely to have ceased for periods of more than approximately 10 million years (Carr and Facer 1980; Embleton et al. 1982). Dating of the time of emplacement of igneous rocks using the K-Ar isotopic system is a relatively straightforward procedure if suitable analytical facilities and samples of appropriate, fresh, primary minerals are available. In the case of intrusions in coal seams, however, the occurrence of fresh, primary minerals is very rare due to widespread alteration produced by interaction between the igneous rock and fluids in the coal seam. This interaction produces a variety of secondary minerals with most primary minerals and glass being altered to clays (mainly kaolinite) and carbonates. Consequently, relatively few isotopic dates for intrusions into coal seams have been determined. A detailed study of several hundred samples of igneous rocks from the Sydney Basin found only six samples of intrusions into coal seams that were suitable for conventional K-Ar dating (Carr and Facer 1980). Techniques for K-Ar dating of authigenic illite, developed in response to the need by the petroleum industry to understand the timing of diagenesis in petroleum source-rocks and reservoirs, are now well established (Clauer and Chaudhuri 1995). As part of a larger project on the impact of igneous intrusions on coal mining and the alienation of coal reserves, a preliminary investigation of the timing of

  12. Sources and distribution of microplastics in China's largest inland lake - Qinghai Lake.

    Science.gov (United States)

    Xiong, Xiong; Zhang, Kai; Chen, Xianchuan; Shi, Huahong; Luo, Ze; Wu, Chenxi

    2018-04-01

    Microplastic pollution was studied in China's largest inland lake - Qinghai Lake in this work. Microplastics were detected with abundance varies from 0.05 × 10 5 to 7.58 × 10 5 items km -2 in the lake surface water, 0.03 × 10 5 to 0.31 × 10 5 items km -2 in the inflowing rivers, 50 to 1292 items m -2 in the lakeshore sediment, and 2 to 15 items per individual in the fish samples, respectively. Small microplastics (0.1-0.5 mm) dominated in the lake surface water while large microplastics (1-5 mm) are more abundant in the river samples. Microplastics were predominantly in sheet and fiber shapes in the lake and river water samples but were more diverse in the lakeshore sediment samples. Polymer types of microplastics were mainly polyethylene (PE) and polypropylene (PP) as identified using Raman Spectroscopy. Spatially, microplastic abundance was the highest in the central part of the lake, likely due to the transport of lake current. Based on the higher abundance of microplastics near the tourist access points, plastic wastes from tourism are considered as an important source of microplastics in Qinghai Lake. As an important area for wildlife conservation, better waste management practice should be implemented, and waste disposal and recycling infrastructures should be improved for the protection of Qinghai Lake. Copyright © 2018 Elsevier Ltd. All rights reserved.

  13. Thermal History and Crystallinity of Sheet Intrusions

    Science.gov (United States)

    Whittington, A. G.; Nabelek, P. I.; Hofmeister, A.

    2011-12-01

    Magma emplaced in a sheet intrusion has two potential fates: to crystallize, or quench to glass. Rapidly chilled sheet margins are typically glassy or microcrystalline, while interiors are coarser-grained. The actual textures result from a combination of thermal history and crystallization kinetics, which are related by various feedback mechanisms. The thermal history of cooling sheet intrusions is often approximated using the analytical solution for a semi-infinite half-space, which uses constant thermal properties such as heat capacity (CP), thermal diffusivity (D) and thermal conductivity (k = DρCP), where ρ is density. In reality, both CP and D are strongly T-dependent for glasses and crystals, and melts have higher CP and lower D than crystals or glasses. Another first-order feature ignored in the analytical solution is latent heat of crystallization (ΔHxt), which can be implemented numerically as extra heat capacity over the crystallization interval. For rhyolite melts, D is ~0.5 mm2s-1 and k is ~1.5 Wm-1K-1, which are similar to those of major crustal rock types and granitic protoliths at magmatic temperatures, suggesting that changes in thermal properties accompanying partial melting of the crust should be relatively minor. Numerical models of hot (~920°C liquidus for 0.5 wt.% H2O) shallow rhyolite intrusions indicate that the key difference in thermal history between bodies that quench to obsidian, and those that crystallize, results from the release of latent heat of crystallization, which enables bodies that crystallize to remain at high temperatures for much longer times. The time to solidification is similar in both cases, however, because solidification requires cooling through the glass transition (Tg ~620°C) in the first case, and cooling only to the solidus (~770°C) in the second. For basaltic melts, D is ~0.3 mm2s-1 and k is ~1.0 Wm-1K-1, compared to ~0.6 mm2s-1 and 2.5 Wm-1K-1 for crystalline basalt or peridotite at magmatic temperatures

  14. New Observations of the Gulf of Aden Intermediate Water Intrusion into the Red Sea.

    Science.gov (United States)

    Bower, A.; Abualnaja, Y.

    2012-04-01

    The three-layer exchange flow between the Red Sea and the Indian Ocean during summer is characterized by a thick, northward intrusion of relatively cold, low-salinity and low in dissolved oxygen (Water (GAIW), sandwiched between two thin layers of outflow water. The flux of GAIW into the Red Sea is important in the heat, freshwater and nutrient budgets of the Red Sea, but the structure and pathways of the intrusion are not well-known due to a paucity of hydrographic and direct velocity observations. A research cruise was executed at the eastern side of the Red Sea during September-October 2011 to conduct the first large-scale survey of the intrusion. This mission is part of a series of expeditions in the Red Sea designed to investigate the seasonal Red Sea circulation. Surprisingly, the GAIW intrusion was observed to stretch nearly the entire length of the Red Sea (~1500 km) as a narrow eastern boundary current with subsurface velocity maximum of 0.1-0.3 m/s in the depth range 50-100 m. The intruding layer is weakly stratified compared to the background, possibly an indication of strong vertical mixing as it flows through the strait. Some GAIW was observed to enter deep channels in a coral reef bank (Farasan Banks) located in the southeastern Red Sea, and to enter the Red Sea interior, the latter possibly due to interactions between the boundary current and mesoscale eddies. The pathways and erosion of the GAIW intrusion will likely have major implications for the spatial distribution of biological productivity.

  15. Scalable High-Performance Parallel Design for Network Intrusion Detection Systems on Many-Core Processors

    OpenAIRE

    Jiang, Hayang; Xie, Gaogang; Salamatian, Kavé; Mathy, Laurent

    2013-01-01

    Network Intrusion Detection Systems (NIDSes) face significant challenges coming from the relentless network link speed growth and increasing complexity of threats. Both hardware accelerated and parallel software-based NIDS solutions, based on commodity multi-core and GPU processors, have been proposed to overcome these challenges. Network Intrusion Detection Systems (NIDSes) face significant challenges coming from the relentless network link speed growth and increasing complexity of threats. ...

