WorldWideScience

Sample records for two-segment dike intrusion

  1. Cooling of an igneous dike 20 yr after intrusion

    Science.gov (United States)

    Connor, C. B.; Lichtner, P. C.; Conway, F. M.; Hill, B. E.; Ovsyannikov, A. A.; Federchenko, I.; Doubik, Yu.; Shapar, V. N.; Taran, Yu. A.

    1997-08-01

    The 1975 Tolbachik, Kamchatka, Russia, eruption resulted in the formation of three basaltic cinder cones. During this eruption, shallow dike injection into a nearby cinder cone, Cone 1004, caused deformation and slumping of the cone. In 1995, temperatures at 2 m depth, electromagnetic anomalies, and geologic units were mapped on the slump block. These data reveal details about the cooling rates of a shallow dike in the slump block, including (1) measured temperatures as much as 475 °C, (2) temperatures greater than 200 °C along a 160-m-long and 30-m-wide zone that trends oblique to bedding, (3) a low resistivity zone at 80 m depth that may delimit a larger intrusion beneath the shallow dike, (4) a dry zone extending 15 20 m from the axis of the thermal anomaly, and (5) a condensation zone beyond this dry-out zone, characterized by steaming ground and high convective heat flux. Analytic models indicate that the surprisingly high temperatures persist because of the low thermal diffusivity of the scoria into which the dike is injected, a direct result of the scoria's high porosity. Two-phase nonisothermal flow models suggest that the observed patterns of dry-out and condensation are expected for small volume fractions of water in the scoria (≤10%). Thus, field observations from Tolbachik provide a graphic example of the roles of rock thermophysical properties and water in the unsaturated zone on rates of dike cooling.

  2. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes

    Science.gov (United States)

    L., Passarelli; E., Rivalta; A., Shuler

    2014-01-01

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process. PMID:24469260

  3. Stalled eruption or dike intrusion at Harrat Lunayyir, Saudi Arabia?

    Science.gov (United States)

    Zahran, H. M.; McCausland, W. A.; Pallister, J. S.; Lu, Z.; El-Hadidy, S.; Aburukba, A.; Schawali, J.; Kadi, K.; Youssef, A.; Ewert, J. W.; White, R. A.; Lundgren, P.; Mufti, M.; Stewart, I. C.

    2009-12-01

    Since 2007 there have been periodic small earthquake swarms recorded at seismic stations located around Harrat Lunayyir in northwest Saudi Arabia. In response to a longer-lived and larger seismic swarm, in early May 2009 the Saudi Geological Survey (SGS) installed a network of broadband seismometers surrounding the Harrat, with real-time data transmitted by VSAT back to its Earthquake and Volcano Center in Jeddah. The new network captured data from the swarm, which culminated with a M5.4 earthquake on 19 May that caused very minor structural damage in the town of Al Ays, 40 km to the southeast. Because of the strength of ground-shaking and resulting structural damage, the Saudi government evacuated more than 30,000 people from a 40 km radius surrounding Harrat Lunayyir, including the town of Al Ays. At the request of the SGS and the U.S. Consulate in Jeddah, the Volcano Disaster Assistance Program (a partnership program of the USGS and USAID’s Office of Foreign Disaster Assistance) sent two advisers to work with the SGS to determine if the unrest was volcanic in origin and to assess hazards associated with the unrest. The SGS-USGS team collected geologic, geodetic and seismic data that confirmed the volcanic nature of the activity. 1) A 3-km-long NW-trending surface rupture appeared in the central part of the Harrat before 19 May, during a time when maximum earthquake magnitudes exceeded M4. 2) The length of this rupture extended to 8 km with the M5.4 earthquake on 19 May. 3) The rupture opened 0.5 m and had an absolute motion of 0.9 m to N35W with a 63 degree plunge to the NE- a tensional offset consistent with that expected from an M5.4 earthquake in a rift-shoulder setting. 4) InSAR data showed about a meter of extension and uplift (as of July 2009) with the majority of deformation associated with the 19 May M5.4 earthquake. The InSAR-derived deformation field is best modeled by intrusion of a narrow (~2 m wide), 8-km-long dike to shallow crustal levels. 5

  4. Graben Formation and Dike Arrest during the 2009 Harrat Lunayyir Dike Intrusion in Saudi Arabia: Insights from InSAR, Stress Calculations and Analog Experiments

    KAUST Repository

    Xu, Wenbin

    2016-03-04

    Detailed spatial and temporal accounts of propagating dikes from crustal deformation data, including their interplay with faulting, are rare, leaving many questions about how this interplay affects graben formation and the arrest of dikes unanswered. Here we use InSAR observations, stress calculations and analog experiments to investigate the interaction between an intruding dike and normal faulting during the 2009 Harrat Lunayyir dike intrusion in western Saudi Arabia. We generated five displacement maps from InSAR data to unravel the temporal evolution of deformation covering the majority of the intrusion. We find that the observed surface displacements can be modeled by a ~2-m-thick dike with an upper tip ~2 km below the surface on 16 May 2009, four weeks after the onset of seismic unrest. In the following three days, the dike propagated to within ~1 km of the surface with graben-bounding normal faulting dominating the near-field deformation. The volume of the dike doubled between mid-May and mid-June. We carried out analog experiments that indicate that the wedge-shaped graben grew outwards with the faulting style changing progressively from normal faulting to oblique. Coulomb failure stress change calculations show that the intruding dike caused two zones of shallow horizontal tension on both sides of the dike, producing two zones of fissuring and normal faulting at the surface. In return, the faulting provoked compression around the upper tip of the dike, holding back its vertical propagation.

  5. Graben formation and dike arrest during the 2009 Harrat Lunayyir dike intrusion in Saudi Arabia: Insights from InSAR, stress calculations and analog experiments

    Science.gov (United States)

    Xu, Wenbin; Jónsson, Sigurjón; Corbi, Fabio; Rivalta, Eleonora

    2016-04-01

    Detailed spatial and temporal accounts of propagating dikes from crustal deformation data, including their interplay with faulting, are rare, leaving many questions about how this interplay affects graben formation and the arrest of dikes unanswered. Here we use interferometric synthetic aperture radar (InSAR) observations, stress calculations, and analog experiments to investigate the interaction between an intruding dike and normal faulting during the 2009 Harrat Lunayyir dike intrusion in western Saudi Arabia. We generated five displacement maps from InSAR data to unravel the temporal evolution of deformation covering the majority of the intrusion. We find that the observed surface displacements can be modeled by a ~2 m thick dike with an upper tip ~2 km below the surface on 16 May 2009, 4 weeks after the onset of seismic unrest. In the following three days, the dike propagated to within ~1 km of the surface with graben-bounding normal faulting dominating the near-field deformation. The volume of the dike doubled between mid-May and mid-June. We carried out analog experiments that indicate that the wedge-shaped graben grew outward with the faulting style changing progressively from normal faulting to oblique. Coulomb failure stress change calculations show that the intruding dike caused two zones of shallow horizontal tension on both sides of the dike, producing two zones of fissuring and normal faulting at the surface. In return, the faulting provoked compression around the upper tip of the dike, holding back its vertical propagation.

  6. Dikes

    NARCIS (Netherlands)

    Augustinus, P.G.E.F.

    2004-01-01

    Dikes, especially sea dikes, are coastal constructions build to avoid flooding. The risk of flooding is detrimental to the safety of people and economic, cultural, and ecological values. This aspect has been of great importance since people first thought about defending their dwellings against

  7. Dikes

    NARCIS (Netherlands)

    Augustinus, P.G.E.F.

    2004-01-01

    Dikes, especially sea dikes, are coastal constructions build to avoid flooding. The risk of flooding is detrimental to the safety of people and economic, cultural, and ecological values. This aspect has been of great importance since people first thought about defending their dwellings against flood

  8. Dike Intrusion Process of 2000 Miyakejima - Kozujima Event estimated from GPS measurements in Kozujima - Niijima Islands, central Japan

    Science.gov (United States)

    Murase, M.; Nakao, S.; Kato, T.; Tabei, T.; Kimata, F.; Fujii, N.

    2003-12-01

    Kozujima - Niijima Islands of Izu Volcano Islands are located about 180 km southeast of Tokyo, Japan. Although the last volcano eruptions in Kozujima and Niijima volcanoes are recorded more than 1000 year before, the ground deformation of 2-3 cm is detected at Kozujima - Niijima Islands by GPS measurements since 1996. On June 26, 2000, earthquake swarm and large ground deformation more than 20 cm are observed at Miyakejima volcano located 40 km east-southeastward of Kozu Island, and volcano eruption are continued since July 7. Remarkable earthquake swarm including five earthquakes more than M5 is stretching to Kozushima Island from Miyakejima Island. From the rapid ground deformation detected by continuous GPS measurements at Miyakejima Island on June 26, magma intrusion models of two or three dikes are discussed in the south and west part of Miyakejima volcano by Irwan et al.(2003) and Ueda et al.(2003). They also estimate dike intrusions are propagated from southern part of Miyakejima volcano to western part, and finally dike intrusion is stretching to 20 km distance toward Kozujima Island. From the ground deformation detected by GPS daily solution of Nation-wide dense GPS network (GEONET), some dike intrusion models are discussed. Ito et al.(2002) estimate the huge dike intrusion with length of about 20 km and volume of 1 km3 in the sea area between the Miyake Island and Kozu Island. (And) Nishimura et al.(2001) introduce not only dike but also aseismic creep source to explain the deformation in Shikinejima. Yamaoka et al.(2002) discuss the dike and spherical deflation source under the dike, because of no evidence supported large aseismic creep. They indicate a dike and spherical deflation source model is as good as dike and creep source model. In case of dike and creep, magma supply is only from the chamber under the Miyakejima volcano. In dike and spherical deflation source model, magma supply is from under Miyakejima volcano and under the dike. Furuya et al

  9. Rapid dike intrusion into Sakurajima volcano on August 15, 2015, as detected by multi-parameter ground deformation observations

    Science.gov (United States)

    Hotta, Kohei; Iguchi, Masato; Tameguri, Takeshi

    2016-04-01

    We present observations of ground deformation at Sakurajima in August 2015 and model the deformation using a combination of GNSS, tilt and strain data in order to interpret a rapid deformation event on August 15, 2015. The pattern of horizontal displacement during the period from August 14 to 16, 2015, shows a WNW-ESE extension, which suggests the opening of a dike. Using a genetic algorithm, we obtained the position, dip, strike length, width and opening of a dislocation source based on the combined data. A nearly vertical dike with a NNE-SSW strike was found at a depth of 1.0 km below sea level beneath the Showa crater. The length and width are 2.3 and 0.6 km, respectively, and a dike opening of 1.97 m yields a volume increase of 2.7 × 106 m3. 887 volcano-tectonic (VT) earthquakes beside the dike suggest that the rapid opening of the dike caused an accumulation of strain in the surrounding rocks, and the VT earthquakes were generated to release this strain. Half of the total amount of deformation was concentrated between 10:27 and 11:54 on August 15. It is estimated that the magma intrusion rate was 1 × 106 m3/h during this period. This is 200 times larger than the magma intrusion rate prior to one of the biggest eruptions at the summit crater of Minami-dake on July 24, 2012, and 2200 times larger than the average magma intrusion rate during the period from October 2011 to March 2012. The previous Mogi-type ground deformation is considered to be a process of magma accumulation in preexisting spherical reservoirs. Conversely, the August 2015 event was a dike intrusion and occurred in a different location to the preexisting reservoirs. The direction of the opening of the dike coincides with the T-axes and direction of faults creating a graben structure.

  10. Intrusion of granitic magma into the continental crust facilitated by magma pulsing and dike-diapir interactions: Numerical simulations

    Science.gov (United States)

    Cao, Wenrong; Kaus, Boris J. P.; Paterson, Scott

    2016-06-01

    We conducted a 2-D thermomechanical modeling study of intrusion of granitic magma into the continental crust to explore the roles of multiple pulsing and dike-diapir interactions in the presence of visco-elasto-plastic rheology. Multiple pulsing is simulated by replenishing source regions with new pulses of magma at a certain temporal frequency. Parameterized "pseudo-dike zones" above magma pulses are included. Simulation results show that both diking and pulsing are crucial factors facilitating the magma ascent and emplacement. Multiple pulses keep the magmatic system from freezing and facilitate the initiation of pseudo-dike zones, which in turn heat the host rock roof, lower its viscosity, and create pathways for later ascending pulses of magma. Without diking, magma cannot penetrate the highly viscous upper crust. Without multiple pulsing, a single magma body solidifies quickly and it cannot ascent over a long distance. Our results shed light on the incremental growth of magma chambers, recycling of continental crust, and evolution of a continental arc such as the Sierra Nevada arc in California.

  11. Structural control on basaltic dike and sill emplacement, Paiute Ridge mafic intrusion complex, southern Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Carter Krogh, K.E.; Valentine, G.A.

    1996-08-01

    Late Miocene basaltic sills and dikes in the Paiute Ridge area of southern nevada show evidence that their emplacement was structurally controlled. Basaltic dikes in this area formed by dilating pre-existing vertical to steeply E-dipping normal faults. Magma propagation along these faults must have required less energy than the creation of a self-propagated fracture at dike tips and the magma pressure must have been greater than the compressive stress perpendicular to the fault surface. N- to NE-trending en echelon dikes formed locally and are not obviously attached to the three main dikes in the area. The en echelon segments are probably pieces of deeper dikes, which are segmented perhaps as a result of a documented rotation of the regional stresses. Alternatively, changes in orientation of principal stresses in the vicinity of each en echelon dike could have resulted from local loads associated with paleotopographic highs or nearby structures. Sills locally branched off some dikes within 300 m of the paleosurface. These subhorizontal bodies occur consistently in the hanging wall block of the dike-injected faults, and intrude Tertiary tuffs near the Paleozoic-Tertiary contact. The authors suggest that the change in stresses near the earth`s surface, the material strength of the tuff and paleozoic rocks, and the Paleozoic bedding dip direction probably controlled the location of sill formation and direction of sill propagation. The two largest sills deflected the overlying tuffs to form lopoliths, indicating that the magma pressure exceeded vertical stresses at that location and that the shallow level and large size of the sills allowed interaction with the free (earth`s) surface. 32 refs., 4 figs., 1 tab.

  12. Dike intrusions into bituminous coal, Illinois Basin: H, C, N, O isotopic responses to rapid and brief heating

    Science.gov (United States)

    Schimmelmann, A.; Mastalerz, Maria; Gao, L.; Sauer, P.E.; Topalov, K.

    2009-01-01

    Unlike long-term heating in subsiding sedimentary basins, the near-instantaneous thermal maturation of sedimentary organic matter near magmatic intrusions is comparable to artificial thermal maturation in the laboratory in terms of short duration and limited extent. This study investigates chemical and H, C, N, O isotopic changes in high volatile bituminous coal near two Illinois dike contacts and compares observed patterns and trends with data from other published studies and from artificial maturation experiments. Our study pioneers in quantifying isotopically exchangeable hydrogen and measuring the D/H (i.e., 2H/1H) ratio of isotopically non-exchangeable organic hydrogen in kerogen near magmatic contacts. Thermal stress in coal caused a reduction of isotopically exchangeable hydrogen in kerogen from 5% to 6% in unaltered coal to 2-3% at contacts, mostly due to elimination of functional groups (e.g., {single bond}OH, {single bond}COOH, {single bond}NH2). In contrast to all previously published data on D/H in thermally matured organic matter, the more mature kerogen near the two dike contacts is D-depleted, which is attributed to (i) thermal elimination of D-enriched functional groups, and (ii) thermal drying of hydrologically isolated coal prior to the onset of cracking reactions, thereby precluding D-transfer from relatively D-enriched water into kerogen. Maxima in organic nitrogen concentration and in the atomic N/C ratio of kerogen at a distance of ???2.5 to ???3.5 m from the thicker dike indicate that reactive N-compounds had been pyrolytically liberated at high temperature closer to the contact, migrated through the coal seam, and recombined with coal kerogen in a zone of lower temperature. The same principle extends to organic carbon, because a strong ??13Ckerogen vs. ??15Nkerogen correlation across 5.5 m of coal adjacent to the thicker dike indicates that coal was functioning as a flow-through reactor along a dynamic thermal gradient facilitating back

  13. Intrusive dike complexes, cumulate cores, and the extrusive growth of Hawaiian volcanoes

    Science.gov (United States)

    Flinders, Ashton F.; Ito, Garrett; Garcia, Michael O.; Sinton, John M.; Kauahikaua, Jim; Taylor, Brian

    2013-01-01

    The Hawaiian Islands are the most geologically studied hot-spot islands in the world yet surprisingly, the only large-scale compilation of marine and land gravity data is more than 45 years old. Early surveys served as reconnaissance studies only, and detailed analyses of the crustal-density structure have been limited. Here we present a new chain-wide gravity compilation that incorporates historical island surveys, recently published work on the islands of Hawai‘i, Kaua‘i, and Ni‘ihau, and >122,000 km of newly compiled marine gravity data. Positive residual gravity anomalies reflect dense intrusive bodies, allowing us to locate current and former volcanic centers, major rift zones, and a previously suggested volcano on Ka‘ena Ridge. By inverting the residual gravity data, we generate a 3-D view of the dense, intrusive complexes and olivine-rich cumulate cores within individual volcanoes and rift zones. We find that the Hāna and Ka‘ena ridges are underlain by particularly high-density intrusive material (>2.85 g/cm3) not observed beneath other Hawaiian rift zones. Contrary to previous estimates, volcanoes along the chain are shown to be composed of a small proportion of intrusive material (<30% by volume), implying that the islands are predominately built extrusively.

  14. Dike/Drift Interactions

    Energy Technology Data Exchange (ETDEWEB)

    E. Gaffiney

    2004-11-23

    This report presents and documents the model components and analyses that represent potential processes associated with propagation of a magma-filled crack (dike) migrating upward toward the surface, intersection of the dike with repository drifts, flow of magma in the drifts, and post-magma emplacement effects on repository performance. The processes that describe upward migration of a dike and magma flow down the drift are referred to as the dike intrusion submodel. The post-magma emplacement processes are referred to as the post-intrusion submodel. Collectively, these submodels are referred to as a conceptual model for dike/drift interaction. The model components and analyses of the dike/drift interaction conceptual model provide the technical basis for assessing the potential impacts of an igneous intrusion on repository performance, including those features, events, and processes (FEPs) related to dike/drift interaction (Section 6.1).

  15. Examining the Causes of Low-frequency Hybrid Earthquakes During Dike Intrusions in the Afar Rift, Ethiopia

    Science.gov (United States)

    Tepp, G.; Ebinger, C. J.; Belachew, M.

    2014-12-01

    Between 2005 and 2012, there were 14 large dike intrusions into the Dabbahu rift segment in the Afar rift, Ethiopia. Swarms of earthquakes with local magnitudes between 1.45events found 173 earthquakes with more low-frequency content and longer codas than expected for typical volcano-tectonic events. These unusual earthquakes were classified as low-frequency hybrid events based on peak frequency and percent of energy below 2 Hz. Previous studies in other volcanic regions have found similar events, which has led to debate about what causes these events and how best to classify them. Explanations for hybrid events include both source and path effects, though the results from previous work and this study suggest that the Afar hybrids are largely a result of path effects based on high attenuation (Q ~ 200) and azimuthal dependence of spectral content. However, large (~3m) surface displacements on short faults indicate that unusual source processes, such as slow rupture times, may also be a factor in these hybrid events. The aims of this study are to distinguish between path and source effects, to characterize the source processes of these events, and to explore the relation between hybrid and normal tectonic events in the region - are the differences in the source or only in the path? For closely located earthquakes, an Empirical Green's Function approach is a great method to isolate the source-time function. Spectral analysis of the source-time function can be used to provide insights into the rupture time, stress drop, and scaling relations of the earthquakes. These results will be used to further refine earthquake classifications and determine if there are any defining characteristics of the classes that associate them with specific faulting processes, such as surface ruptures, that occur during diking events.

  16. Geodetic evidence for en echelon dike emplacement and concurrent slow slip during the June 2007 intrusion and eruption at Kīlauea volcano, Hawaii

    Science.gov (United States)

    Montgomery-Brown, E. K.; Sinnett, D.K.; Poland, M.; Segall, P.; Orr, T.; Zebker, H.; Miklius, Asta

    2010-01-01

    A series of complex events at Kīlauea Volcano, Hawaii, 17 June to 19 June 2007, began with an intrusion in the upper east rift zone (ERZ) and culminated with a small eruption (1500 m3). Surface deformation due to the intrusion was recorded in unprecedented detail by Global Positioning System (GPS) and tilt networks as well as interferometric synthetic aperture radar (InSAR) data acquired by the ENVISAT and ALOS satellites. A joint nonlinear inversion of GPS, tilt, and InSAR data yields a deflationary source beneath the summit caldera and an ENE-striking uniform-opening dislocation with ~2 m opening, a dip of ∼80° to the south, and extending from the surface to ~2 km depth. This simple model reasonably fits the overall pattern of deformation but significantly misfits data near the western end of an inferred dike-like source. Three more complex dike models are tested that allow for distributed opening including (1) a dike that follows the surface trace of the active rift zone, (2) a dike that follows the symmetry axis of InSAR deformation, and (3) two en echelon dike segments beneath mapped surface cracks and newly formed steaming areas. The en echelon dike model best fits near-field GPS and tilt data. Maximum opening of 2.4 m occurred on the eastern segment beneath the eruptive vent. Although this model represents the best fit to the ERZ data, it still fails to explain data from a coastal tiltmeter and GPS sites on Kīlauea's southwestern flank. The southwest flank GPS sites and the coastal tiltmeter exhibit deformation consistent with observations of previous slow slip events beneath Kīlauea's south flank, but inconsistent with observations of previous intrusions. Slow slip events at Kīlauea and elsewhere are thought to occur in a transition zone between locked and stably sliding zones of a fault. An inversion including slip on a basal decollement improves fit to these data and suggests a maximum of ~15 cm of seaward fault motion, comparable to previous slow

  17. Structural, Petrographic and Geochemical Characteristics of Mafic Dikes Intrusive in Metasedimentary Rocks of the Crixás Greenstone Belt, Goiás

    Directory of Open Access Journals (Sweden)

    Hardy Jost

    2010-10-01

    Full Text Available Mafic dikes and stocks are a common feature in the Archean terrain of Goiás, Central Brazil, where they occur asswarms of 2.3 - 2.5 Ga within the granite-gneiss complexes (2.8 e 2.7 Ga, as well as intrusions related to the komatiite andbasalt flows of the greenstone belts lower stratigraphic units, but were unknown within the upper metasedimentary units.Detailed study of core sections from several drill-sites in the area of the Crixás greenstone belt gold deposits showed thatdike intrusion occurred after the main Paleoproterozoic deformation and metamorphism of the metasedimentary units,and literature data indicate that the magmatic zircons from the dikes yielded an age of 2,170 ± 17 Ma. Petrographic andgeochemical data show that they have the composition of epicratonic high-Ti diabases, which are similar to the largecontinental flood basalts of the Paraná Basin. The age of the intrusions may be correlated with the short time-interval of theRhyacian (2.20 to 2.17 Ga, during which successive localized episodes of mantle plume volcanism occurred on the Earth.

  18. The May 2005 eruption of Fernandina volcano, Galápagos: The first circumferential dike intrusion observed by GPS and InSAR

    KAUST Repository

    Chadwick, William W Jr

    2010-12-15

    The May 2005 eruption of Fernandina volcano, Galápagos, occurred along circumferential fissures parallel to the caldera rim and fed lava flows down the steep southwestern slope of the volcano for several weeks. This was the first circumferential dike intrusion ever observed by both InSAR and GPS measurements and thus provides an opportunity to determine the subsurface geometry of these enigmatic structures that are common on Galápagos volcanoes but are rare elsewhere. Pre- and post- eruption ground deformation between 2002 and 2006 can be modeled by the inflation of two separate magma reservoirs beneath the caldera: a shallow sill at ~1 km depth and a deeper point-source at ~5 km depth, and we infer that this system also existed at the time of the 2005 eruption. The co-eruption deformation is dominated by uplift near the 2005 eruptive fissures, superimposed on a broad subsidence centered on the caldera. Modeling of the co-eruption deformation was performed by including various combinations of planar dislocations to simulate the 2005 circumferential dike intrusion. We found that a single planar dike could not match both the InSAR and GPS data. Our best-fit model includes three planar dikes connected along hinge lines to simulate a curved concave shell that is steeply dipping (~45-60°) toward the caldera at the surface and more gently dipping (~12-14°) at depth where it connects to the horizontal sub-caldera sill. The shallow sill is underlain by the deep point source. The geometry of this modeled magmatic system is consistent with the petrology of Fernandina lavas, which suggest that circumferential eruptions tap the shallowest parts of the system, whereas radial eruptions are fed from deeper levels. The recent history of eruptions at Fernandina is also consistent with the idea that circumferential and radial intrusions are sometimes in a stress-feedback relationship and alternate in time with one another. © 2010 Springer-Verlag.

  19. Deformation of host rocks and flow of magma during growth of minette dikes and breccia-bearing intrusions near Ship Rock, New Mexico

    Science.gov (United States)

    Delaney, Paul T.; Pollard, David D.

    1981-01-01

    We have studied a small group of minette dikes and plugs that crop out within a flat-lying sequence of siltstone and shale near Ship Rock, a prominent volcanic throat of tuff breccia in northwestern New Mexico. Seven dikes form a radial pattern about Ship Rock we describe in detail the northeastern dike, which has an outcrop length of about 2,900 m, an average thickness of 2.3 m, and a maximum thickness of 7.2 m. The dike is composed of 35 discrete segments arranged in echelon; orientation. of dike segments ranges systematically from N. 52? E. to N. 66? E. A prominent joint set strikes parallel to the segments and is localized within several tens of meters of the dike. Regional joint patterns display no obvious relation to dike orientation. Small offsets of segment contacts, as well as wedge-shaped bodies of crumpled host rock within segments mark the sites of coalescence of smaller segments during dike growth. Bulges in the dike contact, which represent a nondilational component of growth, indicate that wall rocks were brecciated and eroded during the flow of magma. Breccias make up about 9 percent of the 7,176-m 2 area of the dike, are concentrated in its southwest half, and are commonly associated with its thickest parts. We also describe three subcircular plugs; each plug is smaller than 30 m in diameter, is laterally associated with a dike, and contains abundant breccias. Field evidence indicates that these plugs grew from the dikes by brecciation and erosion of wallrocks and that the bulges in the contact of the northeastern dike represent an initial stage of this process. From continuum-mechanical models of host-rock deformation, we conclude that dike propagation was the dominant mechanism for creating conduits for magma ascent where the host rock was brittle and elastic. At a given driving pressure, dikes dilate to accept greater volumes of magma than plugs, and for a given dilation, less work is done on the host rocks. In addition, the pressure required

  20. Overtopping resistant dike, Sandy dike

    NARCIS (Netherlands)

    ComCoast

    2005-01-01

    An important element in the ComCoast concept is the overtopable sea defence (often a dike). In this concept the landward (inner) slope of the dike is adjusted in such a way that it can withstand higher overtopping rates. Two new concepts for covering the inner slope, sand cover and perforated mats,

  1. Dike Propagation Near Drifts

    Energy Technology Data Exchange (ETDEWEB)

    NA

    2002-03-04

    The purpose of this Analysis and Model Report (AMR) supporting the Site Recommendation/License Application (SR/LA) for the Yucca Mountain Project is the development of elementary analyses of the interactions of a hypothetical dike with a repository drift (i.e., tunnel) and with the drift contents at the potential Yucca Mountain repository. This effort is intended to support the analysis of disruptive events for Total System Performance Assessment (TSPA). This AMR supports the Process Model Report (PMR) on disruptive events (CRWMS M&O 2000a). This purpose is documented in the development plan (DP) ''Coordinate Modeling of Dike Propagation Near Drifts Consequences for TSPA-SR/LA'' (CRWMS M&O 2000b). Evaluation of that Development Plan and the work to be conducted to prepare Interim Change Notice (ICN) 1 of this report, which now includes the design option of ''Open'' drifts, indicated that no revision to that DP was needed. These analyses are intended to provide reasonable bounds for a number of expected effects: (1) Temperature changes to the waste package from exposure to magma; (2) The gas flow available to degrade waste containers during the intrusion; (3) Movement of the waste package as it is displaced by the gas, pyroclasts and magma from the intruding dike (the number of packages damaged); (4) Movement of the backfill (Backfill is treated here as a design option); (5) The nature of the mechanics of the dike/drift interaction. These analyses serve two objectives: to provide preliminary analyses needed to support evaluation of the consequences of an intrusive event and to provide a basis for addressing some of the concerns of the Nuclear Regulatory Commission (NRC) expressed in the Igneous Activity Issue Resolution Status Report.

  2. Spatiotemporal evolution of dike opening and décollement slip at Kīlauea Volcano, Hawai'i

    Science.gov (United States)

    Montgomery-Brown, E. K.; Sinnett, D.K.; Larson, K.M.; Poland, Michael P.; Segall, P.; Miklius, Asta

    2011-01-01

    Rapid changes in ground tilt and GPS positions on Kīlauea Volcano, Hawai'i, are interpreted as resulting from a shallow, two-segment dike intrusion into the east rift zone that began at 1217 UTC (0217 HST) on 17 June 2007 and lasted almost 3 days. As a result of the intrusion, a very small volume of basalt (about 1500 m3) erupted on 19 June. Northward tilt at a coastal tiltmeter, subsidence of south flank GPS sites, southeastward displacements at southwestern flank GPS sites, and a swarm of flank earthquakes suggest that a slow slip event occurred on the décollement beneath Kīlauea's south flank concurrent with the rift intrusion. We use 4 min GPS positions that include estimates of time-dependent tropospheric gradients and ground tilt data to study the spatial and temporal relationships between the two inferred shallow, steeply dipping dike segments extending from the surface to about 2 km depth and décollement slip at 8 km depth. We invert for the temporal evolution of distributed dike opening and décollement slip in independent inversions at each time step using a nonnegative least squares algorithm. On the basis of these inversions, the intrusion occurred in two stages that correspond spatially and temporally with concentrated rift zone seismicity. The dike opening began on the western of the two segments before jumping to the eastern segment, where the majority of opening accumulated. Dike opening preceded the start of décollement slip at an 84% confidence level; the latter is indicated by the onset of northward tilt of a coastal tiltmeter. Displacements at southwest flank GPS sites began about 18 h later and are interpreted as resulting from slow slip on the southwestern flank. Additional constraints on the evolution of the intrusion and décollement slip come from inversion of an Envisat interferogram that spans the intrusion until 0822 UTC on 18 June 2007, combined with GPS and tilt data. This inversion shows that up to 0822 UTC on 18 June, d

  3. Spectral analysis of dike-induced earthquakes in Afar, Ethiopia

    Science.gov (United States)

    Tepp, Gabrielle; Ebinger, Cynthia J.; Yun, Sang-Ho

    2016-04-01

    Shallow dike intrusions may be accompanied by fault slip above the dikes, a superposition which complicates seismic and geodetic data analyses. The diverse volcano-tectonic and low-frequency local earthquakes accompanying the 2005-2010 large-volume dike intrusions in the Dabbahu-Manda Hararo rift (Afar), some with fault displacements of up to 3 m at the surface, provide an opportunity to examine the relations among the earthquakes, dike intrusions, and surface ruptures. We apply the frequency index (FI) method to characterize the spectra of swarm earthquakes from six of the dikes. These earthquakes often have broad spectra with multiple peaks, making the usual peak frequency classification method unreliable. Our results show a general bimodal character with high FI earthquakes associated with deeper dikes (top > 3 km subsurface) and low FI earthquakes associated with shallow dikes, indicating that shallow dikes result in earthquakes with more low-frequency content and larger-amplitude surface waves. Low FI earthquakes are more common during dike emplacement, suggesting that interactions between the dike and faults may lead to lower FI. Taken together, likely source processes for low FI earthquakes are shallow hypocenters (<3 km) possibly with surface rupture, slow rupture velocities, and interactions with dike fluids. Strong site effects also heavily influence the earthquake spectral content. Additionally, our results suggest a continuum of spectral responses, implying either that impulsive volcano-tectonic earthquakes and the unusual, emergent earthquakes have similar source processes or that simple spectral analyses, such as FI, cannot distinguish different source processes.

  4. Virtual Dike: multiscale simulation of dike stability

    NARCIS (Netherlands)

    Melnikova, N.B.; Shirshov, G.S.; Krzhizhanovskaya, V.V.

    2011-01-01

    We present a Virtual Dike simulation module developed as a part of a flood Early Warning System (EWS) for the UrbanFlood project. The UrbanFlood EWS is a distributed system that analyzes sensor data received in real-time from flood defenses (dikes, dams, etc.) and simulates dike stability, breaching

  5. Three-dimensional deformation mapping of a dike intrusion event in Sakurajima in 2015 by exploiting the right- and left-looking ALOS-2 InSAR

    Science.gov (United States)

    Morishita, Yu; Kobayashi, Tomokazu; Yarai, Hiroshi

    2016-05-01

    One of the limitations of the interferometric synthetic aperture radar (InSAR) is its one-dimensional measurement capability. Although three-dimensional (3-D) deformation can be studied if there are three or more measurements with different viewing geometries, it has not been executed because almost all SAR data are acquired using a right-looking geometry. For the Sakurajima volcanic activity on 15 August 2015, ALOS-2 conducted SAR observations from four different viewing directions, ascending/descending and right-/left-looking, enabling the retrieval of 3-D deformation data only from the InSAR results. We have retrieved 3-D deformation with high precision and resolution by a weighted least squares approach. Expansive deformation of over 10 cm has been observed with standard errors of 0.8, 3.4, and 0.7 cm for east-west, north-south, and up-down components, respectively. It is inferred that a dike of 1.7 × 106m3 volume intruded beneath the Showa crater at a depth of 0.4-1.2 km.

  6. Three-dimensional deformation mapping of a dike intrusion event in Sakurajima in 2015 by exploiting the right- and left-looking ALOS-2 InSAR

    Science.gov (United States)

    Morishita, Yu; Kobayashi, Tomokazu; Yarai, Hiroshi

    2017-04-01

    One of the limitations of the interferometric synthetic aperture radar (InSAR) is its one-dimensional measurement capability. Although three-dimensional (3-D) deformation can be studied if there are three or more measurements with different viewing geometries, it has not been executed because almost all SAR data are acquired using a right-looking geometry. For the Sakurajima volcanic activity on 15 August 2015, ALOS-2 conducted SAR observations from four different viewing directions, ascending/descending and right-/left-looking, enabling the retrieval of 3-D deformation data only from the InSAR results. We have retrieved 3-D deformation with high precision and resolution by a weighted least squares approach. Expansive deformation of over 10 cm has been observed with standard errors of 0.8, 3.4, and 0.7 cm for east-west, north-south, and up-down components, respectively. It is inferred that a dike of 1.7 × 106 m3 volume intruded beneath the Showa crater at a depth of 0.4-1.2 km. In addition to the above-mentioned topic, we will demonstrate that the atmospheric noise has a serious effect on the source modeling and the atmosphere-related noise reduction using numerical weather model has worked well. Acknowledgements: ALOS-2 data were provided from the Volcano Working Group under a cooperative research contract with JAXA. The ownership of ALOS-2 data belongs to JAXA. The products of the numerical weather model and GNSS data were provided by JMA, under the agreement between GSI and JMA.

  7. Wide Green Dikes

    NARCIS (Netherlands)

    Loon-Steensma, van Jantsje M.; Schelfhout, Harry A.

    2017-01-01

    The dual task of reinforcing the dikes along the Dutch coast and preparing for the effects of climate change have stimulated a search for innovative dike designs. Triggered by the presence of gently sloped grass-covered dikes that merge smoothly into the adjacent salt marshes along the German Wad

  8. Dike orientations in the late jurassic independence dike swarm and implications for vertical-axis tectonic rotations in eastern California

    Science.gov (United States)

    Hopson, R.F.; Hillhouse, J.W.; Howard, K.A.

    2008-01-01

    Analysis of the strikes of 3841 dikes in 47 domains in the 500-km-long Late Jurassic Independence dike swarm indicates a distribution that is skewed clockwise from the dominant northwest strike. Independence dike swarm azimuths tend to cluster near 325?? ?? 30??, consistent with initial subparallel intrusion along much of the swarm. Dike azimuths in a quarter of the domains vary widely from the dominant trend. In domains in the essentially unrotated Sierra Nevada block, mean dike azimuths range mostly between 300?? and 320??, with the exception of Mount Goddard (247??). Mean dike azimuths in domains in the Basin and Range Province in the Argus, Inyo, and White Mountains areas range from 291?? to 354?? the mean is 004?? in the El Paso Mountains. In the Mojave Desert, mean dike azimuths range from 318?? to 023??, and in the eastern Transverse Ranges, they range from 316?? to 051??. Restoration for late Cenozoic vertical-axis rotations, suggested by paleodeclinations determined from published studies from nearby Miocene and younger rocks, shifts dike azimuths into better agreement with azimuths measured in the tectonically stable Sierra Nevada. This confirms that vertical-axis tectonic rotations explain some of the dispersion in orientation, especially in the Mojave Desert and eastern Transverse Ranges, and that the dike orientations can be a useful if imperfect guide to tectonic rotations where paleomagnetic data do not exist. Large deviations from the main trend of the swarm may reflect (1) clockwise rotations for which there is no paleomagnetic evidence available, (2) dike intrusions of other ages, (3) crack filling at angles oblique or perpendicular to the main swarm, (4) pre-Miocene rotations, or (5) unrecognized domain boundaries between dike localities and sites with paleomagnetic determinations. ?? 2008 The Geological Society of America.

  9. Dike propagation energy balance from deformation modeling and seismic release

    Science.gov (United States)

    Bonaccorso, Alessandro; Aoki, Yosuke; Rivalta, Eleonora

    2017-06-01

    Magma is transported in the crust mainly by dike intrusions. In volcanic areas, dikes can ascend toward the free surface and also move by lateral propagation, eventually feeding flank eruptions. Understanding dike mechanics is a key to forecasting the expected propagation and associated hazard. Several studies have been conducted on dike mechanisms and propagation; however, a less in-depth investigated aspect is the relation between measured dike-induced deformation and the seismicity released during its propagation. We individuated a simple x that can be used as a proxy of the expected mechanical energy released by a propagating dike and is related to its average thickness. For several intrusions around the world (Afar, Japan, and Mount Etna), we correlate such mechanical energy to the seismic moment released by the induced earthquakes. We obtain an empirical law that quantifies the expected seismic energy released before arrest. The proposed approach may be helpful to predict the total seismic moment that will be released by an intrusion and thus to control the energy status during its propagation and the time of dike arrest.type="synopsis">type="main">Plain Language SummaryDike propagation is a dominant mechanism for magma ascent, transport, and eruptions. Besides being an intriguing physical process, it has critical hazard implications. After the magma intrusion starts, it is difficult to predict when and where a specific horizontal dike is going to halt and what its final length will be. In our study, we singled an equation that can be used as a proxy of the expected mechanical energy to be released by the opening dike. We related this expected energy to the seismic moment of several eruptive intrusions around the world (Afar region, Japanese volcanoes, and Mount Etna). The proposed novel approach is helpful to estimate the total seismic moment to be released, therefore allowing potentially predicting when the dike will end its propagation. The approach helps

  10. Volcanotectonic earthquakes induced by propagating dikes

    Science.gov (United States)

    Gudmundsson, Agust

    2016-04-01

    Volcanotectonic earthquakes are of high frequency and mostly generated by slip on faults. During chamber expansion/contraction earthquakes are distribution in the chamber roof. Following magma-chamber rupture and dike injection, however, earthquakes tend to concentrate around the dike and follow its propagation path, resulting in an earthquake swarm characterised by a number of earthquakes of similar magnitudes. I distinguish between two basic processes by which propagating dikes induce earthquakes. One is due to stress concentration in the process zone at the tip of the dike, the other relates to stresses induced in the walls and surrounding rocks on either side of the dike. As to the first process, some earthquakes generated at the dike tip are related to pure extension fracturing as the tip advances and the dike-path forms. Formation of pure extension fractures normally induces non-double couple earthquakes. There is also shear fracturing in the process zone, however, particularly normal faulting, which produces double-couple earthquakes. The second process relates primarily to slip on existing fractures in the host rock induced by the driving pressure of the propagating dike. Such pressures easily reach 5-20 MPa and induce compressive and shear stresses in the adjacent host rock, which already contains numerous fractures (mainly joints) of different attitudes. In piles of lava flows or sedimentary beds the original joints are primarily vertical and horizontal. Similarly, the contacts between the layers/beds are originally horizontal. As the layers/beds become buried, the joints and contacts become gradually tilted so that the joints and contacts become oblique to the horizontal compressive stress induced by a driving pressure of the (vertical) dike. Also, most of the hexagonal (or pentagonal) columnar joints in the lava flows are, from the beginning, oblique to an intrusive sheet of any attitude. Consequently, the joints and contacts function as potential shear

  11. The Acadian Dikes.

    Science.gov (United States)

    MacKinnon, Gregory R.; Yetman, Krista

    2001-01-01

    Presents an interdisciplinary unit that combines science and technology as a social-historical study on Arcadian dikes. Promotes an authentic task for assessment. Provides a student resource materials packet and activity sheet. (ASK)

  12. A mechanical model for giant radiating dike swarms

    Science.gov (United States)

    Minakov, Alexander; Yarushina, Viktoriya; Faleide, Jan Inge

    2016-04-01

    The Large Igneous Provinces (LIP) is believed to form as results of plume-lithosphere interaction. A recognizable diagnostic feature of the LIP is a swarm of dikes (100 - 1000 km -long) radiating from a single or several focal regions. The models for formation of these dike swarms are mainly based on Venusian analogues (associated with coronae structures) since on Earth these paleo-structures are presumably less likely to preserve due to erosion and later tectonics. The existing explanation for the geometry of dikes (in horizontal plane) is based on assumption that in a far-field shear stress the dikes are normal to the least principal stress. A small overpressure related to the lithospheric magma reservoir is also assumed. However, this type of models implies several limitations: 1) the dike emplacement is considered as a purely elastic process, 2) all dikes are assumed to intrude simultaneously (no interaction with neighboring dikes). On the other hand, recent geophysical observations suggest that the dikes that apparently belong to the same magmatic event can intersect and can be affected by each other and local crustal heterogeneity. In this study, we attribute the geometry of dikes to irreversible plastic deformation including the path-dependence. We use finite-element elastoplastic simulations to predict the fracture pattern related to the plume-lithosphere interaction. The rheology is governed by a non-associated Mohr-Coulomb plastic flow law. The accuracy of the numerical results is benchmarked versus 2D plane strain analytical solutions for combined shear and internal pressure loads. We apply our model to the case of the High Arctic LIP. Here, the location of the dike intrusions is based on the interpretation of magnetic anomalies supported by geological and seismic data in the Barents Sea together with timing constraints using U-Pb isotopic ages. The developed model provides a framework for future high-resolution structural and geochronological studies to

  13. Flow dynamics in mid-Jurassic dikes and sills of the Ferrar large igneous province and implications for long-distance magma transport

    Science.gov (United States)

    Airoldi, Giulia M.; Muirhead, James D.; Long, Sylvan M.; Zanella, Elena; White, James D. L.

    2016-06-01

    Magma flow paths in sill-fed dikes of the Ferrar large igneous province (LIP), contrast with those predicted by classic models of dike transport in LIPs and magmatic rift settings. We examine anisotropy of magnetic susceptibility (AMS) flow paths in dike networks at Terra Cotta Mountain and Mt. Gran, which intruded at paleodepths of ~ 2.5 and ~ 1.5 km. These intrusions (up to 30 m thick) exhibit irregular, interconnected dike-sill geometries and adjoin larger sills (~ 200-300 m thick) at different stratigraphic levels. Both shallowly dipping and sub-vertical magma flow components are interpreted from AMS measurements across individual intrusions, and often match macroscopic flow indicators and variations in dike attitudes. Flow paths suggest that intrusive patterns and magma flow directions depended on varying stress concentrations and rotations during dike and sill propagation, whereas a regional extensional tectonic control was negligible or absent. Unlike giant dike swarms in LIPs elsewhere (e.g., 1270 Ma MacKenzie LIP), dikes of the Ferrar LIP show no regionally consistent vertical or lateral flow patterns, suggesting these intrusion were not responsible for long-distance transport in the province. In the absence of regionally significant, colinear dike swarms, or observed intrusions at crustal depths ≥ 4 km, we suggest that long distance magma transport occurred in sills within Beacon Supergroup sedimentary rocks. This interpretation is consistent with existing geochemical data and thermal constraints, which support lateral magma flow for ~ 3,500 km across the Gondwana supercontinent before freezing.

  14. Tracking bubble evolution inside a silicic dike

    Science.gov (United States)

    Álvarez-Valero, Antonio M.; Okumura, Satoshi; Arzilli, Fabio; Borrajo, Javier; Recio, Clemente; Ban, Masao; Gonzalo, Juan C.; Benítez, José M.; Douglas, Madison; Sasaki, Osamu; Franco, Piedad; Gómez-Barreiro, Juan; Carnicero, Asunción

    2016-10-01

    Pressure estimates from rapidly erupted crustal xenoliths constrain the depth of intrusion of the silicic lavas hosting them. This represents an opportunity for tracking magmatic bubble's evolution and quantifying the variation in bubble volume during rapid magma ascent through a volcanic dike just prior to eruption. The petrology, stable-isotope geochemistry and X-ray micro-tomography of dacites containing crustal xenoliths, erupted from a Neogene volcano in SE Spain, showed an increase in porosity from ~ 1.7 to 6.4% from ~ 19 to 13 km depth, at nearly constant groundmass and crystal volumes. This result provides additional constraints for experimental and numerical simulations of subvolcanic magma-crust degassing processes in silicic systems, and may allow the characterization of volcanic eruptive styles based on volatile content.

  15. Saginaw Bay Restoration Assessment Dikes

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — This dataset is the output of a python script/ArcGIS model that identifes dikes as having a difference in elevation above a certain threshold. If the elevation...

  16. Clastic dike from Baga, Goa

    Digital Repository Service at National Institute of Oceanography (India)

    Setty, M.G.A.P.; Wagle, B.G.

    analogous to igneous dikes in appearance and also in their field relationships. These are injections of mobilized sediment into fracture zones and bedding planes of sedimentary sequences and reported from widely scattered regions throughout the world...

  17. The stress state near Spanish Peaks, colorado determined from a dike pattern

    Science.gov (United States)

    Muller, O.H.; Pollard, D.D.

    1977-01-01

    The radial pattern of syenite and syenodiorite dikes of the Spanish Peaks region is analysed using theories of elasticity and dike emplacement. The three basic components of Ode??'s model for the dike pattern (a pressurized, circular hole; a rigid, planar boundary; and uniform regional stresses) are adopted, but modified to free the regional stresses from the constraint of being orthogonal to the rigid boundary. Dike areal density, the White Peaks intrusion, the strike of the upturned Mesozoic strata, and the contact between these strata and the intensely folded and faulted Paleozoic rocks are used to brient the rigid boundary along a north-south line. The line of dike terminations locates the rigid boundary about 8 km west of West Peak. The location of a circular plug, Goemmer Butte, is chosen as a point of isotropic stress. A map correlating the location of isotropic stress points with regional stress parameters is derived from the theory and used to determine a regional stress orientation (N82E) and a normalized stress magnitude. The stress trajectory map constructed using these parameters mimics the dike pattern exceptionally well. The model indicates that the regional principal stress difference was less than 0.05 times the driving pressure in the West Peak intrusion. The regional stress difference probably did not exced 5 MN/m2. ?? 1977 Birkha??user Verlag.