  16. Outflows of groundwater in lakes: case study of Lake Raduńske Górne

    Directory of Open Access Journals (Sweden)

    Cieśliński Roman

    2014-12-01

    Full Text Available The aim of the study was to locate and describe groundwater outflows in a selected lake basin. The study hypothesis was based on the fact that, according to the specialist literature, one of the forms of lake water supply is through groundwater outflows. It was also assumed that the lakes of the Kashubian Lake District are characterised by such a form of lake water supply. The time scope of the work included the period from January 2011 to September 2012. The spatial scope of the work included the area of Lake Raduńskie Górne, located in the Kashubian Lake District in north Poland. The research plot was in the north-eastern part of the lake. Office works were aimed at gathering and studying source materials and maps. Cartographic materials were analysed with the use of the MapInfo Professional 9.5. The purpose of the field work was to find the groundwater outflows in the basin of Lake Raduńskie Górne. During the field research diving was carried out in the lake. During the dive audiovisual documentation was conducted using a Nikon D90 camera with Ikelite underwater housing for Nikon D90 and an Ikelite DS 161 movie substrobe, as well as a GoPro HD HERO 2 Outdoor camera. During the project, four groundwater outflows were found. In order to examine these springs audiovisual and photographic documentation was made. To systematise the typology of the discovered springs, new nomenclature was suggested, namely under-lake springs with subtypes: an under-lake slope spring and under-lake offshore spring

  17. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data

    Science.gov (United States)

    2012-03-01

    52 Table 7. Place Reachability Statistics for Low Level CPN...54 Table 8. Place Reachability Statistics for High Level CPN................................................. 55 Table 9. Password Stealing...the efficiency of traditional anti-virus software tools that are dependent on gigantic , continuously updated databases. Fortunately, Intrusion

  18. Salt intrusion study in Cochin estuary - Using empirical models

    Digital Repository Service at National Institute of Oceanography (India)

    Jacob, B.; Revichandran, C.; NaveenKumar, K.R.

    been applied to the Cochin estuary in the present study to identify the most suitable model for predicting the salt intrusion length. Comparison of the obtained results indicate that the model of Van der Burgh (1972) is the most suitable empirical model...

  19. Changing values of lake ecosystem services as a result of bacteriological contamination on Lake Trzesiecko and Lake Wielimie, Poland

    Directory of Open Access Journals (Sweden)

    Cichoń Małgorzata

    2017-12-01

    Full Text Available Lake ecosystems, on the one hand, are affected by tourism, and on the other by development for tourism. Lake ecosystem services include: water with its self-cleaning processes, air with climate control processes, as well as flora and fauna. Utilisation of services leads to interventions in the structure of ecosystems and their processes. Only to a certain extent, this is specific to each type of environmental interference, remains within the limits of ecosystem resilience and does not lead to its degradation. One of the threats is bacteriological contamination, for which the most reliable sanitation indicator is Escherichia coli. In lake water quality studies it is assumed that the lakeshore cannot be a source of bacteria. It has been hypothesised that the problem of bacterial contamination can be serious for the places that do not have any infrastructure, especially sanitation. Consequently, the purpose of the study was to determine the extent to which lakeshore sanitation, in particular the level of bacteriological contamination, has an impact on the value of services provided by the selected lake ecosystems (Lake Trzesiecko and Lake Wielimie – Szczecinek Lake District. Five selected services related to lake ecosystems are: water, control over the spread of contagious diseases, aesthetic values, tourism and recreation, as well as the hydrological cycle with its self-cleaning function. Services, as well as the criteria adopted for evaluation, allow us to conclude that the services provided by the lake ecosystems are suitable to fulfill a recreation function. However, the inclusion of quality criteria for sanitary status has shown that the value of system services has dropped by as much as 50%. Value changes are visible primarily for water and aesthetic qualities. Such a significant decrease in the value of services clearly indicates the importance of the sanitary conditions of lakes and their appropriate infrastructure. In view of the

  20. Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM in advanced metering infrastructure of smart grid.

    Directory of Open Access Journals (Sweden)

    Yuancheng Li

    Full Text Available Advanced Metering Infrastructure (AMI realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can't satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy.

  1. Resilience and Restoration of Lakes

    Directory of Open Access Journals (Sweden)

    Stephen R. Carpenter

    1997-06-01

    Full Text Available Lake water quality and ecosystem services are normally maintained by several feedbacks. Among these are nutrient retention and humic production by wetlands, nutrient retention and woody habitat production by riparian forests, food web structures that cha nnel phosphorus to consumers rather than phytoplankton, and biogeochemical mechanisms that inhibit phosphorus recycling from sediments. In degraded lakes, these resilience mechanisms are replaced by new ones that connect lakes to larger, regional economi c and social systems. New controls that maintain degraded lakes include runoff from agricultural and urban areas, absence of wetlands and riparian forests, and changes in lake food webs and biogeochemistry that channel phosphorus to blooms of nuisance al gae. Economic analyses show that degraded lakes are significantly less valuable than normal lakes. Because of this difference in value, the economic benefits of restoring lakes could be used to create incentives for lake restoration.

  2. Manipulating recall vantage perspective of intrusive memories in dysphoria.

    Science.gov (United States)

    Williams, Alishia D; Moulds, Michelle L

    2008-10-01

    The current study attempted to experimentally manipulate mode of recall (field, observer perspective) in a sample of mildly dysphoric participants (N=134) who reported a distressing intrusive memory of negative autobiographical event. Specifically, the current study sought to ascertain whether shifting participants into a converse perspective would have differential effects on the reported experience of their memory. Results indicated that shifting participants from a field to an observer perspective resulted in decreased experiential ratings: specifically, reduced distress and vividness. Also, as anticipated, the converse shift in perspective (from observer to field) did not lead to a corresponding increase in experiential ratings, but did result in reduced ratings of observation and a trend was observed for decreased levels of detachment. The findings support the notion that recall perspective has a functional role in the regulation of intrusion-related distress and represents a cognitive avoidance mechanism.

  3. Kissing Bug ( spp. Intrusion into Homes: Troublesome Bites and Domiciliation

    Directory of Open Access Journals (Sweden)

    Stephen A. Klotz

    2016-01-01

    Full Text Available Kissing bugs ( Triatoma spp. frequently enter homes and bite human and pet occupants. Bites may lead to severe allergic reactions and, in some cases, death. Kissing bugs are also vectors of Trypanosoma cruzi , the cause of Chagas disease. In general, modern houses in the United States are not conducive to domiciliation of kissing bugs (bugs living out their entire life within the home with the presence of eggs, nymphs, adults, and exuviae. Construction features such as concrete foundations, solid walls and ceilings, window screens, tight thresholds for doors and windows, and other measures impede bug entry into homes, and air conditioning reduces the need for open doors and windows. Where Chagas disease is endemic in Mexico and Central and South America, homes often have thatch roofs, adobe walls, and open doors and windows. We investigated numerous instances of kissing bug intrusions into homes in Southern Arizona, California, and Louisiana and documented the reactions to kissing bug bites. Our work confirms the importance of modern home construction in limiting kissing bug intrusions. Older homes, especially those lacking modern screening, caulking, and weather stripping to reduce air leakage, may be subject to kissing bug intrusions and domiciliation. We describe a community in Southern Arizona where domiciliation of homes by Triatoma recurva is common. We also provide recent data regarding kissing bug bites and allergic reactions to the bites.

  4. Uncertainty quantification for criticality problems using non-intrusive and adaptive Polynomial Chaos techniques

    International Nuclear Information System (INIS)

    Gilli, L.; Lathouwers, D.; Kloosterman, J.L.; Hagen, T.H.J.J. van der; Koning, A.J.; Rochman, D.

    2013-01-01

    Highlights: ► Non-intrusive spectral techniques are applied to perform UQ of criticality problems. ► A new adaptive algorithm based on the definition of sparse grid is derived. ► The method is applied to two reference criticality problems. - Abstract: In this paper we present the implementation and the application of non-intrusive spectral techniques for uncertainty analysis of criticality problems. Spectral techniques can be used to reconstruct stochastic quantities of interest by means of a Fourier-like expansion. Their application to uncertainty propagation problems can be performed in a non-intrusive fashion by evaluating a set of projection integrals that are used to reconstruct the spectral expansion. This can be done either by using standard Monte Carlo integration approaches or by adopting numerical quadrature rules. We present the derivation of a new adaptive quadrature algorithm, based on the definition of a sparse grid, which can be used to reduce the computational cost associated with non-intrusive spectral techniques. This new adaptive algorithm and the Monte Carlo integration alternative are then applied to two reference problems. First, a stochastic multigroup diffusion problem is introduced by considering the microscopic cross-sections of the system to be random quantities. Then a criticality benchmark is defined for which a set of resonance parameters in the resolved region are assumed to be stochastic

  5. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jian Wang

    2017-05-01

    Full Text Available This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  6. Thought-action fusion as a causal factor in the development of intrusions.