  18. Geomorphic Expression of a Miocene Dike Complex, San Joaquin Hills, California, USA

    Science.gov (United States)

    Behl, R. J.; Ta, L.; Williams, D.; Werner, A.; Bernardino, M.; Peterson, R.; McCormick, C.; Escobedo, D.; Nagy, B.

    2009-12-01

    Miocene transtension during development of the North American-Pacific plate boundary in southern California coincided with extensive magmatism and emplacement of a 15-16 Ma basaltic to andesitic dike and sill complex in the San Joaquin Hills, Orange County. Intrusions cut through and altered a thick Mesozoic to Cenozoic marine and nonmarine siliciclastic sedimentary succession. Hydrothermally altered sandstone within 20 meters of the contact are cemented with secondary microcrystalline quartz and illite, and locally with calcite. Cementation plus removal of iron oxides from redbeds rendered the altered sandstones more resistant to erosion than the highly weathered dikes or unaltered sedimentary strata. These Miocene dikes exert a profound influence on modern topography due to differential susceptibilities of the dikes and altered wall rock to chemical and physical weathering. At vegetated inland sites, where chemical weathering is important, plagioclase feldspar in dolerite intrusions alter to smectitic clays, and the dikes weather to recessive, brush-covered soils on valleys and slopes. In contrast, altered and hardened sedimentary wall rocks stand up in resistant relief. Many of the wall rocks form the high ridges of the uplifted and dissected San Joaquin Hills and control the geometry of drainages by forming resistant ledges that set local base level and by offsetting stream drainages. Differential erosion of the soft weathered mafic dikes and hard, resistant wall rocks produced a sharp contrast that forms most of the steepest slopes in the study area. Coastal exposures of andesitic dikes, where physical weathering dominates, display a contrary behavior. Igneous dikes are more resistant to wave erosion and form prominent headlands jutting out into the ocean, whereas sedimentary wall rocks are more easily eroded back to form flanking cliffs or sand-covered beaches.

  19. Age dependent variation of magnetic fabric on dike swarms from Maio Island (Cape Verde)

    Science.gov (United States)

    Moreira, Mário; Madeira, José; Mata, João.; Represas, Patrícia

    2010-05-01

    Maio is one of the oldest and most eroded islands of Cape Verde Archipelago. It comprises three major geological units: (1) an old raised sea-floor sequence of MORB covered by Jurassic(?)-Cretaceous deep marine sediments; (2) an intrusive 'Central Igneous Complex' (CIC), forming a dome-like structure in the older rocks; and (3) a sequence of initially submarine, then subaerial, extrusive volcanic formations and sediments. Based on the trend distribution of 290 dikes, we performed magnetic sampling on 26 basic and one carbonatite dikes. Anisotropy of magnetic susceptibility (AMS) was measured to infer geometries of magmatic flow. Dikes were sampled in both chilled margins were larger shear acting on particles embedded in the magmatic flow is expected. Sampling involved 11 dikes (N=195) intruding MORB pillows from the Upper Jurassic 'Batalha Formation' (Bt fm); 6 dikes (N=95) intruding the Lower Cretaceous 'Carquejo Formation' (Cq fm), and 10 dikes (N=129) intruding the submarine sequence of the Neogene 'Casas Velhas Formation' (CV fm). The studied hypabissal rocks are usually porphyritic, with phenocrysts of clinopyroxene and/or olivine set on an aphanitic groundmass. Dikes intruding CV fm trend N-S to NE-SW and plunge to SW. In Bt fm, dikes make ≈ 99% of the outcrops, span all directions and include frequent low dip sills. Dikes intruding Cq fm are shallow (mostly parallel to the limestone strata), dip 30o- 40o to the E, and trend N-S to NE-SW. Bulk susceptibility of the 26 basic dikes presents an average value of k = 47 ± 26 (×10-3) SI. The carbonatite dike intruding Bt fm has lower susceptibility: k = 4.6 ± 1.2 (×10-3) SI. More than 80% of the dikes show normal and triaxial magnetic fabric. Anisotropy is usually low, with P' < 1.08, but in CV fm dikes the anisotropy is higher and grows (up to P' ≈ 1.5) towards the centre of the volcano. Dominant magnetic fabric in CV fm is planar but in dikes from Cq fm and Bt fm it varies between oblate and prolate

  20. 49 CFR 193.2161 - Dikes, general.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Dikes, general. 193.2161 Section 193.2161...: FEDERAL SAFETY STANDARDS Design Impoundment Design and Capacity § 193.2161 Dikes, general. An outer wall of a component served by an impounding system may not be used as a dike unless the outer wall...

  1. DIKE FORMATION WITH SUBMERGED VANE

    Institute of Scientific and Technical Information of China (English)

    Umesh P.GUPTA; C.S.P.OJHA; Nayan SHARMA

    2006-01-01

    Submerged vanes are submerged foils constructed in a river at an angle of attack to induce horizontal circulation in the downstream flow. The initial height of vanes is 0.2 - 0.4 times the local water depth (d) at the design stage. Its length expressed as a multiple of the height to length ratio (H/L) normally is 0.25 to 0.5. With the use of a submerged vane in straight channels, dikes (heaps of sediment) were formed downstream. At an optimal angle of attack of 40o and at a Froude number of 0.25, the formation of the dike starts at some distance from the trailing edge of the rectangular and trapezoidal submerged vanes with a collar. A significant scour hole results at the trailing edge of a vane with a collar. A typical dike formed along the vane on the suction side with a symmetric bell-shaped profile. The dike formation phenomenon triggered by a vane close to the bank-line at a flow with a relatively higher Froude number, such as 0.25, does not seem to follow a straight alignment, but has a sort of curvilinear shape bent towards the suction side. The dike formation process for a flow with a smaller Froude number, such as 0.13, is observed to not be appreciable. With the same installation height of H, a vane without a collar was dislodged by the flow at a Froude number of 0.25, whereas it was stable at a Froude number of 0.13.

  2. FLOW PATTERNS AND DAMAGE OF DIKE OVERTOPPING

    Institute of Scientific and Technical Information of China (English)

    Chaiyuth CHINNARASRI; Tawatchai TINGSANCHALI; Sutat WEESAKUL; Somchai WONGWISES

    2003-01-01

    Damage of a dike may result in severe damage and suffering. To reduce downstream damage and loss of life, it is important to study the process of breaching of the damaged dike. It is not possible to understand the damage process without a clear understanding of the flow patterns encountered. In the present study, data obtained from nine experimental runs are analyzed. The flow patterns and progressive damage of dike overtopping are investigated. Two types of phenomena at the dike surface:erosion; and erosion and sliding, are observed during the overtopping event. Four stages of dike damage can be distinguished. The degradation rate of the dike crest is found to be dependent on the downstream slope of the dike. The degradation rate is higher when the downstream slope is steeper.

  3. Effects of axially variable diking rates on faulting at slow spreading mid-ocean ridges

    Science.gov (United States)

    Tian, Xiaochuan; Choi, Eunseo

    2017-01-01

    Magma supply for dike injection can be highly variable within a segment of a slow-spreading mid-ocean ridge but the tectonic impact of this variability is not fully understood. Here, we use three-dimensional numerical models to quantify the effects of variable diking rates on the faulting mode at a 20 km-long slow spreading ridge segment. In addition to end-member faulting modes in which long-lived detachment faults or short-lived normal faults form along the whole segment, we newly identify a transitional mode in which a detachment and a short-lived normal fault form simultaneously but in respective domains separated by a transfer fault. Different faulting modes can be better correlated with the average dike intrusion rate, rather than the highest or lowest rate along the segment. Along-axis stress coupling tends to homogenize fault offset along the segment, inhibiting the domination of a particular faulting mode associated with an extreme local diking rate. This homogenizing effect explains why detachment faults can sometimes form even in the regions previously considered as unfavorable. Our results further suggest that a long (>15 km) and continuous detachment, partially overlain by younger faults, can create an oceanic core complex when faults weaken fast and diking rate is low. When faults weaken slow and diking rate is moderate, however, faulting occurs in the transitional mode, producing a detachment over only a part of the segment length.

  4. Dikes under Pressure - Monitoring the Vulnerability of Dikes by Means of SAR Interferometry

    Science.gov (United States)

    Marzahn, Philip; Seidel, Moritz; Ludwig, Ralf

    2016-04-01

    Dikes are the main man made structures in flood protection systems for the protection of humans and economic values. Usually dikes are built with a sandy core and clay or concrete layer covering the core. Thus, dikes are prone to a vertical shrinkage due to soil physical processes such as reduction of pore space and gravity increasing the risk of a crevasse during floods. In addition, this vulnerability is amplified by a sea level rise due to climate change. To guarantee the stability of dikes, a labourer intensive program is carried out by national authorities monitoring the dikes by visual inspection. In the presented study, a quantitative approach is presented using SAR Interferometry for the monitoring of the stability of dikes from space. In particular, the vertical movement of dikes due to shrinkage is monitored using persistent scatterer interferometry. Therefore three different types of dikes have been investigated: a sea coast dike with a concrete cover, a sea coast dike with short grass cover and a smaller river dike with grass cover. All dikes are located in Germany. Results show the potential of the monitoring technique as well as spatial differences in the stability of dikes with subsidence rates in parts of a dike up to 7 mm/a.

  5. Experiments of dike-induced deformation: Insights on the long-term evolution of divergent plate boundaries

    KAUST Repository

    Trippanera, D.

    2015-10-22

    The shallow transport of magma occurs through dikes causing surface deformation. Our understanding of the effects of diking at the surface is limited, especially on the long term, for repeated intrusive episodes. We use analogue models to study the upper crustal deformation induced by dikes. We insert metal plates within cohesive sand with three setups: in setup A, the intrusion rises upward with constant thickness and in setups B and C, the intrusion thickens at a fixed depth, with final rectangular (setup B) or triangular (setup C) shape in section. Setup A creates a doming delimited by reverse faults, with secondary apical graben, without close correspondence in nature. In setups B and C, a depression flanked by two uplifted areas is bordered by inward dipping normal faults propagating downward and, for deeper intrusions in setup B, also by inner faults, reverse at the surface; this deformation is similar to what is observed in nature, suggesting a consistent physical behavior. Dikes in nature initially propagate developing a mode I fracture at the tip, subsequently thickened by magma intrusion, without any host rock translation in the propagation direction (as in setup A). The deformation pattern in setups B and C depends on the intrusion depth and thickness, consistently to what is observed along divergent plate boundaries. The early deformation in setups B and C is similar to that from a single rifting episode (i.e., Lakagigar, Iceland, and Dabbahu, Afar), whereas the late stages resemble the structure of mature rifts (i.e., Krafla, Iceland), confirming diking as a major process in shaping divergent plate boundaries.

  6. STATISTICAL EVALUATION OF HISTORICAL DIKE FAILURE MECHANISM

    Directory of Open Access Journals (Sweden)

    L. NAGY

    2012-12-01

    Full Text Available Statistical evaluation of historical dike failure mechanism The failure mechanism of flood protection dikes includes physical (geotechnical, seepage processes leading to a dike breach. An awareness of the failure mechanism is required directly in dike stability calculations and indirectly for risk calculations. Statistics of historical data indicate among others the distribution and frequency of failure mechanisms associated with dikes. These data may be used in estimations of the expected likelihood of occurrence of non-quantifiable failure mechanisms. In addition to a comparative evaluation of statistics collected in several countries, this publication also presents data for the Carpathian Basin. One of the most important conclusions drawn from statistical information suggests that most dike breaches develop as a consequence of poor safety strategy

  7. Petrologic Consequences of the Magmatic Death of a Continental Arc: Vanda Dike Swarm, Dry Valleys, Antarctica

    Science.gov (United States)

    Harpp, K. S.; Christensen, B. C.; Geist, D. J.; Garcia, M. O.

    2005-12-01

    The Dry Valleys of southern Victoria Land, Antarctica, are notable for the presence of the Vanda dikes, prominent NE-trending swarms that crosscut a sequence of granitoid plutons. These older plutons are regional in extent and comprise 3 Cambro-Ordovician groups, including: a) calc-alkaline granitoids formed at an active plate margin during the Ross Orogeny (c. 505 Ma); b) adakitic granitoids, likely marking the conclusion of Ross Orogeny subduction-related activity (c. 490 Ma); and c) younger monzonitic plutons, probably generated in an intraplate extensional setting (Cox et al., 2000). The Vanda dikes crosscut the younger plutons, possibly between c. 490 and 477 Ma (Allibone et al., 1993; Encarnacion and Grunow, 1996). Dikes from the east wall of Bull Pass and the south wall of the Wright Valley range from 0.5-25 m wide with nearly vertical dips, are usually several km long, and, in the center of the swarms, occur with a frequency of ~18 dikes/km. Most have chilled margins and are surrounded by brittle fractures, indicative of shallow intrusion into cold country rock. Dike compositions are bimodal, most defining a trend at the boundary between the high-K calc-alkaline and shoshonite series in SiO2-K2O space; some Wright Valley dikes have slightly lower K2O and are calc-alkaline. Granite porphyry dikes are relatively homogeneous (69-73 wt.% SiO2), whereas the mafic dikes exhibit a wider range of compositions (49-57 wt.% SiO2). The felsic and mafic dikes have distinct trace element abundances but similar normalized distribution patterns, including fractionated heavy rare earth elements and negative Eu and high field-strength element anomalies. Average Sr/Y ratios of both the felsic and mafic dikes cluster around 20, well below a typical adakite signature. Major and trace element variations suggest that the felsic dikes may be differentiates of the mafic magmas. Field relations further indicate that the felsic lavas may represent, on average, a later phase of dike

  8. Magma flow through elastic-walled dikes

    NARCIS (Netherlands)

    Bokhove, O.; Woods, A.W.; Boer, de A.

    2005-01-01

    A convection–diffusion model for the averaged flow of a viscous, incompressible magma through an elastic medium is considered. The magma flows through a dike from a magma reservoir to the Earth’s surface; only changes in dike width and velocity over large vertical length scales relative to the chara

  9. How diking affects the longer-term structure and evolution of divergent plate boundaries

    KAUST Repository

    Trippanera, Daniele

    2015-04-01

    Recurrent diking episodes along divergent plate boundaries, as at Dabbahu (2005, Afar) or at Bardarbunga (2014, Iceland) , highlight the possibility to have m-wide opening in a short time (days to weeks). This suggests a prominent role of magma enhancing transient plate separations. However, the role of diking on a longer term (> 102 years) and its influence on the structure and the evolution of a divergent plate boundary is still poorly investigated. Here we use field surveys along the oceanic Icelandic and continental Ethiopian plate boundaries, along five eruptive fissures and four rift segments. Field observations have also been integrated with analogue and numerical models of dike emplacement to better understand the effect of dike emplacement at depth and at the surface. Our results show that the dike-fed eruptive fissures are systematically associated with graben structures formed by inward dipping normal faults having throws up to 10 m and commonly propagating downward. Moreover, rift segments (i.e. mature rift zones), despite any asymmetry and repetition, are characterized by the same features as the eruptive fissures, the only difference lying in the larger size (higher fault throws, up to 40 m, and wider deformation zones). Analogue and numerical models of dike intrusion confirm that all the structural features observed along the rift segments may be dike-induced; these features include downward propagating normal faults bordering graben structures, contraction at the base of the hanging walls of the faults and upward propagating faults. Simple calculations based on the deeper structure of the eroded rift segments in eastern and western Iceland also suggest that all the fault slip in the active rift segments may result from diking. These results suggest that the overall deformation pattern of eruptive fissures and rift segments may be explained only by dike emplacement. In a magmatic rift, the regional tectonic stress may rarely be high enough to be

  10. Western Lake Erie Restoration Assessment Dikes

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — This dataset is the output of a python script/ArcGIS model that identifes dikes as having a difference in elevation above a certain threshold. If the elevation...

  11. Connecting River Systems Restoration Assessment Dikes

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — This dataset is the output of a python script/ArcGIS model that identifes dikes as having a difference in elevation above a certain threshold. If the elevation...

  12. Identification of Five Stages of Dike Swarms in the Shanxi-Hebei-Inner Mongolia Border Area and Its Tectonic Implications

    Institute of Scientific and Technical Information of China (English)

    SHAO Ji'an; ZHAI Mingguo; ZHANG L(u)qiao; LI Daming

    2004-01-01

    Dike swarms are generally ascribed to intrusion of mantle-source magma result from extension. Basic dike swarms around the Shanxi-Hebei-Inner Mogolia borders in the northern peripheral area of the North China Craton can be divided into five age groups according to isotopic dating: 1800-1700 Ma, 800-700 Ma, 230 Ma, 140-120 Ma, and 50-40 Ma. Geological, petrological and isotope geochemical features of the five groups is investigated in order to explore the variation of the mantle material composition in the concerned area with time. And the various extensional activities reflected by the five groups of dike swarms are compared with some important tectonic events within the North China Craton as well as around the world during the same period.

  13. Can a dike "feel" a free surface?

    Science.gov (United States)

    Pansino, S.; Taisne, B.

    2015-12-01

    This study uses analogue experiments to examine the various factors that could influence the dynamic or arrest of a dike prior to an eruption. Dike propagation has been well-studied from the perspective of analogue experiments and it has been shown how various competing forces interact (buoyancy, viscosity, elastic properties, fracture toughness,…). It has been observed that dikes experience acceleration as they approach a free surface, which theoretically is due to increasing stress intensity as distance to the free surface decreases. Other unrelated studies analysed the constant-volume propagation of low-surface-energy liquids (e.g. hydrophilic liquids) in a semi-infinite medium and found the propagation rate to decelerate, as liquid gradually transferred from the head region to the tail and buoyancy abated. In contrast, high-surface-energy fluids transfer negligible quantities of their volume into the tail region, essentially maintain their volume, and experience no such deceleration. This study focuses on the aforementioned factors influencing dike propagation, acceleration due to a free surface and deceleration due to head volume loss, to determine what their combined effect is on magma eruptability. As previous studies used hydrophobic liquids to investigate free-surface effects, and as magma is expected to have a low surface energy with the crust (they are both silicate), hydrophilic liquids (e.g. glucose syrup) are used in this study. Each experiment is arranged to have a free surface condition occupying half of the apparatus, and a no-slip condition occupying the other half, which allows for side-by-side comparison. The results are analysed to determine the minimum volume needed for a dike to erupt; failure to erupt implies that the dike would instead come to arrest in the crust.

  14. Structure - Riverine Flow Structure (Dike/Wingdam)

    Data.gov (United States)

    Army Corps of Engineers, Department of the Army, Department of Defense — A natural or man-made flow (or sediment) control structure in a water course or water body such as a dike or weir. This feature should not be used to model a levee....

  15. IT lessons learnt from real time dike monitoring

    NARCIS (Netherlands)

    Vonder, M.R.; Waaij, B.D. van der

    2013-01-01

    The Dutch lowlands are protected by many kilometres of dikes. Currently these dikes are visually inspected on a regular basis. During heavy weather this frequency is raised, up to 24/7 in very extreme situations. After a dike failure at the Dutch town Wilnis in 2003, the question was raised whether

  16. Impacts of climate change on the principles of dike design

    NARCIS (Netherlands)

    Verhagen, H.J.

    2007-01-01

    Dike design is a very traditional craft. Since many generations dikes have been constructed in our part of Europe. After each disaster the dike was rebuilt, and improved. The improvement was always based on the experiences of the previous flood. For example, for many years the design height of a dik

  17. Koolau dike complex, Oahu: intensity and origin of a sheeted-dike complex high in a Hawaiian volcanic edifice

    Energy Technology Data Exchange (ETDEWEB)

    Walker, G.P.L.

    1986-04-01

    The dike complex in the eroded Koolau tholeiitic shield volcano is unique among described dike swarms for its coherence, high dike-injection intensity, relatively uniform and non-Gaussian 50% to 65% intensity level, and lack of dike divergence. Parts are like a sheeted-dike complex, though high in an intraplate volcanic edifice. A model is proposed in which highly mobile tholeiitic magma, having considerable freedom to move through the strongly disjointed volcano, seeks zones in which it is gravitationally most stable. These zones are marginal parts of the dike complex, separating lavas having a lower-than-magmatic bulk density from a > 50% dike complex having a higher-than-magmatic bulk density. This model also explains the strong propensity for the magma of Kilauea volcano to remain underground (in a gravitationally stable zone). Magma erupts only when it vesiculates sufficiently; often, when it has degassed, some of it promptly plunges back toward the stable zone again.

  18. A laser profilometry technique for monitoring fluvial dike breaching in laboratory experiments

    Science.gov (United States)

    Dewals, Benjamin; Rifai, Ismail; Erpicum, Sébastien; Archambeau, Pierre; Violeau, Damien; Pirotton, Michel; El kadi Abderrezzak, Kamal

    2017-04-01

    A challenging aspect for experimental modelling of fluvial dike breaching is the continuous monitoring of the transient breach geometry. In dam breaching cases induced by flow overtopping over the whole breach crest (plane erosion), a side view through a glass wall is sufficient to monitor the breach formation. This approach can be extended for 3D dam breach tests (spatial erosion) if the glass wall is located along the breach centreline. In contrast, using a side view does not apply for monitoring fluvial dike breaching, because the breach is not symmetric in this case. We present a non-intrusive, high resolution technique to record the breach development in experimental models of fluvial dikes by means of a laser profilometry (Rifai et al. 2016). Most methods used for monitoring dam and dike breaching involve the projection of a pattern (fringes, grid) on the dam or dike body and the analysis of its deformation on images recorded during the breaching (e.g., Pickert et al. 2011, Frank and Hager 2014). A major limitation of these methods stems from reflection on the water surface, particularly in the vicinity of the breach where the free surface is irregular and rippled. This issue was addressed by Spinewine et al. (2004), who used a single laser sheet so that reflections on the water surface were strongly limited and did not hamper the accurate processing of each image. We have developed a similar laser profilometry technique tailored for laboratory experiments on fluvial dike breaching. The setup is simple and relatively low cost. It consists of a digital video camera (resolution of 1920 × 1080 pixels at 60 frames per second) and a swiping red diode 30 mW laser that enables the projection of a laser sheet over the dike body. The 2D image coordinates of each deformed laser profile incident on the dike are transformed into 3D object coordinates using the Direct Linear Transformation (DLT) algorithm. All 3D object coordinates computed over a swiping cycle of the

  19. Minimum critical thickness of dike for ore-bearing fluid injection: A new approach applied to the Shihu gold deposit, Hebei Province, North China

    Directory of Open Access Journals (Sweden)

    Dedong Li

    2012-09-01

    Full Text Available According to the metallogenic theory by transmagmatic fluid (TMF, one magmatic intrusion is a channel of ore-bearing fluids, but not their source. Therefore, it is possible to use TMF’s ability for injection into and for escaping from the magmatic intrusion to evaluate its ore-forming potential. As the ore-bearing fluids cannot effectively inject into the magmatic intrusion when the magma fully crystallized, the cooling time and rates viscosity varied can be used to estimate the minimum critical thickness of the intrusion. One dimensional heat transfer model is used to determine the cooling time for three representative dikes of different composition (granite porphyry, quartz diorite and diabase in the Shihu gold deposit. It also estimated the rates viscosity varied in these time interval. We took the thickness of dike at the intersection of the cooling time – thickness curve and the rates viscosity varied versus thickness curve as the minimum critical thickness. For the ore-bearing fluids effectively injecting into the magma, the minimum critical thicknesses for the three representative dikes are 33.45 m for granite porphyry, 8.22 m for quartz diorite and 1.02 m for diabase, indicating that ore-bearing dikes must be thicker than each value. These results are consistent with the occurrence of ore bodies, and thus they could be applied in practice. Based on the statistical relationship between the length and the width of dikes, these critical thicknesses are used to compute critical areas: 0.0003–0.0016 km2 for diabase, 0.014–0.068 km2 for quartz diorite and 0.011–0.034 km2 for granite porphyry. This implies that ore-bearing minor intrusions have varied areas corresponding to their composition. The numerical simulation has provided the theoretical threshold of exposed thickness and area of the ore-bearing intrusion. These values can be used to determine the ore-forming potentials of dikes.

  20. [Estimation of spur dike-affected fish habitat area].

    Science.gov (United States)

    Ray-Shyan, Wu; Yan-Ru, Chen; Yi-Liang, Ge

    2012-04-01

    Based on the HEC-RAS and River 2D modes, and taking 5% change rate of weighted usable area (WUA) as the threshold to define the spur dike- affected area of target fish species Acrossocheilus paradoxus in Fazi River in Taiwan, this paper studied the affected area of the fish habitat by spur dike, and, in combining with the references about the installations of spur dikes in Taiwan in recent 10 years, analyzed the relative importance of related affecting factors such as dike height, dike length (water block rate), average slope gradient of river way, single or double spur dike, and flow discharge. In spite of the length of the dike, the affected area in downstream was farther, and was about 2-6 times as large as that in upstream. The ratio of the affected area in downstream / upstream decreased with increasing slope gradient, but increased with increasing dike length and flow discharge. When the discharge was approximate to 10 years return periods, the ratio of the affected area would be close to a constant of 2. Building double spur dike would produce a better WUA than building single spur dike.

  1. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  2. Diking-induced moderate-magnitude earthquakes on a youthful rift border fault: The 2002 Nyiragongo-Kalehe sequence, D.R. Congo

    Science.gov (United States)

    Wauthier, C.; Smets, B.; Keir, D.

    2015-12-01

    On 24 October 2002, Mw 6.2 earthquake occurred in the central part of the Lake Kivu basin, Western Branch of the East African Rift. This is the largest event recorded in the Lake Kivu area since 1900. An integrated analysis of radar interferometry (InSAR), seismic and geological data, demonstrates that the earthquake occurred due to normal-slip motion on a major preexisting east-dipping rift border fault. A Coulomb stress analysis suggests that diking events, such as the January 2002 dike intrusion, could promote faulting on the western border faults of the rift in the central part of Lake Kivu. We thus interpret that dike-induced stress changes can cause moderate to large-magnitude earthquakes on major border faults during continental rifting. Continental extension processes appear complex in the Lake Kivu basin, requiring the use of a hybrid model of strain accommodation and partitioning in the East African Rift.

  3. Monitoring of Huaihe DikeDeformation Caused by Mining

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Based on a large number of data gathered through monitoring and surveying, this paper gives modifica-tion and calculation formulas of the movement and deformation of the dike slope. The variation of subsidence andhorizontal movement in the dike interior is analyzed. And from the geological condition of the dike, the interrela-tion between the subsidence, horizontal movement and the stratum structure and the basic laws are discussed.

  4. A two-segment model for thin filament architecture in skeletal muscle.

    Science.gov (United States)

    Gokhin, David S; Fowler, Velia M

    2013-02-01

    Correct specification of myofilament length is essential for efficient skeletal muscle contraction. The length of thin actin filaments can be explained by a novel 'two-segment' model, wherein the thin filaments consist of two concatenated segments, which are of either constant or variable length. This is in contrast to the classic 'nebulin ruler' model, which postulates that thin filaments are uniform structures, the lengths of which are dictated by nebulin. The two-segment model implicates position-specific microregulation of actin dynamics as a general principle underlying actin filament length and stability.

  5. Optical single-sideband OFDM transmission based on a two-segment EAM.

    Science.gov (United States)

    Cheng, Hsuan-Lin; Chen, Wei-Hung; Wei, Chia-Chien; Chiu, Yi-Jen

    2015-01-26

    This paper presents a novel optical single-sideband (SSB) OFDM modulation scheme using a two-segment electro-absorption modulator (EAM). Differences in the chirp characteristics of two segments of the EAM make it possible to design driving signals capable of suppressing one of the optical sidebands, such that the optical OFDM signal does not suffer from frequency-selective power fading following dispersive fiber transmission. Our experiment results demonstrate optical OFDM transmissions at 13.5-Gbps over a 0 ∼ 200-km IM/DD system without the need for dispersion compensation and distance-dependent bit- and power-loading.

  6. Mafic subvolcanic intrusions and their petrologic relation with the volcanism in the south hinge Torres Syncline, Paraná-Etendeka Igneous Province, southern Brazil

    Science.gov (United States)

    Sarmento, Carla Cecília Treib; Sommer, Carlos Augusto; Lima, Evandro Fernandes

    2017-08-01

    The hypabyssal intrusions investigated in this study are located in the east-central region of the state of Rio Grande do Sul, in the south hinge of the Torres Syncline. The intrusions comprise twenty-four dikes and ten sills, intruding in ponded pahoehoe, compound pahoehoe, rubbly and acidic lava flows of the south sub-Province of the Paraná Igneous Province and the sedimentary rocks of the Botucatu, Pirambóia, Santa Maria and Rio do Rasto Formations, on the edge of the Paraná Basin. The intrusive dikes in the flows have preferred NNW-SSE direction and the intrusive dikes in the sedimentary rocks have preferred NE-SW direction. Regarding the morphology, the dikes were separated into two different groups: symmetrical and asymmetrical. The small variation in facies is characterized by fine to aphanitic equigranular rocks. The rocks were divided into two types: Silica Supersaturated Tholeiite (SST) - dikes and sills consisting of plagioclase and clinopyroxene as essential minerals, with some olivine and felsic mesostasis, predominant intergranular texture and subordinate subophitic texture; and Silica Saturated Olivine Tholeiite (SSOT) - dikes consisting mainly of plagioclase, clinopyroxene and olivine, and predominant ophitic texture. The major and trace element geochemistry allows classifying these hypabyssal bodies as basalts (SSOT), basaltic andesites and trachyandesites (TSS) of tholeiitic affinity. The mineral chemistry data and the REE behavior, combined with the LILE and HFSE patterns, similar to the flows and low-Ti basic intrusions of southern Brazil and northwestern Namibia allow suggesting that these dikes and sills were part of a feeder system of the magmatism in the Paraná-Etendeka Igneous Province. The preferred direction of the intrusive dikes in the sedimentary rocks of the Paraná Basin coincides with tectonic-magmatic lineaments related to extensional processes and faulting systems that served as vents for dike swarms parallel to the Brazilian

  7. Cost optimal river dike design using probabilistic methods

    NARCIS (Netherlands)

    Bischiniotis, K.; Kanning, W.; Jonkman, S.N.

    2014-01-01

    This research focuses on the optimization of river dikes using probabilistic methods. Its aim is to develop a generic method that automatically estimates the failure probabilities of many river dike cross-sections and gives the one with the least cost, taking into account the boundary conditions and

  8. Cost optimal river dike design using probabilistic methods

    NARCIS (Netherlands)

    Bischiniotis, K.; Kanning, W.; Jonkman, S.N.

    2014-01-01

    This research focuses on the optimization of river dikes using probabilistic methods. Its aim is to develop a generic method that automatically estimates the failure probabilities of many river dike cross-sections and gives the one with the least cost, taking into account the boundary conditions and

  9. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  10. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  11. Monogenetic volcanoes fed by interconnected dikes and sills in the Hopi Buttes volcanic field, Navajo Nation, USA

    Science.gov (United States)

    Muirhead, James D.; Van Eaton, Alexa R.; Re, Giuseppe; White, James D. L.; Ort, Michael H.

    2016-01-01

    Although monogenetic volcanic fields pose hazards to major cities worldwide, their shallow magma feeders (volcanic field, Arizona, to shed light on the nature of its magma feeder system. Shallow exposures reveal a transition zone between intrusion and eruption within 350 m of the syn-eruptive surface. Using a combination of field- and satellite-based observations, we have identified three types of shallow magma systems: (1) dike-dominated, (2) sill-dominated, and (3) interconnected dike-sill networks. Analysis of vent alignments using the pyroclastic massifs and other eruptive centers (e.g., maar-diatremes) shows a NW-SE trend, parallel to that of dikes in the region. We therefore infer that dikes fed many of the eruptions. Dikes are also observed in places transforming to transgressive (ramping) sills. Estimates of the observable volume of dikes (maximum volume of 1.90 × 106 m3) and sills (minimum volume of 8.47 × 105 m3) in this study reveal that sills at Hopi Buttes make up at least 30 % of the shallow intruded volume (∼2.75 × 106 m3 total) within 350 m of the paeosurface. We have also identified saucer-shaped sills, which are not traditionally associated with monogenetic volcanic fields. Our study demonstrates that shallow feeders in monogenetic fields can form geometrically complex networks, particularly those intruding poorly consolidated sedimentary rocks. We conclude that the Hopi Buttes eruptions were primarily fed by NW-SE-striking dikes. However, saucer-shaped sills also played an important role in modulating eruptions by transporting magma toward and away from eruptive conduits. Sill development could have been accompanied by surface uplifts on the order of decimeters. We infer that the characteristic feeder systems described here for the Hopi Buttes may underlie monogenetic fields elsewhere, particularly where magma intersects shallow, and often weak, sedimentary rocks. Results from this study support growing evidence of the

  12. Living behind dikes: mimicking flooding experiences.

    Science.gov (United States)

    Zaalberg, Ruud; Midden, Cees J H

    2013-05-01

    Delta areas like the Netherlands are threatened by global climate change. Awareness is, however, rather low. Our research objective was to investigate whether coping responses to flooding risks could be enhanced in a virtual environment (VE). A laboratory experiment was conducted in which participants were exposed to a simulated dike breach and consequent flooding of their virtual residence. We tested the hypothesis that an interactive 3D flood simulation facilitates coping responses compared to noninteractive film and slide simulations. Our results showed that information search, the motivation to evacuate, and the motivation to buy flood insurance increased after exposure to the 3D flood simulation compared to the film and slide simulations. Mediation analyses revealed that some of these presentation mode effects were mediated by a greater sense of being present in the VE. Implications to use high-end flood simulations in a VE to communicate real-world flooding risks and coping responses to threatened residents will be discussed.

  13. Interpreting inverse magnetic fabric in dikes from Eastern Iceland

    Science.gov (United States)

    Trippanera, Daniele; Urbani, Stefano; Porreca, Massimiliano; Acocella, Valerio; Kissel, Catherine; Sagnotti, Leonardo; Winkler, Aldo

    2017-04-01

    Since the 70's magnetic fabric analysis has been used to infer magma emplacement in dikes. However, the interpretation of magmatic flow orientation in dikes is often complicated by the occurrence of anomalous (i.e. inverse) magnetic fabric. This latter may either reflect the presence of single-domain (SD) grains or result from peculiar orientation mechanisms of magnetic minerals in magmas of different viscosities. Tertiary dike swarms of extinct volcanic systems in Eastern Iceland represent the ideal case study to clarify the origin of anomalous magnetic fabric. Here we present the results of a multidisciplinary study on dikes belonging to the Alftafjordur volcanic system (Eastern Iceland), including a: (1) structural field study in order to identify kinematic and thermal indicators of dikes; (2) anisotropy of low-field magnetic susceptibility (AMS) analysis, to investigate the magnetic fabric and reconstruct the flow direction of 25 dikes; (3) first order reversal curve (FORC) diagrams and thermomagnetic properties of selected dikes to define the magnetic mineralogy; (4) petrofabric and image analyses at different microscopic scales to investigate the origin of the magnetic fabric and compare the AMS results with mineral texture. Our results show that half of the dikes show a well defined inverse magnetic fabrics (k max orthogonal to the dike margins) and anomalous high anisotropy degrees. Only 7 dikes have a normal magnetic fabric and other 6 dikes have an intermediate magnetic fabric. No clear prevalence of SD grains, which could explain the inverse magnetic fabric, was observed. On the contrary, petrofabric and thermomagnetic analysis reveal the presence of low Ti-content coarse magnetite and high Ti-content elongated magnetite grains as the main contributors to most of the observed magnetic fabrics. In particular, the orientation of the elongated high Ti-content magnetite grains, though usually scattered, is partly comparable with that of the maximum and

  14. Furrow Dike Water Conservation Practices in the Texas High Plains

    OpenAIRE

    Wistrand, Glen L.

    1984-01-01

    Furrow diking can prevent irrigation and rainfall runoff, conserve energy use, prevent soil loss, amd allow producers to reclaim land otherwise unusable, depending on soil, climate, and crops grown in a given area. Initial investment to use this technique may be recovered within the first season. This study analyzes the effects of diking on water and soil conservation, crop yields, costs, and energy use in farming, using examples of farms in the Texas High Plains area.

  15. Paleomagnetism of clastic dikes along the Front Range, Colorado

    Science.gov (United States)

    Dulin, S. A.; Elmore, R. D.

    2011-12-01

    Numerous clastic dikes occur within the Proterozoic basement along nearly 75km of the Front Range of Colorado. These dikes are composed predominately of well-rounded, non-metamorphosed quartz and are red in color due to the abundance of authigenic hematite. The Cambrian Sawatch sandstone is assumed by most studies to be the source of dike sediments due to its similar composition. Despite over a century of study, the origins, age, and emplacement mechanisms of these dikes remain enigmatic. A preliminary paleomagnetic study of the clastic dikes using standard demagnetization techniques indicates the presence of a complex multicomponent magnetization with at least three components. An easterly and moderately steep component residing in hematite was resolved from several dikes and corresponds to an early Cambrian pole position when compared to the apparent polar wander path of North America. An east-southeasterly and shallow magnetization, also residing in hematite, yields a pole of early Paleozoic age. The third component is northwesterly and steep down and is Mesozoic or Cenozoic in age. These results are similar to a previous paleomagnetic study (Kost, MS thesis, Univ. Colorado) in 1984 of different dikes which found poorly defined early and late Paleozoic, as well as Mesozoic-Cenozoic components. Many researchers suggest emplacement occurred during faulting that was associated with either the Ancestral Rockies uplift of the late Paleozoic or the Laramide orogeny of the late Mesozoic/early Cenozoic. The presence of magnetizations of Cambrian age, with subsequent younger remagnetizations, indicates that the emplacement of many of the dikes preceded both of these tectonic events.

  16. Furrow Dike Water Conservation Practices in the Texas High Plains

    OpenAIRE

    Wistrand, Glen L.

    1984-01-01

    Furrow diking can prevent irrigation and rainfall runoff, conserve energy use, prevent soil loss, amd allow producers to reclaim land otherwise unusable, depending on soil, climate, and crops grown in a given area. Initial investment to use this technique may be recovered within the first season. This study analyzes the effects of diking on water and soil conservation, crop yields, costs, and energy use in farming, using examples of farms in the Texas High Plains area.

  17. NUMERICAL SIMULATION OF BED DEFORMATION IN DIKE BURST

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The key point in the numerical simulation of breach growth and bed deformation process in a dike burst is the accurate computation of flow and sediment transport. A numerical model for horizontal 2-D non-uniform sediment was developed to simulate the bed deformation process in the dike burst. The first-order scheme was used in computation. Several simulated results were worked out to demonstrate the applicability of the numerical model.

  18. Computer Intrusions and Attacks.

    Science.gov (United States)

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  19. Design Methods for Geotextile Tubes Application in Dike Construction

    Institute of Scientific and Technical Information of China (English)

    YAN Yue; YAN Shu-wang; QIU Chang-lin; ZHENG Gang

    2008-01-01

    The technique of geotextile tubes used to construct dikes for land reclamation has been widely used. The tubes are usually filled with slurry of soil, such as sand, silt or clay. The tensile stress developed in the geotextile during filling the tube is the dominant factor for construction of a safe dike. The existing design methods are good for designing sausage shaped tubes and can not be directly applied for designing flat tubes, which are commonly used in dike construction. This paper presents a procedure that can determine the relationship among the tube size, the pumping pressure, the unit weight of the slurry, and the tensile stress developed in the geotextile during the tube filing. When the tubes are piling up to form the dike, the tubes in the bottom will sustain the load from the weight of the upper ones. A procedure is also developed to calculate the changes of the mechanical and geometrical behavior of the tubes under the load with a similar method. All these approaches have been programmed, which can help dike designers to select the suitable geotextile and determine the profile of the dike.

  20. Application of Geotextile Bag Dehydrated Soil to Dike Construction

    Institute of Scientific and Technical Information of China (English)

    朱平; 闫澍旺; 刘润

    2004-01-01

    Using geotextile bag dehydrated soil to construct dikes for land reclamation to substitute conventional straw bags is an urgent need in Tianjin New Harbor, China. This paper introduces the method to build a dike for hydraulic filling. The soil for filling the geotextile bags was tested in wave trench; the stress developed during construction was calculated by establishing a numerical model and compared with the tensile strength of the geotextile; the stability and settlement of the dike were estimated by performing centrifuge tests. Through this study, the following information was obtained: 1) The cohesionless silt with plasticity index less than 10 is suitable for filling the geotextile bags. The geotextile bag dehydrated soil consolidated very quickly even under the action of wave force. 2) A numerical model was devised to find the limit injection height and to calculate the tensile stress developed in the geotextile bags when they were piled up to form the dike. The calculated stress was compared with the strength of the geotextile, showing that the design is reasonably safe. 3) Centrifuge test results show that the designed dike will be stable and the settlement of dike will be less than the design requirement.

  1. Extension by faulting, stretching and magma intrusion in Ethiopia

    Science.gov (United States)

    Bastow, I. D.; Keir, D.

    2012-12-01

    The 2001-2004 Ethiopia Afar Geoscientific Lithospheric Experiment showed that high seismic wavespeed, dense, mafic crustal intrusions exist beneath many zones of Quaternary magmatism in the Main Ethiopian rift, and that crustal thinning is minimal. From these observations, a consensus quickly emerged that extension presently occurs not by ductile stretching and brittle faulting but by magma intrusion. Striking InSAR images and accompanying seismic data from the 2005 Afar diking episode provided further compelling evidence in support of the magma assisted rifting hypothesis. Patterns of mantle seismic anisotropy, constrained by a combination of body and surface-wave analysis showed that melt intrusion likely also plays an important role in accommodating extension at greater depths in the extending plate. Evidence from further north in Afar, however, where crustal thickness decreases abruptly into the Danakil Depression, is not so easily explained by the magma assisted rifting hypothesis. Subsidence of the newly forming margin towards and below sea level, and eruption of voluminous basalt flows, is likely the result of late-stage thinning of the heavily intruded, weakened plate just before the onset of seafloor spreading. Faulting, stretching and magma intrusion are thus each important, but at different times during breakup. Combining, not isolating, these mechanisms of strain in new rifting models and appreciating how plate strength varies during rifting is essential in developing a clearer understanding of the incomplete geological record that documents continental breakup over time.

  2. Costs of sea dikes - regressions and uncertainty estimates

    Science.gov (United States)

    Lenk, Stephan; Rybski, Diego; Heidrich, Oliver; Dawson, Richard J.; Kropp, Jürgen P.

    2017-05-01

    Failure to consider the costs of adaptation strategies can be seen by decision makers as a barrier to implementing coastal protection measures. In order to validate adaptation strategies to sea-level rise in the form of coastal protection, a consistent and repeatable assessment of the costs is necessary. This paper significantly extends current knowledge on cost estimates by developing - and implementing using real coastal dike data - probabilistic functions of dike costs. Data from Canada and the Netherlands are analysed and related to published studies from the US, UK, and Vietnam in order to provide a reproducible estimate of typical sea dike costs and their uncertainty. We plot the costs divided by dike length as a function of height and test four different regression models. Our analysis shows that a linear function without intercept is sufficient to model the costs, i.e. fixed costs and higher-order contributions such as that due to the volume of core fill material are less significant. We also characterise the spread around the regression models which represents an uncertainty stemming from factors beyond dike length and height. Drawing an analogy with project cost overruns, we employ log-normal distributions and calculate that the range between 3x and x/3 contains 95 % of the data, where x represents the corresponding regression value. We compare our estimates with previously published unit costs for other countries. We note that the unit costs depend not only on the country and land use (urban/non-urban) of the sites where the dikes are being constructed but also on characteristics included in the costs, e.g. property acquisition, utility relocation, and project management. This paper gives decision makers an order of magnitude on the protection costs, which can help to remove potential barriers to developing adaptation strategies. Although the focus of this research is sea dikes, our approach is applicable and transferable to other adaptation measures.

  3. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  4. Network intrusion detection

    Institute of Scientific and Technical Information of China (English)

    Oboile Tirelo; YANG Chun-hua

    2003-01-01

    Nowadays, network computer systems play an increasingly important role in society and economy. They have become the targets of a wide array of malicious attacks that invariably turn into actual intrusions. This is why the computer security has become an essential concern for network administrators. Too often, intrusions wreak havoc inside LANs and the time and cost to repair the damage can grow to extreme proportions. Instead of using passive measures to fix and patch security holes once they have been exploited, it is more effective to adopt a protective approach to intrusions. In addition to the well-established intrusion prevention techniques such as data encryption and message integrity, user authentication and user authorization, as well as the avoidance of security flaws inherent to many off-the-shelf applications, intrusion detection techniques can be viewed as an addition safeguard for network computers. The paper discusses traditional and new security designs, the approach to implementing best-practice security measures and the method to trace the malicious computer attackers.

  5. Structural evolution of lamprophyric dikes in Lailai, northeastern coast of Taiwan, deduced from mesoscopic structures in dikes and country rocks

    Science.gov (United States)

    You, Cian-Siang; Huang, Wen-Jeng; Lo, Wei; Wang, Tzu-Bin; Chen, Chien-Chih

    2015-04-01

    Lamprophyric dikes are standing in right-stepping en echelon up to 2.3 meters high within the Oligocene Tatungshan formation on the Lai-Lai wave-cut platform in the northeastern coast of Taiwan. The marine platform composed mainly of argillite is the extension of Hsuehshan range, which has the tallest peak of 3,886 m high in Taiwan. The dikes formed at depth in the late Miocene of 9±1.1 Ma ago are exposed on the marine platform nowadays due to the exhumation and Penglai orogeny resulting from the collision of Eurasian plate and Philippine Sea plate, which began in Pleistocene of 5-6 Ma ago. In consequence, folds, faults, joints and other structures are associated with them. In this study, the distribution of the dikes and fractures were mapped by conducting accurate surveys with a total station theodolite and orthorectifying aerial images taken by an unmanned aerial vehicle in different elevations. Electrical resistivity exploration was performed to decipher the arrangement of the dikes underground and the characteristics of the faults. The associated mesoscopic structures were delineated by mapping at a scale of 1: 40 in the field. We infer that the dikes was formed at depth of approximately 2.4 kilometers according to the thickness of overlaying sedimentary rocks formed from late Oligocene to late Miocene. Thus, it excludes the possibility that fractures existed before the lamprophyric magma intruded into the country rocks. Our observations help restore the original status of the current 19 dike segments. We conclude that the lamprophyric magma forcedly and vertically intruded into the Oligocene rocks and the direction change of maximum principle stress at depth of 2.4 kilometers resulted in three or more right-stepping en-echelon dikes.

  6. Simulation of dike-break processes in the Yellow River

    Institute of Scientific and Technical Information of China (English)

    LIANG; Lin(梁林); NI; Jinren(倪晋仁); A.G.L.; Borthwick; B.D.; Rogers

    2002-01-01

    Although dike-break and dam-break processes have similar unsteady and discontinuous hydrodynamic characteristics, there are significant differences. In general, dam-break simulations focus on the flood discharge, whereas dike-break simulations are required to provide detailed information on the hydraulic and breach evolution processes, such as pit-scour and breach-expansion. In order to overcome the difficulties inherent in applying existing dam-break models to dike-breaks, this paper presents an integrated model that combines the shallow water, sediment transport, riverbed deformation and breach-expansion equations. A Godunov-type finite volume method is used for the flow simulation, based on a fixed quadtree grid system. The hydrodynamic aspects of the model are validated for an idealized rectangular dam break. A representative reach in the Yellow River is selected at a location where there is a significant risk of a dike-break, and full-scale topographic and hydrologic data are available. Typical dike-break processes are successfully simulated, with predicted hydraulic characteristics and terrain changes qualitatively in agreement with laboratory data. The modeling study is of practical importance for implementation of engineering countermeasures in the Yellow River, such as breach blocking and head wrapping.

  7. Petrology, geochemistry and tectonic settings of the mafic dikes and sills associated with the evolution of the Proterozoic Cuddapah Basin of south India

    Indian Academy of Sciences (India)

    Nilanjan Chatterjee; Somdev Bhattacharji

    2001-12-01

    In this article we summarize the petrological, geochemical and tectonic processes involved in the evolution of the Proterozoic intracratonic Cuddapah basin. We use new and available ages of Cuddapah igneous rocks, together with field, stratigraphic, geophysical and other criteria, to arrive at a plausible model for the timing of these processes during basin evolution. We present petrological and geochronological evidence of dike emplacement along preferred lineament directions around the basin in response to stresses, which may have been responsible for the evolution of the basin itself. Basaltic dike intrusion started on the south Indian shield around 2400 Ma and continued throughout the Cuddapah basin evolution and sedimentation. A deep mantle perturbation, currently manifested by a lopolithic cupola-like intrusion under the southwestern part of the basin, may have occurred at the onset of basin evolution and played an important role in its development. Paleomagnetic, gravity and geochronological evidence indicates that it was a constant thermal source responsible for dike and sill emplacement between 1500 and 1200 Ma both inside and outside the basin. Lineament reactivation in the NW-SE and NE-SW directions, in response to the mantle perturbation, intensified between 1400 and 1200 Ma, leading to the emplacement of several cross cutting dikes. Fe-Mg partition coefficients of olivine and augite and Ca-Na partition coefficient of plagioclase, calculated from the composition of these minerals and bulk composition of their host rocks, indicate that the dikes outside the Cuddapah basin are cumulates. The contemporary dikes may be related by fractional crystallization as indicated by a positive correlation between their plagioclase Ca#(atomic Ca/[Ca+Na]) and augite Mg#(atomic Mg/[Mg+Fe]). A few NW-SE and NE-SW cross cutting dikes of the period between 1400 and 1200 Ma, preserve petrographic evidence of episodic magmatic intrusive activity along preferred directions

  8. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    Science, pages 576–585. Springer Berlin / Heidelberg, June 2010. • Jing Xiao-Pei and Wang Hou -Xiang. “A new immunity intrusion detection model based on...2008. • Hongying Zheng, Meiju Hou , and Yu Wang. “An efficient hybrid clustering-PSO algorithm for anomaly intrusion detection.” Journal of Software...Technology, 2(6):1790– 1799, 2010. [34] Lee, Suchul, Hyunchul Kim, Dhiman Barman, Sungryoul Lee, Chong -kwon Kim, Ted Kwon, and Yanghee Choi. “NeTraMark: a

  9. Theory of Volumetric Moving Dislocation in Poroelastic Halfspace and Characterization of Magma Intrusion Events

    Institute of Scientific and Technical Information of China (English)

    Ouyang Zhihua; Elsworth Derek; Sheng Jianlong

    2005-01-01

    The undrained change in pore fluid pressure that accompanies dike intrusion may be conveniently represented as a moving volumetric dislocation. The concept of a dilation center was developed to represent the field of undrained pressure change in a saturated linear elastic medium. Since instantaneous pore fluid pressures can be developed to a considerable distance from the dislocation, monitoring the rate of pressure generation and subsequent pressure dissipation in a fully coupled manner enables certain characteristics of the resulting dislocation to be defined. The principal focus of this study is the application of dislocation-based methods to analyze the behavior of the fluid pressure response induced by intrusive dislocations in a semi-infinite space, such as dike intrusion, hydraulic fracturing and piezometer insertion. Partially drained pore pressures result from the isothermal introduction of volumetric moving pencil-like dislocations described as analogs to moving point dislocation within a semi-infinite saturated elastic medium. To represent behavior within the halfspace, an image dislocation is positioned under the moving coordinate frame fixed to the front of the primary moving dislocation, to yield an approximate solution for pore pressure for constant fluid pressure conditions. Induced pore pressures are concisely described under a minimum set of dimensionless parameter groupings representing propagation velocity, and relative geometry. Charts defining induced pore fluid pressure at a static measuring point provide a meaningful tool for determining unknown parameters in data reduction. Two intrusive events at Krafla, Iceland are examined using the type curve matching techniques. Predicted parameters agree favorably with field data.

  10. Thermal rectification and negative differential thermal resistance in a driven two segment classical Heisenberg chain.

    Science.gov (United States)

    Bagchi, Debarshee

    2013-12-11

    Using computer simulation we investigate thermal transport in a two segment classical Heisenberg spin chain with nearest neighbor interaction and in the presence of an external magnetic field. The system is thermally driven by heat baths attached at the two ends and transport properties are studied using energy conserving dynamics. We demonstrate that by properly tuning the parameters thermal rectification can be achieved-the system behaves as a good conductor of heat along one direction but becomes a bad conductor when the thermal gradient is reversed, and crucially depends on nonlinearity and spatial asymmetry. Moreover, suitable tuning of the system parameters gives rise to the counterintuitive and technologically important feature known as negative differential thermal resistance (NDTR). We find that the crucial factor responsible for the emergence of NDTR is a suitable mechanism for impeding the current in the bulk of the system.

  11. Summer oxygen depletion in a diked New England estuary

    Science.gov (United States)

    Portnoy, J.W.

    1991-01-01

    The diked and freshened Herring River estuary (Wellfleet, Massachusetts) experiences regular summer hypoxia and one- to three-week periods of main stream anoxia, often accompanied by fish kills. Stream hypoxia results from the temperature-dependent increase in oxygen demand of organic matter released by diked salt marsh deposits; periods of total anoxia are induced by heavy rains which increase the runoff of wetland organic matter. Historic reductions in tidal flushing have extended the low salinity region of the estuary normally characterized by high organic loads and minimal flushing. Recurrent main stream anoxia has depressed both migratory and resident aquatic fauna.

  12. Perturbation of regional ocean tides due to coastal dikes

    Science.gov (United States)

    Choi, B. H.; Kim, K. O.; Lee, H. S.; Yuk, J. H.

    2010-04-01

    The tidal regime modeling system for ocean tides in the seas bordering the Korean Peninsula is designed to cover an area that is broad in scope and size, yet provide a high degree of resolution in coastal development areas, including the Saemangeum area in the eastern Yellow Sea and the Ariake Sea in Japan, where serious environmental problems have occurred after the completion of interior tidal dikes. With this simulation system, we have estimated the changes in tidal regime due to barriers at Saemangeum and Isahaya Bay in the Ariake Sea. Some results in terms of perturbations in tidal elevations due to the construction of coastal dikes are presented and discussed.

  13. Pandora and Dike in Hesiod’s Works and days

    Directory of Open Access Journals (Sweden)

    Katherine Olstein

    1980-12-01

    Full Text Available Pandora and Dike are negative and positive analogues integral as such to the most important themes of the poem. Pandora's myth explains why strife is deadly and must be rejected for accumulating Bios on the land. As punishment for Prometheus' attempts to trick Zeus, Pandora and her descendants eternally trick men who also cheat each other, neglecting productive work. The evils from Pandora's jar and the several ages of unjust men destroyed by Zeus represent respectively individual and generational mortality. Nevertheless, through Dike —harmonious work and Bios attained in the Just City, a new Golden Age— men may hope to recapture their immortality.

  14. The Characterization of the Crush Zones in the Dike of Ultramafic Rock and Associated Gabbro with a Help of Magnetic Survey

    Science.gov (United States)

    Kudo, S.; Iwamori, A.; Tanaka, Y.; Makino, M.; Okuma, S.; Miyakawa, A.; Nakatsuka, T.; Sasaki, T.; Yanagida, M.; Sugimori, T.; Kitao, H.; Asahi, N.; Shiomi, T.; Higashida, Y.

    2016-12-01

    The composite dike of the ultramafic rock and associated gabbro intruded in the shale and diabase in the upper of the Yakuno Ophiolite of the Paleozoic in the site of the Ohi nuclear power station of the KEPCO (the Kansai Electric Power Co., Inc.). The KEPCO has conducted several surveys such as tectonic landform interpretation, trench and drilling surveys, and crush zones in the dike were found by the trench survey. Detail observations with the X-ray CT images, thin sections and polished sections were conducted to study whether the crush zones were caused by fault activity or landslide along serpentinite metamorphosed from the ultramafic rock. The continuity of the crush zones was studied by an interpretation of the detail DEM and dense drillings which were conducted around the trench (25 drillings in about 25,000 square meters).As results of the study, we clarified that: The crush zones are classified into an inactive fault estimated to be sheared at the time of the intrusion of the dike and a slip surface of a shallow landslide. The fault is limited in the dike and does not extend into the shale or diabase. The shallow landslide resides along the distribution of the ultramafic rock remarkably metamorphosed to the serpentinite, which becomes unclear in deep underground. The distribution of the fault and landslide is enclosed in ultramafic rock of the dike which shows a high magnetic susceptibility. Therefore, a magnetic survey was conducted to clarify the distribution of the ultramafic rock within dozens of meters in depth. As the results of the survey, the areas of strong positive and negative magnetic anomalies corresponded to the distribution of the ultramafic rock confirmed by the trench and drilling surveys. The magnetic survey also revealed the shallow subsurface structures in such areas as shallow sea where the drilling was a few. The details about the magnetic survey and results of analyses are shown in Okuma et al. (2016, this meeting).

  15. LA-ICP-MS zircon U-Pb dating and phenocryst EPMA of dikes, Guocheng, Jiaodong Peninsula: Implications for North China Craton lithosphere evolution

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Widespread dike swarm, including diorite-, monzonite-porphyry and lamprophyre, intruded in the al- tered breccia gold deposits along basin marginal faults, Guocheng, Jiaodong Peninsula. Petrography exhibits biotite enclaves in amphibole phenocrysts and the presence of acicular apatites in these dikes. Electron probe microanalyses (EPMA) show that the amphibole and clinopyroxene phenocryst’s mantle in diorite porphyry and lamprophyre respectively has sharply higher MgO (Mg#) and Cr2O3 contents in contrast to their cores. The plagioclase phenocryst in monzonite porphyry has reverse zoning. These results indicate that the magma mixing between mantle-derived mafic and crust-derived felsic magmas occurred in the original process of the dikes. Zircon cathodoluminescence (CL) images show well-developed magmatic oscillatory zones and the acquired LA-ICP-MS zircon U-Pb weighted mean 206Pb/238U ages are 114±2 Ma (MSDW=1.5) for monzonite porphyry (GS1) and 116±1 Ma (MSDW=0.8) for diorite porphyry (GS2), respectively. Earlier magmatic events in the northwest Jiaodong Peninsula represented by some inherited or captured zircons also occur in these dikes. Magmatic zircons from GS1 and GS2 display consistent chondrite-normalized REE patterns and Nb/Ta values, implying that they may share a similar or same source. HREE enrichment and obvious negative Eu anomalies of these zircons preclude garnet presented in their source. Our results, combined with preciously pub- lished data, indicate that dike intrusion and gold mineralization among quartz vein, altered tectonite and altered breccia gold deposits are broadly contemporaneous throughout the Jiaodong Peninsula. These also imply that the intensive crust-mantle interaction and asthenospheric underplating had oc- curred in the Early Cretaceous in the Peninsula, together with foundering of lower crust in the early Mesozoic, representing the different stages of lithosphere thinning in the North China Craton (NNC).

  16. LA-ICP-MS zircon U-Pb dating and phenocryst of dikes, Guocheng, Jiaodong Peninsula: Implications for North China Craton lithosphere evolution

    Institute of Scientific and Technical Information of China (English)

    TAN Jun; WEI JunHao; GUO LingLi; ZHANG KeQing; YAO ChunLiang; LU JianPei; LI HongMei

    2008-01-01

    Widespread dike swarm, including diorite-, monzonite-porphyry and lamprophyre, intruded in the altered breccia gold deposits along basin marginal faults, Guocheng, Jiaodong Peninsula. Petrography exhibits biotite enclaves in amphibole phenocrysts and the presence of acicular apatites in these dikes.Electron probe microanalyses (EPMA) show that the amphibole and clinopyroxene phenocryst's mantle in diorite porphyry and lamprophyre respectively has sharply higher MgO (Mg#) and Cr203 contents in contrast to their cores. The plagioclase phenocryst in monzonite porphyry has reverse zoning. These results indicate that the magma mixing between mantle-derived mafic and crust-derived felsic magmas occurred in the original process of the dikes. Zircon cathodoluminescence (CL) images show well-developed magmatic oscillatory zones and the acquired LA-ICP-MS zircon U-Pb weighted mean 206pb/238U ages are 114±2 Ma (MSDW=1.5) for monzonite porphyry (GS1) and 116±1 Ma (MSDW=0.8) for diorite porphyry (GS2), respectively. Earlier magmatic events in the northwest Jiaodong Peninsula represented by some inherited or captured zircons also occur in these dikes. Magmatic zircons from GSl and GS2 display consistent chondrite-normalized REE patterns and Nb/Ta values, implying that they may share a similar or same source. HREE enrichment and obvious negative Eu anomalies of these zircons preclude garnet presented in their source. Our results, combined with preciously published data, indicate that dike intrusion and gold mineralization among quartz vein, altered tectonite and altered breccia gold deposits are broadly contemporaneous throughout the Jiaodong Peninsula.These also imply that the intensive crust-mantle interaction and asthenospheric underplating had occurred in the Early Cretaceous in the Peninsula, together with foundering of lower crust in the early Mesozoic, representing the different stages of lithosphere thinning in the North China Craton (NNC).

  17. A Study on the Relations Between Ultrabasic Dikes and Fine Disseminated Gold Deposits in Southwestern Guizhou Province as Exemplified by Zimudang Large—Sized Gold Deposit

    Institute of Scientific and Technical Information of China (English)

    朱赖民

    1998-01-01

    The relations between ultrabasic rocks and gold deposits in time,space and genesis are discussed in this paper,the research results show that the ore-forming materials of the gold deposits is characteristic of crust-mantle mixing,The formation of the gold deposits is related with the activity of juvenile fluids along with the intrusion of ultrabasic dikes.The ascending juvenile fluids not only offered part of the gold.water and mineralizers for gold mineralization but also promoted the remobilization,deposition and enrichment of gold in crustal sediments.

  18. Wave overtopping resistance of grassed dike slopes in Vietnam

    NARCIS (Netherlands)

    Trung, L.H.; Van der Meer, J.W.; Luong, N.Q.; Verhagen, H.J.; Schiereck, G.J.

    2011-01-01

    The resistance of various grassed slopes against wave overtopping has been appraised by means of the Wave Overtopping Simulator in situ for a couple of years in Viet Nam. Destructive test results show that a dike slope covered with grass could suffer a certain overtopping discharge not smaller than

  19. Wave overtopping resistance of grassed dike slopes in Vietnam

    NARCIS (Netherlands)

    Trung, L.H.; Van der Meer, J.W.; Luong, N.Q.; Verhagen, H.J.; Schiereck, G.J.

    2011-01-01

    The resistance of various grassed slopes against wave overtopping has been appraised by means of the Wave Overtopping Simulator in situ for a couple of years in Viet Nam. Destructive test results show that a dike slope covered with grass could suffer a certain overtopping discharge not smaller than

  20. Scattering of electromagnetic plane waves by a buried vertical dike

    Directory of Open Access Journals (Sweden)

    Batista Lurimar S.

    2003-01-01

    Full Text Available The complete and exact solution of the scattering of a TE mode frequency domain electromagnetic plane wave by a vertical dike under a conductive overburden has been established. An integral representation composed of one-sided Fourier transforms describes the scattered electric field components in each one of the five media: air, overburden, dike, and the country rocks on both sides of the dike. The determination of the terms of the series that represents the spectral components of the Fourier integrals requires the numerical inversion of a sparse matrix, and the method of successive approaches. The zero-order term of the series representation for the spectral components of the overburden, for given values of the electrical and geometrical parameters of the model, has been computed. This result allowed to determine an approximate value of the variation of the electric field on the top of the overburden in the direction perpendicular to the strike of the dike. The results demonstrate the efficiency of this forward electromagnetic modeling, and are fundamental for the interpretation of VLF and Magnetotelluric data.

  1. The Acadian Dikes: An Interdisciplinary Study of Technology.

    Science.gov (United States)

    MacKinnon, Gregory; Yetman, Krista

    Technology has a unique place in the elementary classroom. It provides an unparalleled vehicle for integrating many traditional subject areas. It serves to break down curricular barriers while at the same time promoting situated learning. This paper describes the implementation of a unit that focuses on the technology of the dike systems. Dikes…

  2. Design of a pilot dike on Cat Hai Island

    NARCIS (Netherlands)

    Bel, N.; Disco, M.; Kalf, P.; Kluwen, J.; Lin, C.H.; Van de Sande, S.

    2010-01-01

    Master project report. On behalf of, and in cooperation with the TU Delft and the MARD-CWRCT two dike designs are made for a pilot project on Cat Hai Island. Two different types of revetments are used, namely the Dutch block type revetment Basalton and the classic rip-rap revetment. The designs are

  3. Conceptual model for reinforced grass on inner dike slopes

    NARCIS (Netherlands)

    ComCoast

    2005-01-01

    A desk study has been carried out in order to develop a conceptual model for the erosion of inner dike slopes with reinforced grass cover. Based on the results the following can be concluded: The presence of a geosynthetic in a grass slope can be taken into account in the EPM method by increasing

  4. Design of a pilot dike on Cat Hai Island

    NARCIS (Netherlands)

    Bel, N.; Disco, M.; Kalf, P.; Kluwen, J.; Lin, C.H.; Van de Sande, S.

    2010-01-01

    Master project report. On behalf of, and in cooperation with the TU Delft and the MARD-CWRCT two dike designs are made for a pilot project on Cat Hai Island. Two different types of revetments are used, namely the Dutch block type revetment Basalton and the classic rip-rap revetment. The designs are

  5. Strength of the landward slopes of sea dikes in Vietnam

    NARCIS (Netherlands)

    Trung, L.H.; Verhagen, H.J.; Van der Meer, J.W.; Cat, V.M.

    2012-01-01

    The landware slopes of sea dikes in the north of Vietnam are steep and solely constructed by soil covered with grass due to the budget constraints and also the out-of-date design guidelines.The resistance against erosion due to wave overtopping of several grass covered slopes were tested with the Wa

  6. Flood damage reduction by compartmentalization of a dike ring: comparing the effectiveness of three strategies

    NARCIS (Netherlands)

    Oost, J.; Hoekstra, Arjen Ysbert

    2009-01-01

    Compartmentalization of dike ring areas is currently seen as one of the promising options for managing or reducing the risk of flooding. Recently, several studies on the effectiveness of subdividing dike ring areas by means of compartmentalization dikes were published. These studies show that the

  7. Wireless Intrusion Prevention Systems

    Directory of Open Access Journals (Sweden)

    Jack TIMOFTE

    2008-01-01

    Full Text Available The wireless networks have changed the way organizations work and offered a new range of possibilities, but at the same time they introduced new security threats. While an attacker needs physical access to a wired network in order to launch an attack, a wireless network allows anyone within its range to passively monitor the traffic or even start an attack. One of the countermeasures can be the use of Wireless Intrusion Prevention Systems.

  8. Composite synvolcanic intrusions associated with Precambrian VMS-related hydrothermal systems

    Science.gov (United States)

    Galley, Alan G.

    2003-06-01

    Large subvolcanic intrusions are recognized within most Precambrian VMS camps. Of these, 80% are quartz diorite-tonalite-trondhjemite composite intrusions. The VMS camps spatially associated with composite intrusions account for >90% of the aggregate sulfide tonnage of all the Precambrian, intrusion-related VMS camps. These low-alumina, low-K, and high-Na composite intrusions contain early phases of quartz diorite and tonalite, followed by more voluminous trondhjemite. They have a high proportion of high silica (>74% SiO2) trondhjemite which is compositionally similar to the VMS-hosting rhyolites within the volcanic host-rock successions. The quartz-diorite and possibly tonalite phases follow tholeiitic fractionation trends whereas the trondhjemites fall within the composition field for primitive crustal melts. These transitional M-I-type primitive intrusive suites are associated with extensional regimes within oceanic-arc environments. Subvolcanic composite intrusions related to the Archean Sturgeon Lake and Noranda, and Paleoproterozoic Snow Lake VMS camps range in volume from 300 to 1,000 km3. Three have a sill morphology with strike lengths between 15 and 22 km and an average thickness between 1,500 and 2,000 m. The fourth has a gross stock-like shape. The VMS deposits are principally restricted to the volcanic strata above the strike length of the intrusions, as are areally extensive, thin exhalite units. The composite intrusions contain numerous internal phases which are commonly clustered within certain parts of the composite intrusion. These clusters underlie eruptive centers surrounded by areas of hydrothermal alteration and which contain most of the VMS deposits. Early quartz-diorite and tonalite phases appear to have intruded in rapid succession. Evidence includes gradational contacts, magma mixing and disequilibrium textures. They appear to have been emplaced as sill-dike swarms. These early phases are present as pendants and xenoliths within later

  9. Jet transport noise - A comparison of predicted and measured noise for ILS and two-segment approaches

    Science.gov (United States)

    White, K. C.; Bourquin, K. R.

    1974-01-01

    Centerline noise measured during standard ILS and two-segment approaches in DC-8-61 aircraft were compared with noise predicted for these procedures using an existing noise prediction technique. Measured data is considered to be in good agreement with predicted data. Ninety EPNdB sideline locations were calculated from flight data obtained during two-segment approaches and were compared with predicted 90 EPNdB contours that were computed using three different models for excess ground attenuation and a contour with no correction for ground attenuation. The contour not corrected for ground attenuation was in better agreement with the measured data.

  10. Noise data for a twin-engine commercial jet aircraft flying conventional, steep, and two-segment approaches

    Science.gov (United States)

    Hastings, E. C., Jr.; Mueller, A. W.; Hamilton, J. R.

    1977-01-01

    Center-line noise measurements of a twin-engine commercial jet aircraft were made during steep landing approach profiles, and during two-segment approach profiles for comparison with similar measurements made during conventional approaches. The steep and two-segment approaches showed significant noise reductions when compared with the -3 deg base line. The measured noise data were also used to develop a method for estimating the noise under the test aircraft at thrust and altitude conditions typical of current landing procedures and of landing procedures under development for the Advanced Air Traffic Control System.

  11. Scour and flow field around a spur dike in a 90° bend

    Institute of Scientific and Technical Information of China (English)

    Majid FAZLI; Masoud GHODSIAN; Seyed Ali Akbar Salehi NEYSHABOURI

    2008-01-01

    Spur dike is an important element in river training that creates rapid variations in flow field,sediment transport and bed topography.The mechanism of flow and sediment transport in a channel bend is very complex,especially when a spur dike is constructed in a bend.Most of previous investigations on flow behavior and scour around spur dike were carried out in straight channels.In this paper results of experiments on flow field and scour around a spur dike in a 90 degree channel bend are presented.Sand with uniform grain size was used as the bed material.Experiments were conducted for different locations and different lengths of spur dikes at the bend with different values of discharge.The three dimensional flow fields around a spur dike were investigated.The maximum depth of scour was correlated to the Froude numbers,lengths and the locations of spur dike in the bend.

  12. Reactive transport modeling of ferroan dolomitization by seawater interaction with mafic igneous dikes and carbonate host rock at the Latemar platform, Italy

    Science.gov (United States)

    Blomme, Katreine; Fowler, Sarah Jane; Bachaud, Pierre

    2017-04-01

    forms closest to dikes due to the abundance of Fe associated with the dikes. This leads to depletion of Fe in fluid flowing away from dikes and formation of non-ferroan replacement dolomite further afield. References S.K. Carmichael, J.M. Ferry, W.F. McDonough, Formation of replacement dolomite in the Latemar carbonate buildup, Dolomites, Northern Italy: Part 1. Field relations, mineralogy and geochemistry, Am. J. Sci. 308 (2008) 851-884. J.M. Ferry, B.H. Passey, C. Vasconcelos, J.M. Eiler, Formation of dolomite at 40 - 80 °C in the Latemar carbonate buildup, Dolomites, Italy, from clumped isotope thermometry, Geology. 39 (2011) 571-574. C. Jacquemyn, M. Huysmans, D. Hunt, G. Casini, R. Swennen, Multi-scale three-dimensional distribution of fracture- and igneous intrusion- controlled hydrothermal dolomite from digital outcrop model, Latemar platform, Dolomites, northern Italy, Am. Assoc. Pet. Geol. Bull. 99 (2015) 957-984. C. Jacquemyn, H. El Desouky, D. Hunt, G. Casini, R. Swennen, Dolomitization of the Latemar platform: Fluid flow and dolomite evolution, Mar. Pet. Geol. 55 (2014) 43-67. L. Trenty, A. Michel, E. Tillier, Y. Le Gallo, A Sequential Splitting Strategy for CO2 Storage Modelling, in: ECMOR X - 10th Eur. Conf. Math. Oil Recover., 2006. T. Gabellone, F. Whitaker, Secular variations in seawater chemistry controlling dolomitisation in shallow reflux systems: Insights from reactive transport modelling, Sedimentology. 63 (2016) 1233-1259.

  13. Prevention from Dike Failure by Emergency Flood Control Measures

    Directory of Open Access Journals (Sweden)

    Koppe Baerbel

    2016-01-01

    Full Text Available The risk of failure of a flood protection system must always be taken into account. During flooding events, appropriate interim protection systems must be at hand and ready to be deployed to support weak and overloaded structures. Usually sandbags, eventually in combination with fascines and geotextiles, are in use to defend endangered dike stretches in case of emergency. Sandbags offer highly flexible employment, however the enormous personal, material and time consuming efforts required for installation and dismantling are problematic. Therefore, more effective constructions for emergency flood control are needed. Within the research projects HWS-Mobile, DeichSCHUTZ, and DeichKADE different constructions based on the use of flexible membranes have been developed or are in development to ensure easy and effective countermeasures to secure dike stretches, which are in risk of breakage. Successful applications of the developed systems have taken place during the catastrophic flood event at the river Elbe in Northern Germany in 2013.

  14. Development of Maintenance Technology of Sea Dike Using Drone

    Science.gov (United States)

    Seo, Donguk; Choi, Wonwoo; Lee, Joongu

    2017-04-01

    Due to the recent drone technology and mapmaking technology, orthomorphic image and digital surface model(DSM) are able to provide the possibility of their utilization about maintenance works of sea dike. Actually, because covering stones of sea dike have damaged from wave, periodic inspection is need manually. If drone is used to examine about it, management works would be effective. Therefore, we suggest new technology using drone image that damaged covering stone can be figured out. The point, elevation, area, volume, etc. of damaged stone can be measured and we plan to repair damaged stone easily. It is possible to monitor the area of the frequent happening of relaxation and dislocation of covering stones by the time series image shooting drone work.

  15. IMPACTS OF DIMENSION AND SLOPE OF SUBMERGED SPUR DIKES ON LOCAL SCOUR PROCESSES - AN EXPERIMENTAL STUDY

    Institute of Scientific and Technical Information of China (English)

    Daxian FANG; Jueyi SUI; Ronald W.THRING; Hongya ZHANG

    2006-01-01

    In this experimental study, the impacts of the slope of the upstream face of submerged spur dikes on scour patterns in the vicinity of the submerged spur dike have been investigated. Associated hydraulic parameters for scour initiation have been studied. The dependence of the criteria for scour initiation and scour patterns on the dike dimensions such as the dike length and height has been assessed. It is found that the maximum depth of a scour hole is localized upstream of the spur dike end. The location of the maximum scouring depth, the end of the spur dike, and the spot with the maximum deposition are nearly aligned and form a line approximately parallel to the flume wall.Results show that the proper selection of a sloped upstream face of the spur dike can significantly reduce the maximum scour depth and scour volume in the vicinity of the submerged spur dike.Equations have been established to describe the dependence of the criteria for scour initiation and the maximum depth of the scour hole on the Froude number of the flow, the blockage of the cross section by the spur dikes, the slope of upstream face of the spur dike, and the grain size of the bed material.

  16. Intrusive growth of sclerenchyma fibers

    NARCIS (Netherlands)

    Snegireva, A.V.; Ageeva, M.V.; Amenitskii, S.I.; Chernova, T.E.; Ebskamp, M.; Gorshkova, T.A.

    2010-01-01

    Intrusive growth is a type of cell elongation when the rate of its longitudinal growth is higher than that of surrounding cells; therefore, these cells intrude between the neighboring cells penetrating the middle lamella. The review considers the classical example of intrusive growth, e.g., elongati

  17. Solvents and vapor intrusion pathways.

    Science.gov (United States)

    Phillips, Scott D; Krieger, Gary R; Palmer, Robert B; Waksman, Javier C

    2004-08-01

    Vapor intrusion must be recognized appropriately as a separate pathway of contamination. Although many issues resemble those of other forms of contamination (particularly its entryway, which is similar to that of radon seepage), vapor intrusion stands apart as a unique risk requiring case-specific action. This article addresses these issues and the current understanding of the most appropriate and successful remedial actions.

  18. Influence of an igneous intrusion on the inorganic geochemistry of a bituminous coal from Pitkin County, Colorado

    Science.gov (United States)

    Finkelman, R.B.; Bostick, N.H.; Dulong, F.T.; Senftle, F.E.; Thorpe, A.N.

    1998-01-01

    Although the effects of igneous dikes on the organic matter in coal have been observed at many localities there is virtually no information on the effects of the intrusions of the inorganic constituents in the coal. Such a study may help to elucidate the behavior of trace elements during in situ gasification of coal and may provide insights into the resources potential for coal and coke affected by the intrusion. To determine the effects of an igneous intrusion on the inorganic chemistry of a coal we used a series of 11 samples of coal and natural coke that had been collected at intervals from 3 to 106 cm from a dike that intruded the bituminous Dutch Creek coal in Pitkin, CO. The samples were chemically analyzed for 66 elements. SEM-EDX and X-ray diffraction analysis were performed on selected samples. Volatile elements such as F, Cl, Hg, and Se are not depleted in the samples (coke and coal) nearest the dike that were exposed to the highest temperatures. Their presence in these samples is likely due to secondary enrichment following volatilization of the elements inherent in the coal. Equilibration with ground water may account for the uniform distribution of Na, B, and Cl. High concentrations of Ca, Mg, Fe, Mn, Sr, and CO2 in the coke region are attributed to the reaction of CO and CO2 generated during the coking of the coal with fluids from the intrusion, resulting in the precipitation of carbonates. Similarly, precipitation of sulfide minerals in the coke zone may account for the relatively high concentrations of Ag, Hg, Cu, Zn, and Fe. Most elements are concentrated at the juncture of the fluidized coke and the thermally metamorphosed coal. Many of the elements enriched in this region (for example, Ga, Ge, Mo, Rb, U, La, Ce, Al, K, and Si) may have been adsorbed on either the clays or the organic matter or on both.Although the effects of igneous dikes on the organic matter in coal have been observed at many localities there is virtually no information on the

  19. Buffered and unbuffered dike emplacement on Earth and Venus - Implications for magma reservoir size, depth, and rate of magma replenishment

    Science.gov (United States)

    Parfitt, E. A.; Head, J. W., III

    1993-01-01

    Models of the emplacement of lateral dikes from magma chambers under constant (buffered) driving pressure conditions and declining (unbuffered) driving pressure conditions indicate that the two pressure scenarios lead to distinctly different styles of dike emplacement. In the unbuffered case, the lengths and widths of laterally emplaced dikes will be severely limited and the dike lengths will be highly dependent on chamber size; this dependence suggests that average dike length can be used to infer the dimensions of the source magma reservoir. On Earth, the characteristics of many mafic-dike swarms suggest that they were emplaced in buffered conditions (e.g., the Mackenzie dike swarm in Canada and some dikes within the Scottish Tertiary). On Venus, the distinctive radial fractures and graben surrounding circular to oval features and edifices on many size scales and extending for hundreds to over a thousand km are candidates for dike emplacement in buffered conditions.

  20. Analysis of Overtopping Flow on Sea Dikes in Oblique and Short-Crested Waves

    DEFF Research Database (Denmark)

    Nørgaard, Jørgen Harck; Andersen, Thomas Lykke; Burcharth, Hans F.;

    2013-01-01

    -empirical formulae for the estimation of flow depths and flow velocities across a dike. The results have been coupled to the actual erosion of the landward dike slope determined by full-scale 2D tests using the so-called “Overtopping Simulator”. This paper describes the results from 96 small-scale tests carried out...... directions on the dike, and the statistical distribution of individual flow parameters are needed to obtain more realistic estimates of dike erosion caused by wave overtopping....

  1. Dikes, joints, and faults in the upper mantle

    Science.gov (United States)

    Wilshire, H.G.; Kirby, S.H.

    1989-01-01

    Three different types of macroscopic fractures are recognized in upper-mantle and lower-crustal xenoliths in volcanic rocks from around the world: 1. (1) joints that are tensile fractures not occupied by crystallized magma products 2. (2) dikes that are tensile fractures occupied by mafic magmas crystallized to pyroxenites, gabbros or hydrous-mineral-rich rocks, 3. (3) faults that are unfilled shear fractures with surface markings indicative of shear displacement. In addition to intra-xenolith fractures, xenoliths commonly have polygonal or faceted shapes that represent fractures exploited during incorporation of the xenoliths into the host magma that brought them to the surface. The various types of fractures are considered to have formed in response to the pressures associated with magmatic fluids and to the ambient tectonic stress field. The presence of fracture sets and crosscutting relations indicate that both magma-filled and unfilled fractures can be contemporaneous and that the local stress field can change with time, leading to repeated episodes of fracture. These observations give insight into the nature of deep fracture processes and the importance of fluid-peridotite interactions in the mantle. We suggest that unfilled fractures were opened by volatile fluids exsolved from ascending magmas to the tops of growing dikes. These volatile fluids are important because they are of low viscosity and can rapidly transmit fluid pressure to dike and fault tips and because they lower the energy and tectonic stresses required to extend macroscopic cracks and to allow sliding on pre-existing fractures. Mantle seismicity at depths of 20-65 km beneath active volcanic centers in Hawaii corresponds to the depth interval where CO2-rich fluids are expected to be liberated from ascending basaltic magmas, suggesting that such fluids play an important role in facilitating earthquake instabilities in the presence of tectonic stresses. Other phenomena related to the fractures

  2. Quantification of the intrusion process at Kīlauea volcano, Hawai'i

    Science.gov (United States)

    Wright, Thomas L.; Marsh, Bruce

    2016-12-01

    The characteristic size of two types of intrusions identified beneath Kīlauea's East Rift zone are uniquely estimated by combining time constraints from fractional crystallization and the rates of magma solidification during cooling. Some intrusions were rapidly emplaced as dikes, but stalled before reaching the surface, and cooled and crystallized to feed later fractionated eruptions. More specifically, using the observed time interval between initial emplacement and eruption of fractionated lava, whose degree of fractionation is estimated from petrologic mixing calculations, the extent of solidification or cooling needed to produce this amount of fractionation can be directly inferred. And from the known erupted volumes the spatial extent or size of this fractionated volume can be analytically related to the full size of the source body itself. Two examples yield dike widths of 82 and 68 m. Other intrusions remain close to the east rift magma transport path and are observed to last for decades or longer as viable magma bodies that may participate in feeding later eruptions. The thickness of semi-permanent reservoirs near the East Rift Zone magma transport path can be estimated by assuming a resupply rate that is sufficiently frequent to restrict cooling to feeding shallow intrusions, which are accompanied by intense rift earthquake swarms and are often associated with eruptions. These calculations show that long-term heating of the wallrock of the magma transport paths serves to slow conduit cooling, which may be partly responsible for sustaining long East Rift Zone eruptions. Adjacent to the vertical transport path beneath Kīlauea's summit, the combined effects of heating and ever-increasing magma supply rate may have forced a commensurate enlarging of the conduit, perhaps explaining the occurrence of a temporary burst of deep (5-15 km) long-period earthquake swarms between 1987 and 1992.

  3. Granitoid intrusions and related deposits

    Institute of Scientific and Technical Information of China (English)

    孟良义; 李绪俊

    1996-01-01

    Taking the Bainaimiao copper and gold deposits, Inner Mongolia and the Wushan copper deposits, Jiangxi Province as examples, a discussion is devoted to the relationship between the granitoid intrusions and related deposits from different lines of evidence: the spatial distribution, country rocks and alteration of the deposits, trace element contents and vertical zoning of elements in deposits, the metallogenic preference of granitoid intrusions, the metallogenic models and stable isotopic geology. It is concluded that the ore-bearing fluids mainly come from granitoid magmas and granitoid intrusions are closely associated with the related deposits in space.

  4. Novel Model for Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    Li Jia-chun; Li Zhi-tang

    2003-01-01

    It's very difficult that the traditional intrusion detection methods based on accurate match adapt to the blur and uncertainty of user information and expert knowledge, it results in failing to report the variations of attack signature. In addition security itself includes fuzziness, the judgment standard of confidentiality, integrity and availability of system resource is uncertain. In this paper fuzzy intrusion detection based on partial match is presented to detect some types of attacks availably and alleviate some of the difficulties of above approaches, the architecture of fuzzy intrusion detection system(FIDS) is introduced and its performance is analyzed.

  5. Novel Model for Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    Li; Jia-chun; Li; Zhi-tang

    2003-01-01

    It's very difficult that the traditional intrusion detection methods based on accurate match adapt to the blur and uncertainty of user information and expert knowledge, it results in failing to report the variation of attack signature.In addition security itself includes fuzziness, the judgment standard of confidentiality, integrity and availability of system resource is uncertain. In this paper fuzzy intrusion detection based on partial match is presented to detect some types of attacks availably and alleviate some of the difficulties of above approaches, the architecture of fuzzy intrusion detection system(FIDS) is introduced and its performance is analyzed.

  6. Establishing vegetated foreshores to increase dike safety along lake shores

    Directory of Open Access Journals (Sweden)

    Penning Ellis

    2016-01-01

    Full Text Available Vegetated foreshores in front of existing dikes can contribute to the overall reduction of wave loads on the dike. In order to test this concept in large shallow lakes a field pilot was constructed along the Houtribdijk in Lake Markermeer (the Netherlands in 2014 to gain experience with construction, stability, maintenance and governance aspects. A large scale monitoring programme was set up to follow the hydrodynamic forcing, morphological changes and vegetation development on the pilot. The pilot is located on an exposed south-westerly direction, and experiences substantial wave impact. As a result the desired vegetation on the land-water interface has not been able to establish, but a rather dynamic sandy beach is currently the main feature along the waterline of the site. Higher up the slope planted reeds, and a mixture of willows has well established itself in the first growing season. The exposed position of the location makes that hardly any natural pioneer vegetation has settled, only in small sheltered areas some annuals were able to germinate and maintain themselves.

  7. InSAR analysis of diking and incipient oceanic spreading in the Danakil depression of the northern Afar rift

    Science.gov (United States)

    Gomez, F. G.; Tesfaye, S.

    2011-12-01

    The Danakil depression in the northern part of the Afar rift is a location of incipient oceanic spreading. Deformation associated with recent magmatic events provides a view of the incremental stages in rifting. Using Interferometric Synthetic Aperture Radar (InSAR) and geodetic modeling, this study assesses magmatic events that occurred in October 2004 and November 2008 in the axial graben of the Danakil depression. The study utilized C-band Envisat ASAR imagery and L-band ALOS PALSAR imagery. Both events involve deflation of magma chambers and intrusion of NNW-SSE striking dikes. The 2004 event took place in the Dallol area and involved ~5 km deep magmatic source and a SSE-propagating dike that opens approximately 80 - 120 cm - this contrasts with seismological results suggesting a 20 km depth with primarily normal faulting. The 2008 event occurred on the northern segment of the Erta Ale volcanic range between Alu and Dalafillal volcanic centers. Available image data permitted assessing pre- and post-event deformation, as well as the main eruption. Interferograms spanning the 2008 eruption image the deflation of a 3 - 4 km deep magmatic source, as well as dilatation of a SSE-striking dike. Additionally, the erupted lava flow is evident as a decorrelated region along the northeast flank of the fissure event. Prior to the eruption, the inflation of the magmatic chamber is imaged, and after the eruption, resurgence of the magma chamber is also documented. Furthermore, post-eruption interferograms also document the contraction and cooling of the lava flow, which facilitates 1-dimensional modeling of the thickness of the flow and calculation of the volume of the effusive component of the eruption. In both cases, aseismic deformation dominates - i.e., the seismologically measured moment is significantly less than the geodetically observed moment: ~25% for the 2004 event and 10% for the 2008 event. Magnitudes of incremental extension are then compared with regional

  8. Recent advances in vapor intrusion site investigations.

    Science.gov (United States)

    McHugh, Thomas; Loll, Per; Eklund, Bart

    2017-02-22

    Our understanding of vapor intrusion has evolved rapidly since the discovery of the first high profile vapor intrusion sites in the late 1990s and early 2000s. Research efforts and field investigations have improved our understanding of vapor intrusion processes including the role of preferential pathways and natural barriers to vapor intrusion. This review paper addresses recent developments in the regulatory framework and conceptual model for vapor intrusion. In addition, a number of innovative investigation methods are discussed.

  9. The Causes and Mechanisms of Historical Dike Failures in the Netherlands

    NARCIS (Netherlands)

    Van Baars, S.; Van Kempen, I.M.

    2009-01-01

    In a historical perspective, flood protection in the past was not given high priority - plague and periods of famine and war took precedence. Poverty and a lack of knowledge made it difficult to create safer dikes. Dike engineering did improve in Napoleonic era due to the French Central Government,

  10. Root characteristics of some grass species on the sea dikes in Viet Nam

    NARCIS (Netherlands)

    Trung, L.H.

    2012-01-01

    Between 2009 and 2011, some grass-covered sea dikes were tested with the Wave Overtopping Simulator in the north of Viet Nam. Slope specifications and grass species of sea and estuary dikes were quantitatively observed and investigated. This report is concerned with expressing main characteristics

  11. Root characteristics of some grass species on the sea dikes in Viet Nam

    NARCIS (Netherlands)

    Trung, L.H.

    2012-01-01

    Between 2009 and 2011, some grass-covered sea dikes were tested with the Wave Overtopping Simulator in the north of Viet Nam. Slope specifications and grass species of sea and estuary dikes were quantitatively observed and investigated. This report is concerned with expressing main characteristics o

  12. Bioengineering in front of a river dike: Wave attenuation by vegetation

    NARCIS (Netherlands)

    Oude, de R.; Augustijn, D.C.M.; Wijnberg, K.M.; Dekker, F.; Vries, de M.B.; Suzuki, T.; Christodoulou, George C.; Stamou, Anastasios

    2010-01-01

    Bioengineering is a novel way to reduce the application or dimensions of hard constructions. In the Dutch Noordwaard polder a vegetation field is proposed in front of a planned dike to damp waves such that the desired dike height can be reduced. To investigate the impact of vegetation on waves, the

  13. Application of sediment transport formulae to sand-dike breach erosion

    NARCIS (Netherlands)

    Visser, P.J.

    1994-01-01

    The Technical Advisory Committee on Water Defences in the Netherlands has decided to develop a mathematical model for breach erosion in dunes and dikes, with which it will be possible to predict the growth of the breach and the discharge rate through the breach in case of a dike-burst. An essential

  14. Optimal dike investments under uncertainty and learning about increasing water levels

    NARCIS (Netherlands)

    Pol, van der T.D.; Ierland, van E.C.; Weikard, H.P.

    2014-01-01

    Water level extremes for seas and rivers are crucial to determine optimal dike heights. Future development in extremes under climate change is, however, uncertain. In this paper, we explore impacts of uncertainty and learning about increasing water levels on dike investment. We extend previous work

  15. The Causes and Mechanisms of Historical Dike Failures in the Netherlands

    NARCIS (Netherlands)

    Van Baars, S.; Van Kempen, I.M.

    2009-01-01

    In a historical perspective, flood protection in the past was not given high priority - plague and periods of famine and war took precedence. Poverty and a lack of knowledge made it difficult to create safer dikes. Dike engineering did improve in Napoleonic era due to the French Central Government,

  16. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-04-19

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  17. Modeling Earthen Dike Stability: Sensitivity Analysis and Automatic Calibration of Diffusivities Based on Live Sensor Data

    CERN Document Server

    Melnikova, N B; Sloot, P M A

    2012-01-01

    The paper describes concept and implementation details of integrating a finite element module for dike stability analysis Virtual Dike into an early warning system for flood protection. The module operates in real-time mode and includes fluid and structural sub-models for simulation of porous flow through the dike and for dike stability analysis. Real-time measurements obtained from pore pressure sensors are fed into the simulation module, to be compared with simulated pore pressure dynamics. Implementation of the module has been performed for a real-world test case - an earthen levee protecting a sea-port in Groningen, the Netherlands. Sensitivity analysis and calibration of diffusivities have been performed for tidal fluctuations. An algorithm for automatic diffusivities calibration for a heterogeneous dike is proposed and studied. Analytical solutions describing tidal propagation in one-dimensional saturated aquifer are employed in the algorithm to generate initial estimates of diffusivities.