    Science.gov (United States)

    Rassin, E; Merckelbach, H; Muris, P; Spaan, V

    1999-03-01

    Thought-action fusion refers to the tendency to treat thoughts and actions as equivalents. Some authors (e.g., Rachman, 1997; Behaviour Research and Therapy, 35, 793-802) have suggested that thought-action fusion plays a role in the etiology of obsessive intrusions. The present study sought to test this idea. Subjects (n = 19) in the experimental condition underwent a bogus EEG recording session. They were informed that the apparatus was able to pick up the word 'apple' and that thoughts of that word could result in the administration of electrical shocks to another person. After having spent 15 minutes in the EEG laboratory, experimental subjects and controls (n = 26) completed a short questionnaire containing items about characteristics of the target thought (e.g., frequency, aversiveness). Results indicate that thought-action fusion, indeed, promotes intrusive thinking in that it results in a higher frequency of target thoughts, more discomfort, and more resistance. Thus, the current findings support the idea that thought-action fusion may contribute to the development of obsessive intrusions.

  7. Using a time lapse microgravity model for mapping seawater intrusion around Semarang

    Energy Technology Data Exchange (ETDEWEB)

    Supriyadi,, E-mail: supriyadi@mail.unnes.ac.id; Khumaedi [Physics Department, Semarang State University (UNNES), D7 Building 2nd Floor FMIPA Sekaran Gunungpati (Indonesia); Yusuf, M. [Badan Meteologi Klimatologi Goefisika (BMKG), Jl.Angkasa I No.2 Kemayoran Jakarta Pusat (Indonesia); Agung, W. [Physics Department, Diponegoro University (UNDIP), Jl. Prof. Soedharto, Tembalang, Semarang (Indonesia)

    2016-03-11

    A modeling of time-lapse microgravity anomaly due to sea water intrusion has been conducted. It used field data of aquifer cross section, aquifer thickness and lithology of research area. Those data were then processed using Grav3D and Surfer. Modeling results indicated that the intrusion of sea water resulting in a time-lapse microgravity anomalies of 0.12 to 0.18 mGal, at soil layer density of 0.15 g/cm{sup 3} to 0.3 g/cm{sup 3} and at depth of 30 to 100 m. These imply that the areas experiencing seawater intrusion were Tanjung Mas, SPBE Bandarharjo, Brass, Old Market Boom and Johar as the microgravity measured there were in the range of 0.12 to 0.18 mGal and the density contrast were at 0.15 g/cm{sup 3} to 0.28 g/cm{sup 3}. Areas that experienced fluid reduction were Puri Anjasmoro, Kenconowungu and Puspowarno with microgravity changes from -0.06 mGal to -0.18 mGal.

  8. Research on intrusion detection based on Kohonen network and support vector machine

    Science.gov (United States)

    Shuai, Chunyan; Yang, Hengcheng; Gong, Zeweiyi

    2018-05-01

    In view of the problem of low detection accuracy and the long detection time of support vector machine, which directly applied to the network intrusion detection system. Optimization of SVM parameters can greatly improve the detection accuracy, but it can not be applied to high-speed network because of the long detection time. a method based on Kohonen neural network feature selection is proposed to reduce the optimization time of support vector machine parameters. Firstly, this paper is to calculate the weights of the KDD99 network intrusion data by Kohonen network and select feature by weight. Then, after the feature selection is completed, genetic algorithm (GA) and grid search method are used for parameter optimization to find the appropriate parameters and classify them by support vector machines. By comparing experiments, it is concluded that feature selection can reduce the time of parameter optimization, which has little influence on the accuracy of classification. The experiments suggest that the support vector machine can be used in the network intrusion detection system and reduce the missing rate.

  9. multiUQ: An intrusive uncertainty quantification tool for gas-liquid multiphase flows

    Science.gov (United States)

    Turnquist, Brian; Owkes, Mark

    2017-11-01

    Uncertainty quantification (UQ) can improve our understanding of the sensitivity of gas-liquid multiphase flows to variability about inflow conditions and fluid properties, creating a valuable tool for engineers. While non-intrusive UQ methods (e.g., Monte Carlo) are simple and robust, the cost associated with these techniques can render them unrealistic. In contrast, intrusive UQ techniques modify the governing equations by replacing deterministic variables with stochastic variables, adding complexity, but making UQ cost effective. Our numerical framework, called multiUQ, introduces an intrusive UQ approach for gas-liquid flows, leveraging a polynomial chaos expansion of the stochastic variables: density, momentum, pressure, viscosity, and surface tension. The gas-liquid interface is captured using a conservative level set approach, including a modified reinitialization equation which is robust and quadrature free. A least-squares method is leveraged to compute the stochastic interface normal and curvature needed in the continuum surface force method for surface tension. The solver is tested by applying uncertainty to one or two variables and verifying results against the Monte Carlo approach. NSF Grant #1511325.

  10. Orthodontic intrusion of maxillary incisors: a 3D finite element method study

    Directory of Open Access Journals (Sweden)

    Armando Yukio Saga

    2016-02-01

    Full Text Available Objective: In orthodontic treatment, intrusion movement of maxillary incisors is often necessary. Therefore, the objective of this investigation is to evaluate the initial distribution patterns and magnitude of compressive stress in the periodontal ligament (PDL in a simulation of orthodontic intrusion of maxillary incisors, considering the points of force application. Methods: Anatomic 3D models reconstructed from cone-beam computed tomography scans were used to simulate maxillary incisors intrusion loading. The points of force application selected were: centered between central incisors brackets (LOAD 1; bilaterally between the brackets of central and lateral incisors (LOAD 2; bilaterally distal to the brackets of lateral incisors (LOAD 3; bilaterally 7 mm distal to the center of brackets of lateral incisors (LOAD 4. Results and Conclusions: Stress concentrated at the PDL apex region, irrespective of the point of orthodontic force application. The four load models showed distinct contour plots and compressive stress values over the midsagittal reference line. The contour plots of central and lateral incisors were not similar in the same load model. LOAD 3 resulted in more balanced compressive stress distribution.

  11. Yellowstone Lake Nanoarchaeota

    Directory of Open Access Journals (Sweden)

    Scott eClingenpeel

    2013-09-01

    Full Text Available Considerable Nanoarchaeota novelty and diversity were encountered in Yellowstone Lake, Yellowstone National Park, where sampling targeted lake floor hydrothermal vent fluids, streamers and sediments associated with these vents, and in planktonic photic zones in three different regions of the lake. Significant homonucleotide repeats (HR were observed in pyrosequence reads and in near full-length Sanger sequences, averaging 112 HR per 1,349 bp clone and could confound diversity estimates derived from pyrosequencing, resulting in false nucleotide insertions or deletions (indels. However, Sanger sequencing of two different sets of PCR clones (110 bp, 1349 bp demonstrated that at least some of these indels are real. The majority of the Nanoarchaeota PCR amplicons were vent associated; however, curiously, one relatively small Nanoarchaeota OTU (70 pyrosequencing reads was only found in photic zone water samples obtained from a region of the lake furthest removed from the hydrothermal regions of the lake. Extensive pyrosequencing failed to demonstrate the presence of an Ignicoccus lineage in this lake, suggesting the Nanoarchaeota in this environment are associated with novel Archaea hosts. Defined phylogroups based on near full-length PCR clones document the significant Nanoarchaeota 16S rRNA gene diversity in this lake and firmly establish a terrestrial clade distinct from the marine Nanoarcheota as well as from other geographical locations.