  18. Modal Composition and Age of Intrusions in North-Central and Northeast Nevada

    Science.gov (United States)

    du Bray, Edward A.; Crafford, A. Elizabeth Jones

    2007-01-01

    Introduction Data presented in this report characterize igneous intrusions of north-central and northeast Nevada and were compiled as part of the Metallogeny of the Great Basin project conducted by the U.S. Geological Survey (USGS) between 2001 and 2007. The compilation pertains to the area bounded by lats 38.5 and 42 N., long 118.5 W., and the Nevada-Utah border (fig. 1). The area contains numerous large plutons and smaller stocks but also contains equally numerous smaller, shallowly emplaced intrusions, including dikes, sills, and endogenous dome complexes. Igneous intrusions (hereafter, intrusions) of multiple ages are major constituents of the geologic framework of north-central and northeast Nevada (Stewart and Carlson, 1978). Mesozoic and Cenozoic intrusions are particularly numerous and considered to be related to subduction along the west edge of the North American plate during this time. Henry and Ressel (2000) and Ressel and others (2000) have highlighted the association between magmatism and ore deposits along the Carlin trend. Similarly, Theodore (2000) has demonstrated the association between intrusions and ore deposits in the Battle Mountain area. Decades of geologic investigations in north-central and northeast Nevada (hereafter, the study area) demonstrate that most hydrothermal ore deposits are spatially, and probably temporally and genetically, associated with intrusions. Because of these associations, studies of many individual intrusions have been conducted, including those by a large number of Master's and Doctoral thesis students (particularly University of Nevada at Reno students and associated faculty), economic geologists working on behalf of exploration and mining companies, and USGS earth scientists. Although the volume of study area intrusions is large and many are associated with ore deposits, no synthesis of available data that characterize these rocks has been assembled. Compilations that have been produced for intrusions in Nevada

  19. Experimental study of the interplay between magmatic rift intrusion and flank instability with application to the 2001 Mount Etna eruption

    KAUST Repository

    Le Corvec, Nicolas

    2014-07-01

    Mount Etna volcano is subject to transient magmatic intrusions and flank movement. The east flank of the edifice, in particular, is moving eastward and is dissected by the Timpe Fault System. The relationship of this eastward motion with intrusions and tectonic fault motion, however, remains poorly constrained. Here we explore this relationship by using analogue experiments that are designed to simulate magmatic rift intrusion, flank movement, and fault activity before, during, and after a magmatic intrusion episode. Using particle image velocimetry allows for a precise temporal and spatial analysis of the development and activity of fault systems. The results show that the occurrence of rift intrusion episodes has a direct effect on fault activity. In such a situation, fault activity may occur or may be hindered, depending on the interplay of fault displacement and flank acceleration in response to dike intrusion. Our results demonstrate that a complex interplay may exist between an active tectonic fault system and magmatically induced flank instability. Episodes of magmatic intrusion change the intensity pattern of horizontal flank displacements and may hinder or activate associated faults. We further compare our results with the GPS data of the Mount Etna 2001 eruption and intrusion. We find that syneruptive displacement rates at the Timpe Fault System have differed from the preeruptive or posteruptive periods, which shows a good agreement of both the experimental and the GPS data. Therefore, understanding the flank instability and flank stability at Mount Etna requires consideration of both tectonic and magmatic forcing. Key Points Analyzing Mount Etna east flank dynamics during the 2001 eruption Good correlation between analogue models and GPS data Understanding the different behavior of faulting before/during/after an eruption © 2014. American Geophysical Union. All Rights Reserved.

  20. Intrusion Detection using unsupervised learning

    Directory of Open Access Journals (Sweden)

    Kusum bharti

    2010-08-01

    Full Text Available Clustering is the one of the efficient datamining techniques for intrusion detection. In clustering algorithm kmean clustering is widely used for intrusion detection. Because it gives efficient results incase of huge datasets. But sometime kmean clustering fails to give best result because of class dominance problem and no class problem. So for removing these problems we are proposing two new algorithms for cluster to class assignment. According to our experimental results the proposed algorithm are having high precision and recall for low class instances.

  1. Building Intrusion Tolerant Software System

    Institute of Scientific and Technical Information of China (English)

    PENG Wen-ling; WANG Li-na; ZHANG Huan-guo; CHEN Wei

    2005-01-01

    In this paper, we describe and analyze the hypothesis about intrusion tolerance software system, so that it can provide an intended server capability and deal with the impacts caused by the intruder exploiting the inherent security vulnerabilities. We present some intrusion tolerance technology by exploiting N-version module threshold method in constructing multilevel secure software architecture, by detecting with hash value, by placing an "antigen" word next to the return address on the stack that is similar to human immune system, and by adding "Honey code" nonfunctional code to disturb intruder, so that the security and the availability of the software system are ensured.

  2. EXPERIMENTAL INVESTIGATIONS AND NUMERICAL SIMULATIONS OF REDUCING SECONDARY FLOWS AROUND A SPUR DIKE

    Institute of Scientific and Technical Information of China (English)

    Xuelin TANG; Xiang DING; Zhicong CHEN; Wenlong WANG

    2006-01-01

    To better understand the flow patterns near Jiuling Hill in the approach navigation channel of the Three Gorges Project and to improve the navigation channel, a physical flume model was constructed with a non-submerged spur dike placed as a barrier. An approach of sucking a small amount of water from the upper flume at the convex side of the spur dike and spouting it out again into the lower flume at the downstream side of the spur dike, so-called "sucking-spouting" water method, was proposed to improve navigational conditions. The flows around the spur dike for this method are experimentally investigated, and are compared to those in the no "sucking-spouting"water case. Based on the rigid lid assumption and a Dynamic Smagorinsky Model, all the vortex flows around the spur dike are numerically simulated, and the data are analyzed systematically. By applying "sucking-spouting" method, the recirculation zone caused by the spur dike reduced greatly and the transverse velocity decreased. At the same time, the flow behind the spur dike is much more complex, and materials and momentum substantially exchange between the dead zone and the main flow because of spouting action. The finite volume method is used to discretize the governing equations together with a staggered grid system, where the second-order difference is applied for the diffusion terms and the source terms while the upwind difference QUICK is used for the convection terms. The computational results are in fairly good agreement with the experimental data.

  3. Cooling rates and crystallization dynamics of shallow level pegmatite-aplite dikes, San Diego County, California

    Science.gov (United States)

    Webber, Karen L.; Simmons, William B.; Falster, Alexander U.; Foord, Eugene E.

    1999-01-01

    Pegmatites of the Pala and Mesa Grande Pegmatite Districts, San Diego County, California are typically thin, sheet-like composite pegmatite-aplite dikes. Aplitic portions of many dikes display pronounced mineralogical layering referred to as "line rock," characterized by fine-grained, garnet-rich bands alternating with albite- and quartz-rich bands. Thermal modeling was performed for four dikes in San Diego County including the 1 m thick Himalaya dike, the 2 m thick Mission dike, the 8 m thick George Ashley dike, and the 25 m thick Stewart dike. Calculations were based on conductive cooling equations accounting for latent heat of crystallization, a melt emplacement temperature of 650 °C into 150 °C fractured, gabbroic country rock at a depth of 5 km, and an estimated 3 wt% initial H2O content in the melt. Cooling to -5 cm/s. Crystal size distribution (CSD) studies of garnet from layered aplites suggest growth rates of about 10-6 cm/s. These results indicate that the dikes cooled and crystallized rapidly, with variable nucleation rates but high overall crystal-growth rates. Initial high nucleation rates coincident with emplacement and strong undercooling can account for the millimeter-size aplite grains. Lower nucleation rates coupled with high growth rates can explain the decimeter-size minerals in the hanging walls, cores, and miarolitic cavities of the pegmatites. The presence of tourmaline and/or lepidolite throughout these dikes suggests that although the melts were initially H2O-undersaturated, high melt concentrations of incompatible (or fluxing) components such as B, F, and Li (±H2O), aided in the development of large pegmatitic crystals that grew rapidly in the short times suggested by the conductive cooling models.

  4. DIDRO Project – New means for surveying dikes and similar flood defense structures

    Directory of Open Access Journals (Sweden)

    Miquel Thibaut

    2016-01-01

    Full Text Available The 36-month-long DIDRO project seeks to bring existing developments on remote sensing by drone on the scope of the project: dikes surveys as routine inspection or in relation to a flood crisis. Drone offers a new complementary means of surveying which can map broad areas efficiently while being more flexible and easier to operate than other airborne means. The system shall consist in a drone vector, in dedicated sensors (such as LiDAR, visible, near-infrared and thermal infrared optics, in data processing models with analytics specific to dikes surveying and finally in a GIS capitalizing all appropriate data to dikes managers.

  5. Structural variation of the feeder dikes of explosive eruptions in Miyakejima, Japan

    Science.gov (United States)

    Geshi, Nobuo

    2013-04-01

    Explosive eruptions of basaltic volcanoes exhibit wide variation about its explosivity, from stable lava effusion, mild strombolian eruption, to plinian eruption. Complex behavior of magma within the conduit may control the style of eruption activities, and the structure of the conduit controls the behavior of the ascending magma through the conduit. Existence of external water (ground water) may also affect the explosivity of the eruption. In the caldera wall of Miyakejima, Japan, we can observe various type of the cross section of feeder dikes with its surface products. The new caldera wall exhibits the cross section of a basaltic stratovolcano with numerous feeder and non-feeder dikes. Some feeder dikes connect directly to the lava flow. Some feeder dikes connect to the base of scoria cone with 100- 200 meters across and several tens meters high. Size and internal structure of the scoria cone indicates the mild strombolian activity. Uppermost ten meters of these feeder dikes shows upward-flaring (widen the dike thickness to the surface), which infers the magmatic erosion of the dike wall by explosive activities. More explosive activities formed some diatremes. The depth of these diatreme reaches 100 meters from the original ground surface. Typically, these diatremes connect to very-flat scoria cone and wide-spread thick scoria-fall deposit, which indicates the explosive magmatic activities. The sizes of these flat scoria cones are comparable to that of the scoria cones which was built by sub-plinian eruption (e.g., Izu-Oshima 1986). Upward flaring structure of the diatreme indicates the effective mechanical erosion of the dike wall by the explosive activities. The caldera wall also exhibits some diatremes which formed by the phreatomagmatic eruptions (Suoana diatreme). The wider feeder dikes for lager diatreme suggests the higher magmatic overpressure for the explosive activities in comparison to the less-explosive feeder dikes. Comparison of the structures of

  6. A software tool for network intrusion detection

    CSIR Research Space (South Africa)

    Van der Walt, C

    2012-10-01

    Full Text Available This presentation illustrates how a recently developed software tool enables operators to easily monitor a network and detect intrusions without requiring expert knowledge of network intrusion detections....

  7. Non-Intrusive Appliance Recognition

    NARCIS (Netherlands)

    Hoogsteen, G; Hoogsteen, Gerwin; Krist, J.O.; Bakker, Vincent; Smit, Gerardus Johannes Maria

    2012-01-01

    Energy conservation becomes more important nowadays. The use of smart meters and, in the near future, smart appliances, are the key to achieve reduction in energy consumption. This research proposes a non-intrusive appliance monitor and recognition system for implementation on an embedded system. Th

  8. Occurrence of seawater intrusion overshoot

    NARCIS (Netherlands)

    Morgan, L.K.; Bakker, M.; Werner, A.D.

    2015-01-01

    A number of numerical modeling studies of transient sea level rise (SLR) and seawater intrusion (SI) in flux-controlled aquifer systems have reported an overshoot phenomenon, whereby the freshwater-saltwater interface temporarily extends further inland than the eventual steady state position. Recent

  9. Final OSWER Vapor Intrusion Guidance

    Science.gov (United States)

    EPA is preparing to finalize its guidance on assessing and addressing vapor intrusion, which is defined as migration of volatile constituents from contaminated media in the subsurface (soil or groundwater) into the indoor environment. In November 2002, EPA issued draft guidance o...

  10. Experiences with network intrusion detection

    NARCIS (Netherlands)

    Coolen, R.; Luiijf, H.A.M.; Geloven, W.J.F. van; Bakker, E.A.

    2002-01-01

    This paper describes our experience with several commercial Network Intrusion Detection Systems (NIDSs)deployed in a network connected to the Internet. Specific problems in the operation of NIDS are highlighted, and a number of solutions to identified problems will be presented. Finally, we shall pr

  11. Age of nephrite-bearing dikes of the Uzunkyr Belt (South Urals): Local U-Pb isotope analysis of zircon and Sr-Nd isotope data of rock-forming minerals

    Science.gov (United States)

    Arkhireev, I. E.; Makagonov, E. P.; Belyatskii, B. V.; Maslennikov, V. V.

    2012-01-01

    Through local U-Pb isotope analysis of zircon and Sir-Need data on rock-forming minerals, the age of nephrite-bearing monzonite-diorite dikes of the Uzunkyr Belt has been determined. The derived datings coincide with known geological events that took place in the Phanerozoic on the territory of the South Urals. Xenogenic zircons prove the participation of the Upper Ordovician units in the tectonic structure of the studied area. Devonian zircons are associated with assimilation of subvolcanic rocks which are middle and basic in composition and whose formation time correlates with the appearance of the subduction zone with the Magnitogorsk island arc above it. Early Carboniferous datings indicate the relationship between dike formation and formation of the continental arc-shaped structure to which the Syrostan massif (monzodiorite-granite formation) belongs. The age range of the Uzunkyr nephrite-bearing dikes coincides with that of intrusives (350-336 Ma) of the Magnitogorsk Belt, where formation of gabbro series was also changed by formation of subalkali and alkali igneous rocks. According to the analogous data on zircon datings from metamorphic rocks of the Il'menogorskii Complex, the given territory later evolved as a whole.

  12. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O;

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  13. High-precision temporal constraints on intrusive magmatism of the Siberian Traps

    Science.gov (United States)

    Burgess, Seth; Bowring, Sam; Pavlov, Volodia E.; Veselovsky, Roman V.

    2014-05-01

    The broad temporal coincidence between large igneous province magmatism and some of the most severe biotic/environmental crises in Earth history has led many to infer a causal connection between the two. Notable examples include the end-Permian mass extinction and eruption/emplacement of the Siberian Traps large igneous province (LIP) and the end-Triassic mass extinction and the Central Atlantic Magmatic Province. In models proposing a causal connection between LIP magmatism and the environmental changes that lead to mass extinction, gases and particulates injected into the atmosphere are thought to cause abrupt changes in climate and ocean chemistry sufficient to drive mass extinction of marine and terrestrial biota. Magmatism has been proposed to cause voluminous volatile release via contact metamorphism of the sedimentary rocks. In the case of the Siberian Traps LIP, the compositions of sedimentary rocks (carbonates, evaporates, organic-rich shales) that host sills and dikes are ideal for greenhouse gas generation. When coupled with the enormous volume of Siberian LIP intrusive rocks, there is the potential for volatile generation on a scale necessary to drive environmental changes and mass extinction. This model must be tested by comparing the timing of intrusive magmatism with that of the mass extinction. Coupled high-precision geochronology and astrochronology have constrained the timing of biotic crisis and associated environmental perturbations from the deca-millennial to sub-millennial timescale, suggesting that the biotic crisis was abrupt, occurring over < 100 ka. Published geochronology on sills and dikes from the LIP are sparse and lack the necessary precision to resolve the relative timing of the two events outside of age uncertainty. We present new high-precision U-Pb zircon geochronology on seventeen gabbroic sills from throughout the magmatic province. This includes samples from the mineralized and differentiated intrusions in the Noril'sk region

  14. PROVISION OF DIKE SLOPE STABILITY FOR TERRITORY PROTECTION AGAINST GORYN RIVER FLOODS

    Directory of Open Access Journals (Sweden)

    E. Michnevich

    2013-01-01

    Full Text Available Hydrologic conditions that cause the Goryn river floods have been described in the paper. The paper considers engineering solutions pertaining to prevention of catastrophic floodings by bifurcation of maximum river flow while constructing a watershed dike and creating a non-flood polder in the flood plain. The formulas have been developed for calculation of dike slope fixing by dumped riprap when the slopes are subjected to stream impact. The paper provides an analysis of existing dependences for calculation of riprap material size in order to protect slopes against waves. The possible ways for lower cost of fixation while using  waste tyres and also while constructing  small wave-suppressing dikes reinforced by dumped riprap and shrub vegetation along the main dike have been revealed in the paper.

  15. Large Eddy Simulations of Three-Dimensional Flows Around a Spur Dike

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Large eddy simulations were used to model the three-dimensional flows around a non-submerged spur dike. Based on the rigid lid assumption, all these vortex flows around the spur dike, which probably affected the whole flow field, were numerically simulated and analyzed. The largest circulating flow region caused by the spur dike behind it was weak, which would naturally lead to sedimentation for silt-laden two-phase flows. Based on the Smagorinsky model, the finite volume method was used to discretize the Navier-Stokes equations, and the SIMPLEC algorithm was used to solve them. Meanwhile, these flows were investigated experimentally in a 0.5-m wide flume with a dike placed as a barrier. The computational results are in a fairly good agreement with the experimental data.

  16. Dike-induced contraction along oceanic and continental divergent plate boundaries

    KAUST Repository

    Trippanera, D.

    2014-10-28

    The axis of divergent plate boundaries shows extension fractures and normal faults at the surface. Here we present evidence of contraction along the axis of the oceanic ridge of Iceland and the continental Main Ethiopian Rift. Contraction is found at the base of the tilted hanging wall of dilational normal faults, balancing part of their extension. Our experiments suggest that these structures result from dike emplacement. Multiple dike injection induces subsidence above and uplift to the sides of the dikes; the transition in between is accommodated by reverse faults and subsequent peripheral inward dipping normal faults. Our results suggest that contraction is a direct product of magma emplacement along divergent plate boundaries, at various scales, marking a precise evolutionary stage and initiating part of the extensional structures (extension fractures and normal faults). Key Points Contraction along divergent plate boundaries results from dike emplacementContraction generates extensional structures along divergent plate boundariesSurface deformation along divergent plate boundaries may be magma induced

  17. What lies beneath: geophysical mapping of a concealed Precambrian intrusive complex along the Iowa–Minnesota border

    Science.gov (United States)

    Drenth, Benjamin J.; Anderson, Raymond R.; Schulz, Klaus J.; Feinberg, Joshua M.; Chandler, Val W.; Cannon, William F.

    2015-01-01

    Large-amplitude gravity and magnetic highs over northeast Iowa are interpreted to reflect a buried intrusive complex composed of mafic–ultramafic rocks, the northeast Iowa intrusive complex (NEIIC), intruding Yavapai province (1.8–1.72 Ga) rocks. The age of the complex is unproven, although it has been considered to be Keweenawan (∼1.1 Ga). Because only four boreholes reach the complex, which is covered by 200–700 m of Paleozoic sedimentary rocks, geophysical methods are critical to developing a better understanding of the nature and mineral resource potential of the NEIIC. Lithologic and cross-cutting relations interpreted from high-resolution aeromagnetic and airborne gravity gradient data are presented in the form of a preliminary geologic map of the basement Precambrian rocks. Numerous magnetic anomalies are coincident with airborne gravity gradient (AGG) highs, indicating widespread strongly magnetized and dense rocks of likely mafic–ultramafic composition. A Yavapai-age metagabbro unit is interpreted to be part of a layered intrusion with subvertical dip. Another presumed Yavapai unit has low density and weak magnetization, observations consistent with felsic plutons. Northeast-trending, linear magnetic lows are interpreted to reflect reversely magnetized diabase dikes and have properties consistent with Keweenawan rocks. The interpreted dikes are cut in places by normally magnetized mafic–ultramafic rocks, suggesting that the latter represent younger Keweenawan rocks. Distinctive horseshoe-shaped magnetic and AGG highs correspond with a known gabbro, and surround rocks with weaker magnetization and lower density. Here, informally called the Decorah complex, the source body has notable geophysical similarities to Keweenawan alkaline ring complexes, such as the Coldwell and Killala Lake complexes, and Mesoproterozoic anorogenic complexes, such as the Kiglapait, Hettasch, and Voisey’s Bay intrusions in Labrador. Results presented here suggest that

  18. Methane release from igneous intrusion of coal during Late Permian extinction events

    Energy Technology Data Exchange (ETDEWEB)

    Retallack, G.J.; Jahren, A.H. [University of Oregon, Eugene, OR (USA). Dept. of Geological Science

    2008-01-15

    Unusually large and locally variable carbon isotope excursions coincident with mass extinctions at the end of the Permian Period (253 Ma) and Guadalupian Epoch (260 Ma) can be attributed to methane outbursts to the atmosphere. Methane has isotopic values {delta}{sup 13}C low enough to reduce to feasible amounts the carbon required for isotopic mass balance. The duration of the carbon isotopic excursions and inferred methane releases are here constrained to < 10,000 yr by counting annual varves in lake deposits and by estimating peat accumulation rates. On paleogeographic maps, the most marked carbon isotope excursions form linear arrays back to plausible methane sources: end-Permian Siberian Traps and Longwood-Bluff intrusions of New Zealand and end-Guadalupian Emeishan Traps of China. Intrusion of coal seams by feeder dikes to flood basalts could create successive thermogenic methane outbursts of the observed timing and magnitude, but these are unreasonably short times for replenishment of marine or permafrost sources of methane. Methane released by fracturing and heating of coal during intrusion of large igneous provinces may have been a planetary hazard comparable with bolide impact.

  19. Geochronology, geochemistry and tectonic implications of Xiongshan diabasic dike swarm, northern Fujian

    Institute of Scientific and Technical Information of China (English)

    任胜利; 李继亮; 周新华; 孙敏

    1997-01-01

    Sm/Nd isotopic age determination showed that Xiongshan dike swarm was at 585.7 Ma±30 Ma. The trace element geochemistry and Sr/Nd/Pb isotope geochemistry studies indicate that the dike swarm was products of back-arc basin spreading ridge and the magma originated from the depleted mantle region which was metasomatized by LTLE-rich liquids/melts derived from subduction slab.

  20. Probabilistic Assessment of Wave Overtopping of Nampo Dike in the West Coast of Korea

    Institute of Scientific and Technical Information of China (English)

    QIE Lu-wen; CHOI Byung-ho; XIE Shi-leng

    2008-01-01

    The Nampo dike, which is located at the west coast of Korea, was destroyed by wave overtopping during the storms on 30 August and 17 September in 1989. In this paper, is performed the probabilistic assessment of wave overtopping of Nampo dike by use of Owen model, Van der Meer & Janssen model and Hedges & Reis model for wave overtopping of seawall. Based on the available tidal and wave data for storm surges in 1989, the risk assessment of wave overtopping of the Nampo dike has been carried out by both Level II and Level III reliability methods. The calculated results show the general agreement of failure probability between the two methods. By utilizing the rehabilitated cross section of Nampo dike, the failure probability of wave overtopping for the Nampo dike after rehabilitation will be rapidly reduced to that of initial design at crest level of 9.0 m with the improved slope from 1:2 to 1:4 at seaside. Since the sea level may only rise 1.0 m in the next few decades, the failure probability of Nampo dike will be still in the safe range.

  1. Study on Spacing Threshold of Nonsubmerged Spur Dikes with Alternate Layout

    Directory of Open Access Journals (Sweden)

    Xiaomeng Cao

    2013-01-01

    Full Text Available This paper investigated the spacing threshold of nonsubmerged spur dikes with alternate layout to classify the impact scale of spur dikes. A mathematical model was built based on standard k-ε model, finite volume method (FVM, and rigid lid assumption and was verified by experimental data. According to dimensional analysis, three indices, that is, Fr (Froude number, B/b (channel width to dike length, and B/h (channel width to water depth, were identified as the influencing factors on the spacing threshold, based on which fifteen sets of conditions were simulated. The calculation results indicate that B/h is the most influencing parameter on Sc/b (spacing threshold to dike length, followed by B/b and Fr. A dimensionless empirical formula of spacing threshold is fitted by multivariate regression. The results of four sets of additional conditions illustrate that the generalization of empirical formula is satisfactory and the precision of interpolation is higher than that of extrapolation. Furthermore, the spacing threshold of alternate spur dikes is generally smaller than ipsilateral spur dikes.

  2. Zircon Recycling in Arc Intrusions

    Science.gov (United States)

    Miller, J.; Barth, A.; Matzel, J.; Wooden, J.; Burgess, S.

    2008-12-01

    Recycling of zircon has been well established in arc intrusions and arc volcanoes, but a better understanding of where and how zircons are recycled can help illuminate how arc magma systems are constructed. To that end, we are conducting age, trace element (including Ti-in-zircon temperatures; TzrnTi) and isotopic studies of zircons from the Late Cretaceous (95-85 Ma) Tuolumne Intrusive Suite (TIS) in the Sierra Nevada Batholith (CA). Within the TIS zircons inherited from ancient basement sources and/or distinctly older host rocks are uncommon, but recycled zircon antecrysts from earlier periods of TIS-related magmatism are common and conspicuous in the inner and two most voluminous units of the TIS, the Half Dome and Cathedral Peak Granodiorites. All TIS units have low bulk Zr ([Zr]825°C), [Zr] in the TIS is a factor of 2 to 3 lower than saturation values. Low [Zr] in TIS rocks might be attributed to a very limited supply of zircon in the source, by disequilibrium melting and rapid melt extraction [1], by melting reactions involving formation of other phases that can incorporate appreciable Zr [2], or by removal of zircon at an earlier stage of magma evolution. Based on a preliminary compilation of literature data, low [Zr] is common to Late Cretaceous N.A. Cordilleran granodioritic/tonalitic intrusions (typically Tzrnsat [3]. A corollary is that slightly older zircon antecrysts that are common in the inner units of the TIS could be considered inherited if they are derived from remelting of slightly older intrusions. Remelting at such low temperatures in the arc would require a source of external water. Refs: [1] Sawyer, J.Pet 32:701-738; [2] Fraser et al, Geology 25:607-610; [3] Harrison et al, Geology 35:635- 638

  3. Smart sensor-based geospatial architecture for dike monitoring

    Science.gov (United States)

    Herle, S.; Becker, R.; Blankenbach, J.

    2016-04-01

    Artificial hydraulic structures like dams or dikes used for water level regulations or flood prevention are continuously under the influence of the weather and variable river regimes. Thus, ongoing monitoring and simulation is crucial in order to determine the inner condition. Potentially life-threatening situations, in extreme case a failure, must be counteracted by all available means. Nowadays flood warning systems rely exclusively on water level forecast without considering the state of the structure itself. Area-covering continuous knowledge of the inner state including time dependent changes increases the capability of recognizing and locating vulnerable spots for early treatment. In case of a predicted breach, advance warning time for alerting affected citizens can be extended. Our approach is composed of smart sensors integrated in a service-oriented geospatial architecture to monitor and simulate artificial hydraulic structures continuously. The sensors observe the inner state of the construction like the soil moisture or the stress and deformation over time but also various external influences like water levels or wind speed. They are interconnected in distributed network architecture by a so-called sensor bus system based on lightweight protocols like Message Queue Telemetry Transport for Sensor Networks (MQTT-SN). These sensor data streams are transferred into an OGC Sensor Web Enablement (SWE) data structure providing high-level geo web services to end users. Bundled with 3rd party geo web services (WMS etc.) powerful processing and simulation tools can be invoked using the Web Processing Service (WPS) standard. Results will be visualized in a geoportal allowing user access to all information.

  4. Flight test investigation of the vortex wake characteristics behind a Boeing 727 during two-segment and normal ILS approaches

    Science.gov (United States)

    Garodz, L. J.

    1975-01-01

    A series of flight tests were performed to evaluate the vortex wake characteristics of a Boeing 727 (B727-200) aircraft during conventional and two-segment ILS approaches. Flights of the B727, equipped with smoke generators for vortex marking, were flown wherein its vortex wake was intentionally encountered by a Lear Jet model 23 (LR-23) or a Piper Twin Comanche (Pa-30); and its vortex location during landing approach was measured using a system of photo-theodolites. The tests showed that at a given separation distance there were no differences in the upsets resulting from deliberate vortex encounters during the two types of approaches. Timed mappings of the position of the landing configuration vortices showed that they tended to descend approximately 91 meters (300 feet) below the flight path of the B727. The flaps of the B727 have a dominant effect on the character of the trailed wake vortex. The clean wing produces a strong, concentrated vortex. As the flaps are lowered, the vortex system becomes more diffuse. Pilot opinion and roll acceleration data indicate that 4.5 nautical miles would be a minimum separation distance at which roll control could be maintained during parallel encounters of the B727's landing configuration wake by small aircraft.

  5. 70193-Influence of Clastic Dikes on Vertical Migration of Contaminants in the Vadose Zonde at Hanford

    Energy Technology Data Exchange (ETDEWEB)

    Christopher J Murray; Anderson L. Ward; John L. Wilson

    2004-04-07

    The purpose of this study was to examine the hypothesis that clastic dikes could form a preferential flow path through the vadose zone to the water table at the Hanford Site. Clastic dikes are subvertical structures that form within sedimentary sequences after deposition and cut across the original sedimentary layers. They are common throughout the Hanford Site, often occurring in organized polygonal networks. In the initial phase of the project, we analyzed the large-scale geometry of the clastic dikes and developed an algorithm for simulating their spatial distribution. This result will be useful in providing maps of the potential distribution of clastic dikes in areas where they are not exposed at the surface (e.g., where covered by windblown sand or construction of facilities like tank farms at the surface). In addition to the study of the large-scale distribution of the dikes, a major focus of the project was on field, laboratory, and modeling studies of the hydrogeological properties of the clastic dikes and the effect that they have on transport of water through the vadose zone. These studies were performed at two field locations at the Hanford Site. We performed an extensive series of field and laboratory measurements of a large number of samples from the clastic dikes, linked with infrared (IR) and visual imagery of the clastic dikes and surrounding matrix. We developed a series of correlations from the sample data that allowed us to estimate the unsaturated hydraulic conductivity of the dike and matrix at an extremely high resolution (approximately 1 mm). The resulting grids, each of which measured several meters on a side and included nearly four million grid nodes, were used to study the distribution of moisture between the clastic dike and surrounding matrix, as well as the relative velocities that moisture would have through the clastic dike and matrix for a number of different recharge scenarios. Results show the development of complex flow networks

  6. Theoretical prediction of gold vein location in deposits originated by a wall magma intrusion

    Science.gov (United States)

    Martin, Pablo; Maass-Artigas, Fernando; Cortés-Vega, Luis

    2016-05-01

    The isotherm time-evolution resulting from the intrusion of a hot dike in a cold rock is analized considering the general case of nonvertical walls. This is applied to the theoretical prediction of the gold veins location due to isothermal evolution. As in previous treatments earth surface effects are considered and the gold veins are determined by the envelope of the isotherms. The locations of the gold veins in the Callao mines of Venezuela are now well predicted. The new treatment is now more elaborated and complex that in the case of vertical walls, performed in previous papers, but it is more adequated to the real cases as the one in El Callao, where the wall is not vertical.

  7. Mapping faults and intrusions onshore Disko Island by use of Vibroseismic data, shallow marine seismic data and electromagnetic observations

    Science.gov (United States)

    Clausen, Ole R.; Nørmark, Egon; Gulbrandsen, Pelle; Sabra, Henrik

    2014-05-01

    The west Greenland margin is characterized by sedimentary basins containing high density of intrusions (dikes and sills) originating from the Cenozoic breakup and separation of Greenland and North American. The magmatic rocks have lately attracted interest due to observations of hydrocarbons associated to the intrusions but here due to the ore potential associated to the same intrusions. In 2000 a marine seismic campaign by GEUS in the coastal areas of West Greenland showed that it is possible to identify magmatic intrusions in the sedimentary succession as well as map normal faults, and that the intrusions are heterogeneous distributed and probably related to the normal faults. The presence of normal faults is known from the regional onshore geological mapping campaigns performed by GEUS. However, the marine seismic data indicate a much more complicated structural pattern than presented in the onshore maps, which is a well-known phenomenon (Marcussen et al., 2002). In 2012 and 2013 seismic data were acquired onshore on the northern coast of Disko as part of a research project funded by Avannaa Resources . The objective was initially to test whether it is possible to acquire data of a quality enabling the observation and mapping of intrusions in the subsurface. Later it was followed by a more extensive survey where it was attempted to map the depth to and geometry of the intrusions. The relatively dense seismic grid onshore -compared to the marine seismic data offshore west Greenland- enable the identification and more important the mapping of several intrusions. They show some of the same characteristics as intrusions observed at e.q. the Norwegian margin of the North Atlantic (Hansen et al., 2004). The preliminary results which integrate both marine and onshore seismic data revise the structural understanding of the area and indicate a close relation between the intrusions and the rift related normal faults. The results are consistent with remote sensing methods

  8. Understanding the link between circumferential dikes and eruptive fissures around calderas based on numerical and analog models

    Science.gov (United States)

    Corbi, Fabio; Rivalta, Eleonora; Pinel, Virginie; Maccaferri, Francesco; Acocella, Valerio

    2016-06-01

    Active calderas are seldom associated with circumferential eruptive fissures, but eroded magmatic complexes reveal widespread circumferential dikes. This suggests that, while the conditions to emplace circumferential dikes are easily met, mechanisms must prevent them from reaching the surface. We explain this discrepancy with experiments of air injection into gelatin shaped as a volcano with caldera. Analog dikes show variable deflection, depending on the competition between overpressure, Pe, and topographic unloading, Pl; when Pl/Pe = 4.8-5.3, the dikes propagate orthogonal to the least compressive stress. Due to the unloading, they become circumferential and stall below the caldera rim; buoyancy is fundamental for the further rise and circumferential fissure development. Numerical models quantitatively constrain the stress orientation within the gelatin, explaining the observed circumferential dikes. Our results explain how dikes propagate below the rim of felsic and mafic calderas, but only in the latter they are prone to feed circumferential fissures.

  9. Morphological Changes Along a Dike Landside Slope Sampled by 4d High Resolution Terrestrial Laser Scanning

    Science.gov (United States)

    Herrero-Huertaa, Mónica; Lindenbergh, Roderik; Ponsioen, Luc; van Damme, Myron

    2016-06-01

    Emergence of light detection and ranging (LiDAR) technology provides new tools for geomorphologic studies improving spatial and temporal resolution of data sampling hydrogeological instability phenomena. Specifically, terrestrial laser scanning (TLS) collects high resolution 3D point clouds allowing more accurate monitoring of erosion rates and processes, and thus, quantify the geomorphologic change on vertical landforms like dike landside slopes. Even so, TLS captures observations rapidly and automatically but unselectively. In this research, we demonstrate the potential of TLS for morphological change detection, profile creation and time series analysis in an emergency simulation for characterizing and monitoring slope movements in a dike. The experiment was performed near Schellebelle (Belgium) in November 2015, using a Leica Scan Station C10. Wave overtopping and overflow over a dike were simulated whereby the loading conditions were incrementally increased and 14 successful scans were performed. The aim of the present study is to analyse short-term morphological dynamic processes and the spatial distribution of erosion and deposition areas along a dike landside slope. As a result, we are able to quantify the eroded material coming from the impact on the terrain induced by wave overtopping which caused the dike failure in a few minutes in normal storm scenarios (Q = 25 l/s/m) as 1.24 m3. As this shows that the amount of erosion is measurable using close range techniques; the amount and rate of erosion could be monitored to predict dike collapse in emergency situation. The results confirm the feasibility of the proposed methodology, providing scalability to a comprehensive analysis over a large extension of a dike (tens of meters).

  10. Geochemistry of Deccan Traps Dikes: Insights Into the Evolution of a Flood Basalt Feeder System

    Science.gov (United States)

    Mahoney, J. J.; Vanderkluysen, L.; Hooper, P. R.; Sheth, H. C.; Ray, R.

    2007-12-01

    Three large dike swarms are exposed in the 500,000 km2 Deccan Traps of India: the dominantly N-S trending West Coast swarm, the ENE-WSW trending Narmada-Tapi swarm in the northern Deccan, and the Nasik-Pune swarm in the central western Deccan. Dikes of the Nasik-Pune swarm show no strongly preferred trend. This swarm is commonly postulated (e.g., Hooper, Nature, 349, 246, 1990) to be the principal locus of feeders for the lava pile, and the lack of a preferred trend taken as evidence that the flood volcanism was not accompanied by significant rifting-related lithospheric extension. Our combined major and trace element and Pb-Nd-Sr isotope data reveal that dikes with signatures matching those of the three major lava formations in the upper part of the lava pile (Poladpur, Ambenali, and Mahabaleshwar formations) are abundant in the coastal and Nasik-Pune swarms. As a group, these dikes have no preferred trend. Dikes with similarities to formations lower in the lava stratigraphy (i.e., the Igatpuri, Jawhar, and Bushe formations) are present but rare in these two swarms. However, many dikes with strong affinities to the lower and middle lava formations (e.g., Igatpuri, Jawhar, Bushe, and Thakurvadi formations) are present in the Narmada-Tapi swarm. These dikes have geometries indicative of N-S extension. We infer that rifting did not drive emplacement of the upper lava formations, but was occurring in the Narmada-Tapi region during the earlier phases of volcanism. Thus, N-S rifting cannot be ruled out as a trigger mechanism for the massive melting event. In contrast, our data provide no evidence that E-W extension along the coast triggered the event.

  11. 岩脉的侵位机制对成矿作用的约束——以内蒙古大井锡多金属矿床为例%Constraints of Dike Emplacement Mechanism on Metallogenesis: An example from the Dajing Tin-polymetallic Deposit, Inner Mongolia

    Institute of Scientific and Technical Information of China (English)

    李德东; 王玉往; 王京彬; 王莉娟; 龙灵利; 廖震

    2012-01-01

    岩脉的侵位机制对理解岩脉和矿脉的侵位过程有着重要的意义。本文详细介绍了岩脉的侵位机制,并以大井锡多金属矿床为例初步探讨了矿区内岩脉与矿脉的关系。研究表明,区域上主要受NW-SE向的挤压应力,在海西期向燕山期转变阶段,区域应力场并没有发生变化,只是林西断块发生了顺时针转动的结果。矿区范围内,同样受NW-SE向挤压应力作用,块体也发生了相应的变化,推测矿区西南向北东方向挤压应力逐渐减小,隆升剥蚀量也随之减小。整体上,岩脉侵位于先存裂隙,矿脉侵位于岩脉形成的构造空间,局部具有互相穿插的现象。通过岩脉和矿脉的侵位过程,认为矿区西部寻找斑岩型矿床潜力较大。%Mechanism of dike emplacement is significant to understanding intrusion processes of dikes and ore veins. This paper describes the mechanism of dike emplacement, and takes the Dajing ore deposit as an example to discuss the relationship between dikes and ore veins. Our study shows that dikes and ore veins in the region are mainly under the NW-SE directed compressive stress. During the period from the Hercynian to the Yanshanian, the regional stress field remained unchanged,while the block Linxi had a clockwise rotation. Within the Dajing ore deposit area, the NW-SE directed compressive stress was also dominated, and a similar rotation occurred. Thus,we infer that the magnitude of compressive stress declined from SW to NE in the Dajing ore deposit area, and that the amount of uplift and erosion also decreased in this direction. In the whole, dikes intruded into the existing fissures and ore veins took the space of dikes, with local intercalation between dikes and ore veins. We suggest that the western portion of this ore field has a greater poten- tial in search for porphyry-type deposits.

  12. Classification and Importance of Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Rajasekaran K

    2012-08-01

    Full Text Available An intrusion detection system (IDS is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Due to a growing number of intrusion events and also because the Internet and local networks have become so ubiquitous, organizations are increasingly implementing various systems that monitor IT security breaches. This includes an overview of the classification of intrusion detection systems and introduces the reader to some fundamental concepts of IDS methodology: audit trail analysis and on-the-fly processing as well as anomaly detection and signature detection approaches. This research paper discusses the primary intrusion detection techniques and the classification of intrusion Detection system.

  13. Association Rules Applied to Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    We discuss the basic intrusion detection techniques, and focus on how to apply association rules to intrusion detection. Begin with analyzing some close relations between user's behaviors, we discuss the mining algorithm of association rules and apply to detect anomaly in IDS. Moreover, according to the characteristic of intrusion detection, we optimize the mining algorithm of association rules, and use fuzzy logic to improve the system performance.

  14. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    Pabitra Nath

    2010-04-01

    An experimental realization of a simple non-intrusive refractometer sensor is demonstrated in this communication. The working principle of the sensor is based on intensity modulation of the back-reflected light when output light from an optical fibre end focusses onto air–medium interface. The change in the refractive index of the medium affects the reflectance of the incident light signal and thus modulates the back-reflected signal. Refractive index variation as small as 0.002 RIU can be measured using the present technique. The advantages of the technique are its simplicity, cost efficiency and usefulness in monitoring refractive indices of acidic solutions.

  15. Modelling erosion development during wave overtopping of an asphalt road covered dike

    Directory of Open Access Journals (Sweden)

    Bomers Anouk

    2016-01-01

    Full Text Available Wave overtopping initiates erosion of dikes, thereby compromising the safety against flooding. Structures integrated in a grass covered dike may decrease the resistance against erosion. In this study, CFD modelling is used to assess the effect of an asphalt road on top of the dike crest on the initiation of erosion due to wave overtopping. The Reynolds-Averaged Navier-Stokes equations are solved via a k-ε turbulence model. Two wave overtopping experiments are used for validating the hydrodynamics and the coupled hydrodynamic-erosion model. The amount of scour caused by overtopping waves is predicted by combining the shear stresses from the CFD model with an erosion model including grass erosion. Both the hydrodynamics and scour depths show good agreement with the measurements. Results show that a dike profile with a road on top of the crest is more vulnerable to erosion development than a bare grass covered dike profile. This is caused by a combination of the smoother asphalt section and the damaged berms at the transitions of the asphalt with the grass cover.

  16. Experiments and Numerical Simulations of Dike Erosion due to a Wave Impact

    Directory of Open Access Journals (Sweden)

    Stefania Evangelista

    2015-10-01

    Full Text Available Dike erosion is a crucial issue in coastal and fluvial flood risk management. These defense structures appear vulnerable to extreme hydrological events, whose potential occurrence risk seems to be recently increased due to climate change. Their design and reinforcement is, however, a complex task, and although numerical models are very powerful nowadays, real processes cannot be accurately predicted; therefore, physical models constitute a useful tool to investigate different features under controlled conditions. This paper presents some laboratory experimental results of erosion of a sand dike produced by the impact of a dam break wave. Experiments have been conducted in the Water Engineering Laboratory at the University of Cassino and Southern Lazio, Italy, in a rectangular channel: here, the sudden opening of a gate forming the reservoir generates the wave impacting the dike, made in turn of two different, almost uniform sands. The physical evidence proves that the erosion process is strongly unsteady and significantly different from a gradual overtopping and highlights the importance of apparent cohesion for the fine sand dike. The experimental results have also been compared against the ones obtained through the numerical integration of a two-phase model, which shows the reasonable predictive capability of the temporal free surface and dike profile evolution.

  17. Pattern and origin of spherulites in a rhyolite dike swarm,northeastern Cheongsong, Korea

    Institute of Scientific and Technical Information of China (English)

    Sang Koo Hwang; Chang Oh Choo

    2006-01-01

    Several NNW-trending Cretaceous rhyolite dikes in the northeastern Cheongsong area of southern Korea contain spherulitic fabrics and are locally quarried as an ornamental stone. The dikes, part of the Cheongsong dike swarm, contain a variety of spherulites which are characterized by radial array of acicular intergrowths from fibrous quartz and alkali feldspars. They are classified as some simple, multiple and compound spherulite types from flower-like patterns, and the types are different each other in spatial distribution within the dikes. The various radial fabrics suggest that they crystallized under the different cooling mechanisms and processes in rapidly cooling dikes. Spheroids lacking a flower-like pattern may be precipitated after compositional segregation in a supercooled magma. Simple acicular spherulites could be crystallized by devitrification of true glass which cooled rapidly below the transformation temperature, whereas layered multiple spherulites could result from a crystallization of supercooled magma at relatively rapid cooling rates above the transformation temperature. Acicular multiple spherulites could be produced from a combination of the above three mechanisms operating at slower cooling rates.

  18. Experiments and numerical simulations on transport of dissolved pollutants around spur dike

    Institute of Scientific and Technical Information of China (English)

    Li-ping CHEN; Jun-cheng JIANG

    2010-01-01

    The flow field around a spur dike has three-dimensional characteristics.In order to analyze the influence of the flow field on pollutant transport,based on a compressive volume of fluid(VOF)scheme,the three-dimensional transient compressive pollutant transport model(CPTM)and the cubic equation(CE)bounded differencing scheme were developed.For the calibration and validation of CPTM,laboratory experiments were carried out in a flume with a non-submerged spur dike.The spur dike was angled at 60°,90°,and 120° from the upstream direction.The simulation results agreed with the experimental results.The simulations and experiments showed that the distribution of pollutant concentration was determined by circumfluence and the main flow.Concentration decay in the circumfluence zone was slower than that in the main flow.Downstream of the spur dike,the concentration fluctuation became intensive with the increase of spur dike angle.

  19. The use of GPR attributes to map a weak zone in a river dike

    Science.gov (United States)

    Marcak, Henryk; Golebiowski, Tomislaw

    2014-02-01

    Dike leakage can be the result of a rupture and the formation of loose zones which are not able to stand the water pressure during flooding. Loose zones are significantly more saturated when it rains and floods than the undamaged portion of the dike. Due to the increased water in loose zones, their electrical properties are changed, particularly dielectric permittivity. As a result, these zones have a different ground-penetrating radar (GPR) wave reflection coefficient and are a source of wave diffraction. The interpretation of GPR measurements carried out on a leaking dike during a flood event in Poland is presented in this paper. The GPR attributes, such as an instantaneous phase, envelope, instantaneous frequency averaged over time and traces, have been analysed in the paper the interpretative tools. Also, the averaged spectrum (spectrum calculated from averaged traces) and moving spectrum (averaged spectrum calculated in windows moving along the traces), as well as the phase spectrum, of recorded GPR data were analysed as indicators of the existence of the deterioration of parts of the dike. As shown in the paper, the use of GPR signals attributes and spectra in the interpretation of field measurements can increase the available information about the structure of the dike by highlighting some of the physical properties of its construction.

  20. Fissure eruptions at Mount Vesuvius (Italy): Insights on the shallow propagation of dikes at volcanoes

    Science.gov (United States)

    Acocella, Valerio; Porreca, Massimiliano; Neri, Marco; Mattei, Massimo; Funiciello, Renato

    2006-08-01

    Fissure eruptions may provide important information on the shallow propagation of dikes at volcanoes. Somma-Vesuvius (Italy) consists of the active Vesuvius cone, bordered to the north by the remnants of the older Somma edifice. Historical chronicles are considered to define the development of the 37 fissure eruptions between A.D. 1631 and 1944. The 1631 fissure, which reopened the magmatic conduit, migrated upward and was the only one triggered by the subvertical propagation of a dike. The other 25 fissure eruptions migrated downward, when the conduit was open, through the lateral propagation of radial dikes. We suggest two scenarios for the development of the fissures. When the summit conduit is closed, the fissures are fed by vertically propagating dikes. When the summit conduit is open, the fissures are fed by laterally propagating dikes along the volcano slopes. Consistent behaviors are found at other composite volcanoes, suggesting a general application to our model, independent of the tectonic setting and composition of magma. At Vesuvius, the historical data set and our scenarios are used to predict the consequences of the emplacement of fissures after the opening of the conduit. The results suggest that, even though the probability of opening of vents within the inhabited south and west slopes is negligible, the possibility that these are reached by a lava flow remains significant.

  1. Sulfide intrusion and detoxification in Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2014-01-01

    nutrition in general. By a global review of sulfide intrusion, coupled with a series of field studies and in situ experiments we elucidate sulfide intrusion and different strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis...... indicating a possible role of sulfide in the sulfur nutrition beside the detoxification function. Our results suggest different adaptations of Z. marina to reduced sediments and sulfide intrusion ranging from bacterial and chemical reoxidation of sulfide to sulfate to incorporation of sulfide into organic...

  2. An international perspective on Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country.

  3. Risk Analysis and Assessment of Overtopping Concerning Sea Dikes in the Case of Storm Surge

    Institute of Scientific and Technical Information of China (English)

    王莉萍; 黄桂玲; 陈正寿; 梁丙臣; 刘桂林

    2014-01-01

    Risk-analysis-and-assessment-relating-coastal-structures-has-been-one-of-the-hot-topics-in-the-area-of-coastal-protection-recently.-In-this-paper,-from-three-aspects-of-joint-return-period-of-multiple-loads,-dike-failure-rate-and-dike-continuous-risk-prevention-respectively,-three-new-risk-analysis-methods-concerning-overtopping-of-sea-dikes-are-developed.-It-is-worth-noting-that-the-factors-of-storm-surge-which-leads-to-overtopping-are-also-considered-in-the-three-methods.-In-order-to-verify-and-estimate-the-effectiveness-and-reliability-of-the-newly-developed-methods,-quantified-mutual-information-is-adopted.-By-means-of-case-testing,-it-can-be-found-that-different-prior-variables-might-be-selected-dividedly,-according-to-the-requirement-of-special-engineering-application-or-the-dominance-of-loads.-Based-on-the-selection-of-prior-variables,-the-correlating-risk-analysis-method-can-be-successfully-applied-to-practical-engineering.

  4. THREE-DIMENSIONAL NUMERICAL MODELLING OF SUBMERGED DIKE ALIGNMENT IN CURVED ESTUARINE CHANNEL

    Institute of Scientific and Technical Information of China (English)

    ZHENG Jin-hai; LIU Ying-qi; YAN Yi-xin; ZHU Yu-liang

    2005-01-01

    Submerged dikes were frequently built in curved estuarine channels to improve navigational conditions. A three-dimensional numerical model of tidal motions was developed to simulate flows through the submerged dike alignment in curved estuarine reach of complex bathymetry on the basis of satisfactory calibrations. Through the analysis of the morphological characteristics of the curved channel of the Huangpu River mouth in the Yangtze River Delta, a submerged dike alignment project was examined. The effect of the navigation channel improvement project and its influence on the flow regimes, the navigational conditions, the flood control and the operating conditions of harbours within the adjacent water area were evaluated, and the technical feasibility of the navigation channel improvement scheme was demonstrated.

  5. Impact of lime treated soils performance on design of earthfill dikes

    Directory of Open Access Journals (Sweden)

    Nerincx Nicolas

    2016-01-01

    Full Text Available Nowadays soil treatment with lime in civil engineering is widespread in many countries on all continents, within several construction fields. The interest of the hydraulic works community regarding this technique is currently growing. It has been indeed shown during the last decade that appropriate treatment technologies provide lime treated soils with high level properties such as excellent homogeneity, low permeability, internal and external erosion resistance and mechanical stability. Those have been shown in laboratory and for some properties with full scale experiments. The so conferred soil properties can lead to innovative earthfill dams and dikes designs by addressing some of the typical designer’s problems, such as stability, watertightness, internal erosion, surface protection and flood control. However, lime treated soil external erosion resistance is still to be quantified in the field for proper designing and dimensioning of lime treated soil external erosion protection or spillways. With this purpose, an experimental earthfill dike has been built along the river Vidourle (France in July 2015, in the frame of the French R&D program “DigueELITE”. This 50 m long and 3,5 m high dike is made of lime treated silt and is provided with sensors (succion, water content and temperature and piezometer in order to be monitored. It will also be tested against surface erosion. The final objective of this R&D program is to provide guidelines for designing innovative overflow resistant earthfill dikes. This article describes the performance reached by lime treated soils and associated design requirements and application; the experimental dike construction and lessons learned; the monitoring program; the dike design perspectives opened by soil treatment.

  6. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  7. Climate Change Impact Assessment of Dike Safety and Flood Risk in the Vidaa River System

    DEFF Research Database (Denmark)

    Madsen, H.; Sunyer Pinya, Maria Antonia; Larsen, J.;

    2013-01-01

    The impact of climate change on the flood risk and dike safety in the Vidaa River system, a cross-border catchment located in the southern part of Jutland, Denmark and northern Germany, is analysed. The river discharges to the Wadden Sea through a tidal sluice, and extreme water level conditions......, and increases in storm surge levels of up to 0.8 m in 2100 are estimated. The changes in extreme catchment run-off and sea water level have a significant effect on the flood risk in the river system. While most parts today have a low risk of dike overtopping with annual exceedance probabilities of 0.1 % or less...

  8. Variations of the state of stress and dike propagation at Fernandina volcano, Galápagos.

    Science.gov (United States)

    Bagnardi, M.; Amelung, F.

    2012-04-01

    Fernandina volcano forms the youngest and westernmost island of the Galapagos Archipelago, a group of volcanic islands located near the equator and 1000 km west of Ecuador. Twenty-five eruptions in the last two hundred years make Fernandina the most active volcano in the archipelago and one of the most active volcanoes in the world. Most eruptions occur along fissures fed by dikes that propagate from the central magmatic system and from reservoirs centered under the summit caldera. Eruptive fissures in the subaerial portion of the volcano form two distinct sets: (1) arcuate or circumferential fissures characterize the upper portion of the volcano around the caldera while (2) radial fissures are present on the lower flanks. The subaerial portion of the volcano lacks of well-developed rift zones, while the submarine part of Fernandina shows three rifting zones that extend from the western side of the island. Using Interferometric Synthetic Aperture Radar (InSAR) measurements of the surface displacement at Fernandina acquired from 1992 to 2010, and in particular the ones spanning the last three eruptions (1995 - radial, 2005 - circumferential and 2009 - radial) we infer the geometry of the shallow magmatic system and of the dikes that fed these eruptions. A shallow dipping radial dike on the southwestern flank has been inferred by Jónnson et al. (1999) for the 1995 eruption. This event shows a pattern of deformation strikingly similar to the one associated with the April 2009 eruption for which we infer a similar geometry. Co-eruptive deformation for the 2005 event has been modeled by Chadwick et al. (2010) using three planar dikes, connected along hinge lines, in the attempt to simulate a curve-concave shell, steeply dipping toward the caldera at the surface and more gently dipping at depth. Dike propagation in a volcano is not a random process but it is controlled by the orientation of the principal stresses, with the dike orthogonal to the least compressive stress

  9. Case studies of extended model-based flood forecasting: prediction of dike strength and flood impacts

    Science.gov (United States)

    Stuparu, Dana; Bachmann, Daniel; Bogaard, Tom; Twigt, Daniel; Verkade, Jan; de Bruijn, Karin; de Leeuw, Annemargreet

    2017-04-01

    Flood forecasts, warning and emergency response are important components in flood risk management. Most flood forecasting systems use models to translate weather predictions to forecasted discharges or water levels. However, this information is often not sufficient for real time decisions. A sound understanding of the reliability of embankments and flood dynamics is needed to react timely and reduce the negative effects of the flood. Where are the weak points in the dike system? When, how much and where the water will flow? When and where is the greatest impact expected? Model-based flood impact forecasting tries to answer these questions by adding new dimensions to the existing forecasting systems by providing forecasted information about: (a) the dike strength during the event (reliability), (b) the flood extent in case of an overflow or a dike failure (flood spread) and (c) the assets at risk (impacts). This work presents three study-cases in which such a set-up is applied. Special features are highlighted. Forecasting of dike strength. The first study-case focusses on the forecast of dike strength in the Netherlands for the river Rhine branches Waal, Nederrijn and IJssel. A so-called reliability transformation is used to translate the predicted water levels at selected dike sections into failure probabilities during a flood event. The reliability of a dike section is defined by fragility curves - a summary of the dike strength conditional to the water level. The reliability information enhances the emergency management and inspections of embankments. Ensemble forecasting. The second study-case shows the setup of a flood impact forecasting system in Dumfries, Scotland. The existing forecasting system is extended with a 2D flood spreading model in combination with the Delft-FIAT impact model. Ensemble forecasts are used to make use of the uncertainty in the precipitation forecasts, which is useful to quantify the certainty of a forecasted flood event. From global

  10. The genetic relationship between mafic dike swarms and plutonic reservoirs in the mesozoic of central chile (30°-33°45'S): insights from AMS and geochemistry

    Science.gov (United States)

    Creixell, Christian; Parada, Miguel Ángel; Morata, Diego; Roperch, Pierrick; Arriagada, César

    2009-02-01

    Five mafic dike swarms between 30° and 33°45'S were studied for their geochemical signature and kinematics of magma flow directions by means of AMS data. In the Coastal Range of central Chile (33°-33°45'S), Middle Jurassic dike swarms (Concón and Cartagena dike swarms, CMDS and CrMDS, respectively) and an Early Cretaceous dike swarm (El Tabo Dike Swarm, ETDS) display the presence of dikes of geochemically enriched (high-Ti) and depleted (low-Ti) basaltic composition. These dikes show geochemical patterns that are different from the composition of mafic enclaves of the Middle Jurassic Papudo-Quintero Complex, and this suggests that the dikes were injected from reservoirs not related to the plutonic complex. The mantle source appears to be a depleted mantle for Jurassic dikes and a heterogeneous-enriched lithospheric mantle for Cretaceous dikes. In the ETDS, vertical and gently plunging magma flow vectors were estimated for enriched and depleted dikes, respectively, which suggest, together with variations in dike thickness, that reservoirs were located at different depths for each dike family. In the Elqui Dike Swarm (EDS) and Limarí Mafic Dike Swarm (LMDS), geochemical patterns are similar to those of the mafic enclaves of the Middle Jurassic plutons. In the LMDS, east to west magma flow vectors are coherent with injection from neighbouring pluton located to the east. In the EDS, some dikes show geochemical and magma flow patterns supporting the same hypothesis. Accordingly, dikes do not necessarily come from deep reservoir; they may propagate in the upper crust from coeval shallow pluton chamber.

  11. Vapour Intrusion into Buildings - A Literature Review

    Science.gov (United States)

    This chapter provides a review of recent research on vapour intrusion of volatile organic compounds (VOCs) into buildings. The chapter builds on a report from Tillman and Weaver (2005) which reviewed the literature on vapour intrusion through 2005. Firstly, the term ‘vapour intru...

  12. Intrusion Preventing System using Intrusion Detection System Decision Tree Data Mining

    Directory of Open Access Journals (Sweden)

    Syurahbil

    2009-01-01

    Full Text Available Problem statement: To distinguish the activities of the network traffic that the intrusion and normal is very difficult and to need much time consuming. An analyst must review all the data that large and wide to find the sequence of intrusion on the network connection. Therefore, it needs a way that can detect network intrusion to reflect the current network traffics. Approach: In this study, a novel method to find intrusion characteristic for IDS using decision tree machine learning of data mining technique was proposed. Method used to generate of rules is classification by ID3 algorithm of decision tree. Results: These rules can determine of intrusion characteristics then to implement in the firewall policy rules as prevention. Conclusion: Combination of IDS and firewall so-called the IPS, so that besides detecting the existence of intrusion also can execute by doing deny of intrusion as prevention.

  13. Origin of the Lyme Dome and implications for the timing of multiple Alleghanian deformational and intrusive events in southern Connecticut

    Science.gov (United States)

    Walsh, G.J.; Aleinikoff, J.N.; Wintsch, R.P.

    2007-01-01

    Geologic mapping, structural analysis, and geochronology in the area of the Lyme dome, southern Connecticut provides constraints on the origin of the rocks in the core of the dome, the absolute timing of the principal deformational and thermal events attributed to Alleghanian orogenesis, and the processes that generated the dome. Detrital zircon geochronology in combination with ages on intrusive rocks brackets the deposition of quartzite in the core of the dome sometime between ca. 925 and 620 Ma. Granite and granodiorite intruded the Neoproteorozic metasedimentary rocks in the core of the dome at ca. 620 to 610 Ma. Four major early Permian events associated with the Alleghanian orogeny affected the rocks in the Lyme dome area. Syn-tectonic migmatization and widespread penetrative deformation (D1, ca. 300 - 290 Ma) included emplacement of alaskite at 290 ?? 4 Ma during regional foliation development and aluminosilicate-orthoclase metamorphic conditions. Rocks of the Avalon terrane may have wedged between Gander cover rocks and Gander basement in the core of the Lyme during D1. Limited structural evidence for diapiric uplift of the Lyme dome indicates that diapirism started late in D1 and was completed by D2 (ca. 290 - 280 Ma) when horizontal WNW contractional stresses dominated over vertical stresses. Second sillimanite metamorphism continued and syn-tectonic D2 granite pegmatite (288 ?? 4 Ma) and the Joshua Rock Granite Gniess (284 ?? 3 Ma) intruded at this time. North-northwest extension during D3 (ca. 280 - 275 Ma) led to granitic pegmatite intrusion along S3 cleavage planes and in extensional zones in boudin necks during hydraulic failure and decompression melting. Intrusion of a Westerly Granite dike at 275 ?? 4 Ma suggests that D3 extension was active, and perhaps concluding, by ca. 275 Ma. Late randomly oriented but gently dipping pegmatite dikes record a final stage of intrusion during D4 (ca. 275 - 260 Ma), and a switch from NNW extension to vertical

  14. Seafloor spreading event in western Gulf of Aden during the November 2010-March 2011 period captured by regional seismic networks: evidence for diking events and interactions with a nascent transform zone

    Science.gov (United States)

    Ahmed, Abdulhakim; Doubre, Cécile; Leroy, Sylvie; Kassim, Mohamed; Keir, Derek; Abayazid, Ahmadine; Julie, Perrot; Laurence, Audin; Vergne, Jérome; Alexandre, Nercessian; Jacques, Eric; Khanbari, Khaled; Sholan, Jamal; Rolandone, Frédérique; Al-Ganad, Ismael

    2016-05-01

    In November 2010, intense seismic activity including 29 events with a magnitude above 5.0, started in the western part of the Gulf of Aden, where the structure of the oceanic spreading ridge is characterized by a series of N115°-trending slow-spreading segments set within an EW-trending rift. Using signals recorded by permanent and temporary networks in Djibouti and Yemen, we located 1122 earthquakes, with a magnitude ranging from 2.1 to 5.6 from 2010 November 1 to 2011 March 31. By looking in detail at the space-time distribution of the overall seismicity, and both the frequency and the moment tensor of large earthquakes, we re-examine the chronology of this episode. In addition, we also interpret the origin of the activity using high-resolution bathymetric data, as well as from observations of seafloor cable damage caused by high temperatures and lava flows. The analysis allows us to identify distinct active areas. First, we interpret that this episode is mainly related to a diking event along a specific ridge segment, located at E044°. In light of previous diking episodes in nearby subaerial rift segments, for which field constraints and both seismic and geodetic data exist, we interpret the space-time evolution of the seismicity of the first few days. Migration of earthquakes suggests initial magma ascent below the segment centre. This is followed by a southeastward dike propagation below the rift immediately followed by a northwestward dike propagation below the rift ending below the northern ridge wall. The cumulative seismic moment associated with this sequence reaches 9.1 × 1017 Nm, and taking into account a very low seismic versus geodetic moment, we estimate a horizontal opening of ˜0.58-2.9 m. The seismic activity that followed occurred through several bursts of earthquakes aligned along the segment axis, which are interpreted as short dike intrusions implying fast replenishment of the crustal magma reservoir feeding the dikes. Over the whole period

  15. Overtopping on Grass Covered Dikes: Resistance and Failure of the Inner Slopes

    NARCIS (Netherlands)

    Trung, L.H.

    2014-01-01

    A large part of the Vietnamese population is living close to the coast. The sea is an essential source for supporting lives. Coastal flooding, on the other hand, threatens the people, land and infrastructures every year. Some hundreds years ago, the first sea dikes were built in Thai Binh and Nam D

  16. Overtopping Flow Impact on a Vertical Wall on a Dike Crest

    NARCIS (Netherlands)

    Chen, X.; Hofland, B.; Altomare, C.; Uijttewaal, J.S.W.

    2014-01-01

    In this paper the impact process and mechanism of overtopping flow on a vertical wall on a dike crest are investigated by means of a series of physical model tests. A double-peaked force was recognized in a time series of an overtoping flow. Four stages were summarized for the whole overtopping flow

  17. Overtopping on Grass Covered Dikes: Resistance and Failure of the Inner Slopes

    NARCIS (Netherlands)

    Trung, L.H.

    2014-01-01

    A large part of the Vietnamese population is living close to the coast. The sea is an essential source for supporting lives. Coastal flooding, on the other hand, threatens the people, land and infrastructures every year. Some hundreds years ago, the first sea dikes were built in Thai Binh and Nam

  18. Ottawa National Wildlife Refuge : 1978 BLHP Contract Pool 1 Dike Repair & Ditch Improvement Photographs

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This is a series of Ottawa National Wildlife Refuge photographs of the 1979 Dike Repair and Ditch Improvement project, as part of the BLHP $140,346 contract (JO-A3)....

  19. The Weakest Link: Spatial Variability in the Piping Failure Mechanism of Dikes

    NARCIS (Netherlands)

    Kanning, W.

    2012-01-01

    Piping is an important failure mechanism of flood defense structures. A dike fails due to piping when a head difference causes first the uplift of an inland blanket layer, and subsequently soil erosion due to a ground water flow. Spatial variability of subsoil parameters causes the probability of pi

  20. `Anomalous' magnetic fabrics of dikes in the stable single domain/superparamagnetic threshold

    Science.gov (United States)

    Soriano, Carles; Beamud, Elisabet; Garcés, Miguel; Ort, Michael H.

    2016-02-01

    `Anomalous' magnetic fabrics in dikes that appear to indicate flow into the wall confound many workers. Here, we present extensive magnetic data on five dikes from Tenerife, Canary Islands, and use these to interpret the causes of the anomalous fabrics. Comparison of the anisotropy of magnetic susceptibility (AMS) and anhysteretic magnetization (AARM) results show that, in some cases, the anomalous fabrics are caused by single-domain grains, which produce AMS fabrics perpendicular to the grain elongation, whereas AARM fabrics are parallel. To check this, hysteresis experiments were used to characterize the domain state. These show most are mixtures of pseudo-single-domain or single-domain plus multi-domain particles, but many have wasp-waisted hysteresis loops, likely indicating mixed populations of stable single-domain and superparamagnetic grains. First-order reversal curves were used to better characterize this and show mixtures of stable single-domain and superparamagnetic grains dominate the magnetic signal. Magnetic particles at the stable single-domain/superparamagnetic threshold are unstable at timespans relevant to the analytical techniques, so they produce complicated results. This suggests that anomalous AMS fabrics in dikes cannot simply be attributed to elongated stable single-domain particles and that mixtures of the different grain types can produce hybrid fabrics, in which the fabrics are neither perpendicular or parallel to the dike plane, that are difficult to interpret without extensive magnetic analysis.

  1. Fish assemblages, connectivity, and habitat rehabilitation in a diked Great Lakes coastal wetland complex

    Science.gov (United States)

    Kowalski, Kurt P.; Wiley, Michael J.; Wilcox, Douglas A.

    2014-01-01

    Fish and plant assemblages in the highly modified Crane Creek coastal wetland complex of Lake Erie were sampled to characterize their spatial and seasonal patterns and to examine the implications of the hydrologic connection of diked wetland units to Lake Erie. Fyke netting captured 52 species and an abundance of fish in the Lake Erie–connected wetlands, but fewer than half of those species and much lower numbers and total masses of fish were captured in diked wetland units. Although all wetland units were immediately adjacent to Lake Erie, there were also pronounced differences in water quality and wetland vegetation between the hydrologically isolated and lake-connected wetlands. Large seasonal variations in fish assemblage composition and biomass were observed in connected wetland units but not in disconnected units. Reestablishment of hydrologic connectivity in diked wetland units would allow coastal Lake Erie fish to use these vegetated habitats seasonally, although connectivity does appear to pose some risks, such as the expansion of invasive plants and localized reductions in water quality. Periodic isolation and drawdown of the diked units could still be used to mimic intermediate levels of disturbance and manage invasive wetland vegetation.

  2. 3-D flow and scour near a submerged wing dike: ADCP measurements on the Missouri River

    Science.gov (United States)

    Jamieson, E.C.; Rennie, C.D.; Jacobson, R.B.; Townsend, R.D.

    2011-01-01

    Detailed mapping of bathymetry and three-dimensional water velocities using a boat-mounted single-beam sonar and acoustic Doppler current profiler (ADCP) was carried out in the vicinity of two submerged wing dikes located in the Lower Missouri River near Columbia, Missouri. During high spring flows the wing dikes become submerged, creating a unique combination of vertical flow separation and overtopping (plunging) flow conditions, causing large-scale three-dimensional turbulent flow structures to form. On three different days and for a range of discharges, sampling transects at 5 and 20 m spacing were completed, covering the area adjacent to and upstream and downstream from two different wing dikes. The objectives of this research are to evaluate whether an ADCP can identify and measure large-scale flow features such as recirculating flow and vortex shedding that develop in the vicinity of a submerged wing dike; and whether or not moving-boat (single-transect) data are sufficient for resolving complex three-dimensional flow fields. Results indicate that spatial averaging from multiple nearby single transects may be more representative of an inherently complex (temporally and spatially variable) three-dimensional flow field than repeated single transects. Results also indicate a correspondence between the location of calculated vortex cores (resolved from the interpolated three-dimensional flow field) and the nearby scour holes, providing new insight into the connections between vertically oriented coherent structures and local scour, with the unique perspective of flow and morphology in a large river.

  3. Is the outcrop topology of dolerite dikes of the Precambrian Singhbhum Craton fractal?

    Indian Academy of Sciences (India)

    Nibir Mandal; Atin Kumar Mitra; Santanu Misra; Chandan Chakraborty

    2006-12-01

    In the Precambrian Singhbhum Craton of eastern India, newer dolerite dikes occur profusely with varying outcrop lengths. We have analysed the nature of their length-size and orientation distributions in relation to the theory of fractals. Two orientational sets of dikes (NW–SE and NE–SW) are present. Both the sets show strongly non-power-law size distributions, as reflected in nonlinear variations in logarithmic space. We analyzed thousands of data, revealing that polynomial functions with a degree of 3 to 4 are the best representatives of the non-linear variations. Orientation analysis shows that the degree of dispersions from the mean trend tends to decrease with increasing dike length. The length-size distributions were studied by simulating fractures in physical models. Experimental fractures also show a non-power-law distribution, which grossly conforms to those of the dolerite dikes. This type of complex size distributions results from the combined effects of nucleation, propagation and coalescence of fractures.

  4. Intrusion Triggering of Explosive Eruptions: Lessons Learned from EYJAFJALLAJÖKULL 2010 Eruptions and Crustal Deformation Studies

    Science.gov (United States)

    Sigmundsson, F.; Hreinsdottir, S.; Hooper, A. J.; Arnadottir, T.; Pedersen, R.; Roberts, M. J.; Oskarsson, N.; Auriac, A.; Decriem, J.; Einarsson, P.; Geirsson, H.; Hensch, M.; Ofeigsson, B. G.; Sturkell, E. C.; Sveinbjornsson, H.; Feigl, K.

    2010-12-01

    Gradual inflation of magma chambers often precedes eruptions at highly active volcanoes. During eruptions, rapid deflation occurs as magma flows out and pressure is reduced. Less is known about the deformation style at moderately active volcanoes, such as Eyjafjallajökull, Iceland, where an explosive summit eruption of trachyandesite beginning on 14 April 2010 caused exceptional disruption to air traffic. This eruption was preceded by an effusive flank eruption of olivine basalt from 20 March - 12 April 2010. Geodetic and seismic observations revealed the growth of an intrusive complex in the roots of the volcano during three months prior to eruptions. After initial horizontal growth, modelling indicates both horizontal and sub-vertical growth in three weeks prior the first eruption. The behaviour is attributed to subsurface variations in crustal stress and strength originating from complicated volcano foundations. A low-density layer may capture magma allowing pressure to build before an intrusion can ascend towards higher levels. The intrusive complex was formed by olivine basalt as erupted on the volcano flank 20 March - 12 April; the intrusive growth halted at the onset of this eruption. Deformation associated with the eruption onset was minor as the dike had reached close to the surface in the days before. Isolated eruptive vents opening on long-dormant volcanoes may represent magma leaking upwards from extensive pre-eruptive intrusions formed at depth. A deflation source activated during the summit eruption of trachyandesite is distinct from, and adjacent to, all documented sources of inflation in the volcano roots. Olivine basalt magma which recharged the volcano appears to have triggered the summit eruption, although the exact mode of triggering is uncertain. Scenarios include stress triggering or propagation of olivine basalt into more evolved magma. The trachyandesite includes crystals that can be remnants of minor recent intrusion of olivine basalt

  5. The role of estrogen in intrusive memories.

    Science.gov (United States)

    Cheung, Jessica; Chervonsky, Liza; Felmingham, Kim L; Bryant, Richard A

    2013-11-01

    Intrusive memories are highly vivid, emotional and involuntary recollections which cause significant distress across psychological disorders including posttraumatic disorder (PTSD). Recent evidence has potentially extended our understanding of the development of intrusive memories by identifying biological factors which significantly impact on memories for emotionally arousing stimuli. This study investigated the role of stress on the development of intrusions for negative and neutral images, and indexed the potential contributions of sex (estrogen and progesterone) and stress (noradrenaline and cortisol) hormones. Whilst viewing the images, half the participants underwent a cold pressor stress (CPS) procedure to induce stress while the control participants immersed their hands in warm water. Saliva samples were collected to index estrogen, progesterone and noradrenergic and cortisol response. Participants (55 university students, 26 men, 29 women) viewed a series of negatively arousing and neutral images. Participants completed recall and intrusions measures 2 days later. Negative images resulted in greater recall and more intrusions than neutral images. In the cold water condition females recalled fewer neutral memories than males. Cortisol increase predicted decreased recall of negative memories in males, and estrogen predicted increased intrusions of negative images in women. These findings are consistent with evidence that circulating levels of ovarian hormones influence memory for emotionally arousing events, and provides the first evidence of the influence of sex hormones on intrusive memories. These results provide one possible explanation for the higher incidence of anxiety disorders in women.

  6. Geochronology and Geochemistry of Mafic Dikes from Hainan Island and Tectonic Implications

    Institute of Scientific and Technical Information of China (English)

    CAO Jianjin; HU Ruizhong; LIU Shen; XIE Guiqing

    2009-01-01

    In the present study, the major and trace element compositions, as well as Sr, Nd isotopic compositions and K-Ar age data in mafic dikes from Hainan Island, China, have been analyzed. Whole-rock K-Ar dating yielded a magmatic duration of 61-98 Ma for mafic dikes. Mafic dikes have a very high concentration of incompatible elements, for example, Ba, Rb, Sr, K, rare earth elements, and especially light rare earth elements (LREE), and negative anomalies of Nb, Ta, and Ti in the normalized trace element patterns. The initial ~(87)Sr/~(86)Sr ratios and εSr(t) of the mafic dikes are 0.70634-0.71193 and +27.7 to +112.2, respectively. In the ~(87)Sr/~(86)Sr versus εNd(t) diagram, the Hainan Island mafic dikes plot between fields for depleted mantle and enriched mantle type 2. All these characteristics show that the mantle (source region) of mafic dikes in this area experienced metasomatism by fluids relatively enriched in LREE and large ion lithophile elements. The genesis of Hainan Island mafic dikes is explained as a result of the mixing of asthenospheric mantle with lithospheric mantle that experienced metasomatism by the subduction of the Pacific Plate. This is different from the Hainan Island Cenozoic basaits mainly derived from depleted asthenospheric mantle, and possibly, minor metasomatised lithospheric mantle. This study suggests that the Mesozoic and Cenozoic lithospheric revolutions in Hainan Island can be divided into three stages: (1) the compression orogenesis stage before 98 Ma. The dominant factor during this stage is the subduction of the ancient Pacific Plate beneath this area. The lithospheric mantle changed into enriched mantle type 2 by metasomatism; (2) the thinning and extension stage during 61-98 Ma. The dominant factor during this stage is that the asthenospheric mantle invaded and corroded the lithospheric mantle; and (3) the large-scale thinning and extension stage after 61 Ma. The large-scale asthenospheric upwelling results in the strong

  7. Stress Field and Dike Propagation within a Partially Submerged Volcanic Edifice

    Science.gov (United States)

    Tait, S.; Taisne, B.; Manga, M.; Pasquet, E.; Limare, A.; Bhat, H.

    2013-12-01

    In order to better understand dike propagation within and flank collapse on volcanic islands, we performed a set of analogue laboratory experiments. We created conic edifices of gelatin and measured their deformation under their own weight whilst we varied the level to which they were partially submerged. In most experiments the lower part of the edifice was submerged in water while the upper part was surrounded by air, but in some cases oil was used as the fluid surrounding the upper part of the edifice in order to change density differences. The gelatin was typically made of a sugar (or glycerol) solution so that it was approximately 10-30% denser than water, and its strength was varied by using different gelatin concentrations. The strain field was visualized from the birefringence pattern created by placing the gelatin between sheets of polarising film with the directions crossed. One first order feature of the strain field is an approximately elliptical shaped extensional region, centered below the summit and at approximately sea-level. The second feature is a region of strong sub-horizontal shear in the lower most part of the edifice, close to the lower, rigid no-slip boundary. We also observed the behaviour of dikes injected into the base of the edifice from below: these dikes were filled with water or salt solution so that they had variable amounts of positive buoyancy with respect to the edifice. If all, or a very large fraction, of the edifice was submerged, the dike typically propagated vertically and erupted at the summit. If the edifice was only partially submerged, however, the dikes typically switched from dominantly vertical to horizontal propagation and erupted on the flanks of the edifice, very often at sea level.

  8. Signature Based Intrusion Detection System Using SNORT

    Directory of Open Access Journals (Sweden)

    Vinod Kumar

    2012-11-01

    Full Text Available Now a day’s Intrusion Detection systems plays very important role in Network security. As the use of internet is growing rapidly the possibility of attack is also increasing in that ratio. People are using signature based IDS’s. Snort is mostly used signature based IDS because of it is open source software. World widely it is used in intrusion detection and prevention domain. Basic analysis and security engine (BASE is also used to see the alerts generated by Snort. In the paper we have implementation the signature based intrusion detection using Snort. Our work will help to novel user to understand the concept of Snort based IDS.

  9. Excess water generation during reaction-inducing intrusion of granitic melts into ultramafic rocks at crustal P-T conditions in the Sør Rondane Mountains of East Antarctica

    Science.gov (United States)

    Uno, Masaoki; Okamoto, Atsushi; Tsuchiya, Noriyoshi

    2017-07-01

    Arc magmas are one of the main sources of aqueous geofluids in the crust, and the movement of fluids above magma chambers has been geophysically imaged. Here, we constrain the water budget (i.e., supply, consumption and release of H2O) in these areas above magma chamber by examining the hydration caused by crust-melt reactions in the Sør Rondane Mountains of East Antarctica. The study area contains a phlogopite-pargasite-peridotite unit that has been intruded by numerous granitic dikes, creating hydration reaction zones at the dike-peridotite boundary. These reactions occurred at 0.5 GPa and 700 °C, corresponding to middle crustal conditions, and generated a series of reaction zones with distance from the granitic dikes as follows: (i) granitic dike, (ii) pargasite-actinolite zone, (iii) tremolite-phlogopite zone, (iv) anthophyllite-phlogopite zone, (v) phlogopite-olivine-orthopyroxene zone, and (vi) unaltered pargasite-phlogopite peridotite. The presence of amphiboles with a preferred orientation perpendicular to the dike margins and an absence of Cr-rich magnetite indicate that the pargasite-actinolite zone [zone (ii)] grew from the dike margins as a result of the dike reacting with the host rock, with an initial melt/rock boundary located between zones (ii) and (iii). The H2O contents of reaction zones (ii)-(v) are higher than the content in the hosting pargasite-phlogopite peridotite, suggesting that the intrusion of the dike was associated with hydration reactions. Geochemical analysis along a profile through the reaction zones indicates Mg and Fe depletion, and Si enrichment in zones (iii)-(iv), and Ca depletion and K enrichment in zones (iv)-(v) relative to the hosting pargasite-phlogopite peridotite. In contrast, zone (ii) is characterized by Ca, Fe, and Mg enrichments relative to the granitic dike. These observations suggest that the reaction zone sequence was formed by the elemental transfer between granitic dike and parasite-phlogopite peridotite: Ca

  10. Grey-theory based intrusion detection model

    Institute of Scientific and Technical Information of China (English)

    Qin Boping; Zhou Xianwei; Yang Jun; Song Cunyi

    2006-01-01

    To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theory has merits of fewer requirements on original data scale, less limitation of the distribution pattern and simpler algorithm in modeling.With these merits GTIDS constructs model according to partial time sequence for rapid detect on intrusive act in secure system. In this detection model rate of false drop and false retrieval are effectively reduced through twice modeling and repeated detect on target data. Furthermore, GTIDS framework and specific process of modeling algorithm are presented. The affectivity of GTIDS is proved through emulated experiments comparing snort and next-generation intrusion detection expert system (NIDES) in SRI international.

  11. Intrusion Detection Architecture Utilizing Graphics Processors

    Directory of Open Access Journals (Sweden)

    Branislav Madoš

    2012-12-01

    Full Text Available With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS. Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.

  12. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  13. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  14. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  15. A phased approach to network intrusion detection

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; DuBois, D.H.; Stallings, C.A.

    1991-01-01

    This paper describes the design and development of a prototype intrusion detection system for the Los Alamos National Laboratory's Integrated Computing Network (ICN). The development of this system is based on three basic assumptions: (1) that statistical analysis of computer system and user activates may be used to characterize normal system and user behavior, and that given the resulting statistical profiles, behavior which deviates beyond certain bounds can be detected, (2) that expert system techniques can be applied to security auditing and intrusion detection, and (3) that successful intrusion detection may take place while monitoring a limited set of network activities. The Network Anomaly Detection and Intrusion Reporter (NADIR) design intent was to duplicate and improve the audit record review activities which had previously been undertaken by security personnel, to replace the manual review of audit logs with a near realtime expert system.

  16. Immune Based Intrusion Detector Generating Algorithm

    Institute of Scientific and Technical Information of China (English)

    DONG Xiao-mei; YU Ge; XIANG Guang

    2005-01-01

    Immune-based intrusion detection approaches are studied. The methods of constructing self set and generating mature detectors are researched and improved. A binary encoding based self set construction method is applied. First,the traditional mature detector generating algorithm is improved to generate mature detectors and detect intrusions faster. Then, a novel mature detector generating algorithm is proposed based on the negative selection mechanism. Accord ing to the algorithm, less mature detectors are needed to detect the abnormal activities in the network. Therefore, the speed of generating mature detectors and intrusion detection is improved. By comparing with those based on existing algo rithms, the intrusion detection system based on the algorithm has higher speed and accuracy.

  17. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  18. Intrusion Detection System Using Advanced Honeypots

    CERN Document Server

    Singh, Ram Kumar

    2009-01-01

    The exponential growth of Internet traffic has made public servers increasingly vulnerable to unauthorized accesses and intrusions. In addition to maintaining low latency for the client, filtering unauthorized accesses has become one of the major concerns of a server maintainer. This implementation of an Intrusion Detection System distinguishes between the traffic coming from clients and the traffic originated from the attackers, in an attempt to simultaneously mitigate the problems of both latency and security. We then present the results of a series of stress and scalability tests, and suggest a number of potential uses for such a system. As computer attacks are becoming more and more difficult to identify the need for better and more efficient intrusion detection systems increases. The main problem with current intrusion detection systems is high rate of false alarms. Using honeypots provides effective solution to increase the security.

  19. Evolution of dike opening during the March 2011 Kamoamoa fissure eruption, Kīlauea Volcano, Hawai`i

    Science.gov (United States)

    Lundgren, Paul; Poland, Michael; Miklius, Asta; Orr, Tim R.; Yun, Sang-Ho; Fielding, Eric; Liu, Zhen; Tanaka, Akiko; Szeliga, Walter; Hensley, Scott; Owen, Susan

    2013-01-01

    The 5–9 March 2011 Kamoamoa fissure eruption along the east rift zone of Kīlauea Volcano, Hawai`i, followed months of pronounced inflation at Kīlauea summit. We examine dike opening during and after the eruption using a comprehensive interferometric synthetic aperture radar (InSAR) data set in combination with continuous GPS data. We solve for distributed dike displacements using a whole Kīlauea model with dilating rift zones and possibly a deep décollement. Modeled surface dike opening increased from nearly 1.5 m to over 2.8 m from the first day to the end of the eruption, in agreement with field observations of surface fracturing. Surface dike opening ceased following the eruption, but subsurface opening in the dike continued into May 2011. Dike volumes increased from 15, to 16, to 21 million cubic meters (MCM) after the first day, eruption end, and 2 months following, respectively. Dike shape is distinctive, with a main limb plunging from the surface to 2–3 km depth in the up-rift direction toward Kīlauea's summit, and a lesser projection extending in the down-rift direction toward Pu`u `Ō`ō at 2 km depth. Volume losses beneath Kīlauea summit (1.7 MCM) and Pu`u `Ō`ō (5.6 MCM) crater, relative to dike plus erupted volume (18.3 MCM), yield a dike to source volume ratio of 2.5 that is in the range expected for compressible magma without requiring additional sources. Inflation of Kīlauea's summit in the months before the March 2011 eruption suggests that the Kamoamoa eruption resulted from overpressure of the volcano's magmatic system.

  20. Intrusion-Tolerant Architectures: Concepts and Design

    OpenAIRE

    Paulo Veríssimo; Nuno Ferreira Neves; Miguel Correia

    2003-01-01

    There is a significant body of research on distributed computing architectures, methodologies and algorithms, both in the fields of fault tolerance and security. Whilst they have taken separate paths until recently, the problems to be solved are of similar nature. In classical dependability, fault tolerance has been the workhorse of many solutions. Classical security-related work has on the other hand privileged, with few exceptions, intrusion prevention. Intrusion tolerance (IT) is a new app...

  1. Cluster based Intrusion Detection System for Manets

    Directory of Open Access Journals (Sweden)

    Nisha Dang

    2012-07-01

    Full Text Available Manets are the ad hoc networks that are build on demand or instantly when some mobile nodes come in the mobility range of each other and decide to cooperate for data transfer and communication. Therefore there is no defined topology for Manets. They communicate in dynamic topology which continuously changes as nodes are not stable. Due to this lack of infrastructure and distributed nature they are more vulnerable for attacks and provide a good scope to malicious users to become part of the network. To prevent the security of mobile ad hoc networks many security measures are designed such as encryption algorithms, firewalls etc. But still there is some scope of malicious actions. So, Intrusion detection systems are proposed to detect any intruder in the network and its malicious activities. Cluster based intrusion detection system is also designed to restrict the intruders activities in clusters of mobile nodes. In clusters each node run some intrusion detection code to detect local as well as global intrusion. In this paper we have taken insight of intrusion detection systems and different attacks on Manet security. Then we proposed how overhead involved in cluster based intrusion detection system can be reduced.

  2. A system for distributed intrusion detection

    Energy Technology Data Exchange (ETDEWEB)

    Snapp, S.R.; Brentano, J.; Dias, G.V.; Goan, T.L.; Heberlein, L.T.; Ho, Che-Lin; Levitt, K.N.; Mukherjee, B. (California Univ., Davis, CA (USA). Div. of Computer Science); Grance, T. (Air Force Cryptologic Support Center, San Antonio, TX (USA)); Mansur, D.L.; Pon, K.L. (Lawrence Livermore National Lab., CA (USA)); Smaha, S.E. (Haystack Labs., Inc., Austin, TX (USA))

    1991-01-01

    The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of our present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.

  3. Wave run-up of a possible Anak-Krakatau tsunami on planned and optimized Jakarta Sea Dike

    Science.gov (United States)

    Badriana, M. R.; Bachtiar, H.; Adytia, D.; Sembiring, L.; Andonowati, van Groesen, E.

    2017-07-01

    The infrastructural plans in the Jakarta Bay to reduce risks of flooding in Jakarta city comprise a large Sea Dike that encloses a retention lake. Part of the planned dike has the shape of the iconic Garuda bird. This paper shows that if in the future an explosion of Anak Krakatau will occur with strength 1/4th of the original Karkatau 1883 explosion, wave crests of 11m and troughs of 6m may collide against the bird's head. As an alternative example, a more optimized design of the dike is constructed that reduces the maximal wave effects considerably.

  4. Experimental study on scour and flow field in a scour hole around a T-shape spur dike in a 90° bend

    Institute of Scientific and Technical Information of China (English)

    Masoud GHODSIAN; Mohammad VAGHEFI

    2009-01-01

    In this paper results of experimental study on scour and flow field around a T-shape spur dike in a 90 degree channel bend are presented. Experiments were conducted in a laboratory channel to measure the variations of bed topography under a clear water condition. The three dimensional flow field was measured by an Acoustic Doppler Velocimeter in a scour hole due to a T-shape spur dike. It was found that by increasing the Froude number and length of spur dike the amount of scour increases.Increasing the wing length of spur dike decreases the scour, The amount of scour at the upstream of spur dike is much more as compare to that at the downstream of spur dike. By increasing the wing length of spur dike the zone of flow separation expands. As a result the sizes of vortex increase.Details of flow field are also addressed in the paper.

  5. From optimal to practical safety standards for dike-ring areas.

    Science.gov (United States)

    Eijgenraam, C J J

    2007-01-01

    After the flood disaster in 1953 in the southwestern part of the Netherlands, Van Dantzig tried to solve the economic decision problem concerning the optimal height of dikes. His solution has a fixed probability of flooding after each investment. However, when there is economic growth, not the probability of flooding but the expected yearly loss by flooding is the key variable in the real optimal safety strategy. Under some conditions, it is optimal to keep this expected loss within a constant interval. Therefore, when the potential damage increases by economic growth, the flooding probability has to decline in the course of time in order to keep the expected loss between the fixed boundaries. The purpose of the paper is to show the implications of the optimal solution in case there are differences between costs and benefits among dike-ring areas. Further, the paper focuses on the translation of the theoretical results into new legal standards that can work well in practice.

  6. Geochronology and Nd and Pb isotope characteristics of gabbro dikes in the Luobusha ophiolite, Tibet

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    We report a combined internal and whole-rock Sm-Nd isochron age, and Nd and Pb isotopic data for gabbro dikes of the Luobusha ophiolite in Tibet. The Sm-Nd isochron of data for two whole rocks and plagioclase and clinopyroxene separates from one of the rocks yields a Middle Jurassic age of (177±31) Ma (with an initial εNd(t) = +8),which provides a significant bound on the time of formation of the Luobusha ophiolite. The Nd and Pb isotopic characteristics of the dike indicate an Indian-Ocean-type isotopic affinity, and we conclude that the Luobusha ophiolite formed in an oceanic setting during the Middle Jurassic.``

  7. K-Ar Geochronology of Mesozoic Mafic Dikes in Shandong Province, Eastern China:Implications for Crustal Extension

    Institute of Scientific and Technical Information of China (English)

    LIU Shen; HU Ruizhong; ZHAO Junhong; FENG Caixia

    2004-01-01

    Based on K-Ar isotope analyses, Mesozoic mafic (and alkali ultramafic) dikes from western and eastern Shandong Province, China, are dated at 88.2±1.70 Ma to 169.5±3.7 Ma with the majority of ages ranging from 90 Ma to 140 Ma. The emplacement of the dikes suggests a major Yanshanian (Cretaceous) crustal extension in Shandong province.Together with other available age data, this study suggests four periods of crustal extension at about 80 Ma, 100 Ma, 120 Ma and 140 Ma, respectively. Besides the effect of collapse of the Yanshanian orogenic belt on the emplacement of the mafic dikes in Shandong in the Cretaceous, the mantle plume and the extensive left-lateral advection and extension of the Tanlu fault also have controlled the crustal extension and the emplacement of the mafic dikes in eastern Shandong and western Shandong, respectively.

  8. RESTORING A DAMAGED 16-YEAR -OLD INSULATING POLYMER CONCRETE DIKE OVERLAY: REPAIR MATERIALS AND TECHNOLOGIES.

    Energy Technology Data Exchange (ETDEWEB)

    SUGAMA,T.

    2007-01-01

    The objective of this program was to design and formulate organic polymer-based material systems suitable for repairing and restoring the overlay panels of insulating lightweight polymer concrete (ILPC) from the concrete floor and slope wall of a dike at KeySpan liquefied natural gas (LNG) facility in Greenpoint, Brooklyn, NY, just over sixteen years ago. It also included undertaking a small-scale field demonstration to ensure that the commercial repairing technologies were applicable to the designed and formulated materials.

  9. Environmental and Water Quality Operational Studies. Environmental Guidelines for Dike Fields.

    Science.gov (United States)

    1984-09-01

    oak ( Quercus alba) 12.5 7.0 Douglas fir (Pseudotsuga taxifolia) 12.5 7.0 Bald cypress (Taxodium distichum) 12.5 7.0 _ * Norway pine (Pinus resinosa...Rier• inc al the¢’.. -.elW~~;. W .- W W.V-W W dikes~ ~ ~ ~ ~ ~ ~ ~ ~ ~~~~’ are subered none spreve o ot sd kes Sme’’.. • -. Increase in width due to

  10. EXPERIMENTAL AND NUMERICAL INVESTIGATIONS ON SECONDARY FLOWS AND SEDIMENTATIONS BEHIND A SPUR DIKE

    Institute of Scientific and Technical Information of China (English)

    TANG Xue-lin; DING Xiang; CHEN Zhi-cong

    2007-01-01

    For a physical model of the approach navigation channel of Three Gorges Project(TGP), flow patterns around a non-submerged spur dike placed as a mountain in a long rectangular glass flume were experimentally investigated with and without "sucking-spouting" water respectively. Based on rigid lid assumption and Dynamic Smagorinsky Model, all these vortex flows around the spur dike were numerically simulated and analyzed, which probably affect the whole flow field and then probably lead to sedimentations for silt-laden two-phase flows. Meanwhile, silt-laden flows were also investigated experimentally. Both the secondary flow region and the silt sedimentations downstream of the spur dike decrease greatly with "sucking-spouting" water compared to those ones without "sucking-spouting" water. The Finite Volume Method (FVM) was used to discretize the governing equations together with a staggered grid system, where the second order difference is employed for the diffusion terms and the source terms while the upwind difference QUICK is used for the convection terms. The computational results are all in fairly good agreement with the experimental data.

  11. Uncertainty assessment of a dike with an anchored sheet pile wall using FEM

    Directory of Open Access Journals (Sweden)

    Rippi Aikaterini

    2016-01-01

    Full Text Available The Dutch design codes for the dikes with retaining walls rely on Finite Element Analysis (FEM in combination with partial safety factors. However, this can lead to conservative designs. For this reason, in this study, a reliability analysis is carried out with FEM calculations aiming to demonstrate the feasibility of reliability analysis for a dike with an anchored sheet pile wall modelled in the 2D FEM, Plaxis. Sensitivity and reliability analyses were carried out and enabled by coupling the uncertainty package, OpenTURNS and Plaxis. The most relevant (ultimate limit states concern the anchor, the sheet pile wall, the soil body failure (global instability and finally the system. The case was used to investigate the applicability of the First Order Reliability Method (FORM and Directional Sampling (DS to analysing these limit states. The final goal is to estimate the probability of failure and identify the most important soil properties that affect the behaviour of each component and the system as a whole. The results of this research can be used to assess and optimize the current design procedure for dikes with retaining walls.