  12. Large-scale circulation associated with moisture intrusions into the Arctic during winter

    Science.gov (United States)

    Woods, Cian; Caballero, Rodrigo; Svensson, Gunilla

    2014-05-01

    Observations during recent decades show that there is a greater near surface warming occurring in the Arctic, particularly during winter, than at lower latitudes. Understanding the mechanisms controlling surface temperature in the Arctic is therefore an important priority in climate research. The surface energy budget is a key proximate control on Arctic surface temperature. During winter, insolation is low or absent and the atmospheric boundary layer is typically very stable, limiting turbulent hear exchange, so that the surface energy budget is almost entirely governed by longwave radiation. The net surface longwave radiation (NetLW) at this time has a strikingly bimodal distribution: conditions oscillate between a 'radiatively clear' state with rapid surface heat loss and a "moist cloudy" state with NetLW ˜ 0 W m-2. Each state can persist for days or weeks at a time but transitions between them happen in a matter of hours. This distribution of NetLW has important implications for the Arctic climate, as even a small shift in the frequency of occupancy of each state would be enough to significantly affect the overall surface energy budget and thus winter sea ice thickness. The clear and cloudy states typically occur during periods of relatively high and low surface pressure respectively, suggesting a link with synoptic-scale dynamics. This suggestion is consistent with previous studies indicating that the formation of low-level and mid-level clouds over the Arctic Ocean is typically associated with cyclonic activity and passing frontal systems . More recent work has shown that intense filamentary moisture intrusion events are a common feature in the Arctic and can induce large episodic increases of longwave radiation into the surface. The poleward transport of water vapor across 70N during boreal winter is examined in the ERA-Interim reanalysis product and 16 of the Coupled Model Intercomparison Project Phase 5 (CMIP5) models, focusing on intense moisture

  13. Contaminant trends in lake trout and walleye from the Laurentian Great Lakes

    Science.gov (United States)

    DeVault, David S.; Hesselberg, Robert J.; Rodgers, Paul W.; Feist, Timothy J.

    1996-01-01

    Trends in PCBs, DDT, and other contaminants have been monitored in Great Lakes lake trout and walleye since the 1970s using composite samples of whole fish. Dramatic declines have been observed in concentrations of PCB, ΣDDT, dieldrin, and oxychlordane, with declines initially following first order loss kinetics. Mean PCB concentrations in Lake Michigan lake trout increased from 13 μg/g in 1972 to 23 μg/g in 1974, then declined to 2.6 μg/g by 1986. Between 1986 and 1992 there was little change in concentration, with 3.5 μg/g observed in 1992. ΣDDT in Lake Michigan trout followed a similar trend, decreasing from 19.2 μg/g in 1970 to 1.1 μg/g in 1986, and 1.2 μg/g in 1992. Similar trends were observed for PCBs and ΣDDT in lake trout from Lakes Superior, Huron and Ontario. Concentrations of both PCB and ΣDDT in Lake Erie walleye declined between 1977 and 1982, after which concentrations were relatively constant through 1990. When originally implemented it was assumed that trends in the mean contaminant concentrations in open-lake fish would serve as cost effective surrogates to trends in the water column. While water column data are still extremely limited it appears that for PCBs in lakes Michigan and Superior, trends in lake trout do reasonably mimic those in the water column over the long term. Hypotheses to explain the trends in contaminant concentrations are briefly reviewed. The original first order loss kinetics used to describe the initial decline do not explain the more recent leveling off of contaminant concentrations. Recent theories have examined the possibilities of multiple contaminant pools. We suggest another hypothesis, that changes in the food web may have resulted in increased bioaccumulation. However, a preliminary exploration of this hypothesis using a change point analysis was inconclusive.

  14. Pollution at Lake Mariut

    International Nuclear Information System (INIS)

    Nour ElDin, H.; Halim, S. N.; Shalby, E.

    2004-01-01

    Lake Mariut, south Alexandria, Egypt suffered in the recent decades from intensive pollution as a result of a continuous discharge of huge amounts of agriculture wastewater that contains a large concentration of the washed pesticides and fertilizers in addition to domestic and industrial untreated wastewater. The over flow from the lake is discharged directly to the sea through El-Max pumping station via EI-Umum drain. Lake Mariout is surrounded by a huge number of different industrial activities and also the desert road is cutting the lake, this means that a huge number of various pollutants cycle through the air and settle down in the lake, by the time and during different seasons these pollutants after accumulation and different chemical interactions will release again from the lake to the surrounding area affecting the surrounding zone

  15. Disclosure of negative intrusions : the relationship with thought-action fusion, shame, guilt and fear.

    OpenAIRE

    Wells-Britton, Kaighley; Simonds, Laura

    2017-01-01

    Background: Given their highly unacceptable nature, negative intrusions are likely to promote the experience of negative affect such as fear, shame and guilt. Moreover, moral thought-action fusion (believing that negative thinking is the equivalent of acting immorally) is likely to inflate the occurrence of negative affect when intrusions are experienced. In turn, negative affect is likely related to disclosure. The current study investigated whether thought-action fusion beliefs predict anti...

  16. Long-Term Variability of Satellite Lake Surface Water Temperatures in the Great Lakes

    Science.gov (United States)

    Gierach, M. M.; Matsumoto, K.; Holt, B.; McKinney, P. J.; Tokos, K.

    2014-12-01

    The Great Lakes are the largest group of freshwater lakes on Earth that approximately 37 million people depend upon for fresh drinking water, food, flood and drought mitigation, and natural resources that support industry, jobs, shipping and tourism. Recent reports have stated (e.g., the National Climate Assessment) that climate change can impact and exacerbate a range of risks to the Great Lakes, including changes in the range and distribution of certain fish species, increased invasive species and harmful algal blooms, declining beach health, and lengthened commercial navigation season. In this study, we will examine the impact of climate change on the Laurentian Great Lakes through investigation of long-term lake surface water temperatures (LSWT). We will use the ATSR Reprocessing for Climate: Lake Surface Water Temperature & Ice Cover (ARC-Lake) product over the period 1995-2012 to investigate individual and interlake variability. Specifically, we will quantify the seasonal amplitude of LSWTs, the first and last appearances of the 4°C isotherm (i.e., an important identifier of the seasonal evolution of the lakes denoting winter and summer stratification), and interpret these quantities in the context of global interannual climate variability such as ENSO.

  17. Lake Cadagno

    DEFF Research Database (Denmark)

    Tonolla, Mauro; Storelli, Nicola; Danza, Francesco

    2017-01-01

    Lake Cadagno (26 ha) is a crenogenic meromictic lake located in the Swiss Alps at 1921 m asl with a maximum depth of 21 m. The presence of crystalline rocks and a dolomite vein rich in gypsum in the catchment area makes the lake a typical “sulphuretum ” dominated by coupled carbon and sulphur...... cycles. The chemocline lies at about 12 m depth, stabilized by density differences of salt-rich water supplied by sub-aquatic springs to the monimolimnion and of electrolyte-poor surface water feeding the mixolimnion. Steep sulphide and light gradients in the chemocline support the growth of a large...... in the chemocline. Small-celled PSB together with the sulfate-reducing bacterium Desulfocapsa thiozymogenes sp. form stable aggregates in the lake, which represent small microenvironments with an internal sulphur cycle. Eukaryotic primary producers in the anoxic zones are dominated by Cryptomonas phaseolus...

  18. Use of behavioral biometrics in intrusion detection and online gaming

    Science.gov (United States)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2006-04-01

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

  19. Isotopic variation in the Tuolumne Intrusive Suite, central Sierra Nevada, California

    Science.gov (United States)

    Kistler, R.W.; Chappell, B.W.; Peck, D.L.; Bateman, P.C.

    1986-01-01

    Granitoid rocks of the compositionally zoned Late Cretaceous Toulumne Intrusive Suite in the central Sierra Nevada, California, have initial87Sr/86Sr values (Sri) and143Nd/144Nd values (Ndi) that vary from 0.7057 to 0.7067 and from 0.51239 to 0.51211 respectively. The observed variation of both Sri and Ndi and of chemical composition in rocks of the suite cannot be due to crystal fractionation of magma solely under closed system conditons. The largest variation in chemistry, Ndi, and Sri is present in the outer-most equigranular units of the Tuolumne Intrusive Suite. Sri varies positively with SiO2, Na2O, K2O, and Rb concentrations, and negatively with Ndi, Al2O3, Fe2O3, MgO, FeO, CaO, MnO, P2O5, TiO2, and Sr concentrations. This covariation of Sri, Ndi and chemistry can be modeled by a process of simple mixing of basaltic and granitic magmas having weight percent SiO2 of 48.0 and 73.3 respectively. Isotopic characteristic of the mafic magma are Sri=0.7047, Ndi=0.51269 and ??18O=6.0, and of the felsic magma are Sri=0.7068, Ndi=0.51212 and ??18O=8.9. The rocks sampled contain from 50 to 80% of the felsic component. An aplite in the outer equigranular unit of the Tuolumne Intrusive Suite apparently was derived by fractional crystallization of plagioclase and hornblende from magma with granudiorite composition that was a product of mixing of the magmas described above. Siliceous magmas derived from the lower crust, having a maximum of 15 percent mantle-derived mafic component, are represented by the inner prophyritic units of the Tuolumne Intrusive Suite. ?? 1986 Springer-Verlag.

  20. Recent lake ice-out phenology within and among lake districts of Alaska, U.S.A.

    Science.gov (United States)

    Arp, Christopher D.; Jones, Benjamin M.; Grosse, Guido

    2013-01-01

    The timing of ice-out in high latitudes is a fundamental threshold for lake ecosystems and an indicator of climate change. In lake-rich regions, the loss of ice cover also plays a key role in landscape and climatic processes. Thus, there is a need to understand lake ice phenology at multiple scales. In this study, we observed ice-out timing on 55 large lakes in 11 lake districts across Alaska from 2007 to 2012 using satellite imagery. Sensor networks in two lake districts validated satellite observations and provided comparison with smaller lakes. Over this 6 yr period, the mean lake ice-out for all lakes was 27 May and ranged from 07 May in Kenai to 06 July in Arctic Coastal Plain lake districts with relatively low inter-annual variability. Approximately 80% of the variation in ice-out timing was explained by the date of 0°C air temperature isotherm and lake area. Shoreline irregularity, watershed area, and river connectivity explained additional variation in some districts. Coherence in ice-out timing within the lakes of each district was consistently strong over this 6 yr period, ranging from r-values of 0.5 to 0.9. Inter-district analysis of coherence also showed synchronous ice-out patterns with the exception of the two arctic coastal districts where ice-out occurs later (June–July) and climatology is sea-ice influenced. These patterns of lake ice phenology provide a spatially extensive baseline describing short-term temporal variability, which will help decipher longer term trends in ice phenology and aid in representing the role of lake ice in land and climate models in northern landscapes.

  1. 33 CFR 162.132 - Connecting waters from Lake Huron to Lake Erie; communications rules.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Connecting waters from Lake Huron to Lake Erie; communications rules. 162.132 Section 162.132 Navigation and Navigable Waters COAST... NAVIGATION REGULATIONS § 162.132 Connecting waters from Lake Huron to Lake Erie; communications rules. (a...

  2. 33 CFR 162.140 - Connecting waters from Lake Huron to Lake Erie; miscellaneous rules.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Connecting waters from Lake Huron to Lake Erie; miscellaneous rules. 162.140 Section 162.140 Navigation and Navigable Waters COAST... NAVIGATION REGULATIONS § 162.140 Connecting waters from Lake Huron to Lake Erie; miscellaneous rules. (a...

  3. A novel intrusion detection method based on OCSVM and K-means recursive clustering

    Directory of Open Access Journals (Sweden)

    Leandros A. Maglaras

    2015-01-01

    Full Text Available In this paper we present an intrusion detection module capable of detecting malicious network traffic in a SCADA (Supervisory Control and Data Acquisition system, based on the combination of One-Class Support Vector Machine (OCSVM with RBF kernel and recursive k-means clustering. Important parameters of OCSVM, such as Gaussian width o and parameter v affect the performance of the classifier. Tuning of these parameters is of great importance in order to avoid false positives and over fitting. The combination of OCSVM with recursive k- means clustering leads the proposed intrusion detection module to distinguish real alarms from possible attacks regardless of the values of parameters o and v, making it ideal for real-time intrusion detection mechanisms for SCADA systems. Extensive simulations have been conducted with datasets extracted from small and medium sized HTB SCADA testbeds, in order to compare the accuracy, false alarm rate and execution time against the base line OCSVM method.

  4. Procrastination as a Self-Regulation Failure: The Role of Impulsivity and Intrusive Thoughts.

    Science.gov (United States)

    Rebetez, Marie My Lien; Rochat, Lucien; Barsics, Catherine; Van der Linden, Martial

    2018-02-01

    Procrastination has been described as the quintessence of self-regulatory failure. This study examines the relationships between this self-regulatory failure and other manifestations of self-regulation problems, namely impulsivity and intrusive thoughts. One hundred and forty-one participants completed questionnaires assessing procrastination, impulsivity (in particular, the urgency and lack of perseverance dimensions), and intrusive thoughts (i.e., rumination and daydreaming). Main results show that urgency mediated the association between rumination and procrastination, whereas rumination did not mediate the relation between urgency and procrastination. Lack of perseverance mediated the association between daydreaming and procrastination, and daydreaming mediated the relation between lack of perseverance and procrastination. This study highlights the role of impulsivity and intrusive thoughts in procrastination, specifies the links between these self-regulation problems, and provides insights into their (potential) underlying mechanisms. It also opens interesting prospects for management strategies for implementing targeted psychological interventions to reduce impulsive manifestations and/or thought control difficulties accompanying procrastination.

  5. Real-estate lakes

    Science.gov (United States)

    Rickert, David A.; Spieker, Andrew Maute

    1971-01-01

    Since the dawn of civilization waterfront land has been an irresistible attraction to man. Throughout history he has sought out locations fronting on oceans, rivers, and lakes. Originally sought for proximity .to water supply and transportation, such locations are now sought more for their esthetic qualities and for recreation. Usable natural waterfront property is limited, however, and the more desirable sites in many of our urban areas have already been taken. The lack of available waterfront sites has led to the creation of many artificial bodies of water. The rapid suburbanization that has characterized urban growth in America since the end of World War II, together with increasing affluence and le-isure time, has created a ready market for waterfront property. Accordingly, lake-centered subdivisions and developments dot the suburban landscape in many of our major urban areas. Literally thousands of lakes surrounded by homes have materialized during this period of rapid growth. Recently, several "new town" communities have been planned around this lake-centered concept. A lake can be either an asset or a liaoility to a community. A clean, clear, attractively landscaped lake is a definite asset, whereas a weed-choked, foul-smelling mudhole is a distinct liability. The urban environment poses both problems and imaginative opportunities in the development of lakes. Creation of a lake causes changes in all aspects of the environment. Hydrologic systems and ecological patterns are usually most severely altered. The developer should be aware of the potential changes; it is not sufficient merely to build a dam across a stream or to dig a hole in the ground. Development of Gl a successful lake requires careful planning for site selection and design, followed by thorough and cc ntinual management. The purpose of this report is to describe the characteristics of real-estate lakes, to pinpoint potential pmblems, and to suggest possible planning and management guidelines

  6. A Survey on Cross-Layer Intrusion Detection System for Wireless ...

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... excessive packet collision, artificially increases contention, decrease signal .... Intelligent security architecture was conducted by [36], as an intrusion ... the main disadvantages of this scheme is: The IDS node is static (runs ...