  12. Stability of the Guiding Dike in Yangtze Estuary Under the Wave Load

    Institute of Scientific and Technical Information of China (English)

    YAN Shu-wang; LIU Run; FAN Qi-jin; XIE Shi-leng

    2005-01-01

    During the construction of the guiding dike in the Yangtze Estuary, some of the caisson structures sank into the soil for 1~5 m or slid about 20 m away from the original place when a strong storm attacked this area. Dynamic triaxial tests were carried out to simulate the behavior of foundation soils under wave loading. The test results show that the excessive settlement and lateral movement of the caissons are due to the weakening of the soft clay strength during the strong storm. The test results also show that the ability of the soft clay to resist the wave force will be greatly increased when the soft soil samples are suitably improved. Based on the test results, an improvement method combining vertical drains with surcharge loading was proposed to strengthen the foundation soil. On the improved soil foundation, the dike has been reconstructed and undergone several strong storms without any damage. A finite element approach has been developed for analyzing the settlement and stability of the dike under the action of strong storm.

  13. A model, describing the influence of water management alternatives on dike stability

    Science.gov (United States)

    Lambert, J. W. M.; Vastenburg, E.; Roelofsen, F. J.

    2015-11-01

    The awareness is rising that economic effects of Land Subsidence are high. Nevertheless, quantifying these economic losses is difficult and, as far as known, not yet done in a sophisticated way. Also, to be able to decide about future strategies, for example to avoid or decrease subsidence, it is necessary to know the financial consequences of measures and possible solutions. As a first step to quantify these economic effects, a MODFLOW-SCR (coupled MODFLOW-Settlements model) is coupled with the model DAM. Based on the local stratigraphy, the shape and composition of the existing dike or levee, the level of the surface water and the surface level, macro-stability of the dike is calculated and - if the dike does not meet the required stability - adaptions are proposed. The model enables to separate effects that are caused by sea-level rise and the effects of subsidence. Coupling the DAM model with an economic model to calculate costs of these adaptions is under construction.

  14. Flight test investigation of the vortex wake characteristics behind a Boeing 727 during two-segment and normal ILS approaches (A joint NASA/FAA report)

    Science.gov (United States)

    Barber, M. R.; Kurkowski, R. L.; Garodz, L. J.; Robinson, G. H.; Smith, H. J.; Jacobsen, R. A.; Stinnett, G. W., Jr.; Mcmurtry, T. C.; Tymczyszyn, J. J.; Devereaux, R. L.

    1975-01-01

    Flight tests were performed to evaluate the vortex wake characteristics of a Boeing 727 aircraft during conventional and two-segment instrument landing approaches. Smoke generators were used for vortex marking. The vortex was intentionally intercepted by a Lear Jet and a Piper Comanche aircraft. The vortex location during landing approach was measured using a system of phototheodolites. The tests showed that at a given separation distance there are no readily apparent differences in the upsets resulting from deliberate vortex encounters during the two types of approaches. The effect of the aircraft configuration on the extent and severity of the vortices is discussed.

  15. A New Method for Intrusion Detection using Manifold Learning Algorithm

    Directory of Open Access Journals (Sweden)

    Guoping Hou

    2013-07-01

    Full Text Available Computer and network security has received and will still receive much attention. Any unexpected intrusion will damage the network. It is therefore imperative to detect the network intrusion to ensure the normal operation of the internet. There are many studies in the intrusion detection and intrusion patter recognition. The artificial neural network (ANN has proven to be powerful for the intrusion detection. However, very little work has discussed the optimization of the input intrusion features for the ANN. Generally, the intrusion features contain a certain number of useless features, which is useless for the intrusion detection. Large dimensions of the feature data will also affect the intrusion detection performance of the ANN. In order to improve the ANN performance, a new approach for network intrusion detection based on nonlinear feature dimension reduction and ANN is proposed in this work. The manifold learning algorithm was used to reduce the intrusion feature vector. Then an ANN classifier was employed to identify the intrusion. The efficiency of the proposed method was evaluated with the real intrusion data. The test result shows that the proposed approach has good intrusion detection performance.

  16. Dike Strength Analysis on a Regional Scale Based On a Stochastic Subsoil Model

    Science.gov (United States)

    Koelewijn, A. R.; Vastenburg, E. W.

    2013-12-01

    About two-third of the Netherlands is protected against flooding by dikes and levees. The subsoil can be characterized by fluvial and marine sediments. Maintaining the safety of these dikes and levees is of vital importance. Insufficient safety is not permissible, but excessive safety would imply a waste of money and other resources. Therefore safety assessments are carried out on a regular basis. Over the past decades, a practice has grown to calculate a limited number of cross-sections, roughly one every 500 to 1000 meters. For this purpose, a representative cross-section is selected as an estimate of the most vulnerable surface geometry and the subsoil conditions determined from boreholes and cone penetration tests, for which slope stability and piping analyses are carried out. This is a time-consuming procedure which is not only expensive, but also neglects geological knowledge. A method to incorporate geological knowledge of an area, including updating on the basis of additional investigations, has been described in Koelewijn et al. [2011]. In addition, various groups have worked to incorporate geotechnical stability models and detailed Lidar-measurements of the surface into a more efficient and rational calculation process [Knoeff et al. 2011, Lam et al. 2013, van den Ham & Mastbergen, 2013]. Combining this experience with the 3D subsoil model opens possibilities for cost-effective additional soil investigations for those locations where ruling out unfavorable conditions really influences the decisions to be made regarding rejection and improvement, see the figure for examples of different subsoil profiles along a dike. The resulting system has been applied for semi-automated calculations of dikes in various parts of the Netherlands, totalling over 4000 km by now, and a part of the Mississippi levee system. [van den Ham & Mastbergen, 2013] G.A. van den Ham & D.R. Mastbergen, A semi-probabilistic assessment method for flow slides. AGU Fall meeting, 2013

  17. Sedimentation and contamination patterns of dike systems along the Rhône River (France)

    Science.gov (United States)

    Seignemartin, Gabrielle; Tena, Alvaro; Piégay, Hervé; Roux, Gwenaelle; Winiarski, Thierry

    2017-04-01

    Humans have historically modified the Rhône River, especially in the last centuries. In the 19th century, the river was systematically embanked for flood protection purposes, and works continued along the 20th century with dike system engineering work for navigation. The Rhône was canalised and its historical course by-passed by a series of hydroelectric dams. Besides, industrial activity polluted the river. For example, high levels of PCB's were attributed to the inputs of the heavily industrialized zone downstream from Lyon. During floods, these contaminants, associated with the suspended sediment, were trapped by the engineering works and the floodplain. Currently, a master plan to reactivate the river dynamics in the alluvial margins by removing the groyne-fields and dikes in the by-passed sections is being implemented. Within this context, this work aims to assess historical dynamics of sediment and associated contaminants in the floodplain (e.g. trace metal elements), notably in the dike system, in order to evaluate the contamination risk related to bank protection removal. With this objective, a transversal methodology has been applied coupling GIS diachronic analysis (old maps, bathymetric data, Orthophotos, LIDAR, etc.) to understand the historical floodplain evolution, sediment survey to obtain sediment thickness (metal rod and Ground Penetrating Radar), and sediment sampling (manual auger and core sampling) to obtain the metal element concentrations (X-Ray Fluorescence and Inductively Coupled Plasma Mass Spectrometry). By this way, metal element patterns were defined and used as contamination tracing indicators to apprehend the contamination history but also as geochemical background indicators to define the sediment source influence. We found that sediment temporal patterns are directly related with the by-pass construction year. Spatially, fine sediment deposition predominates in the dike systems, being lower in the floodplain already disconnected in

  18. Environmental and eelgrass response to dike removal: Nisqually River Delta (2010–14)

    Science.gov (United States)

    Takesue, Renee K.

    2016-10-03

    Restoration of tidal flows to formerly diked marshland can alter land-to-sea fluxes and patterns of accumulation of terrestrial sediment and organic matter, and these tidal flows can also affect existing nearshore habitats. Dikes were removed from 308 hectares (ha) of the Nisqually National Wildlife Refuge on the Nisqually River Delta in south Puget Sound, Washington, in fall 2009 to improve habitat for wildlife, such as juvenile salmon. Ecologically important intertidal and subtidal eelgrass (Zostera marina) beds grow on the north and west margins of the delta. The goal of this study was to understand long-term changes in eelgrass habitat and their relation to dike removal. Sediment and eelgrass properties were monitored annually in May from 2010 to 2014 at two sites on the west side of the Nisqually River Delta along McAllister Creek, a spring-fed creek near two restored tidal channels. In May 2014, the mean canopy height of eelgrass was the same as in previous years in an 8-ha bed extending to the Nisqually River Delta front, but mean canopy height was 20 percent lower in a 0.3-ha eelgrass bed closer to the restored marsh when compared to mean canopy height of eelgrass in May 2010, 6 months after dike removal was completed. Over 5 years, the amount of eelgrass leaf area per square meter (m2) in the 8-ha bed increased slightly, and surface-sediment grain size became finer. In contrast, in the 0.3-ha bed, eelgrass leaf area per m2 decreased by 45 percent, and surface sediment coarsened. Other potential stressors, including sediment pore water reduction-oxidation potential (redox) and hydrogen sulfide (H2S) concentration in the eelgrass rhizosphere, or root zone, were below levels that negatively affect eelgrass growth and therefore did not appear to be environmental stressors on plants. Eelgrass biomass partitioning, though less favorable in the 8-ha eelgrass bed compared to the 0.3-ha one, was well above the critical above-ground to below-ground biomass ratio of

  19. Data Mining and Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Zibusiso Dewa

    2016-01-01

    Full Text Available The rapid evolution of technology and the increased connectivity among its components, imposes new cyber-security challenges. To tackle this growing trend in computer attacks and respond threats, industry professionals and academics are joining forces in order to build Intrusion Detection Systems (IDS that combine high accuracy with low complexity and time efficiency. The present article gives an overview of existing Intrusion Detection Systems (IDS along with their main principles. Also this article argues whether data mining and its core feature which is knowledge discovery can help in creating Data mining based IDSs that can achieve higher accuracy to novel types of intrusion and demonstrate more robust behaviour compared to traditional IDSs.

  20. Intrusion Detection System: Security Monitoring System

    Directory of Open Access Journals (Sweden)

    ShabnamNoorani,

    2015-10-01

    Full Text Available An intrusion detection system (IDS is an ad hoc security solution to protect flawed computer systems. It works like a burglar alarm that goes off if someone tampers with or manages to get past other security mechanisms such as authentication mechanisms and firewalls. An Intrusion Detection System (IDS is a device or a software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station.Intrusion Detection System (IDS has been used as a vital instrument in defending the network from this malicious or abnormal activity..In this paper we are comparing host based and network based IDS and various types of attacks possible on IDS.

  1. An Adaptive Clustering Algorithm for Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    QIU Juli

    2007-01-01

    In this paper,we introduce an adaptive clustering algorithm for intrusion detection based on wavecluster which was introduced by Gholamhosein in 1999 and used with success in image processing.Because of the non-stationary characteristic of network traffic,we extend and develop an adaptive wavecluster algorithm for intrusion detection.Using the multiresolution property of wavelet transforms,we can effectively identify arbitrarily shaped clusters at different scales and degrees of detail,moreover,applying wavelet transform removes the noise from the original feature space and make more accurate cluster found.Experimental results on KDD-99 intrusion detection dataset show the efficiency and accuracy of this algorithm.A detection rate above 96% and a false alarm rate below 3% are achieved.

  2. An Overview on Intrusion Detection in Manet

    Directory of Open Access Journals (Sweden)

    Rajesh D. Wagh

    2015-05-01

    Full Text Available A mobile ad hoc network (MANET is a self-configuring of mobile devices network connected without wires and hence MANET has become a very popular technology now days. A MANETS are the networks that are building, when some mobile nodes come in the mobility range of each other for data transfer and communication. In MANET, nodes are not stable hence the communication topology is not stable due to this vulnerable for attacks. MANET devices are connected via wireless links without using an existing network infrastructure or centralized administration due to which MANETs are not able to diverse types of attacks and intrusions. Hence intrusion detection has attracted many researchers. This paper gives an overview and different methods to detect intrusion in MANET.

  3. An overview to Software Architecture in Intrusion Detection System

    CERN Document Server

    Bahrami, Mehdi

    2012-01-01

    Network intrusion detection systems provide proactive defense against security threats by detecting and blocking attack-related traffic. This task can be highly complex, and therefore, software based network intrusion detection systems have difficulty in handling high speed links. This paper reviews of many type of software architecture in intrusion detection systems and describes the design and implementation of a high-performance network intrusion detection system that combines the use of software-based network intrusion detection sensors and a network processor board. The network processor acts as a customized load balancing splitter that cooperates with a set of modified content-based network intrusion detection sensors in processing network traffic.

  4. Effective analysis of cloud based intrusion detection system

    Directory of Open Access Journals (Sweden)

    Sanjay Ram

    2012-08-01

    Full Text Available The goal of IDS is to analyze events on the network and identify attacks. The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS. People are paid more attention on intrusion detection which as an important computer network security technology. According to the development trend of intrusion detection, detecting all kinds of intrusions effectively requires a global view of the monitored network, Here, discuss about new intrusion detection mechanism based on cloud computing, which can make up for the deficiency of traditional intrusion detection, and proved to be great scalable.

  5. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  6. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  7. Adaptive Genetic Algorithm Model for Intrusion Detection

    Directory of Open Access Journals (Sweden)

    K. S. Anil Kumar

    2012-09-01

    Full Text Available Intrusion detection systems are intelligent systems designed to identify and prevent the misuse of computer networks and systems. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffective. Thus the emerging network security systems need be part of the life system and this ispossible only by embedding knowledge into the network. The Adaptive Genetic Algorithm Model - IDS comprising of K-Means clustering Algorithm, Genetic Algorithm and Neural Network techniques. Thetechnique is tested using multitude of background knowledge sets in DARPA network traffic datasets.

  8. Intrusion Detection Using Cost-Sensitive Classification

    CERN Document Server

    Mitrokotsa, Aikaterini; Douligeris, Christos

    2008-01-01

    Intrusion Detection is an invaluable part of computer networks defense. An important consideration is the fact that raising false alarms carries a significantly lower cost than not detecting at- tacks. For this reason, we examine how cost-sensitive classification methods can be used in Intrusion Detection systems. The performance of the approach is evaluated under different experimental conditions, cost matrices and different classification models, in terms of expected cost, as well as detection and false alarm rates. We find that even under unfavourable conditions, cost-sensitive classification can improve performance significantly, if only slightly.

  9. Design of Secure Distributed Intrusion Detection Systems

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Intrusion Detection System (IDS) have received a great deal of attention because of their excellent ability of preventing network incidents. Recently, many efficient approaches have been proposed to improve detection ability of IDS. While the self-protection ability of IDS is relatively worse and easy to be exploited by attackers, this paper gives a scheme of Securely Distributed Intrusion Detection System (SDIDS). This system adopts special measurements to enforce the security of IDS components. A new secure mechanism combining role-based access control and attribute certificate is used to resist attack to communication.

  10. Intrusion Detection Approach Using Connectionist Expert System

    Institute of Scientific and Technical Information of China (English)

    MA Rui; LIU Yu-shu; DU Yan-hui

    2005-01-01

    In order to improve the detection efficiency of rule-based expert systems, an intrusion detection approach using connectionist expert system is proposed. The approach converts the AND/OR nodes into the corresponding neurons, adopts the three-layered feed forward network with full interconnection between layers,translates the feature values into the continuous values belong to the interval [0, 1 ], shows the confidence degree about intrusion detection rules using the weight values of the neural networks and makes uncertain inference with sigmoid function. Compared with the rule-based expert system, the neural network expert system improves the inference efficiency.

  11. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  12. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  13. Emplacement Ages and Geochemical Characteristics of Grabbroic Intrusions and Prospecting Orientation of Related Deposit in Luodian, Guizhou Province

    Institute of Scientific and Technical Information of China (English)

    FANG Weixuan; HU Ruizhong; SU Wenchao; XIAO Jiafei

    2008-01-01

    Emplacement ages, geochemical characteristics and analysis of continental dynamics ongabbroic intrusions in Luodian County, Guizhou Province, have been discussed based on studies ofisotopic chronology (the whole-rock Sm-Nd and Rb-Sr isochron methods), major elements, traceelements and PGE. Intrusive activities of the gabbroic intrusions in the study area took place during theLate Yanshanian Orogenic Movement (the Cretaceous Period), as indicated by the Sm-Nd isochronages (t)=(99.6±4.5) (2σ) Ma and by the Rb-Sr isochron ages t=(97±1.6) (2o) Ma. The gabbroic intrusionsare attached to mafic rocks in cal-alkaline basaltic series. They occurred as dikes and might be formedunder an extensional background of the continent. Differentiation of their magmatic crystallizationresulted in obvious zonation of petrography. In the gabbroic intrusions of this study, large ion lithophileelements and LREE are enriched, and the chondrite-normalized REE distribution pattern is leftwardinclined without anomalies of δCe or δEu, and there are high concentrations of PGE and ratios of Pd/Ir(averaging 4.21). All of these imply that their source areas may be basaltic magma in the upper mantlewith high-level partial melting, derived from EMl-type enriched mantle. It is different from Emeishanbasalt, which may be related to the upper mantle at low-grade partial melting. Emplacementmechanism of the gabbroic intrusions in this study may suppose to be asthenosphere upheaving as anisolated hot wave in the presence of mantle fluid, resulting in basaltic magma intruded into thecontinental crust as a diapiric intrusion. Therefore, uplifting of faulting-block and extensionaldeformation could take place in the shallow part of the continental crust while vertical amassing andaccretion of magmatic materials in the deep part of the continental crust. These special processes couldsupposed to be a special background of continental dynamics for this large-scale epithermalmetaliogenic domain, such as Au

  14. Sulfide mineralization associated with arc magmatism in the Qilian Block, western China: zircon U-Pb age and Sr-Nd-Os-S isotope constraints from the Yulonggou and Yaqu gabbroic intrusions

    Science.gov (United States)

    Zhang, Zhao-Wei; Li, Wen-Yuan; Gao, Yong-Bao; Li, Chusi; Ripley, Edward M.; Kamo, Sandra

    2014-02-01

    The sulfide-bearing Yulonggou and Yaqu mafic intrusions are located in the southern margin of the Qilian Block, Qinghai Province, western China. They are small dike-like bodies mainly composed of gabbros and diorites. Disseminated sulfides (pyrrhotite, pentlandite, and chalcopyrite) are present as concordant lenses within the intrusions. Precise CA-ID-TIMS zircon U-Pb dating yields the crystallization ages of 443.39 ± 0.42 and 440.74 ± 0.33 Ma for the Yulonggou and Yaqu intrusions, respectively. Whole rock samples from both intrusions show light rare earth element (REE) enrichments relative to heavy REE and pronounced negative Nb-Ta anomalies relative to Th and La, which are consistent with the products of arc basaltic magmatism. The Yulonggou intrusion has negative ɛ Nd values from -5.7 to -7.7 and elevated (87Sr/86Sr) i ratios from 0.711 to 0.714. In contrast, the Yaqu intrusion has higher ɛ Nd values from -4.1 to +8.4 and lower (87Sr/86Sr) i ratios from 0.705 to 0.710. The δ34S values of sulfide separates from the Yulonggou and Yaqu deposits vary from 0.8 to 2.4 ‰ and from 2 to 4.3 ‰, respectively. The γ Os values of sulfide separates from the Yulonggou and Yaqu deposits vary between 80 and 123 and between 963 and 1,191, respectively. Higher γ Os values coupled with higher δ34S values for the Yaqu deposit relative to the Yulonggou deposit indicate that external sulfur played a bigger role in sulfide mineralization in the Yaqu intrusion than in the Yulonggou intrusion. Mixing calculations using Sr-Nd isotope data show that contamination with siliceous crustal materials is more pronounced in the Yulonggou intrusion (up to 20 wt%) than in the Yaqu intrusion (market condition due to small sizes and low Ni grades, which can be explained by late-stage sulfide saturation after extensive olivine fractional crystallization from the magmas. Based on these observations, we suggest a shift of focus for Ni exploration in the region from mafic/gabbroic intrusions

  15. An evaluation of the relative quality of dike pools for benthic macroinvertebrates in the Lower Missouri River, USA

    Science.gov (United States)

    Poulton, B.C.; Allert, A.L.

    2012-01-01

    A habitat-based aquatic macroinvertebrate study was initiated in the Lower Missouri River to evaluate relative quality and biological condition of dike pool habitats. Water-quality and sediment-quality parameters and macroinvertebrate assemblage structure were measured from depositional substrates at 18 sites. Sediment porewater was analysed for ammonia, sulphide, pH and oxidation-reduction potential. Whole sediments were analysed for particle-size distribution, organic carbon and contaminants. Field water-quality parameters were measured at subsurface and at the sediment-water interface. Pool area adjacent and downstream from each dike was estimated from aerial photography. Macroinvertebrate biotic condition scores were determined by integrating the following indicator response metrics: % of Ephemeroptera (mayflies), % of Oligochaeta worms, Shannon Diversity Index and total taxa richness. Regression models were developed for predicting macroinvertebrate scores based on individual water-quality and sediment-quality variables and a water/sediment-quality score that integrated all variables. Macroinvertebrate scores generated significant determination coefficients with dike pool area (R2=0.56), oxidation–reduction potential (R2=0.81) and water/sediment-quality score (R2=0.71). Dissolved oxygen saturation, oxidation-reduction potential and total ammonia in sediment porewater were most important in explaining variation in macroinvertebrate scores. The best two-variable regression models included dike pool size + the water/sediment-quality score (R2=0.84) and dike pool size + oxidation-reduction potential (R2=0.93). Results indicate that dike pool size and chemistry of sediments and overlying water can be used to evaluate dike pool quality and identify environmental conditions necessary for optimizing diversity and productivity of important aquatic macroinvertebrates. A combination of these variables could be utilized for measuring the success of habitat enhancement

  16. Data Mining Approaches for Intrusion Detection

    Science.gov (United States)

    2007-11-02

    In this paper we discuss our research in developing general and systematic methods for intrusion detection. The key ideas are to use data mining techniques...two general data mining algorithms that we have implemented: the association rules algorithm and the frequent episodes algorithm. These algorithms can

  17. Intrusion Detection System Visualization of Network Alerts

    Science.gov (United States)

    2010-07-01

    Intrusion Detection System Visualization of Network Alerts Dolores M. Zage and Wayne M. Zage Ball State University Final Report July 2010...contracts. Staff Wayne Zage, Director of the S2ERC and Professor, Department of Computer Science, Ball State University Dolores Zage, Research

  18. Chemical Observations of a Polar Vortex Intrusion

    Science.gov (United States)

    Schoeberl, M. R.; Kawa, S. R.; Douglass, A. R.; McGee, T. J.; Browell, E.; Waters, J.; Livesey, N.; Read, W.; Froidevaux, L.

    2006-01-01

    An intrusion of vortex edge air in D the interior of the Arctic polar vortex was observed on the January 31,2005 flight of the NASA DC-8 aircraft. This intrusion was identified as anomalously high values of ozone by the AROTAL and DIAL lidars. Our analysis shows that this intrusion formed when a blocking feature near Iceland collapsed, allowing edge air to sweep into the vortex interior. along the DC-8 flight track also shows the intrusion in both ozone and HNO3. Polar Stratospheric Clouds (PSCs) were observed by the DIAL lidar on the DC-8. The spatial variability of the PSCs can be explained using MLS HNO3 and H2O observations and meteorological analysis temperatures. We also estimate vortex denitrification using the relationship between N2O and HNO3. Reverse domain fill back trajectory calculations are used to focus on the features in the MLS data. The trajectory results improve the agreement between lidar measured ozone and MLS ozone and also improve the agreement between the HNO3 measurements PSC locations. The back trajectory calculations allow us to compute the local denitrification rate and reduction of HCl within the filament. We estimate a denitrification rate of about lO%/day after exposure to below PSC formation temperature. Analysis of Aura MLS observations made

  19. Root resorption after orthodontic intrusion and extrusion:.

    NARCIS (Netherlands)

    Han, G.; Huang, S.; Hoff, J.W. Von den; Zeng, X.; Kuijpers-Jagtman, A.M.

    2005-01-01

    The aim of this investigation was to compare root resorption in the same individual after application of continuous intrusive and extrusive forces. In nine patients (mean age 15.3 years), the maxillary first premolars were randomly intruded or extruded with a continuous force of 100 cN for eight wee

  20. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  1. How stratospheric are deep stratospheric intrusions?

    Science.gov (United States)

    Trickl, T.; Vogelmann, H.; Giehl, H.; Scheel, H.-E.; Sprenger, M.; Stohl, A.

    2014-09-01

    Preliminary attempts of quantifying the stratospheric ozone contribution in the observations at the Zugspitze summit (2962 m a.s.l.) next to Garmisch-Partenkirchen in the German Alps had yielded an approximate doubling of the stratospheric fraction of the Zugspitze ozone during the time period 1978 to 2004. These investigations had been based on data filtering by using low relative humidity (RH) and elevated 7Be as the criteria for selecting half-hour intervals of ozone data representative of stratospheric intrusion air. To quantify the residual stratospheric component in stratospherically influenced air masses, however, the mixing of tropospheric air into the stratospheric intrusion layers must be taken into account. In fact, the dewpoint mirror instrument at the Zugspitze summit station rarely registers RH values lower than 10% in stratospheric air intrusions. Since 2007 a programme of routine lidar sounding of ozone, water vapour and aerosol has been conducted in the Garmisch-Partenkirchen area. The lidar results demonstrate that the intrusion layers are drier by roughly one order of magnitude than indicated in the in situ measurements. Even in thin layers RH values clearly below 1% have frequently been observed. These thin, undiluted layers present an important challenge for atmospheric modelling. Although the ozone values never reach values typical of the lower-stratosphere it becomes, thus, obvious that, without strong wind shear or convective processes, mixing of stratospheric and tropospheric air must be very slow in most of the free troposphere. As a consequence, the analysis the Zugspitze data can be assumed to be more reliable than anticipated. Finally, the concentrations of Zugspitze carbon monoxide rarely drop inside intrusion layers and normally stay clearly above full stratospheric values. This indicates that most of the CO, and thus the intrusion air mass, originates in the shallow "mixing layer" around the thermal tropopause. The CO mixing ratio in

  2. How stratospheric are deep stratospheric intrusions?

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2014-06-01

    Full Text Available Preliminary attempts of quantifying the stratospheric ozone contribution in the observations at the Zugspitze summit (2962 m a.s.l. next to Garmisch-Partenkirchen in the German Alps had yielded an approximate doubling of the stratospheric fraction of the Zugspitze ozone during the time period 1978 and 2004. These investigations had been based on data filtering by using low relative humidity and elevated 7Be as the criteria for selecting half-hour intervals of ozone data representative of stratospheric intrusion air. For quantifying the residual stratospheric component in stratospherically influenced air masses, however, the mixing of tropospheric air into the stratospheric intrusion layers must be taken into account. In fact, the dew-point-mirror instrument at the Zugspitze summit station rarely registers relative humidity (RH values lower than 10% in stratospheric air intrusions. Since 2007 a programme of routine lidar sounding of ozone, water vapour and aerosol has been conducted in the Garmisch-Partenkirchen area. The lidar results demonstrate that the intrusion layers are dryer by roughly one order of magnitude than indicated in the in-situ measurements. Even in thin layers frequently RH values clearly below 1% have been observed. These thin, undiluted layers present an important challenge for atmospheric modelling. Although the ozone values never reach values typical of the lower-stratosphere it becomes, thus, obvious that, without strong wind shear or convective processes, mixing of stratospheric and tropospheric air must be very slow in most of the free troposphere. As a consequence, the analysis the Zugspitze data can be assumed to be more reliable than anticipated. Finally, the concentrations of Zugspitze carbon monoxide rarely drop inside intrusion layers and normally stay clearly above full stratospheric values. This indicates that most of the CO and, thus, the intrusion air mass originate in the shallow "mixing layer" around the

  3. How stratospheric are deep stratospheric intrusions?

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2014-09-01

    Full Text Available Preliminary attempts of quantifying the stratospheric ozone contribution in the observations at the Zugspitze summit (2962 m a.s.l. next to Garmisch-Partenkirchen in the German Alps had yielded an approximate doubling of the stratospheric fraction of the Zugspitze ozone during the time period 1978 to 2004. These investigations had been based on data filtering by using low relative humidity (RH and elevated 7Be as the criteria for selecting half-hour intervals of ozone data representative of stratospheric intrusion air. To quantify the residual stratospheric component in stratospherically influenced air masses, however, the mixing of tropospheric air into the stratospheric intrusion layers must be taken into account. In fact, the dewpoint mirror instrument at the Zugspitze summit station rarely registers RH values lower than 10% in stratospheric air intrusions. Since 2007 a programme of routine lidar sounding of ozone, water vapour and aerosol has been conducted in the Garmisch-Partenkirchen area. The lidar results demonstrate that the intrusion layers are drier by roughly one order of magnitude than indicated in the in situ measurements. Even in thin layers RH values clearly below 1% have frequently been observed. These thin, undiluted layers present an important challenge for atmospheric modelling. Although the ozone values never reach values typical of the lower-stratosphere it becomes, thus, obvious that, without strong wind shear or convective processes, mixing of stratospheric and tropospheric air must be very slow in most of the free troposphere. As a consequence, the analysis the Zugspitze data can be assumed to be more reliable than anticipated. Finally, the concentrations of Zugspitze carbon monoxide rarely drop inside intrusion layers and normally stay clearly above full stratospheric values. This indicates that most of the CO, and thus the intrusion air mass, originates in the shallow "mixing layer" around the thermal tropopause. The

  4. Dike construction on the north bank of the La Grande 1 project; Construction de la dique nord de l`amenagement La Grande 1

    Energy Technology Data Exchange (ETDEWEB)

    Massiera, M. [Moncton Univ., NB (Canada); Levay, J. [Societe d`Energie de la Baie James, Montreal, PQ (Canada)

    1995-08-01

    Sensitive marine clay, delta and river sand, and silt deposits necessitated the construction of a 2444 m long dike on the northern bank of the La Grande 1 (LG-1) power station in northern Quebec. Geological conditions at the LG-1 site and various stages of construction of the dike were described. Emphasis was placed on the construction techniques and foundation treatment. The dike was constructed with side berms in a depression to ensure stability. 14 figs.

  5. NADIR (Network Anomaly Detection and Intrusion Reporter): A prototype network intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; DuBois, D.H.; Stallings, C.A.

    1990-01-01

    The Network Anomaly Detection and Intrusion Reporter (NADIR) is an expert system which is intended to provide real-time security auditing for intrusion and misuse detection at Los Alamos National Laboratory's Integrated Computing Network (ICN). It is based on three basic assumptions: that statistical analysis of computer system and user activities may be used to characterize normal system and user behavior, and that given the resulting statistical profiles, behavior which deviates beyond certain bounds can be detected, that expert system techniques can be applied to security auditing and intrusion detection, and that successful intrusion detection may take place while monitoring a limited set of network activities such as user authentication and access control, file movement and storage, and job scheduling. NADIR has been developed to employ these basic concepts while monitoring the audited activities of more than 8000 ICN users.

  6. Simulation of network intrusion detection system with GPenSim

    OpenAIRE

    2011-01-01

    In recent years, network has penetrated into every aspect of our life with its rapid growth and popularization. More and more serious network security problems have occurred together with this process, especially network intrusion problem. It has seriously affected the normal use of network, so research of network intrusion detection has become one of the hottest research areas. This thesis simulated a network intrusion detection system based on particle filter to solve the network intrusion ...

  7. Towards Multi-Stage Intrusion Detection using IP Flow Records

    OpenAIRE

    Muhammad Fahad Umer; Muhammad Sher; Imran Khan

    2016-01-01

    Traditional network-based intrusion detection sys-tems using deep packet inspection are not feasible for modern high-speed networks due to slow processing and inability to read encrypted packet content. As an alternative to packet-based intrusion detection, researchers have focused on flow-based intrusion detection techniques. Flow-based intrusion detection systems analyze IP flow records for attack detection. IP flow records contain summarized traffic information. However, flow data is very ...

  8. Efficiency of Svm and Pca to Enhance Intrusion Detection System

    OpenAIRE

    Soukaena Hassan Hashem

    2013-01-01

    Intrusion detection system (IDS) is a system that gathers and analyzes information from various areas within a computer or a network to identify attacks made against these components. This research proposed an Intrusion Detection Model (IDM) for detection intrusion attempts, the proposal is a hybrid IDM because it considers both features of network packets and host features that are sensitive to most intrusions. The dataset used to build the hybrid IDM is the proposed HybD (Hybrid Dataset) da...

  9. Hydraulic properties of a model dike from coupled Bayesian and multi-criteria hydrogeophysical inversion

    Science.gov (United States)

    Huisman, J. A.; Rings, J.; Vrugt, J. A.; Sorg, J.; Vereecken, H.

    2010-01-01

    SummaryCoupled hydrogeophysical inversion aims to improve the use of geophysical data for hydrological model parameterization. Several numerical studies have illustrated the feasibility and advantages of a coupled approach. However, there is still a lack of studies that apply the coupled inversion approach to actual field data. In this paper, we test the feasibility of coupled hydrogeophysical inversion for determining the hydraulic properties of a model dike using measurements of electrical resistance tomography (ERT). Our analysis uses a two-dimensional (2D) finite element hydrological model (HYDRUS-2D) coupled to a 2.5D finite element electrical resistivity code (CRMOD), and includes explicit recognition of parameter uncertainty by using a Bayesian and multiple criteria framework with the DREAM and AMALGAM population based search algorithms. To benchmark our inversion results, soil hydraulic properties determined from ERT data are compared with those separately obtained from detailed in situ soil water content measurements using Time Domain Reflectometry (TDR). Our most important results are as follows. (1) TDR and ERT data theoretically contain sufficient information to resolve most of the soil hydraulic properties, (2) the DREAM-derived posterior distributions of the hydraulic parameters are quite similar when estimated separately using TDR and ERT measurements for model calibration, (3) among all parameters, the saturated hydraulic conductivity of the dike material is best constrained, (4) the saturation exponent of the petrophysical model is well defined, and matches independently measured values, (5) measured ERT data sufficiently constrain model predictions of water table dynamics within the model dike. This finding demonstrates an innate ability of ERT data to provide accurate hydrogeophysical parameterizations for flooding events, which is of particular relevance to dike management, and (6) the AMALGAM-derived Pareto front demonstrates trade-off in the

  10. Dike, ius o la libertad irrealizada. Sobre la abstracción del derecho en Hegel

    OpenAIRE

    Maureira, M. (Max)

    2015-01-01

    Hegel prácticamente no habla del derecho romano, sino del derecho abstracto: ¿por qué, pese a conocerlo, no lo menciona como tal? Aclararlo exige volver a lo que mienta el griego dike y el latino ius. Recién a partir de esto se advierte cómo es que, sobre esta base, y sobre lo que abre Kant, al convertir la libertad en principio supremo, Hegel construye su propia concepción del derecho, asentada en su comprensión del espíritu. When Hegel speaks about law in abstract, he hardly mentions Rom...

  11. A distributed fiber optic sensor system for dike monitoring using Brillouin optical frequency domain analysis

    Science.gov (United States)

    Nöther, Nils; Wosniok, Aleksander; Krebber, Katerina; Thiele, Elke

    2008-03-01

    We report on the development of a complete system for spatially resolved detection of critical soil displacement in river embankments. The system uses Brillouin frequency domain analysis (BOFDA) for distributed measurement of strain in silica optical fibers. Our development consists of the measurement unit, an adequate coating for the optical fibers and a technique to integrate the coated optical fibers into geotextiles as they are commonly used in dike construction. We present several laboratory and field tests that prove the capability of the system to detect areas of soil displacement as small as 2 meters. These are the first tests of truly distributed strain measurements on optical fibers embedded into geosynthetics.

  12. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  13. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  14. Episodic growth of a Late Cretaceous and Paleogene intrusive complex of pegmatitic leucogranite, Ruby Mountains core complex, Nevada, USA

    Science.gov (United States)

    Howard, K.A.; Wooden, J.L.; Barnes, C.G.; Premo, W.R.; Snoke, A.W.; Lee, S.-Y.

    2011-01-01

    Gneissic pegmatitic leucogranite forms a dominant component (>600 km3) of the midcrustal infrastructure of the Ruby Mountains-East Humboldt Range core complex (Nevada, USA), and was assembled and modified episodically into a batholithic volume by myriad small intrusions from ca. 92 to 29 Ma. This injection complex consists of deformed sheets and other bodies emplaced syntectonically into a stratigraphic framework of marble, calc-silicate rocks, quartzite, schist, and other granitoids. Bodies of pegmatitic granite coalesce around host-rock remnants, which preserve relict or ghost stratigraphy, thrusts, and fold nappes. Intrusion inflated but did not disrupt the host-rock structure. The pegmatitic granite increases proportionally downward from structurally high positions to the bottoms of 1-km-deep canyons where it constitutes 95%-100% of the rock. Zircon and monazite dated by U-Pb (sensitive high-resolution ion microprobe, SHRIMP) for this rock type cluster diffusely at ages near 92, 82(?), 69, 38, and 29 Ma, and indicate successive or rejuvenated igneous crystallization multiple times over long periods of the Late Cretaceous and the Paleogene. Initial partial melting of unexposed pelites may have generated granite forerunners, which were remobilized several times in partial melting events. Sources for the pegmatitic granite differed isotopically from sources of similar-aged interleaved equigranular granites. Dominant Late Cretaceous and fewer Paleogene ages recorded from some pegmatitic granite samples, and Paleogene-only ages from the two structurally deepest samples, together with varying zircon trace element contents, suggest several disparate ages of final emplacement or remobilization of various small bodies. Folded sills that merge with dikes that cut the same folds suggest that there may have been in situ partial remobilization. The pegmatitic granite intrusions represent prolonged and recurrent generation, assembly, and partial melting modification of a

  15. Reinforcement of Soft Foundation with Geotextile and Observation for Sea Dike Project of Zhapu Port

    Institute of Scientific and Technical Information of China (English)

    章香雅; 郑祖祯

    2003-01-01

    The design method of reinforcement of soft foundation with geotextile for the sea dike of the Zhapu Port is discussed in this paper. The prototype behaviours such as pore water pressure, settlement and so on were observed. The degree of consolidation is found out from observed pore water pressure and observed settlement respectively, then the strength increment of soil is calculated and compared with that obtained from vane shear tests. For the use of observed pore water pressure, the consolidation coefficient of soil is deduced approximately with a method named experimental exponential interpolation. The degree of consolidation of the ground is deduced theoretically from the dissipation of pore water pressure. Besides, the logarithmic curve and hyperbola are used to fit the observed time-settlement curve, and the degree of consolidation of soil is obtained according to the definition of the consolidation degree. After preliminary verification with observed prototype data, the method to reinforce the low dike with geotextile is considered to be simple and rational, and it can also reduce the construction cost.

  16. Abundance and distribution of ultramafic microbreccia in Moses Rock Dike: Quantitative application of AIS data

    Science.gov (United States)

    Mustard, John F.; Pieters, Carle M.

    1987-01-01

    Moses Rock dike is a Tertiary diatreme containing serpentinized ultramafic microbreccia (SUM). Field evidence indicates the SUM was emplaced first followed by breccias derived from the Permian strata exposed in the walls of the diatreme and finally by complex breccias containing basement and mantle derived rocks. SUM is found primarily dispersed throughout the matrix of the diatreme. Moses Rock dike was examined with Airborne Imaging Spectrometer (AIS) to map the distribution and excess of SUM in the matrix and to better understand the nature of the eruption which formed this explosive volcanic feature. AIS data was calibrated by dividing the suite of AIS data by data from an internal standard area and then multiplying this relative reflectance data by the absolute bidirectional reflectance of a selected sample from the standard area which was measured in the lab. From the calibrated AIS data the minerals serpentine, gypsum, and illite as well as desert varnish and the lithologies SUM and other sandstones were identified. SUM distribution and abundance in the matrix of the diatreme were examined in detail and two distinct styles of SUM dispersion were observed. The two styles are discussed in detail.

  17. Water Resources Research Program. Abatement of malodors at diked, dredged-material disposal sites. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Harrison, W.; Dravnieks, A.; Zussman, R.; Goltz, R.

    1976-06-01

    Samples of malodorous air and dredged material were collected at diked disposal sites at the following locations: Buffalo, NY; Milwaukee, WI; Mobile, AL; York Harbor, ME; Houston, TX; Detroit, MI; and Anacortes, WA; during the period July--October, 1975. Odorous compounds in the air samples were identified by gas chromatography/mass spectrometry, while the detection threshold, intensity, and character of the various odors were determined by experienced panelists using a dynamic, forced-choice-triangle olfactometer. Although significant problems with malodors were not observed beyond the disposal-area dikes during site visits, noteworthy odor episodes had occurred at some sites. An odor-abatement strategy is presented for handling the expected range of odor conditions at dredged-material disposal sites. Its aim is to reduce to an acceptable level the intensity of malodors in an affected community. The main steps in the strategy cover selection of the disposal site, site preparation, odor characterization of sediments to be dredged, malodor abatement during dredging and disposal operations, malodor abatement after filling of the disposal site, and the handling of malodor complaints.

  18. Estimation of Flow Resistance Due to Embankments and Spur Dikes during Floods

    Directory of Open Access Journals (Sweden)

    Shahid Ali

    2013-07-01

    Full Text Available Flow resistance is a key factor in predicting the river conveyance capacity and associated water levels. In addition to bed resistance, the obstacles (embankments, spur dikes etc. in the flood plain of a river contribute to the flow resistance. In particular the elevated parts are expected to play an important role. The objective of this study is to develop and parameterize an analytical model for the form drag due to such obstacles. An experimental study was carried out for validation purposes of the developed analytical model. The prototype weir-like structure (in the form of an embankment was modeled as a weir with various leeside slopes. Measurements for energy head losses were carried out for a range of discharges and downstream water levels covering submerged flow conditions. The energy head loss due to submerged dikes was modeled as an expansion loss form drag. The analytical form drag model was estimated using a one-dimensional momentum conservation equation which accounts for the energy loss associated with a deceleration of the flow in the leeside region of the sudden expansion. The predicted losses from the analytical model agreed well with the experimental results. The minor deviations observed could be attributed to downstream slope effects and non- uniform velocity distribution in expansion zone (recirculation region of an embankment.

  19. The Importance of Hydraulic Structures for Society: Quay Walls and Dikes in the Netherlands

    Directory of Open Access Journals (Sweden)

    de Gijt J.G.

    2015-12-01

    Full Text Available Since mankind exists, men have undertaken engineering activities to make their life more pleasant and secure. However this has not been an easy task, especially in the past. The knowledge of mathematics and physics to describe engineering problems became available only since 1400-1500. Nevertheless, great achievements have been made by man before that time, e.g. the pyramids in Egypt, the first sluice in China, the Borobudur temple in Indonesia, and the design and building activities of the Inca’s in South America. To illustrate this development, also the world economy, world ecology will be shortly mentioned. The structures that are briefly discussed in this paper are: soil and concrete dams for generating electricity, reservoirs for irrigation and drinking water, dikes, sluices, inland and sea, tunnels, and quay walls. This paper presents an overview of hydraulic structures in general with the emphasis on quay walls and dikes in the Netherlands. Examples of these structures will be discussed illustrating present state of the art and also with a view to the future. Conclusions and recommendations are given to enhance the knowledge of hydraulic structures.

  20. ISDTM:An Intrusion Signatures Description Temporal Model

    Institute of Scientific and Technical Information of China (English)

    OuYangMing-guang; ZhouYang-bo

    2003-01-01

    ISDTM, based on an augmented Allen's interval temporal logic (ITL) and first-order predicate calculus, is a formal temporal model for representing intrusion signatures.It is augmented with some real time extensions which enhance the expressivity. Intrusion scenarios usually are the set of events and system states, wherethe temporal sequence is their basic relation. Intrusion signatures description, therefore, is to represent such temporal relations in a sense. While representing these signatures, ISDTM decomposes the intrusion process into the sequence of events according to their relevant intervals, and then specifies network states in these Intervals. The uncertain intrusion signatures as well as basic temporal modes of events, which consist of the parallel mode,the sequential mode and the hybrid mode, can be succinctly and naturally represented in ISDTM. Mode chart is the visualization of intrusion signatures in ISDTM, which makes the formulas more readable. The intrusion signatures descriptions in ISDTM have advantages of compact construct, concise syntax, scalability and easy implementation.

  1. A Comprehensive Study in Data Mining Frameworks for Intrusion Detection

    Directory of Open Access Journals (Sweden)

    R.Venkatesan

    2012-12-01

    Full Text Available Intrusions are the activities that violate the security policy of system. Intrusion Detection is the process used to identify intrusions. Network security is to be considered as a major issue in recent years, since the computer network keeps on expanding every day. An Intrusion Detection System (IDS is a system for detecting intrusions and reporting to the authority or to the network administration. Data mining techniques have been successfully applied in many fields like Network Management, Education, Science, Business, Manufacturing, Process control, and Fraud Detection. Data Mining for IDS is the technique which can be used mainly to identify unknown attacks and to raise alarms when security violations are detected. The purpose of this survey paper is to describe the methods/ techniques which are being used for Intrusion Detection based on Data mining concepts and the designed frame works for the same. We are also going to review the related works for intrusion detection.

  2. Using Jquery with Snort to Visualize Intrusion

    Directory of Open Access Journals (Sweden)

    Alaa El - Din Riad

    2012-01-01

    Full Text Available The explosive growth of malicious activities on worldwide communication networks, such as the Internet, has highlighted the need for efficient intrusion detection systems. The efficiency of traditional intrusion detection systems is limited by their inability to effectively relay relevant information due to their lack of interactive / immersive technologies. Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human user. Authors have found that the representations can be quite effective at conveying the needed information and resolving the relationships extremely rapidly. To facilitate the creation of novel visualizations this paper presents a new framework that is designed with using data visualization technique by using Jquery Php for analysis and visualizes snort result data for user.

  3. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and/or...... crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... liquid immiscibility. Forty-eight whole rock samples from well-constrained stratigraphic levels in the intrusion were crushed, powdered and dissolved, followed by iron separation by ion chromatography. Purified solutions were analyzed by MC- ICPMS in high-resolution mode using the sample-std bracket...

  4. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  5. An immune based dynamic intrusion detection model

    Institute of Scientific and Technical Information of China (English)

    LI Tao

    2005-01-01

    With the dynamic description method for self and antigen, and the concept of dynamic immune tolerance for lymphocytes in network-security domain presented in this paper, a new immune based dynamic intrusion detection model (Idid) is proposed. In Idid, the dynamic models and the corresponding recursive equations of the lifecycle of mature lymphocytes, and the immune memory are built. Therefore, the problem of the dynamic description of self and nonself in computer immune systems is solved, and the defect of the low efficiency of mature lymphocyte generating in traditional computer immune systems is overcome. Simulations of this model are performed, and the comparison experiment results show that the proposed dynamic intrusion detection model has a better adaptability than the traditional methods.

  6. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and....../or liquid immiscibility. Forty-eight whole rock samples from well-constrained stratigraphic levels in the intrusion were crushed, powdered and dissolved, followed by iron separation by ion chromatography. Purified solutions were analyzed by MC- ICPMS in high-resolution mode using the sample-std bracket...

  7. A Survey on Intrusion Detection in MANETs.

    Science.gov (United States)

    BakeyaLakshmi, P.; Santhi, K.

    2012-10-01

    A mobile ad hoc network is an infrastructureless network that changes its links dynamically, which makes routing in MANET a difficult process. As Mobile Ad-Hoc Network (MANET) has become a very important technology, research concerning its security problem, especially, in intrusion detection has attracted many researchers. Feature selection methodology plays a vital role in the data analysis process. PCA is used to analyze the selected features. This is because, redundant and irrelevant features often reduce performance of the intrusion detection system. It performs better in increasing speed and predictive accuracy. This survey aims to select and analyze the network features using principal component analysis. While performing various experiments, normal and attack states are simulated and the results for the selected features are analyzed.

  8. Intrusion Detection in Wireless Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nadya El MOUSSAID

    2017-01-01

    Full Text Available The recent advances in electronic and robotics industry have enabled the manufacturing of sensors capable of measuring a set of application-oriented parameters and transmit them back to the base station for analysis purposes. These sensors are widely used in many applications including the healthcare systems forming though a Wireless Body Sensor Networks. The medical data must be highly secured and possible intrusion has to be fully detected to proceed with the prevention phase. In this paper, we propose a new intrusion superframe schema for 802.15.6 standard to detect the cloning attack. The results proved the efficiency of our technique in detecting this type of attack based on 802.15.6 parameters performances coupled with frequency switching at the radio model.

  9. Sensing Danger: Innate Immunology for Intrusion Detection

    CERN Document Server

    Uwe, Aickelin

    2008-01-01

    The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for a number of years for intrusion detection, unfortunately so far with little success. However, these previous systems were largely based on immunological theory from the 1970s and 1980s and over the last decade our understanding of immunological processes has vastly improved. In this paper we present two new immune inspired algorithms based on the latest immunological discoveries, such as the behaviour of Dendritic Cells. The resultant algorithms are applied to real world intrusion problems and show encouraging results. Overall, we believe there is a bright future for these next generation artificial immune algorithms.

  10. A Survey on VANET Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Mohammed ERRITALI

    2013-04-01

    Full Text Available In recent years, the security issues on Vehicular ad hoc networks (VANETs have become one of the primary concerns. The VANET is inherently very vulnerable to attacks than wired network because it is characterized by high mobility, shared wireless medium and the absence of centralized security services offered by dedicated equipment such as firewalls and authentication servers. Attackcountermeasures such as digital signature and encryption, can be used as the first line of defense for reducing the possibilities of attacks. However, these techniques have limited prevention in general, and they are designed for a set of known attacks. They are unlikely to avoid most recent attacks that are designed to circumvent existing security measures. For this reason, there is a need of second technique to “detect and notify” these newer attacks, i.e. “intrusion detection”. This article aims to present and classifycurrent techniques of Intrusion Detection System (IDS aware VANETs.

  11. Multilayer Statistical Intrusion Detection in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Noureddine Boudriga

    2008-12-01

    Full Text Available The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs. This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  12. A Review of Vapor Intrusion Models

    OpenAIRE

    Yao, Yijun; Suuberg, Eric M.

    2013-01-01

    A complete vapor intrusion (VI) model, describing vapor entry of volatile organic chemicals (VOCs) into buildings located on contaminated sites, generally consists of two main parts-one describing vapor transport in the soil and the other its entry into the building. Modeling the soil vapor transport part involves either analytically or numerically solving the equations of vapor advection and diffusion in the subsurface. Contaminant biodegradation must often also be included in this simulatio...

  13. THE UNITED METHOD FOR THE CALCULATION OF SEEPAGE CONTROL BY ADOPTING WEIGHTING SOIL LAYER ON THE BACK SIDE OF DIKE

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Constructing a weighting soil layer at the downstream toe of dike on layered ground is an effective measure to prevent the foundation from blowout failures. In this paper, a series of differential equations describing the seepage flow in layered dike foundation were established, and a united method combining analytic method with one-dimensional finite difference method was proposed for solving the equations. The case study shows that the results calculated by the united method are considerably identical to the computational results of Finite Element Method (FEM), and the united method is very simple and easy compared to the FEM.

  14. Artificial Intrusion Detection Techniques: A Survey

    Directory of Open Access Journals (Sweden)

    Ashutosh Gupta

    2014-08-01

    Full Text Available Networking has become the most integral part of our cyber society. Everyone wants to connect themselves with each other. With the advancement of network technology, we find this most vulnerable to breach and take information and once information reaches to the wrong hands it can do terrible things. During recent years, number of attacks on networks have been increased which drew the attention of many researchers on this field. There have been many researches on intrusion detection lately. Many methods have been devised which are really very useful but they can only detect the attacks which already took place. These methods will always fail whenever there is a foreign attack which is not famous or which is new to the networking world. In order to detect new intrusions in the network, researchers have devised artificial intelligence technique for Intrusion detection prevention system. In this paper we are going to cover what types evolutionary techniques have been devised and their significance and modification.

  15. A BOOSTING APPROACH FOR INTRUSION DETECTION

    Institute of Scientific and Technical Information of China (English)

    Zan Xin; Han Jiuqiang; Zhang Junjie; Zheng Qinghua; Han Chongzhao

    2007-01-01

    Intrusion detection can be essentially regarded as a classification problem,namely,distinguishing normal profiles from intrusive behaviors.This paper introduces boosting classification algorithm into the area of intrusion detection to learn attack signatures.Decision tree algorithm is used as simple base learner of boosting algorithm.Furthermore,this paper employs the Principle Component Analysis(PCA)approach,an effective data reduction approach,to extract the key attribute set from the original high-dimensional network traffic data.KDD CUP 99 data set is used in these exDeriments to demonstrate that boosting algorithm can greatly improve the clas.sification accuracy of weak learners by combining a number of simple"weak learners".In our experiments,the error rate of training phase of boosting algorithm is reduced from 30.2%to 8%after 10 iterations.Besides,this Daper also compares boosting algorithm with Support Vector Machine(SVM)algorithm and shows that the classification accuracy of boosting algorithm is little better than SVM algorithm's.However,the generalization ability of SVM algorithm is better than boosting algorithm.

  16. Intrusion Detection with Multi-Connected Representation

    Directory of Open Access Journals (Sweden)

    Abdelkader Khobzaoui

    2016-01-01

    Full Text Available Recently, considerable attention has been given to data mining techniques to improve the performance of intrusion detection systems (IDS. This has led to the application of various classification and clustering techniques for the purpose of intrusion detection. Most of them assume that behaviors, both normal and intrusions, are represented implicitly by connected classes. We state that such assumption isn't evident and is a source of the low detection rate and false alarm. This paper proposes a suitable method able to reach high detection rate and overcomes the disadvantages of conventional approaches which consider that behaviors must be closed to connected representation only. The main strategy of the proposed method is to segment sufficiently each behavior representation by connected subsets called natural classes which are used, with a suitable metric, as tools to build the expected classifier. The results show that the proposed model has many qualities compared to conventional models; especially regarding those have used DARPA data set for testing the effectiveness of their methods. The proposed model provides decreased rates both for false negative rates and for false positives.

  17. Intrusion detection using rough set classification

    Institute of Scientific and Technical Information of China (English)

    张连华; 张冠华; 郁郎; 张洁; 白英彩

    2004-01-01

    Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learning algorithm, is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of"IF-THEN" rules, which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set).

  18. Intrusion detection using rough set classification

    Institute of Scientific and Technical Information of China (English)

    张连华; 张冠华; 郁郎; 张洁; 白英彩

    2004-01-01

    Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modem learning algorithm,is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of"IF-THEN" rules,which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set).

  19. Intrusion detection using pattern recognition methods

    Science.gov (United States)

    Jiang, Nan; Yu, Li

    2007-09-01

    Today, cyber attacks such as worms, scanning, active attackers are pervasive in Internet. A number of security approaches are proposed to address this problem, among which the intrusion detection system (IDS) appears to be one of the major and most effective solutions for defending against malicious users. Essentially, intrusion detection problem can be generalized as a classification problem, whose goal is to distinguish normal behaviors and anomalies. There are many well-known pattern recognition algorithms for classification purpose. In this paper we describe the details of applying pattern recognition methods to the intrusion detection research field. Experimenting on the KDDCUP 99 data set, we first use information gain metric to reduce the dimensionality of the original feature space. Two supervised methods, the support vector machine as well as the multi-layer neural network have been tested and the results display high detection rate and low false alarm rate, which is promising for real world applications. In addition, three unsupervised methods, Single-Linkage, K-Means, and CLIQUE, are also implemented and evaluated in the paper. The low computational complexity reveals their application in initial data reduction process.

  20. Count out your intrusions: effects of verbal encoding on intrusive memories.

    Science.gov (United States)

    Krans, Julie; Naring, Gerard; Becker, Eni S

    2009-11-01

    Peri-traumatic information processing is thought to affect the development of intrusive trauma memories. This study aimed to replicate and improve the study by Holmes, Brewin, and Hennessy (2004, Exp. 3) on the role of peri-traumatic verbal processing in analogue traumatic intrusion development. Participants viewed an aversive film under one of three conditions: counting backwards in 3s ("verbal interference"), verbalising emotions and thoughts ("verbal enhancement"), or without an extra task. A dual-process account of PTSD would predict that verbal interference would increase intrusion frequency compared to no task, whereas verbal enhancement would lead to a decrease. In contrast, mainstream memory theory predicts a decrease in intrusion frequency from any concurrent task that diverts attention away from the trauma film. The main finding was that the verbal interference task led to a decrease in intrusive memories of the film compared to the other two conditions. This finding does not support a dual-process account of PTSD, but is in line with general theories of memory and attention.

  1. Construction of the Vinalhaven Intrusive Complex, Maine, USA: the Plutonic Record of Evolving Magma Chambers Affected by Multiple Episodes of Replenishment, Rejuvenation, Crystal Accumulation and Eruption

    Science.gov (United States)

    Wiebe, R. A.; Hawkins, D. P.

    2004-12-01

    Increasingly, the plutonic roots of volcanic systems can be shown to contain temporal records of events inferred from the study of volcanic rocks. The Vinalhaven intrusive complex preserves evidence for multiple episodes of silicic and mafic replenishments, rejuvenation of granite, and probable eruptive events over a nominal time-span of 1.7 Ma (Hawkins and Wiebe, this volume). The complex is about 12 km in diameter and consists mainly of cg granite, a thick section of arcuate, inward-dipping gabbro-diorite sheets in the southeastern half of the complex, and a circular core of fg granite. Field relations demonstrate that the base of the intrusion is along the southeastern margin of the complex, and the top is along the northwestern margin where it intrudes coeval volcanic rocks. Aphyric basaltic and granitic dikes fed this essentially bimodal intrusion. When basaltic dikes intersected a silicic chamber, basalt spread across a floor of silicic crystal mush to form gabbro-diorite sheets in granite. Several extensive layers of angular blocks of country rock occur within the mafic rocks. Granitic dikes and the fg granitic core of the complex have sharp to gradational contacts with cg granite, and, locally, both granites are intimately mixed and commingled. These relations indicate that new silicic injections mixed into partly crystallized resident magma. Several irregular bodies of porphyry (0.2 to 0.5 km in average dimension) intrude cg granite with sharp, gradational, or commingled contacts. The porphyry has 5 to 40% corroded phenocrysts, identical in composition to crystals in the granite, and a variably quenched matrix. Some of these bodies formed when late injections of basalt remelted largely solid portions of cg granite. New silicic input may have contributed to other porphyry bodies. The matrix probably quenched because of a sudden decrease in pressure, possibly due to eruption of magma from the chamber. The cg granite and inter-layered mafic rocks preserve a

  2. Natural foreshores as an alternative to traditional dike re-enforcements: a field pilot in the large shallow lake Markermeer, The Netherlands

    NARCIS (Netherlands)

    Penning, W.E.; Steetzel, H.J.; Santen, van R.; Fiselier, J.; Lange, de H.J.; Vuik, V.; Ouwerkerk, S.; Thiel de Vries, van J.S.M.

    2015-01-01

    Natural foreshores are shallow zones and beaches with a gradual slope and a (near-)natural vegetation that can be used
    as an additional protection against flooding by reducing the wave attack on existing dikes, or can even completely
    replace an existing dike system. In order to test the

  3. Generation, ascent and eruption of magma on the Moon: New insights into source depths, magma supply, intrusions and effusive/explosive eruptions (Part 2: Predicted emplacement processes and observations)

    Science.gov (United States)

    Head, James W.; Wilson, Lionel

    2017-02-01

    We utilize a theoretical analysis of the generation, ascent, intrusion and eruption of basaltic magma on the Moon to develop new insights into magma source depths, supply processes, transport and emplacement mechanisms via dike intrusions, and effusive and explosive eruptions. We make predictions about the intrusion and eruption processes and compare these with the range of observed styles of mare volcanism, and related features and deposits. Density contrasts between the bulk mantle and regions with a greater abundance of heat sources will cause larger heated regions to rise as buoyant melt-rich diapirs that generate partial melts that can undergo collection into magma source regions; diapirs rise to the base of the anorthositic crustal density trap (when the crust is thicker than the elastic lithosphere) or, later in history, to the base of the lithospheric rheological trap (when the thickening lithosphere exceeds the thickness of the crust). Residual diapiric buoyancy, and continued production and arrival of diapiric material, enhances melt volume and overpressurizes the source regions, producing sufficient stress to cause brittle deformation of the elastic part of the overlying lithosphere; a magma-filled crack initiates and propagates toward the surface as a convex upward, blade-shaped dike. The volume of magma released in a single event is likely to lie in the range 102 km3 to 103 km3, corresponding to dikes with widths of 40-100 m and both vertical and horizontal extents of 60-100 km, favoring eruption on the lunar nearside. Shallower magma sources produce dikes that are continuous from the source region to the surface, but deeper sources will propagate dikes that detach from the source region and ascend as discrete penny-shaped structures. As the Moon cools with time, the lithosphere thickens, source regions become less abundant, and rheological traps become increasingly deep; the state of stress in the lithosphere becomes increasingly contractional

  4. Frequency of intrusive luxation in deciduous teeth and its effects.

    Science.gov (United States)

    Carvalho, Vivian; Jacomo, Diana Ribeiro; Campos, Vera

    2010-08-01

    The aims of this study were three-fold: First, to determine the prevalence of partial and total intrusion of the primary anterior teeth. Second, to investigate the sequelae of total and partial intrusive luxation in the primary anterior teeth and in their successors and finally, to establish whether the sequelae on both deciduous and permanent teeth were related to the child's age at the time of the intrusion. Data collected from records of 169 boys and 138 girls, all between the ages of zero and 10 years, who were undergoing treatment during the period of March 1996 to December 2004. The sample was composed of 753 traumatized deciduous teeth, of which 221 presented intrusive luxation injury. Children with ages ranging from one to 4 years were the most affected with falls being the main cause of intrusion. Of all intruded teeth 128 (57.9%) were totally intruded and 93 (42.1%) partially. Pulp necrosis/premature loss and color change were the most frequent sequelae in both total and partial intrusions. Concerning permanent dentition, the most common disturbances were color change and/or enamel hypoplasia. Both types of intrusion caused eruption disturbance. Total intrusion was the most frequent type of intrusive luxation. There was no significant correlation between the child's age at the time of intrusion and the frequency of subsequent sequela on primary injured teeth (P = 0.035), between the age at the time of injury and the developmental disturbances on permanent teeth (P = 0.140).

  5. Petrogenesis of postcollisional magmatism at Scheelite Dome, Yukon, Canada: Evidence for a lithospheric mantle source for magmas associated with intrusion-related gold systems

    Science.gov (United States)

    Mair, John L.; Farmer, G. Lang; Groves, David I.; Hart, Craig J.R.; Goldfarb, Richard J.

    2011-01-01

    The type examples for the class of deposits termed intrusion-related gold systems occur in the Tombstone-Tungsten belt of Alaska and Yukon, on the eastern side of the Tintina gold province. In this part of the northern Cordillera, extensive mid-Cretaceous postcollisional plutonism took place following the accretion of exotic terranes to the continental margin. The most cratonward of the resulting plutonic belts comprises small isolated intrusive centers, with compositionally diverse, dominantly potassic rocks, as exemplified at Scheelite Dome, located in central Yukon. Similar to other spatially and temporally related intrusive centers, the Scheelite Dome intrusions are genetically associated with intrusion-related gold deposits. Intrusions have exceptional variability, ranging from volumetrically dominant clinopyroxene-bearing monzogranites, to calc-alkaline minettes and spessartites, with an intervening range of intermediate to felsic stocks and dikes, including leucominettes, quartz monzonites, quartz monzodiorites, and granodiorites. All rock types are potassic, are strongly enriched in LILEs and LREEs, and feature high LILE/HFSE ratios. Clinopyroxene is common to all rock types and ranges from salite in felsic rocks to high Mg augite and Cr-rich diopside in lamprophyres. Less common, calcic amphibole ranges from actinolitic hornblende to pargasite. The rocks have strongly radiogenic Sr (initial 87Sr/86Sr from 0.711-0.714) and Pb isotope ratios (206Pb/204Pb from 19.2-19.7), and negative initial εNd values (-8.06 to -11.26). Whole-rock major and trace element, radiogenic isotope, and mineralogical data suggest that the felsic to intermediate rocks were derived from mafic potassic magmas sourced from the lithospheric mantle via fractional crystallization and minor assimilation of metasedimentary crust. Mainly unmodified minettes and spessartites represent the most primitive and final phases emplaced. Metasomatic enrichments in the underlying lithospheric mantle

  6. Coping with the uncertainties in the climate change adaptation of river dikes using risk-aversion economic optimization

    NARCIS (Netherlands)

    Wang, L.; Van Gelder, P.H.A.J.M.; Vrijling, J.K.; Ranasinghe, R.W.M.R.J.B.; Maskey, S.

    2013-01-01

    To guarantee a safe flood defence in a changing environment, the adaptation to climate change needs to be considered in the design of river dikes. However, the large uncertainty in the projections of future climate leads to varied estimations of future flood probability. How to cope with the uncerta

  7. Coping with the uncertainties in the climate change adaptation of river dikes using risk-aversion economic optimization

    NARCIS (Netherlands)

    Wang, L.; Van Gelder, P.H.A.J.M.; Vrijling, J.K.; Ranasinghe, R.W.M.R.J.B.; Maskey, S.

    2013-01-01

    To guarantee a safe flood defence in a changing environment, the adaptation to climate change needs to be considered in the design of river dikes. However, the large uncertainty in the projections of future climate leads to varied estimations of future flood probability. How to cope with the

  8. Evidence of Gondwana early rifting process recorded by Resende-Ilha Grande Dike Swarm, southern Rio de Janeiro, Brazil

    Science.gov (United States)

    Guedes, Eliane; Heilbron, Monica; de Morisson Valeriano, Claudio; de Almeida, Julio César Horta; Szatmari, Peter

    2016-04-01

    Continental flood basalts and dike swarm have been related to continental breakup process through geological time. The Resende - Ilha Grande Dike swarm (RIGDS) located in the southeast Brazil, is related the Gondwana breakup and composed of dikes/sills intruded in Precambrian gneiss. The dikes have three distinguish orientations: NNW more inland; NS-NNE in the central segment and NE orientation in the coast line, consistent with Precambrian structural lineaments. The swarm comprises high-TiO2 tholeiitic basalts divided into three suites based on REE and Sr and Nd isotope data. The Resende and Volta Redonda suites present higher initial 87Sr/86Sr ratios between 0.7077 and 0.7065, while Angra dos Reis suite presents values of 0.7066 to 0.7057. Geochemical and isotopic data support the sub-continental lithospheric mantle (SCLM) as the main source for the high-TiO2 basalts. The suites heterogeneities are explained by different compositions of SCLM in accreted Precambrian terranes and/or different degree of partial melting and fractional. 40Ar/39Ar data indicate age interval between ca. 156 to 144 Ma for the swarm, older than the average for Gondwana breakup (ca. 130-120 Ma). The age interval places the RIGDS between the Karoo magmatism (181-178 Ma) and the Paraná-Etendeka magmatism (133-134 Ma) and indicates that extensional process affected the supercontinent prior the break-up.

  9. Manma—Fluid Transition and the Genesis of Pegmatite Dike No.3,Altay,Xinjiang,Northwest China

    Institute of Scientific and Technical Information of China (English)

    卢焕章; 王中刚; 等

    1997-01-01

    The physico-chemical conditions under which the pegmatite dyke No.3 was formed were discussed in the light of fluid-melt inclusion evidence.Our results lend support to the fractionation of hydrothermal solutions from magma,For the pegmatite dike No.3,the magmaderived hydrothermal solutions are dominated by NaCl+CO2+H2O.

  10. A Method for Determination of in Run-Up Front Velocities on Dikes in Oblique and Short-Crested Waves

    DEFF Research Database (Denmark)

    Andersen, Thomas Lykke; Nørgaard, Jørgen Harck; Burcharth, Hans F.

    2011-01-01

    This paper presents a physical model test study to improve description of run-up events on dikes in oblique long and short-crested waves in terms of flow depth, flow velocities and overtopping. The paper focus on the flow velocities and a new method is proposed for determining flow velocities...

  11. Uav Application in Coastal Environment, Example of the Oleron Island for Dunes and Dikes Survey

    Science.gov (United States)

    Guillot, B.; Pouget, F.

    2015-08-01

    The recent evolutions in civil UAV ease of use led the University of La Rochelle to conduct an UAV program around its own potential costal application. An application program involving La Rochelle University and the District of Oleron Island began in January 2015 and lasted through July of 2015. The aims were to choose 9 study areas and survey them during the winter season. The studies concerned surveying the dikes and coastal sand dunes of Oleron Island. During each flight, an action sport camera fixed on the UAV's brushless gimbal took a series of 150 pictures. After processing the photographs and using a 3D reconstruction plugin via Photoscan, we were able to export high-resolution ortho-imagery, DSM and 3D models. After applying GIS treatment to these images, volumetric evolutions between flights were revealed through a DDVM (Difference of Digital volumetric Model), in order to study sand movements on coastal sand dunes.

  12. UAV APPLICATION IN COASTAL ENVIRONMENT, EXAMPLE OF THE OLERON ISLAND FOR DUNES AND DIKES SURVEY

    Directory of Open Access Journals (Sweden)

    B. Guillot

    2015-08-01

    Full Text Available The recent evolutions in civil UAV ease of use led the University of La Rochelle to conduct an UAV program around its own potential costal application. An application program involving La Rochelle University and the District of Oleron Island began in January 2015 and lasted through July of 2015. The aims were to choose 9 study areas and survey them during the winter season. The studies concerned surveying the dikes and coastal sand dunes of Oleron Island. During each flight, an action sport camera fixed on the UAV’s brushless gimbal took a series of 150 pictures. After processing the photographs and using a 3D reconstruction plugin via Photoscan, we were able to export high-resolution ortho-imagery, DSM and 3D models. After applying GIS treatment to these images, volumetric evolutions between flights were revealed through a DDVM (Difference of Digital volumetric Model, in order to study sand movements on coastal sand dunes.

  13. Subcircular conduits and dikes offshore the Somma-Vesuvius volcano revealed by magnetic and seismic data

    Science.gov (United States)

    Paoletti, V.; Passaro, S.; Fedi, M.; Marino, C.; Tamburrino, S.; Ventura, G.

    2016-09-01

    We analyzed new magnetic, bathymetric, and seismic data acquired in the offshore sector of Somma-Vesuvius volcano (Italy). We detected a group of high-intensity, short wavelength magnetic anomalies corresponding to partly buried volcanic dome-like structures located by seismic data. The magnetic anomalies are aligned along a NW-SE strike that is the preferential orientation of an eruptive fracture of the pre-19 ka activity of Vesuvius. Three cones emplaced before the Last Glacial Maximum, whereas a fourth one emplaced after 19 ka suggesting a rejuvenation of the eruptive system offshore the volcano in historical times. We also identified a NE-SW elongated magnetic anomaly consistent with a dike-like body associated to an on-land tectonic structure that was active in recent times at Vesuvius. A delta-like area with diffuse low-intensity magnetic anomalies reflects the seaward fronts of lava flows that entered the sea mainly during the Middle Ages.

  14. [Energy value evaluation of dike-pond agro-ecological engineering modes].

    Science.gov (United States)

    Lu, Hongfang; Peng, Shaolin; Lan, Shengfang; Chen, Feipeng

    2003-10-01

    In this paper, energy value analysis and new energy index for sustainable development (EISD) were used to evaluate three different dike-pond agro-ecological engineering modes in Sanshui city of Pearl River Delta in system and subsystem levels. The result showed that mode III was the best in its sustainable development ability. The EISD of mode III was 58.3% and 29.7% higher than that of modes I and II. With a higher economic benefit and higher environmental loading, the planting subsystem had the lowest sustainability. Although the economic benefit of stock raising subsystem was not high, its indirect benefit was higher. With a higher economic benefit and a lower environmental loading, fishing subsystem had the highest sustainability.

  15. Rapid laccolith intrusion driven by explosive volcanic eruption

    Science.gov (United States)

    Castro, Jonathan M.; Cordonnier, Benoit; Schipper, C. Ian; Tuffen, Hugh; Baumann, Tobias S.; Feisel, Yves

    2016-11-01

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ~0.8 km3. Deformation and conduit flow models indicate laccolith depths of only ~20-200 m and overpressures (~1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  16. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  17. Multi-agent cooperative intrusion response in mobile adhoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Zou Futai; Jiang Xinghao; Li Jianhua

    2007-01-01

    The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermeasures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions. the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation.

  18. Melt evolution in felsic dikes inferred from the composition of gahnite in two new occurrences, Pala Chief and Elizabeth R composite dikes, California

    Science.gov (United States)

    Heimann, Adriana; Yonts, Jason A.; Wise, Michael A.

    2016-06-01

    We report the occurrence and composition of gahnite ([Zn,Fe,Mg,Mn]Al2O4) in aplites of the Pala Chief and Elizabeth R layered pegmatite-aplite dikes, Pala District, California, and the significance for felsic melt evolution. The aplite is characterized by alternating bands of white, fine-grained plagioclase + quartz + muscovite +/- black tourmaline and thin laminations defined by concentrations of reddish-brown garnet ("line rock"). Accessory gahnite occurs as extremely fine-grained (50-250 μm) green to bluish-green crystals. Gahnite compositions in both occurrences are similar and defined by end-member ranges Ghn83.5-90.9Hc8.7-15Spl0-1.4. Zinc contents in gahnite are high (36.7-39.5 wt.% ZnO for Pala Chief, 37.2-40.2 wt.% ZnO for Elizabeth R), the MgO and MnO contents are negligible (< 0.7 wt.%), and Fe is the main substitution present (< 6.9 wt.% FeO). Gahnite is chemically zoned and characterized by higher Zn (< 2 wt.% ZnO) and lower Fe, Mg, and Mn contents in rims compared to cores, which shows the substitution mechanism, and reflects fast growth during melt evolution via fractional crystallization followed by fast cooling. Compositional variations are greater within individual crystals than among crystals and between laminations, which indicate a homogeneous melt at the aplite scale. Compared with the composition of gahnite from pegmatites worldwide, the studied gahnite reflects a moderate degree of melt evolution. This study confirms the incompatible character of Zn in evolving pegmatite-aplite melts and shows the usefulness of gahnite as a petrogenetic indicator. Because gahnite is a resistant mineral, surficial findings of gahnite with very low Mg contents and Zn contents similar or higher than those measured here may indicate a source of granitic pegmatite-aplite.

  19. Network Intrusion Detection based on GMKL Algorithm

    Directory of Open Access Journals (Sweden)

    Li Yuxiang

    2013-06-01

    Full Text Available According to the 31th statistical reports of China Internet network information center (CNNIC, by the end of December 2012, the number of Chinese netizens has reached 564 million, and the scale of mobile Internet users also reached 420 million. But when the network brings great convenience to people's life, it also brings huge threat in the life of people. So through collecting and analyzing the information in the computer system or network we can detect any possible behaviors that can damage the availability, integrity and confidentiality of the computer resource, and make timely treatment to these behaviors which have important research significance to improve the operation environment of network and network service. At present, the Neural Network, Support Vector machine (SVM and Hidden Markov Model, Fuzzy inference and Genetic Algorithms are introduced into the research of network intrusion detection, trying to build a healthy and secure network operation environment. But most of these algorithms are based on the total sample and it also hypothesizes that the number of the sample is infinity. But in the field of network intrusion the collected data often cannot meet the above requirements. It often shows high latitudes, variability and small sample characteristics. For these data using traditional machine learning methods are hard to get ideal results. In view of this, this paper proposed a Generalized Multi-Kernel Learning method to applied to network intrusion detection. The Generalized Multi-Kernel Learning method can be well applied to large scale sample data, dimension complex, containing a large number of heterogeneous information and so on. The experimental results show that applying GMKL to network attack detection has high classification precision and low abnormal practical precision.

  20. Intelligent Intrusion Detection System Model Using Rough Neural Network

    Institute of Scientific and Technical Information of China (English)

    YAN Huai-zhi; HU Chang-zhen; TAN Hui-min

    2005-01-01

    A model of intelligent intrusion detection based on rough neural network (RNN), which combines the neural network and rough set, is presented. It works by capturing network packets to identify network intrusions or malicious attacks using RNN with sub-nets. The sub-net is constructed by detection-oriented signatures extracted using rough set theory to detect different intrusions. It is proved that RNN detection method has the merits of adaptive, high universality,high convergence speed, easy upgrading and management.

  1. Performance Assessment of Network Intrusion-Alert Prediction

    Science.gov (United States)

    2012-09-01

    personnel information, credit card information theft, etc. The focus has shifted to attacks that can cause significant damage. Intrusion detection...Maintaining access Miscellanous Reverse engineering RFID tools Table 3. BackTrack Intrusion-detection System/Intrusion-prevention System Penetration...high processing power. 22 Machine 1’s network interface card connected to the mirroring port on the first port of the Ethernet switch. Machine 2’s

  2. Petrography and mineral chemistry of wehrlites in contact zone of gabbro intrusions and mantle peridotites of the Naein ophiolite

    Directory of Open Access Journals (Sweden)

    Farhad Ghaseminejad

    2014-10-01

    Full Text Available Introduction Geological background Ophiolites have played a major role in our understanding of Earth’s processes ranging from seafloor spreading, melt evolution and magma transport in oceanic spreading centers, and hydrothermal alteration and mineralization of oceanic crust to collision tectonics, mountain building processes, and orogeny. They provide the essential structural, petrological, geochemical, and geochronological evidence to document the evolutionary history of ancient continental margins and ocean basin. Ophiolites include a peridotitic mantle sequence, generally characterized by high-temperature plastic deformation and residual chemistry, and a comagmatic crustal sequence (gabbros, diabase dikes, and submarine basalts, weakly or not deformed. According to this interpretation, ophiolites were allochthonous with respect to their country rocks. They were assembled during a primary accretion stage at an oceanic spreading center, and later tectonically emplaced on a continental margin or island arc (Dilek, 2003. The indigenous dikes of pyroxenites and gabbros that were injected into a melting peridotite, or intrusive dikes of pyroxenite and gabbro that injected when the peridotite was fresh and well below its solidus, are discussed in different ophiolite papers. Pyroxenite formation and contact of gabbro and mantle peridotite are discussed in different articles (Dilek, 2003. When a gabbro intrude a fresh mantle peridotite could not significantly react with it, but if intrusion occurs during the serpentinization, the gabbro will change to rodingite. Geological setting The Naein ophiolitic melanges comprise the following rock units: mantle peridotites (harzburgite, lherzolite, dunite, with associated chromitite, gabbro, pyroxenite, sheeted and swarm dikes, massive basalts, pillow lava, plagiogranite, radiolarian chert, glaubotruncana limestone, rodingite, listvenite, and metamorphic rocks (foliated amphibolitic dike, amphibolite, skarn

  3. Introduction to gravity currents and intrusions

    CERN Document Server

    Ungarish, Marius

    2009-01-01

    The whole book is well written in a clear and pedagogical general style. … the author has, in my opinion, produced the first comprehensive book entirely devoted to the modeling of gravity currents and intrusions. This book will be particularly useful to graduate and PhD students, as well as to academics and research engineers working in this field. It may be used as a self-consistent document to get a detailed idea of the state of knowledge about a given problem or a guide toward more specialized papers. It is rich with ideas regarding the direction in which further research is warranted. This

  4. Forensic Analysis of Windows Registry Against Intrusion

    Directory of Open Access Journals (Sweden)

    Haoyang Xie

    2012-03-01

    Full Text Available Windows Registry forensics is an important branch of computer and network forensics. Windows Registry is often considered as the heart of Windows Operating Systems because it contains allof the configuration setting of specific users, groups, hardware, software, and networks. Therefore, Windows Registry can be viewed as a gold mine of forensic evidences which could be used in courts. This paper introduces the basics of Windows Registry, describes its structure and its keys and subkeys thathave forensic values. This paper also discusses how the Windows Registry forensic keys can be applied in intrusion detection.

  5. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis, tracing sulfur compounds combined with ecosystem parameters we found different spatial, intraspecific and interspecific strategies to cope with sulfidic sediments. 1......) Tolerance, by elimination (eg. Zostera marina); where we found precipitation of sulfide as non-toxic elemental sulfur on the inner wall of the root lacunae. 2) Utilization (eg. Z. marina), where seagrasses detoxify and incorporate sulfides by active uptake and metabolize to sulfate, representing a non...

  6. Generation, ascent and eruption of magma on the Moon: New insights into source depths, magma supply, intrusions and effusive/explosive eruptions (Part 1: Theory)

    Science.gov (United States)

    Wilson, Lionel; Head, James W.

    2017-02-01

    zones deeper within the mantle. Thus magma accumulations at the base of the crust would have been able to intrude dikes part-way through the crust, but not able to feed eruptions to the surface; in order to be erupted, magma must have been extracted from deeper mantle sources, consistent with petrologic evidence. Buoyant dikes growing upward from deep mantle sources of partial melt can disconnect from their source regions and travel through the mantle as isolated bodies of melt that encounter and penetrate the crust-mantle density boundary. They adjust their lengths and internal pressure excesses so that the stress intensity at the lower tip is zero. The potential total vertical extent of the resulting melt body depends on the vertical extent of the source region from which it grew. For small source extents, the upper tip of the resulting dike crossing the crust-mantle boundary cannot reach the surface anywhere on the Moon and therefore can only form a dike intrusion; for larger source extents, the dike can reach the surface and erupt on the nearside but still cannot reach the surface on the farside; for even larger source extents, eruptions could occur on both the nearside and the farside. The paucity of farside eruptions therefore implies a restricted range of vertical extents of partial melt source region sizes, between ∼16 and ∼36 km. When eruptions can occur, the available pressure in excess of what is needed to support a static magma column to the surface gives the pressure gradient driving magma flow. The resulting typical turbulent magma rise speeds are ∼10 to a few tens of m s-1, dike widths are of order 100 m, and eruption rates from 1 to 10 km long fissure vents are of order 105 to 106 m3 s-1. Volume fluxes in lunar eruptions derived from lava flow thicknesses and surface slopes or rille lengths and depths are found to be of order 105 to 106 m3 s-1 for volume-limited lava flows and >104 to 105 m3 s-1 for sinuous rilles, with dikes widths of ∼50 m. The

  7. Geochronology and geochemistry of the high Mg dioritic dikes in Eastern Tianshan, NW China: Geochemical features, petrogenesis and tectonic implications

    Science.gov (United States)

    Li, Deng-Feng; Zhang, Li; Chen, Hua-Yong; Hollings, Pete; Cao, Ming-Jian; Fang, Jing; Wang, Cheng-Ming; Lu, Wan-Jian

    2016-01-01

    Zircon U-Pb ages of high Mg dioritic dikes in the Mesoproterozoic Kawabulake Group in the Eastern Tianshan area, NW China indicate that they were emplaced in the Early Carboniferous at 353-348 Ma. The dikes consist of medium-grained plagioclase and hornblende with minor clinopyroxene and trace quartz. They are characterized by intermediate SiO2 (60-62 wt.%), low TiO2 (0.63-0.71 wt.%), relatively high Al2O3 (15.1-15.8 wt.%) and MgO contents (3.45-4.15 wt.%) with Mg# generally higher than 56 (56-59). The geochemistry of the high Mg diorites suggest they were formed by similar magmatic processes to sanukitoid high Mg Andesites such as those of the Setouchi volcanic belt, Japan. Zircons from the high Mg dioritic dikes have εHf(t) values of -6.8 to +14.5. The dominantly positive values suggest a juvenile source, whereas the small number of negative values suggests mature components were also incorporated into the source. Similarly, the positive εNd(t) values (0 to +2.2) are interpreted to reflect a juvenile source whereas the negative values of (-5.2 to 0) suggest participation of old crustal rocks in the petrogenesis of the diorites. The variable εHf(t) and εNd(t) values suggest that the mature material was assimilated during magma ascent rather than in the mantle wedge which would result in more uniform values. Mass balance calculations suggest that the dioritic dikes were derived from sources composed of approximately 97% juvenile mantle-derived material and 3% sediment. Petrographic, elemental, and isotopic evidence suggest that the dioritic dikes were generated by partial melting of depleted mantle that migrated into the shallow crust where it assimilated older sedimentary rocks of the Mesoproterozoic Kawabulake Group.

  8. Geological and Geochemical Characteristics of Early Cretaceous Mafic Dikes in Northern Jiangxi Province, SE China and Their Geodynamic Implications

    Institute of Scientific and Technical Information of China (English)

    XIE Guiqing; HU Ruizhong; MAO Jingwen; LI Ruiling; CAO Jinjian; JIANG Guohao; QI Liang

    2005-01-01

    The development of Early Cretaceous mafic dikes in northern and southern Jiangxi allows an understanding of the geodynamic setting and characteristics of the mantle in southeast China in the Cretaceous. Geological and geochemical characteristics for the mafic dikes from the Wushan copper deposit and No. 640 uranium deposit are given in order to constrain the nature of source mantle, genesis and tectonic implications. According to the mineral composition,the mafic dikes in northern Jiangxi can be divided into spessartite and olive odinite types, which belong to slightly potassium-rich calc-alkaline lamprophyre characterized by enrichment in large ion lithophile elements (LILE) and light rare earth elements (LREE), large depletion in high strength field elements (HSFE) and with negative Nb, Ta and Ti anomalies, as well as 87Sr/86Sr ratios varying from 0.7055 to 0.7095 and 143Nd/144Nd ratios varying from 0.5119 to 0.5122.All features indicate that the magma responsible for the mafic dikes was derived mainly from metasomatic lithosphere mantle related to dehydration and/or upper crust melting during subduction. Differences in geochemical characteristics between the mafic dikes in northern Jiangxi and the Dajishan area, southern Jiangxi were also studied and they are attributed to differences in regional lithosphefic mantle components and/or magma emplacement depth. Combining geological and geochemical characteristics with regional geological history, we argue that southeast China was dominated by an extensional tectonic setting in the Early Cretaceous, and the nature of the mantle source area was related to enrichment induced by asthenosphere upwelling and infiltration of upper crust-derived fluids responding to Pacific Plate subduction.

  9. An Early Cretaceous paleomagnetic pole from Ponta Grossa dikes (Brazil): Implications for the South American Mesozoic apparent polar wander path

    Science.gov (United States)

    Bartolomeu Raposo, Maria Irene; Ernesto, Marcia

    1995-10-01

    Paleomagnetic results from the Early Cretaceous Ponta Grossa dike swarm are reported. These dikes crosscut sediments and basement rocks associated with the Ponta Grossa Arch, a tectonic feature in the eastern border of the Paleozoic-Mesozoic Paraná Basin. These dikes are vertical or subvertical and trend mainly NW and NE. Samples from 127 dikes were submitted to both alternating field and thermal demagnetizations; 121 of them yielded characteristic directions interpreted as original thermal remanent magnetizations. Both normal and reversed polarities as well as intermediate directions (6 dikes) are recorded. The paleomagnetic pole is located at 30.3°E, 82.4°S (N=115; α95=2.0° k=43.8). This pole along with the available paleomagnetic poles for the Paraná Basin volcanics (Serra Geral Formation), recalculated in this paper in the light of reported 40Ar/39Ar ages describe an apparent polar wander path segment corresponding to a clockwise rotation (~6.9°) of the South American plate. This movement is compatible with the initial phase of the South Atlantic opening with rifting progressing from south to north. However, the calculated plate velocity is higher than the predicted velocities reported so far based on oceanic floor magnetic anomalies. The new data reported in this paper allowed the calculation of a mean Early Cretaceous pole (60.3°E, 83.8°S N=7, α95=2.9°) which can be discriminated from the Middle-Late Jurassic (191.3°E, 86.2°S N=3, α95=7.8°) and Late Cretaceous (346.5°E, 84.1°S N=5, α95=4.9°) mean poles for South America, indicating a more complex movement of the continent than the simple east-west drift generally proposed.

  10. The role of diffusion-controlled oscillatory nucleation in the formation of line rock in pegmatite-aplite dikes

    Science.gov (United States)

    Webber, K.L.; Falster, A.U.; Simmons, W.B.; Foord, E.E.

    1997-01-01

    The George Ashley Block (GAB), located in the Pala Pegmatite District, San Diego County, California, is a composite pegmatite-aplite dike of 8 m thickness displaying striking mineralogical layering in the aphte portion of the dike, referred to as line rock. Rhythmic layering is characterized by garnet-rich bands alternating with albite-quartz-muscovite-rich bands. Cumulus textures are notably absent from the layered portion of the dike. Elongated quartz, megacrysts are oriented perpendicular to the garnet-rich layers and poikilitically include garnet, albite, and muscovite. Calculated crystal-free magma viscosity with 3% H2O is 106.2 Pa s and the calculated settling velocity for garnet is 0??51 cm/year. Conductive cooling calculations based on emplacement of a 650??C dike into 150?? C fractured gabbroic country rock at 1??5 kbar, and accounting for latent heat of crystallization, demonstrate that the line rock portion of the dike cools to 550?? C in about 1 year. Crystal size distribution studies also suggest very rapid nucleation and crystallization. Diffusion-controlled gel crystallization experiments yield textures virtually identical to those observed in the layered aplite, including rhythmic banding, colloform layering, and band discontinuities. Thus, observed textures and calculated magmatic parameters suggest that mineralogical layering in the GAB results from an in situ diffusion-controlled process of oscillatory nucleation and crystallization. We propose that any event that promotes strong undercooling has the potential to initiate rapid heterogeneous nucleation and oscillatory crystal growth, leading to the development of a layer of excluded components in front of the crystallization front, and the formation of line rock.

  11. Types of saltwater intrusion of the Changjiang Estuary

    Institute of Scientific and Technical Information of China (English)

    茅志昌; 沈焕庭; JamesT.Liu; D.Eisma

    2001-01-01

    The Changjiang Estuary is characterized by multi-order bifurcations, unsteady submerged sandbars, mid-channel sandbars, creeks and riffles. The following four types of saltwater intrusion are found: (1) direct intrusion from the sea; (2) intrusion during tidal flooding; (3) intrusion from tidal flats overflow; and (4) salt water coming upstream through other waterways. These result in a complicated temporal and spatial salinity distribution. A high chlorinity concentration zone exists from the Liuhekou to the Sidongkou along the South Branch. The salinity during neap tide or ordinary tide is higher than during spring tide.

  12. Characteristics of wake vortex generated by a Boeing 727 jet transport during two-segment and normal ILS approach flight paths

    Science.gov (United States)

    Kurkowski, R. L.; Barber, M. R.; Garodz, L. J.

    1976-01-01

    A series of flight tests was conducted to evaluate the vortex wake characteristics of a Boeing 727 (B727-200) aircraft during conventional and two-segment ILS approaches. Twelve flights of the B727, which was equipped with smoke generators for vortex marking, were flown and its vortex wake was intentionally encountered by a Lear Jet model 23 (LR-23) and a Piper Twin Comanche (PA-30). Location of the B727 vortex during landing approach was measured using a system of photo-theodolites. The tests showed that at a given separation distance there were no readily apparent differences in the upsets resulting from deliberate vortex encounters during the two types of approaches. Timed mappings of the position of the landing configuration vortices showed that they tended to descend approximately 91 m(300 ft) below the flight path of the B727. The flaps of the B727 have a dominant effect on the character of the trailed wake vortex. The clean wing produces a strong, concentrated vortex but as the flaps are lowered, the vortex system becomes more diffuse. Pilot opinion and roll acceleration data indicate that 4.5 n.mi. would be a minimum separation distance at which roll control of light aircraft (less than 5,670 kg (12,500 lb) could be maintained during parallel encounters of the B727's landing configuration wake. This minimum separation distance is generally in scale with results determined from previous tests of other aircraft using the small roll control criteria.

  13. Isotope-geochemical Nd-Sr evidence of Palaeoproterozoic plume magmatism in Fennoscandia and mantle-crust interaction on stages of layered intrusions formation

    Science.gov (United States)

    Serov, Pavel; Bayanova, Tamara; Kunakkuzin, Evgeniy; Steshenko, Ekaterina

    2016-04-01

    Palaeoproterozoic Fennoscandian layered intrusions belong to the pyroxenite-gabbronorite-anorthosite formation and spread on a vast area within the Baltic Shield. Based on isotope U-Pb, Sm-Nd, Rb-Sr and Re-Os data the duration of this formation can be to 100-130 Ma (2.53-2.40 Ga) [Serov et. al., 2008; Bayanova et. al., 2009]. We have studied rocks of layered PGE-bearing Fedorovo-Pansky, Monchetundra, Burakovsky, Olanga group intrusions and Penikat intrusion. According to recent and new complex Nd-Sr-REE data magma source of the vast majority of these intrusions was a mantle reservoir with unusual characteristics: negative values of ɛNd (from 0 to -4) and ISr = 0.702-0.706, flat spectra of REE (value of (La/Yb)N ~ 1.0-5.8) with positive Eu-anomalies [Bayanova et. al., 2009; Bayanova et. al., 2014]. However, the distribution of REE for ore-bearing gabbronorite intrusions Penikat (Sm-Nd age is 2426 ± 38 Ma [Ekimova et. al., 2011]) has a negative Eu-anomalies. This may be due to the formation of plagioclase and its removal from the magma chamber. One of the aims of isotope geochemical investigations is to establish the contribution of mantle components in the formation of layered intrusions rocks and the degrees of contamination of the magma source by crustal material. To calculate the proportion of mantle component model binary mixture was used [Jahn et. al., 2000]. As the mantle components we used data for CHUR: ɛNd = 0, [Nd] = 1.324 [Palm, O'Neil, 2003] and for crustal components were used host-rocks Nd-data. The proportion of mantle component for the studied intrusions was 77-99%. Also, data were obtained for the Monchetundra dike complex and amphibolized gabbro, for which the proportion of mantle material was 20-40%. For these rocks a significant crustal contamination is most likely. This process resulted in low values of ɛNd, a direct relationship between ɛNd and Nd concentration, and significant differences between the U-Pb and Sm-Nd model ages. A

  14. Advanced Trace Pattern For Computer Intrusion Discovery

    CERN Document Server

    Rahayu, S Siti; Shahrin, S; Zaki, M Mohd; Faizal, M A; Zaheera, Z A

    2010-01-01

    The number of crime committed based on the malware intrusion is never ending as the number of malware variants is growing tremendously and the usage of internet is expanding globally. Malicious codes easily obtained and use as one of weapon to gain their objective illegally. Hence, in this research, diverse logs from different OSI layer are explored to identify the traces left on the attacker and victim logs in order to establish worm trace pattern to defending against the attack and help revealing true attacker or victim. For the purpose of this paper, it focused on malware intrusion and traditional worm namely sasser worm variants. The concept of trace pattern is created by fusing the attacker's and victim's perspective. Therefore, the objective of this paper is to propose a general worm trace pattern for attacker's, victim's and multi-step (attacker/victim)'s by combining both perspectives. These three proposed worm trace patterns can be extended into research areas in alert correlation and computer forens...