  7. Lake Morphometry for NHD Lakes in California Region 18 HUC

    Data.gov (United States)

    U.S. Environmental Protection Agency — Lake morphometry metrics are known to influence productivity in lakes and are important for building various types of ecological and environmental models of lentic...

  8. Lake Morphometry for NHD Lakes in Tennessee Region 6 HUC

    Data.gov (United States)

    U.S. Environmental Protection Agency — Lake morphometry metrics are known to influence productivity in lakes and are important for building various types of ecological and environmental models of lentic...

  9. Lake Morphometry for NHD Lakes in Ohio Region 5 HUC

    Data.gov (United States)

    U.S. Environmental Protection Agency — Lake morphometry metrics are known to influence productivity in lakes and are important for building various types of ecological and environmental models of lentic...

  10. Bathymetry of Lake Ontario

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Bathymetry of Lake Ontario has been compiled as a component of a NOAA project to rescue Great Lakes lake floor geological and geophysical data and make it more...

  11. Bathymetry of Lake Michigan

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Bathymetry of Lake Michigan has been compiled as a component of a NOAA project to rescue Great Lakes lake floor geological and geophysical data and make it more...

  12. Bathymetry of Lake Superior

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Bathymetry of Lake Superior has been compiled as a component of a NOAA project to rescue Great Lakes lake floor geological and geophysical data and make it more...

  13. Bathymetry of Lake Huron

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Bathymetry of Lake Huron has been compiled as a component of a NOAA project to rescue Great Lakes lake floor geological and geophysical data and make it more...

  14. Circulation and sedimentation in a tidal-influenced fjord lake: Lake McKerrow, New Zealand

    Science.gov (United States)

    Pickrill, R. A.; Irwin, J.; Shakespeare, B. S.

    1981-01-01

    Lake McKerrow is a tide-influenced fjord lake, separated from the open sea by a Holocene barrier spit. Fresh, oxygenated waters of the epilimnion overlie saline, deoxygenated waters of the hypolimnion. During winter, water from the Upper Hollyford River interflows along the pycnocline, depositing coarse silt on the steep delta and transporting finer sediment down-lake. An extensive sub-lacustrine channel system on the foreset delta slope is possibly maintained by turbidity currents. Saline waters of the hypolimnion are periodically replenished. During high tides and low lake levels saline water flows into the lake and downslope into the lake basin as a density current in a well defined channel.

  15. An assessment of the radiological impact of human intrusion at the UK Low Level Waste Repository (LLWR) - 59356

    International Nuclear Information System (INIS)

    Hicks, Tim; Baldwin, Tamara; Cummings, Richard; Sumerling, Trevor

    2012-01-01

    The UK Low Level Waste Repository Ltd submitted an Environmental Safety Case for the disposal of low-level waste (LLW) to the Environment Agency on the 1 May 2011. The Environmental Safety Case (ESC) presents a complete case for the environmental safety of the Low Level Waste Repository (LLWR) both during operations and in the long term (Cummings et al, in these proceedings). This includes an assessment of the long-term radiological safety of the facility, including an assessment of the potential consequences of human intrusion at the site. The human intrusion assessment is based on a cautiously realistic approach in defining intrusion cases and parameter values. A range of possible human intrusion events was considered based on present-day technologies and credible future uses of the site. This process resulted in the identification of geotechnical investigations, a housing development and a smallholding as requiring quantitative assessment. A particular feature of the site is that, because of its proximity to the coast and in view of expected global sea-level rise, it is vulnerable to coastal erosion. During such erosion, wastes and engineered barrier materials will be exposed, and could become targets for investigation or recovery. Therefore, human intrusion events have been included that are associated with such activities. A radiological assessment model has been developed to analyse the impacts of potential human intrusion at the site. A key feature of the model is the representation of the spatial layout of the disposal site, including the engineered cap design and the large-scale spatial heterogeneity of radionuclide concentrations within the repository. The model has been used to calculate the radiation dose to intruders and to others following intrusion at different times and at different locations across the site, for the each of the selected intrusion events, considering all relevant exposure modes. Potential doses due to radon and its daughters in

  16. Geology of the Mid-Miocene Rooster Comb Caldera and Lake Owyhee Volcanic Field, eastern Oregon: Silicic volcanism associated with Grande Ronde flood basalt

    Science.gov (United States)

    Benson, Thomas R.; Mahood, Gail A.

    2016-01-01

    The Lake Owyhee Volcanic Field (LOVF) of eastern Oregon consists of rhyolitic caldera centers and lava fields contemporaneous with and spatially related to Mid-Miocene Columbia River flood basalt volcanism. Previous studies delineated two calderas in the southeastern part of LOVF near Owyhee Reservoir, the result of eruptions of two ignimbrites, the Tuff of Leslie Gulch and the Tuff of Spring Creek. Our new interpretation is that these two map units are differentially altered parts of a single ignimbrite produced in a major phreatomagmatic eruption at 15.8 Ma. Areas previously mapped as Tuff of Spring Creek are locations where the ignimbrite contains abundant clinoptilolite ± mordenite, which made it susceptible to erosion. The resistant intracaldera Tuff of Leslie Gulch has an alteration assemblage of albite ± quartz, indicative of low-temperature hydrothermal alteration. Our new mapping of caldera lake sediments and pre- and post-caldera rhyolitic lavas and intrusions that are chemically similar to intracaldera Tuff of Leslie Gulch point to a single 20 × 25 km caldera, which we name the Rooster Comb Caldera. Erosion of the resurgently uplifted southern half of the caldera created dramatic exposures of intracaldera Tuff of Leslie Gulch cut by post-caldera rhyolite dikes and intrusions that are the deeper-level equivalents of lava domes and flows that erupted into the caldera lake preserved in exposures to the northeast. The Rooster Comb Caldera has features in common with more southerly Mid-Miocene calderas of the McDermitt Volcanic Field and High Rock Caldera Complex, including formation in a basinal setting shortly after flood basalt eruptions ceased in the region, and forming on eruption of peralkaline ignimbrite. The volcanism at Rooster Comb Caldera postdates the main activity at McDermitt and High Rock, but, like it, begins 300 ky after flood basalt volcanism begins in the area, and while flood basalts don't erupt through the silicic focus, are

  17. 33 CFR 162.130 - Connecting waters from Lake Huron to Lake Erie; general rules.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Connecting waters from Lake Huron to Lake Erie; general rules. 162.130 Section 162.130 Navigation and Navigable Waters COAST GUARD... REGULATIONS § 162.130 Connecting waters from Lake Huron to Lake Erie; general rules. (a) Purpose. The...

  18. Synergy of climate change and local pressures on saltwater intrusion in heterogeneous coastal aquifers

    Science.gov (United States)

    Abou Najm, M.; Safi, A.; El-Fadel, M.; Doummar, J.; Alameddine, I.

    2016-12-01

    The relative importance of climate change induced sea level rise on the salinization of a highly urbanized karstified coastal aquifers were compared with non-sustainable pumping. A 3D variable-density groundwater flow and solute transport model was used to predict the displacement of the saltwater-freshwater interface in a pilot aquifer located along the Eastern Mediterranean. The results showed that the influence of sea level rise was marginal when compared with the encroachment of salinity associated with anthropogenic abstraction. Model predictions of salinity mass and volumetric displacement of the interface corresponding to a long-term monthly transient model showed that the saltwater intrusion dynamic is highly sensitive to change in the abstraction rates which were estimated based on combinations of water consumption rates and population growth rates. Salinity encroachment, however, appeared to be more sensitive to water consumption rates in comparison to population growth rates, where a 50% increase in the rate of former led to four times more intrusion as compared to an equivalent increase in population growth rate over 20 years. Coupling both increase in population growth and increased consumption rates had a synergistic effect that aggravated the intrusion beyond the sum of the individual impacts. Adaptation strategies targeting a decrease in groundwater exploitation proved to be effective in retarding the intrusion.

  19. Great Lakes Restoration Initiative Great Lakes Mussel Watch(2009-2014)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Following the inception of the Great Lakes Restoration Initiative (GLRI) to address the significant environmental issues plaguing the Great Lakes region, the...

  20. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    2008-01-01

    We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying a new method for anomaly detection on the

  1. Revised predictive equations for salt intrusion modelling in estuaries

    NARCIS (Netherlands)

    Gisen, J.I.A.; Savenije, H.H.G.; Nijzink, R.C.

    2015-01-01

    For one-dimensional salt intrusion models to be predictive, we need predictive equations to link model parameters to observable hydraulic and geometric variables. The one-dimensional model of Savenije (1993b) made use of predictive equations for the Van der Burgh coefficient $K$ and the dispersion

  2. 33 CFR 162.134 - Connecting waters from Lake Huron to Lake Erie; traffic rules.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Connecting waters from Lake Huron to Lake Erie; traffic rules. 162.134 Section 162.134 Navigation and Navigable Waters COAST GUARD... REGULATIONS § 162.134 Connecting waters from Lake Huron to Lake Erie; traffic rules. (a) Detroit River. The...

  3. 33 CFR 162.138 - Connecting waters from Lake Huron to Lake Erie; speed rules.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Connecting waters from Lake Huron to Lake Erie; speed rules. 162.138 Section 162.138 Navigation and Navigable Waters COAST GUARD... REGULATIONS § 162.138 Connecting waters from Lake Huron to Lake Erie; speed rules. (a) Maximum speed limit for...

  4. 33 CFR 162.136 - Connecting waters from Lake Huron to Lake Erie; anchorage grounds.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Connecting waters from Lake Huron to Lake Erie; anchorage grounds. 162.136 Section 162.136 Navigation and Navigable Waters COAST GUARD... REGULATIONS § 162.136 Connecting waters from Lake Huron to Lake Erie; anchorage grounds. (a) In the Detroit...

  5. Limnology of Botos Lake, a tropical crater lake in Costa Rica.

    Science.gov (United States)

    Umaña, G

    2001-12-01

    Botos Lake, located at the Poas Volcano complex (Costa Rica) was sampled eight times from 1994 to 1996 for physicochemical conditions of the water column and phytoplanktonic community composition. Depth was measured at fixed intervals in several transects across the lake to determine its main morphometric characteristics. The lake has an outlet to the north. It is located 2580 m above sea level and is shallow, with a mean depth of 1.8 m and a relative depth of 2.42 (surface area 10.33 ha, estimated volume 47.3 hm3). The lake showed an isothermal water column in all occasions, but it heats and cools completely according to weather fluctuations. Water transparency reached the bottom on most occasions (> 9 m). The results support the idea that the lake is polymictic and oligotrophic. The lake has at least 23 species of planktonic algae, but it was always dominated by dinoflagellates, especially Peridinium inconspicuum. The shore line is populated by a sparse population of Isoetes sp. and Eleocharis sp. mainly in the northern shore where the bottom has a gentle slope and the forest does not reach the shore.

  6. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  7. Effects of climate change on saltwater intrusion at Hilton Head Island, SC. U.S.A.

    Science.gov (United States)

    Payne, Dorothy F.

    2010-01-01

    Sea‐level rise and changes in precipitation patterns may contribute to the occurrence and affect the rate of saltwater contamination in the Hilton Head Island, South Carolina area. To address the effects of climate change on saltwater intrusion, a threedimensional, finite‐element, variable‐density, solute‐transport model was developed to simulate different rates of sea‐level rise and variation in onshore freshwater recharge. Model simulation showed that the greatest effect on the existing saltwater plume occurred from reducing recharge, suggesting recharge may be a more important consideration in saltwater intrusion management than estimated rates of sea‐level rise. Saltwater intrusion management would benefit from improved constraints on recharge rates by using model‐independent, local precipitation and evapotranspiration data, and improving estimates of confining unit hydraulic properties.

  8. Attacks and Intrusion Detection in Cloud Computing Using Neural Networks and Particle Swarm Optimization Algorithms

    Directory of Open Access Journals (Sweden)

    Ahmad Shokuh Saljoughi

    2018-01-01

    Full Text Available Today, cloud computing has become popular among users in organizations and companies. Security and efficiency are the two major issues facing cloud service providers and their customers. Since cloud computing is a virtual pool of resources provided in an open environment (Internet, cloud-based services entail security risks. Detection of intrusions and attacks through unauthorized users is one of the biggest challenges for both cloud service providers and cloud users. In the present study, artificial intelligence techniques, e.g. MLP Neural Network sand particle swarm optimization algorithm, were used to detect intrusion and attacks. The methods were tested for NSL-KDD, KDD-CUP datasets. The results showed improved accuracy in detecting attacks and intrusions by unauthorized users.

  9. High-resolution insights into episodes of crystallization, hydrothermal alteration and remelting in the Skaergaard intrusive complex

    DEFF Research Database (Denmark)

    Wotzlaw, Joern-Frederik; Bindeman, Ilya N.; Schaltegger, Urs

    2012-01-01

    of the most incompatible trace element rich horizon, similar to 100 m above SH. As the Skaergaard intrusion is also the most classic example of a shallow meteoric hydrothermal system, this work documents the alternating processes in a life of an intrusion with periods of hydrothermal cooling, heating by new...

  10. Geophysical characterization from Itu intrusive suite

    International Nuclear Information System (INIS)

    Pascholati, M.E.

    1989-01-01

    The integrated use of geophysical, geological, geochemical, petrographical and remote sensing data resulted in a substantial increase in the knowledge of the Itu Intrusive Suite. The main geophysical method was gamma-ray spectrometry together with fluorimetry and autoradiography. Three methods were used for calculation of laboratory gamma-ray spectrometry data. For U, the regression method was the best one. For K and Th, equations system and absolute calibration presented the best results. Surface gamma-ray spectrometry allowed comparison with laboratory data and permitted important contribution to the study of environmental radiation. (author)

  11. 75 FR 34934 - Safety Zone; Fireworks for the Virginia Lake Festival, Buggs Island Lake, Clarksville, VA

    Science.gov (United States)

    2010-06-21

    ...-AA00 Safety Zone; Fireworks for the Virginia Lake Festival, Buggs Island Lake, Clarksville, VA AGENCY... Fireworks for the Virginia Lake Festival event. This action is intended to restrict vessel traffic movement... Virginia Lake Festival, Buggs Island Lake, Clarksville, VA (a) Regulated Area. The following area is a...

  12. Holocene lake-level fluctuations of Lake Aricota, Southern Peru

    Science.gov (United States)

    Placzek, C.; Quade, Jay; Betancourt, J.L.

    2001-01-01

    Lacustrine deposits exposed around Lake Aricota, Peru (17?? 22???S), a 7.5-km2 lake dammed by debris flows, provide a middle to late Holocene record of lake-level fluctuations. Chronological context for shoreline deposits was obtained from radiocarbon dating of vascular plant remains and other datable material with minimal 14C reservoir effects (Titicaca (16?? S), which is only 130 km to the northeast and shares a similar climatology. Comparisons with other marine and terrestrial records highlight emerging contradictions over the nature of mid-Holocene climate in the central Andes. ?? 2001 University of Washington.

  13. Stable isotope and hydrogeochemical studies of Beaver Lake and Radok Lake, MacRobertson Land, East Antarctica

    International Nuclear Information System (INIS)

    Wand, U.; Hermichen, W.D.

    1988-01-01

    Beaver Lake and Radok Lake, the largest known epishelf lake and the deepest freshwater lake on the Antarctic continent, respectively, were isotopically (δ 2 H, δ 18 O) and hydrogeochemically studied. Radok Lake is an isothermal and nonstratified, i.e. homogeneous water body, while Beaver Lake is stratified with respect to temperature, salinity and isotopic composition. The results for the latter attest to freshwater (derived from snow and glacier melt) overlying seawater. (author)

  14. A Labeled Data Set For Flow-based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Sadre, R.; van Vliet, Frank; Pras, Aiko; Nunzi, Giorgio; Scoglio, Caterina; Li, Xing

    2009-01-01

    Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field, benchmarking of flow-based IDS is still an open issue. In this paper, we propose the first publicly available, labeled data set

  15. Combining Host-based and network-based intrusion detection system

    African Journals Online (AJOL)

    These attacks were simulated using hping. The proposed system is implemented in Java. The results show that the proposed system is able to detect attacks both from within (host-based) and outside sources (network-based). Key Words: Intrusion Detection System (IDS), Host-based, Network-based, Signature, Security log.

  16. AANtID: an alternative approach to network intrusion detection ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Security has become not just a feature of an information system, but the core and a necessity especially the systems that communicate and transmit data over the Internet for they are more ... Keywords: Intrusion, Genetic Algorithm, detection, Security, DARPA dataset ...

  17. Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks

    Directory of Open Access Journals (Sweden)

    Wenjuan Li

    2018-01-01

    Full Text Available Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN has thus been developed by allowing intrusion detection system (IDS nodes to exchange data with each other. Insider attacks are a great threat for such types of collaborative networks, where an attacker has the authorized access within the network. In literature, a challenge-based trust mechanism is effective at identifying malicious nodes by sending challenges. However, such mechanisms are heavily dependent on two assumptions, which would cause CIDNs to be vulnerable to advanced insider attacks in practice. In this work, we investigate the influence of advanced on–off attacks on challenge-based CIDNs, which can respond truthfully to one IDS node but behave maliciously to another IDS node. To evaluate the attack performance, we have conducted two experiments under a simulated and a real CIDN environment. The obtained results demonstrate that our designed attack is able to compromise the robustness of challenge-based CIDNs in practice; that is, some malicious nodes can behave untruthfully without a timely detection.

  18. Relationship between vapor intrusion and human exposure to trichloroethylene.

    Science.gov (United States)

    Archer, Natalie P; Bradford, Carrie M; Villanacci, John F; Crain, Neil E; Corsi, Richard L; Chambers, David M; Burk, Tonia; Blount, Benjamin C

    2015-01-01

    Trichloroethylene (TCE) in groundwater has the potential to volatilize through soil into indoor air where it can be inhaled. The purpose of this study was to determine whether individuals living above TCE-contaminated groundwater are exposed to TCE through vapor intrusion. We examined associations between TCE concentrations in various environmental media and TCE concentrations in residents. For this assessment, indoor air, outdoor air, soil gas, and tap water samples were collected in and around 36 randomly selected homes; blood samples were collected from 63 residents of these homes. Additionally, a completed exposure survey was collected from each participant. Environmental and blood samples were analyzed for TCE. Mixed model multiple linear regression analyses were performed to determine associations between TCE in residents' blood and TCE in indoor air, outdoor air, and soil gas. Blood TCE concentrations were above the limit of quantitation (LOQ; ≥ 0.012 µg L(-1)) in 17.5% of the blood samples. Of the 36 homes, 54.3%, 47.2%, and >84% had detectable concentrations of TCE in indoor air, outdoor air, and soil gas, respectively. Both indoor air and soil gas concentrations were statistically significantly positively associated with participants' blood concentrations (P = 0.0002 and P = 0.04, respectively). Geometric mean blood concentrations of residents from homes with indoor air concentrations of >1.6 µg m(-3) were approximately 50 times higher than geometric mean blood TCE concentrations in participants from homes with no detectable TCE in indoor air (P < .0001; 95% CI 10.4-236.4). This study confirms the occurrence of vapor intrusion and demonstrates the magnitude of exposure from vapor intrusion of TCE in a residential setting.

  19. Review of the geochemistry and metallogeny of approximately 1.4 Ga granitoid intrusions of the conterminous United States

    Science.gov (United States)

    du Bray, Edward A.; Holm-Denoma, Christopher S.; Lund, Karen; Premo, Wayne R.

    2018-03-27

    The conterminous United States hosts numerous volumetrically significant and geographically dispersed granitoid intrusions that range in age from 1.50 to 1.32 billion years before present (Ga). Although previously referred to as A-type granites, most are better described as ferroan granites. These granitoid intrusions are distributed in the northern and central Rocky Mountains, the Southwest, the northern midcontinent, and a swath largely buried beneath Phanerozoic cover across the Great Plains and into the southern midcontinent. These intrusions, with ages that are bimodally distributed between about 1.455–1.405 Ga and 1.405–1.320 Ga, are dispersed nonsystematically with respect to age across their spatial extents. Globally, although A-type or ferroan granites are genetically associated with rare-metal deposits, most U.S. 1.4 Ga granitoid intrusions do not contain significant deposits. Exceptions are the light rare-earth element deposit at Mountain Pass, California, and the iron oxide-apatite and iron oxide-copper-gold deposits in southeast Missouri.Most of the U.S. 1.4 Ga granitoid intrusions are composed of hornblende ± biotite or biotite ± muscovite monzogranite, commonly with prominent alkali feldspar megacrysts; however, modal compositions vary widely. These intrusions include six of the eight commonly identified subtypes of ferroan granite: alkali-calcic and calc-alkalic peraluminous subtypes; alkalic, alkali-calcic, and calc-alkalic metaluminous subtypes; and the alkalic peralkaline subtype. The U.S. 1.4 Ga granitoid intrusions also include variants of these subtypes that have weakly magnesian compositions. Extreme large-ion lithophile element enrichments typical of ferroan granites elsewhere are absent among these intrusions. Chondrite-normalized rare-earth element patterns for these intrusions have modest negative slopes and moderately developed negative europium anomalies. Their radiogenic isotopic compositions are consistent with mixing involving

  20. Lake Generated Microseisms at Yellowstone Lake as a Record of Ice Phenology

    Science.gov (United States)

    Mohd Mokhdhari, A. A.; Koper, K. D.; Burlacu, R.

    2017-12-01

    It has recently been shown that wave action in lakes produces microseisms, which generate noise peaks in the period range of 0.8-1.2 s as recorded by nearby seismic stations. Such noise peaks have been observed at seven seismic stations (H17A, LKWY, B208, B944, YTP, YLA, and YLT) located within 2 km of the Yellowstone Lake shoreline. Initial work using 2016 data shows that the variations in the microseism signals at Yellowstone Lake correspond with the freezing and thawing of lake ice: the seismic noise occurs more frequently in the spring, summer, and fall, and less commonly in the winter. If this can be confirmed, then lake-generated microseisms could provide a consistent measure of the freezing and melting dates of high-latitude lakes in remote areas. The seismic data would then be useful in assessing the effects of climate change on the ice phenology of those lakes. In this work, we analyze continuous seismic data recorded by the seven seismic stations around Yellowstone Lake for the years of 1995 to 2016. We generate probability distribution functions of power spectral density for each station to observe the broad elevation of energy near a period of 1 s. The time dependence of this 1-s seismic noise energy is analyzed by extracting the power spectral density at 1 s from every processed hour. The seismic observations are compared to direct measurements of the dates of ice-out and freeze-up as reported by rangers at Yellowstone National Park. We examine how accurate the seismic data are in recording the freezing and melting of Yellowstone Lake, and how the accuracy changes as a function of the number of stations used. We also examine how sensitive the results are to the particular range of periods that are analyzed.