  15. Characterizing and Improving Distributed Intrusion Detection Systems.

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, Steven A; Proebstel, Elliot P.

    2007-11-01

    Due to ever-increasing quantities of information traversing networks, network administrators are developing greater reliance upon statistically sampled packet information as the source for their intrusion detection systems (IDS). Our research is aimed at understanding IDS performance when statistical packet sampling is used. Using the Snort IDS and a variety of data sets, we compared IDS results when an entire data set is used to the results when a statistically sampled subset of the data set is used. Generally speaking, IDS performance with statistically sampled information was shown to drop considerably even under fairly high sampling rates (such as 1:5). Characterizing and Improving Distributed Intrusion Detection Systems4AcknowledgementsThe authors wish to extend our gratitude to Matt Bishop and Chen-Nee Chuah of UC Davis for their guidance and support on this work. Our thanks are also extended to Jianning Mai of UC Davis and Tao Ye of Sprint Advanced Technology Labs for their generous assistance.We would also like to acknowledge our dataset sources, CRAWDAD and CAIDA, without which this work would not have been possible. Support for OC48 data collection is provided by DARPA, NSF, DHS, Cisco and CAIDA members.

  16. A Bayesian Networks in Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    M. Mehdi

    2007-01-01

    Full Text Available Intrusion detection systems (IDSs have been widely used to overcome security threats in computer networks. Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behaviour which may result in a large number of false alarms caused by incorrect classification of events in current systems. We propose a new approach of an anomaly Intrusion detection system (IDS. It consists of building a reference behaviour model and the use of a Bayesian classification procedure associated to unsupervised learning algorithm to evaluate the deviation between current and reference behaviour. Continuous re-estimation of model parameters allows for real time operation. The use of recursive Log-likelihood and entropy estimation as a measure for monitoring model degradation related with behavior changes and the associated model update show that the accuracy of the event classification process is significantly improved using our proposed approach for reducing the missing-alarm.

  17. Research on the dry intrusion accompanying the low vortex precipitation

    Institute of Scientific and Technical Information of China (English)

    YAO; XiuPing; WU; GuoXiong; ZHAO; BingKe; YU; YuBin; YANG; GuiMing

    2007-01-01

    By employing the 6.7μm satellite vapor cloud images and NCEP/NCAR 1°×1° reanalysis datasets, the characteristics and mechanism of the dry intrusion, as well as its impacts on the low vortex precipitation at the Meiyu front are explored in this paper. It is found that the formation,development and maintenance of the low vortex precipitation at the Meiyu front are closely related to the evolution of the dry intrusion. The dry intrusion is characterized by high potential vorticity (PV), low humidity and cold air. The dry intrusion exhibits as an obvious dark zone on vapor cloud images, an area in which atmospheric relative humidity is lower than 60%. However, the features of the dry intrusion on the vapor images are clearer than that of the humidity field, for the former is the digital vapor cloud images with high temporal and spatial resolution, and it can be used to explore the finer characteristics of the development, evolution and supplement of the intrusion during the development of the low vortex. The dry intrusion impacts accompanying the low vortex precipitation at the Meiyu front come from all levels of the troposphere, with the strongest intrusion located at the upper troposphere. The dry and cold air intrudes the vicinity of the low vortex from the upper isentropic surface to the lower one, slanting east-ward from lower to higher level. The low vortex precipitation region is usually situated in front of the dry intrusion where the relative humidity gradient is higher. The research also reveals that the mechanism of the dry intrusion is that the high potential vorticity descends from the upper troposphere to the lower level, therefore, the dry intrusion can be used as an important index of the high PV forcing. To the west of the low vortex precipitation, the upper level northerlies descend across the isentropic surface, then the dry cold advection can trigger the instable development in the midlow troposphere. The dry intru-sion enhances the low vortex

  18. Change in the magnetic properties of bituminous coal intruded by an igneous dike, Dutch Creek Mine, Pitkin County, Colorado

    Science.gov (United States)

    Thorpe, A.N.; Senftle, F.E.; Finkelman, R.B.; Dulong, F.T.; Bostick, N.H.

    1998-01-01

    Magnetization measurements have been made on natural coke-coal samples collected at various distances from a felsic porphyry dike in a coal seam in Dutch Creek Mine, Colorado to help characterize the nature and distribution of the iron-bearing phases. The magnetization passes through a maximum at the coke-to-coal transition about 31 cm from the dike contact. The magnetic measurements support the geochemical data indicating that magmatic fluids along with a high-temperature gas pulse moved into the coal bed. Interaction of the magmatic fluids with the coal diminished the reducing power of the thermal gas pulse from the dike to a point about 24 cm into the coal. The hot reducing gas penetrated further and produced a high temperature (~400-525??C) zone (at about 31 cm) just ahead of the magmatic fluids. Metallic iron found in this zone is the principal cause of the observed high magnetization. Beyond this zone, the temperature was too low to alter the coal significantly.Magnetization measurements have been made on natural coke-coal samples collected at various distances from a felsic porphyry dike in a coal seam in Dutch Creek Mine, Colorado to help characterize the nature and distribution of the iron-bearing phases. The magnetization passes through a maximum at the coke-to-coal transition about 31 cm from the dike contact. The magnetic measurements support the geochemical data indicating that magmatic fluids along with a high-temperature gas pulse moved into the coal bed. Interaction of the magmatic fluids with the coal diminished the reducing power of the thermal gas pulse from the dike to a point about 24 cm into the coal. The hot reducing gas penetrated further and produced a high temperature (approximately 400-525 ??C) zone (at about 31 cm) just ahead of the magmatic fluids. Metallic iron found in this zone is the principal cause of the observed high magnetization. Beyond this zone, the temperature was too low to alter the coal significantly.

  19. The rheological behavior of fracture-filling cherts: example of Barite Valley dikes, Barberton Greenstone Belt, South Africa

    Directory of Open Access Journals (Sweden)

    M. Ledevin

    2014-05-01

    Full Text Available A 100 m-thick complex of near-vertical carbonaceous chert dikes marks the transition from the Mendon to Mapepe Formations (3260 Ma in the Barberton Greenstone Belt, South Africa. Fracturing was intense in this area, as shown by the profusion and width of the dikes (ca. 1 m on average and by the abundance of completely shattered rocks. The dike-and-sill organization of the fracture network and the upward narrowing of some of the large veins indicate that at least part of the fluid originated at depth and migrated upward in this hydrothermal plumbing system. Abundant angular fragments of silicified country rock are suspended and uniformly distributed within the larger dikes. Jigsaw-fit structures and confined bursting textures indicate that hydraulic fracturing was at the origin of the veins. The confinement of the dike system beneath an impact spherule bed suggests that the hydrothermal circulations were triggered by the impact and located at the external margin of a large crater. From the geometry of the dikes and the petrography of the cherts, we infer that the fluid that invaded the fractures was thixotropic. On one hand, the injection of black chert into extremely fine fractures is evidence for low viscosity at the time of injection; on the other hand, the lack of closure of larger veins and the suspension of large fragments in a chert matrix provide evidence of high viscosity soon thereafter. The inference is that the viscosity of the injected fluid increased from low to high as the fluid velocity decreased. Such rheological behavior is characteristic of media composed of solid and colloidal particles suspended in a liquid. The presence of abundant clay-sized, rounded particles of silica, carbonaceous matter and clay minerals, the high proportion of siliceous matrix and the capacity of colloidal silica to form cohesive 3-D networks through gelation, account for the viscosity increase and thixotropic behavior of the fluid that filled the

  20. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities.

  1. Salt intrusion study in Cochin estuary - Using empirical models

    Digital Repository Service at National Institute of Oceanography (India)

    Jacob, B.; Revichandran, C.; NaveenKumar, K.R.

    Intensive measurements of salt intrusion are taken at high and low waters during spring and neap tide for each month respectively from June 2007 to May 2008. Salt intrusion length at high water varied from 10 km in monsoon 2008 to more than 40 km...

  2. An improved unsupervised clustering-based intrusion detection method

    Science.gov (United States)

    Hai, Yong J.; Wu, Yu; Wang, Guo Y.

    2005-03-01

    Practical Intrusion Detection Systems (IDSs) based on data mining are facing two key problems, discovering intrusion knowledge from real-time network data, and automatically updating them when new intrusions appear. Most data mining algorithms work on labeled data. In order to set up basic data set for mining, huge volumes of network data need to be collected and labeled manually. In fact, it is rather difficult and impractical to label intrusions, which has been a big restrict for current IDSs and has led to limited ability of identifying all kinds of intrusion types. An improved unsupervised clustering-based intrusion model working on unlabeled training data is introduced. In this model, center of a cluster is defined and used as substitution of this cluster. Then all cluster centers are adopted to detect intrusions. Testing on data sets of KDDCUP"99, experimental results demonstrate that our method has good performance in detection rate. Furthermore, the incremental-learning method is adopted to detect those unknown-type intrusions and it decreases false positive rate.

  3. Specification Mining for Intrusion Detection in Networked Control Systems

    NARCIS (Netherlands)

    Caselli, Marco; Zambon, Emmanuele; Amann, Johanna; Sommer, Robin; Kargl, Frank

    2016-01-01

    This paper discusses a novel approach to specification-based intrusion detection in the field of networked control systems. Our approach reduces the substantial human effort required to deploy a specification-based intrusion detection system by automating the development of its specification rules.

  4. Soft-sensing, non-intrusive multiphase flow meter

    NARCIS (Netherlands)

    Wrobel, K.; Schiferli, W.

    2009-01-01

    For single phase flow meters more and better non-intrusive or even clamp-on meters become available. This allows for a wider use of meters and for easier flow control. As the demand for multiphase meters is increasing, the current aim is to develop a non-intrusive multiphase flow meter. The non-intr

  5. Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning

    Directory of Open Access Journals (Sweden)

    Indah Yulia Prafitaning Tiyas

    2014-06-01

    Full Text Available Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system. We need a reliable network security system that is resistant to a variety of attacks against the system. Therefore, Intrusion Detection System (IDS required to overcome the problems of intrusions. Many researches have been done on intrusion detection using classification methods. Classification methodshave high precision, but it takes efforts to determine an appropriate classification model to the classification problem. In this paper, we propose a new reinforced approach to detect intrusion with On-line Clustering using Reinforcement Learning. Reinforcement Learning is a new paradigm in machine learning which involves interaction with the environment.It works with reward and punishment mechanism to achieve solution. We apply the Reinforcement Learning to the intrusion detection problem with considering competitive learning using Pursuit Reinforcement Competitive Learning (PRCL. Based on the experimental result, PRCL can detect intrusions in real time with high accuracy (99.816% for DoS, 95.015% for Probe, 94.731% for R2L and 99.373% for U2R and high speed (44 ms.The proposed approach can help network administrators to detect intrusion, so the computer network security systembecome reliable. Keywords: Intrusion Detection System, On-Line Clustering, Reinforcement Learning, Unsupervised Learning.

  6. Existence, morphology and persistence of intrusions as a probe for lithosphere rheology

    Science.gov (United States)

    Massmeyer, Anna; Davaille, Anne; Di Giuseppe, Erika

    2013-04-01

    The development of intrusions in the lithosphere depends strongly on its rheology. Less viscous mushroom-shaped plumes or more viscous finger-shaped diapirs, depending on the viscosity ratio between the rising and the matrix materials, are known to migrate through ductile, quasi-newtonian lithosphere; while dikes fracture and propagate through a solid matrix. However, the lithosphere presents solid as well as viscous properties. To determine what happens in this complex case, we performed a combined study of laboratory experiments and numerical simulations on the development of thermal plumes in aqueous solutions of Carbopol, a polymer gel suspension forming a continuous network of micrometric sponges. This fluid is shear thinning and presents a yield-stress, whereby flow occurs only if the local stress exceeds a critical value ?0. Below this value, the fluid acts as an elastic solid. The rheological properties of the solutions can be systematically varied by varying the Carbopol concentration. Our experimental setup consists of a localized heat-source of constant power, placed in the center of a squared plexiglas tank. Two conditions must be fulfilled for an instability to develop and rise: 1) the Yield number 0 comparing the buoyancy-induced stress to the yield stress, should be greater than a critical value c ~ 6; and 2) the Bingham number Bi, comparing the yield stress to the viscous stresses, needs to be locally smaller than 1. Then, a plug flow develops inside the plume thermal anomaly, producing a rising finger-shape with strong shear zones confined along its edges. Moreover, the instability halts its ascent as soon as 0 1. Those finger-shaped diapirs show strong similarities with an off-axis diapir in Oman emplaced in a ridge context. This geological object, a few kilometers in diameter, presents strong shear localization along its edges. Our fluid dynamical analysis places constraints on the parameter range within which such an object may be emplaced. It

  7. The Arrangement of Dike Lines and the Choice of Dike Types in Rural Flood-control Works%农村防洪工程堤线布置与堤型选择

    Institute of Scientific and Technical Information of China (English)

    张文丽; 李宁; 王诗俊; 李经伟

    2012-01-01

    以某农村防洪工程为例,根据流域规划、工程现状、地形条件等因素,按照防洪标准,确定堤线布置形式。提出堤型方案,通过技术经济比较,确定合理堤型,即采用梯形断面均质土堤。%Taking a rural flood-control works as an example, combining the basin's plan, the present situation of projects and topo- graphical conditions, and according to the flood control standards, the dike line arrangement pattern is determined. The reasonable dike type is determined by the trapezoidal cross section isotropic earth embankment.

  8. 振孔切喷截渗墙技术在堤防消险加固中的应用%Application of vibrating hole cutting spraying intercepting seepage wall technique in dike damage prevention and dike reinforcement

    Institute of Scientific and Technical Information of China (English)

    王永明; 郝群; 张秀宏

    2001-01-01

    The paper introduced the application of the vibrating hole cutting spraying intercepting seepage wall technique in the urban dike damage prevention,dike reinforcement and intercepting seepage.The technical theory,engineering design,construction technique,quality check for the vibrating hole cutting spraying are discussed in this paper.%介绍振孔切喷截渗墙技术在城区堤防消险加固截渗工程中的应用。其中包括振孔切喷技术工艺原理、工程设计、施工工艺、质量检查方法等。

  9. Boron isotope method for study of seawater intrusion

    Institute of Scientific and Technical Information of China (English)

    肖应凯; 尹德忠; 刘卫国; 王庆忠; 魏海珍

    2001-01-01

    A distinct difference in boron isotopes between seawater and terrestrial water is emphasized by δ11B values reported for seawater and groundwater, with an average of 38.8‰ and in the range of -8.9‰ to 9.8‰, respectively. The isotopic composition of boron in groundwater can be used to quantify seawater intrusion and identify intrusion types, e.g. seawater or brine intrusions with different chemical and isotopic characteristics, by using the relation of δ11B and chloride concentration. The feasibility of utilizing boron isotope in groundwater for studying seawater intrusion in Laizhou Bay Region, China, is reported in this study, which shows that boron isotope is a useful and excellent tool for the study of seawater intrusion.

  10. Network Security using Linux Intrusion Detection System / IJORCS

    Directory of Open Access Journals (Sweden)

    Arul Anitha

    2011-12-01

    Full Text Available Attacks on the nation’s computer infrastructures are becoming an increasingly serious problem. Firewalls provide a certain amount of security, but can be fooled at times by attacks like IP spoofing and the so called authorized users. So an intelligent system that can detect attacks and intrusions is required. The tool GRANT (Global Real-time Analysis of Network Traffic being a Linux based Intrusion Detection System(LIDs, takes the advantage of the security of a Linux box and secures the other nodes in the perimeter of the network. It is capable of detecting intrusions and probes as and when they occur and capable of responding to “already” successful attacks, thus causing minimal or no damage to the entire network. For better performance, this Linux Intrusion Detection System should be part of a defense in depth strategy such as Firewall and Intrusion Prevention.

  11. Intrusive Thoughts Mediate the Association between Neuroticism and Cognitive Function.

    Science.gov (United States)

    Munoz, Elizabeth; Sliwinski, Martin J; Smyth, Joshua M; Almeida, David M; King, Heather A

    2013-11-01

    Although research has established a negative association between trait neuroticism and cognition, little is known about the mechanisms that underlie this relationship. We examined the tendency to experience intrusive thoughts and negative affect as potential mediators of the relationship between neuroticism and cognitive performance. We hypothesized that the tendency to experience intrusive thoughts reflects ineffective attentional control and would account for the relationship between neuroticism and cognitive performance over and above the mediating effect of negative affect. Three hundred seventeen adults (Mage =49.43) completed a series of attention-demanding cognitive tasks as well as self-report measures of intrusive thoughts, negative affect, and neuroticism. Intrusive thoughts mediated the association between trait neuroticism and cognitive performance beyond negative affect. These findings are consistent with the hypothesis that the tendency to experience intrusive thoughts is a mechanism through which trait neuroticism influences cognitive performance.

  12. Intrusion-Tolerant Based Survivable Model of Database System

    Institute of Scientific and Technical Information of China (English)

    ZHUJianming; WANGChao; MAJianfeng

    2005-01-01

    Survivability has become increasingly important with society's increased dependence of critical infrastructures on computers. Intrusiontolerant systems extend traditional secure systems to be able to survive or operate through attacks, thus it is an approach for achieving survivability. This paper proposes survivable model of database system based on intrusion-tolerant mechanisms. The model is built on three layers security architecture, to defense intrusion at the outer layer, to detect intrusion at the middle layer, and to tolerate intrusion at the inner layer. We utilize the techniques of both redundancy and diversity and threshold secret sharing schemes to implement the survivability of database and to protect confidential data from compromised servers in the presence of intrusions. Comparing with the existing schemes, our approach has realized the security and robustness for the key functions of a database system by using the integration security strategy and multiple security measures.

  13. Multi-core Processors based Network Intrusion Detection Method

    Directory of Open Access Journals (Sweden)

    Ziqian Wan

    2012-09-01

    Full Text Available It is becoming increasingly hard to build an intrusion detection system (IDS, because of the higher traffic throughput and the rising sophistication of attacking. Scale will be an important issue to address in the intrusion detection area. For hardware, tomorrow’s performance gains will come from multi-core architectures in which a number of CPU executes concurrently. We take the advantage of multi-core processors’ full power for intrusion detection in this work. We present an intrusion detection system based on the Snort open-source IDS that exploits the computational power of MIPS multi-core architecture to offload the costly pattern matching operations from the CPU, and thus increase the system’s processing throughput. A preliminary experiment demonstrates the potential of this system. The experiment results indicate that this method can be used effectively to speed up intrusion detection systems.

  14. Mapping the 3-D extent of the Northern Lobe of the Bushveld layered mafic intrusion from geophysical data

    Science.gov (United States)

    Finn, Carol A.; Bedrosian, Paul A.; Cole, Janine; Khoza, Tshepo David; Webb, Susan J.

    2015-01-01

    Geophysical models image the 3D geometry of the mafic portion of the Bushveld Complex north of the Thabazimbi-Murchison Lineament (TML), critical for understanding the origin of the world's largest layered mafic intrusion and platinum group element deposits. The combination of the gravity and magnetic data with recent seismic, MT, borehole and rock property measurements powerfully constrains the models. The intrusion north of the TML is generally shallowly buried (generally modeled area of ∼160 km × ∼125 km. The modeled thicknesses are not well constrained but vary from ∼12,000 m, averaging ∼4000 m. A feeder, suggested by a large modeled thickness (>10,000 m) and funnel shape, for Lower Zone magmas could have originated near the intersection of NS and NE trending TML faults under Mokopane. The TML has been thought to be the feeder zone for the entire Bushveld Complex but the identification of local feeders and/or dikes in the TML in the models is complicated by uncertainties on the syn- and post-Bushveld deformation history. However, modeled moderately thick high density material near the intersection of faults within the central and western TML may represent feeders for parts of the Bushveld Complex if deformation was minimal. The correspondence of flat, high resistivity and density regions reflect the sill-like geometry of the Bushveld Complex without evidence for feeders north of Mokopane. Magnetotelluric models indicate that the Transvaal sedimentary basin underlies much of the Bushveld Complex north of the TML, further than previously thought and important because the degree of reaction and assimilation of the Transvaal rocks with the mafic magmas resulted in a variety of mineralization zones.

  15. Coastal Marsh Monitoring for Persistent Saltwater Intrusion

    Science.gov (United States)

    Hall, Callie M.

    2008-01-01

    This viewgraph presentation reviews NASA's work on the project that supports the Gulf of Mexico Alliance (GOMA) Governors Action Plan to monitor the coastal wetlands for saltwater intrusion. The action items that relate to the task are: (1) Obtain information on projected relative sea level rise, subsidence, and storm vulnerability to help prioritize conservation projects, including restoration, enhancement, and acquisition, and (2) Develop and apply ecosystem models to forecast the habitat structure and succession following hurricane disturbance and changes in ecological functions and services that impact vital socio-economic aspects of coastal systems. The objectives of the program are to provide resource managers with remote sensing products that support ecosystem forecasting models requiring salinity and inundation data. Specifically, the proposed work supports the habitat-switching modules in the Coastal Louisiana Ecosystem Assessment and Restoration (CLEAR) model, which provides scientific evaluation for restoration management.

  16. Multimodal Evolution Approach to Multidimensional Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    Weng Guang'an; Yu Shengsheng; Zhou Jingli

    2006-01-01

    An artificial immunity based multimodal evolution algorithm is developed to generate detectors with variable coverage for multidimensional intrusion detection. In this algorithm, a proper fitness function is used to drive the detectors to fill in those detection holes close to self set or among self spheres, and genetic algorithm is adopted to reduce the negative effects that different distribution of self imposes on the detector generating process. The validity of the algorithm is tested with spherical and rectangular detectors,respectively, and experiments performed on two real data sets ( machine learning database and DAPRA99) indicate that the proposed algorithm can obtain good results on spherical detectors, and that its performances in detection rate, false alarm rate, stability, time cost, and adaptability to incomplete training set on spherical detectors are all better than on rectangular ones.

  17. Introduction To Intrusion Detection System Review

    Directory of Open Access Journals (Sweden)

    Rajni Tewatia

    2015-05-01

    Full Text Available Abstract Security of a network is always an important issue. With the continuously growing network the basic security such as firewall virus scanner is easily deceived by modern attackers who are experts in using software vulnerabilities to achieve their goals. For preventing such attacks we need even smarter security mechanism which act proactively and intelligently. Intrusion Detection System is the solution of such requirement. Many techniques have been used to implement IDS. These technique basically used in the detector part of IDS such as Neural Network Clustering Pattern Matching Rule Based Fuzzy Logic Genetic Algorithms and many more. To improve the performance of an IDS these approaches may be used in combination to build a hybrid IDS so that benefits of two o more approaches may be combined.

  18. PTAGIS - Development of Large PIT-Tag Antennas to Estimate Migration Timing and Survival for Adult Salmonids near Pile Dikes in the Columbia River Estuary

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — We continued research and development of a passive PIT-tag detection system along a pile dike in the estuary (rkm 70). Target fish for this system are returning...

  19. Discussion on Weed Integrated Removal Prevention of Dike Turf%关于堤身草皮杂草综合防除的探讨

    Institute of Scientific and Technical Information of China (English)

    金玉生

    2014-01-01

    堤身草皮的杂草防除是一项十分繁重的日常养护工作,杂草的清除效果直接影响堤容堤貌,关系堤防工程的景观效果。本文分析了堤身草皮杂草特点、除草方式,对全年度堤身草皮杂草综合防除进行规划并提出了相应的建议。%The weed removal of dike turf is very onerous routine maintenance work.Weed removal effect directly affects dike appearance , which is related to landscape effect of dike project.In this paper , the characteristics of weeds and weed control methods are analyzed .The whole-year dike turf weed integrated removal plan and corresponding suggestions are proposed.

  20. Reinforced dike seepage stability analysis for flood protection project in Quanshui town%巴江口水电站拦污清污系统设计

    Institute of Scientific and Technical Information of China (English)

    张明

    2014-01-01

    An introduction was made on the basic information of the flood protection project in Quanshui town. For the flood dike sections in need of reinforcement, earth filling is designed on the river side to thicken the old dike, de-crease the permeability with bank slope stability up to requirements. The author discussed the structural types and engineering geological conditions of thickening old dike by earth filling, and presented the calculation and analysis conducted to check seepage and sliding stability of the concerned dike section.%介绍了巴江口水电站拦污清污系统采用通仓式布置,孔口尺寸大的特点,分析了无障碍回转式清污机的结构及功能,并论述了该电站拦污清污的效果和效益。

  1. Detecting areal changes in tidal flats after sea dike construction using Landsat-TM images

    Indian Academy of Sciences (India)

    Moon Seong Kang; Sang June Im; Tae Il Jang; Seung Woo Park; Sang Min Kim

    2007-12-01

    The main objective of this study was to estimate changes in the area of tidal flats that occurred after sea dike construction on the western coast of South Korea using Landsat-TM images. Applying the ISODATA method of unsupervised classification for Landsat-TM images, the tidal flats were identified, and the resulting areas were quantified for each image. The area of tidal flats from a topographic map published in one year differs significantly from that shown in another, which appears to be attributable to the tide levels at the time of aerial photography. During the study period, the area of tidal flats, as estimated from Landsat-TM images, increased by 4.57 km2 per year in the study areas. The tidal flats in the inner sea of Chunsu Harbor area increased by 200m2 per zone, while the accumulation for a number of inner sea areas within Asan Harbor area occurred at over 50m2 per zone. The results of this research may serve as the basis of an environmentallyfriendly development plan for tidal flats.

  2. Evidence for Moho-lower crustal transition depth diking and rifting of the Sierra Nevada microplate

    Science.gov (United States)

    Smith, Kenneth D.; Kent, Graham M.; Seggern, David P.; Driscoll, Neal W.; Eisses, Amy

    2016-10-01

    Lithospheric rifting most often initiates in continental extensional settings where "breaking of a plate" may or may not progress to sea floor spreading. Generally, the strength of the lithosphere is greater than the tectonic forces required for rupture (i.e., the "tectonic force paradox"), and it has been proposed that rifting requires basaltic magmatism (e.g., dike emplacement) to reduce the strength and cause failure, except for the case of a thin lithosphere (structure, each striking N45°W and dipping 50°NE. A single event at 30 km depth that locates on the implied dipping feature between the two swarms is further evidence for a single Moho-transition depth structure. We propose that basaltic or fluid emplacement at or near Moho depths weakens the upper mantle lid, facilitating lithospheric rupture of the Sierra Microplate. Similar to the LT sequence, the SV event is also associated with increased upper crustal seismicity. An 27 October 2011, Mw 4.7 earthquake occurred directly above the deep SV sequence at the base of the upper crustal seismogenic zone ( 15 km depth).

  3. Rapakivi texture in porphyritic dikes within the Karavanke Granitic Massif (Slovenia

    Directory of Open Access Journals (Sweden)

    Giuliano Bellieni

    2002-01-01

    Full Text Available The northern Karavanke Granitic Massif straddles the Slovenian–Austrian border. The investigated area lies in northern Slovenia, and extends from the western Slovenian–Austrian border to the east for about 30 km, with a maximum width of 2 km. The massif exhibits a bimodal magmatic association comprising mainly syenogranite and syenite with contemporaneous gabbroic rocks. Rocks of intermediate composition are less abundant and show field, textural and chemical features suggesting that they have formed as a result of the interaction (mixing and mingling between felsic and mafic magmas. Plagioclasemantled alkali feldspars occur in dikes of porphyritic syenite, which cut larger bodies of gabbroic rocks. Field, mineralogical, petrographic and geochemical evidences suggest that the porphyritic syenite is a hybrid rock, formed by the interaction of mafic and felsic magmas. The formation of plagioclase-mantled alkali feldspar can be explained by the introduction of alkali feldspar from felsic, syenogranitic magma into more mafic magma, causing local undercooling in the portion of mafic magma surrounding the crystals. This resulted in the growth of cellular plagioclase, with quartz infilling, in a thermally and compositionally equilibrating system.

  4. 法律何以成为正义——从themis到dike

    Institute of Scientific and Technical Information of China (English)

    程志敏; 郑兴凤

    2012-01-01

    法律女神忒弥斯代表着西方最早的规范性思想,后来却逐渐为“正义”所取代.themis(法律)与dike(正义)本身有着深刻而密切的联系,由于都具有“审判”的涵义,二者逐渐合流,dike取代了themis而上升为社会生活的主导规范.在这个过程中,本来主要指“审判”的dike吸收了审判过程的“公正”要求,变成了一种伦理品质,即“正义”.dike继承并集成了themis的众多属性,其内涵从司法领域上升到伦理政治的高度,逐渐取代了神法themis.这充分证明,法律的本质就在于正义.

  5. Flood risk assessment in The Netherlands: a case study for dike ring South Holland.

    Science.gov (United States)

    Jonkman, Sebastiaan N; Kok, Matthijs; Vrijling, Johannes K

    2008-10-01

    Large parts of The Netherlands are below sea level. Therefore, it is important to have insight into the possible consequences and risks of flooding. In this article, an analysis of the risks due to flooding of the dike ring area South Holland in The Netherlands is presented. For different flood scenarios the potential number of fatalities is estimated. Results indicate that a flood event in this area can expose large and densely populated areas and result in hundreds to thousands of fatalities. Evacuation of South Holland before a coastal flood will be difficult due to the large amount of time required for evacuation and the limited time available. By combination with available information regarding the probability of occurrence of different flood scenarios, the flood risks have been quantified. The probability of death for a person in South Holland due to flooding, the so-called individual risk, is small. The probability of a flood disaster with many fatalities, the so-called societal risk, is relatively large in comparison with the societal risks in other sectors in The Netherlands, such as the chemical sector and aviation. The societal risk of flooding appears to be unacceptable according to some of the existing risk limits that have been proposed in literature. These results indicate the necessity of a further societal discussion on the acceptable level of flood risk in The Netherlands and the need for additional risk reducing measures.

  6. PIV experiment on flow characteristics between submerged double spur dikes%淹没双丁坝间水流结构特性PIV试验

    Institute of Scientific and Technical Information of China (English)

    刘易庄; 蒋昌波; 邓斌; 王刚

    2015-01-01

    为探讨淹没双丁坝对坝间水流的影响,采用粒子图像测速( PIV)系统对坝间水平面流场进行了测量,并对坝间水流结构进行了分析。结果表明:丁坝间距与丁坝长度的比值d/B( B为定值)对坝间漩涡中心位置、坝间回流区及涡量分布有着显著影响;d/B越大,坝间“漩涡”中心越接近坝头线;坝间回流区宽度随d/B增大而增大,零速度线基本呈线性关系且其斜率随d/B增大而减小,同时回流区流速也随之发生很大变化;上游丁坝头附近出现最大负涡量而在下游丁坝头附近出现最大正涡量。%In order to study the influence of submerged double spur dikes on the flow characteristics between them, this study measured the horizontal flow field within the area between the spur dikes using a particle image velocimetry ( PIV) system, and analyzed the flow characteristics between the spur dikes. Results show that the ratio of the gap between the double spur dikes to the dike length d/B ( B is a constant) has a significant impact on the location of the eddy’ s core between the spur dikes, the recirculation flow between the spur dikes, and the vorticity distribution around the heads of the spur dikes. When the value of d/B increases, the eddy’ s core is closer to the line connecting the tips of the spur dikes, and the width of the recirculation zone increases. The zero velocity line changes linearly in the streamwise direction, and its slope decreases with the increase of d/B. The velocity in the recirculation zone changes significantly with the value of d/B. The maximum negative vorticity occurs near the head of the upstream spur dike, while the maximum positive vorticity occurs near the head of the downstream spur dike.

  7. Blind Source Separation Model of Earth-Rock Junctions in Dike Engineering Based on Distributed Optical Fiber Sensing Technology

    Directory of Open Access Journals (Sweden)

    Huaizhi Su

    2015-01-01

    Full Text Available Distributed temperature sensing (DTS provides an important technology support for the earth-rock junctions of dike projects (ERJD, which are binding sites between culvert, gates, and pipes and dike body and dike foundation. In this study, a blind source separation model is used for the identification of leakages based on the temperature data of DTS in leakage monitoring of ERJD. First, a denoising method is established based on the temperature monitoring data of distributed optical fiber in ERJD by a wavelet packet signal decomposition technique. The temperature monitoring messages of fibers are combined response for leakages and other factors. Its character of unclear responding mechanism is very obvious. Thus, a blind source separation technology is finally selected. Then, the rule of temperature measurement data for optical fiber is analyzed and its temporal and spatial change process is also discussed. The realization method of the blind source separation model is explored by combining independent component analysis (ICA with principal component analysis (PCA. The practical test result in an example shows that the method could efficiently locate and identify the leakage location of ERJD. This paper is expected to be useful for further scientific research and efficient applications of distributed optical fiber sensing technology.

  8. LA-ICP-MS U-Pb Zircon Geochronology of Basic Dikes within Maxianshan Rock Group in the Central Qilian Orogenic Belt and Its Tectonic Implications

    Institute of Scientific and Technical Information of China (English)

    He Shiping; Wang Hongliang; Chen Junlu; Xu Xueyi; Zhang Hongfei; Ren Guangming; Yu Jiyuan

    2007-01-01

    A large number of basic dikes, which indicate an important tectonic-magmatic event in the eastern part of the Central Qilian (祁连) orogenic belt, were found from Maxianshan (马衔山) rock group, Yongjing (永靖) county, Gansu (甘肃) Province, China. According to the research on the characteristics of geology and petrology, the basic dike swarms, widely intruded in Maxianshan rock group,are divided into two phases by the authors. U-Pb isotope of zircons from the basic dikes above two phases is separately determined by LA-ICP-MS in the Key Laboratory of Continental Dynamics of Northwest University, China and the causes of formation of the zircons are studied using CL images.The formation age of the earlier phase of metagabbro dikes is (441.1±1.4) Ma (corresponding to the early stage of Early Silurian), and the age of the main metamorphic period is (414.3±1.2) Ma (corresponding to the early stage of Early Devonian). The formation age of the later phase of diabase dike swarms is (434±1.0) Ma (corresponding to the late stage of Early Silurian). The cap- tured-zircons from diabase dike swarms saved some information of material interfusion by Maxianshan rock group (207pb/206Pb apparent ages are (2325±3)-(2573±6) Ma), and some zircons from diabase dike swarms also saved impacted information by tectonic thermal event during the late period of Caledonian movement (206pb/238U apparent ages are (400±2)-(429±2) Ma). By combining the results of the related studies, the basic dikes within Maxianshan rock group were considered to be formed in the transfer period, from subductional orogeny towards collisional orogeny, which represents geological records of NW-SE extension during regional NE-SW towards intense compression in the Central Qilian block.

  9. The role of stress during memory reactivation on intrusive memories.

    Science.gov (United States)

    Cheung, Jessica; Garber, Benjamin; Bryant, Richard A

    2015-09-01

    Intrusive memories are unwanted recollections that maintain distress in psychological disorders. Increasing evidence suggests that memories that are reactivated through retrieval become temporarily vulnerable to environmental or pharmacological manipulation, including changes in levels of circulating stress hormones. This study investigated the influence of stress during memory reactivation of an emotionally arousing trauma film on subsequent intrusive memories. Three groups of participants (N=63) viewed a trauma film depicting a serious car accident at baseline. Two days later (Time 2), one group received a reactivation induction following a socially evaluated cold pressor test (SECPT; Stress/Reactivation condition), whilst the second group reactivated the memory after a control procedure (Reactivation condition). A third group underwent the SECPT but was not asked to reactivate memory of the trauma film (Stress condition). Two days later (Time 3), all participants received a surprise cued memory recall test and intrusions questionnaire which they completed online. Results showed that those in the Stress/Reactivation group had higher intrusions scores than the other two groups, suggesting that acute stress promotes intrusive memories only when the memory trace is reactivated shortly afterwards. Increased cortisol predicted enhanced intrusive experiences in the Stress/Reactivation condition but not in the other conditions. This pattern of results suggests that acute stress during the reactivation of emotional material impacts on involuntary emotional memories. These findings suggest a possible explanation for the mechanism underlying the maintenance of intrusive memories in clinical disorders. Copyright © 2015 Elsevier Inc. All rights reserved.

  10. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  11. 忻城县都乐河防洪整治工程堤防设计%Dike design of Dule River Flood Protection Project in Xincheng County

    Institute of Scientific and Technical Information of China (English)

    黄宝君

    2014-01-01

    介绍了忻城县都乐河河道整治工程的基本情况,论述了都乐河防洪堤堤线布置的原则和方案。通过对草皮护面土堤、混凝土护面土堤和浆砌石3种堤型的安全、环保和投资情况比较后,推荐草皮护面土堤作为实施方案,并探讨了防洪堤设计中应该注意的一些问题。%An introduction was made on the basic situation of Dule River Flood Protection Project in Xincheng County,based on which the author presented the layout principle and scheme of flood dike line. Three design schemes had been taken into consideration,including herbaceous cover soil dike,concrete cover soil dike and ce-ment stone masonry dike. After three schemes were compared in respects of safety,environment protection and cost,herbaceous cover soil dike scheme was recommended. The author also discussed some issues in need of spe-cial attention during flood dike design.

  12. Experimental modelling of ground deformation associated with shallow magma intrusions

    Science.gov (United States)

    Galland, O.

    2012-04-01

    Active volcanoes experience ground deformation as a response to the dynamics of underground magmatic systems. The analysis of ground deformation patterns may provide important constraints on the dynamics and shape of the underlying volcanic plumbing systems. Nevertheless, these analyses usually take into account simplistic shapes (sphere, dykes, sills) and the results cannot be verified as the modelled systems are buried. In this contribution, I will present new results from experimental models of magma intrusion, in which both the evolution of ground deformation during intrusion and the shape of the underlying intrusion are monitored in 3D. The models consisted of a molten vegetable oil, simulating low viscosity magma, injected into cohesive fine-grained silica flour, simulating the brittle upper crust; oil injection resulted is sheet intrusions (dykes, sills and cone sheets). The initial topography in the models was flat. While the oil was intruding, the surface of the models slightly lifted up to form a smooth relief, which was mapped through time. After an initial symmetrical development, the uplifted area developed asymmetrically; at the end of the experiments, the oil always erupted at the steepest edge of the uplifted area. After the experiment, the oil solidified, the intrusion was excavated and the shape of its top surface mapped. The comparison between the uplifted zone and the underlying intrusions showed that (1) the complex shapes of the uplifted areas reflected the complex shapes of the underlying intrusions, (2) the time evolution of the uplifted zone was correlated with the evolution of the underlying intrusion, and (3) the early asymmetrical evolution of the uplifted areas can be used to predict the location of the eruption of the oil. The experimental results also suggest that complex intrusion shapes (inclined sheet, cone sheet, complex sill) may have to be considered more systematically in analyses of ground deformation patterns on volcanoes.

  13. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  14. Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Hichem Sedjelmaci

    2011-08-01

    Full Text Available Wireless sensor network (WSN is regularly deployed in unattended and hostile environments. The WSN isvulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the mostefficient security mechanisms to protect the network against malicious attacks or unauthorized access. In this paper, we propose a hybrid intrusion detection system for clustered WSN. Our intrusion framework uses a combination between the Anomaly Detection based on support vector machine (SVM and the Misuse Detection. Experiments results show that most of routing attacks can be detected with low falsealarm.

  15. Draped aeromagnetic survey in Transantarctic Mountains over the area of the Butcher Ridge igneous complex showing extent of underlying mafic intrusion

    Science.gov (United States)

    Behrendt, John C.; Damaske, D.; Finn, C.A.; Kyle, P.; Wilson, T.J.

    2002-01-01

    A draped aeromagnetic survey over the area surrounding the Butcher Ridge igneous complex (BRIC), Transantarctic Mountains, was acquired in 1997-1998 as part of a larger Transantarctic Mountains Aerogeophysical Research Activity survey. The BRIC is a sill-like hypoabyssal intrusion ranging in composition from tholeiitic basalt to rhyolite. An 40Ar/39 Ar age of 174 Ma and the chemical character of the basaltic rocks show the BRIC to be part of the widespread Jurassic Ferrar suite of continental tholeiitic rocks, that extends for 3500 km across Antarctica. The aeromagnetic survey shows a horseshoe-shaped pattern of anomalies reaching amplitudes as great as 1900 nT generally associated with the bedrock topography where it is exposed. It is apparent that the high-amplitude anomaly pattern is more extensive than the 10-km-long exposed outcrop, first crossed by a single 1990 aeromagnetic profile. The highest-amplitude anomalies appear south of the profile acquired in 1990 and extend out of the survey area. The new aeromagnetic data allow determination of the extent of the interpreted Butcher mafic(?) intrusion beneath exposures of Beacon sedimentary rock and ice in the area covered, as well as beneath the small BRIC exposure. The magnetic anomalies show a minimum area of 3000 km2, a much greater extent than previously inferred. Magnetic models indicate a minimum thickness of ???1-2 km for a horizontal intrusion. However, nonunique models with magnetic layers decreasing in apparent susceptibility with depth are consistent with of a 4- to 8-km-thick layered intrusion. These magnetic models indicate progressively deeper erosion of the interpreted mafic-layered body from the south to north. The erosion has removed more magnetic upper layers that mask the magnetic effects of the lower less magnetic layers. The probable minimum volume of the intrusion in the area of the survey is ???6000 km3. An alternate, but less likely, interpretation of a series of dikes can also fit the

  16. 丁坝对鱼类栖地的影响范围评估%Estimation of spur dike-affected fish habitat area

    Institute of Scientific and Technical Information of China (English)

    吴瑞贤; 陈嬿如; 葛奕良

    2012-01-01

    基于一维水理模式(HEC-RAS)和河川栖地二维模式(River 2D),以5%权重栖地可使用面积(weighted usable area,WUA)增减率判定筏子溪丁坝对台湾石鱼宾的影响范围,并结合近年台湾地区丁坝设置的相关文献,探讨丁坝对鱼群栖地的影响范围以及丁坝建置要素[如坝高、坝长(阻水率)、流量、河道平均坡降、单双丁坝]对其范围的影响.结果表明:丁坝对下游的影响范围皆远于上游,下游影响范围约为上游的2~6倍.上下游影响范围之比随坡降增加而下降、随丁坝阻水率及流量增加而增加,但流量趋近至10年重现期距时,上下游影响范围比趋于2.双丁坝配置较单丁坝配置有较优的WUA.%Based on the HEC-RAS and River 2D modes, and taking 5% change rate of weighted usable area (WUA) as the threshold to define the spur dike- affected area of target fish species Acrossocheilus paradoxus in Fazi River in Taiwan, this paper studied the affected area of the fish habitat by spur dike, and, in combining with the references about the installations of spur dikes in Taiwan in recent 10 years, analyzed the relative importance of related affecting factors such as dike height, dike length (water block rate) , average slope gradient of river way, single or double spur dike, and flow discharge. In spite of the length of the dike, the affected area in downstream was farther, and was about 2-6 times as large as that in upstream. The ratio of the affected area in downstream / upstream decreased with increasing slope gradient, but increased with increasing dike length and flow discharge. When the discharge was approximate to 10 years return periods, the ratio of the affected area would be close to a constant of 2. Building double spur dike would produce a better WUA than building single spur dike.

  17. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei

    2010-01-01

    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  18. KUROSHIO INTRUSION INTO THE SOUTH CHINA SEA

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qing-hua; FAN Hai-mei; QU Yuan-yuan

    2006-01-01

    In this article, the circulation of the South China Sea (SCS), which is idealized as the rectangular basin with constant depth, is studied under Kuroshio boundary forces. Starting from the linearly quasi-geostrophic vorticity equation, the solution of the SCS circulation is given in the form of corrected Fourier series under proper boundary conditions. The results show that the intruded current flows westward and separates into the northward branch and the southward branch before arriving at the western boundary. The southward branch flows out of the SCS through the southwestern passage, at the same time, the induced cyclonic (anti-clockwise) ring almost occupies the middle and southern parts, and concomitant anti-cyclonic (clockwise) vortex appears between the cyclone and the western boundary. While the northward branch outflows through the northeastern passage, the anti-cyclonic (clockwise) ring is triggered at the northern part of the SCS. The above two vortexes are both intensified if the south-entering and the north-leaving current loop intrusion are superposed. The outer flow of the northern vortex flows westward, then northward, and then eastward, and it is very similar to the configuration of the SCS Warm Current (SCSWC) at the northern part of the SCS, thus, a kind of generating mechanism of the SCSWC is presented.

  19. Intrusion Prevention/Intrusion Detection System (IPS/IDS for Wifi Networks

    Directory of Open Access Journals (Sweden)

    Michal Korcak

    2014-07-01

    Full Text Available The nature of wireless networks itself created new vulnerabilities that in the classical wired network s do not exist. This results in an evolutional requireme nt to implement new sophisticated security mechanis m in form of Intrusion Detection and Prevention Systems. This paper deals with security issues of small off ice and home office wireless networks. The goal of our work is to design and evaluate wireless IDPS with u se of packet injection method. Decrease of attacker’s traffic by 95% was observed when compared to attacker’s traffic without deployment of proposed I DPS system.

  20. Effectiveness of Intrusion Prevention Systems (IPS) in Fast Networks

    CERN Document Server

    Shafi, Muhammad Imran; Hayat, Sikandar; Sohail, Imran

    2010-01-01

    Computer systems are facing biggest threat in the form of malicious data which causing denial of service, information theft, financial and credibility loss etc. No defense technique has been proved successful in handling these threats. Intrusion Detection and Prevention Systems (IDPSs) being best of available solutions. These techniques are getting more and more attention. Although Intrusion Prevention Systems (IPSs) show a good level of success in detecting and preventing intrusion attempts to networks, they show a visible deficiency in their performance when they are employed on fast networks. In this paper we have presented a design including quantitative and qualitative methods to identify improvement areas in IPSs. Focus group is used for qualitative analysis and experiment is used for quantitative analysis. This paper also describes how to reduce the responding time for IPS when an intrusion occurs on network, and how can IPS be made to perform its tasks successfully without effecting network speed nega...

  1. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  2. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against obse

  3. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against

  4. SVM Intrusion Detection Model Based on Compressed Sampling

    Directory of Open Access Journals (Sweden)

    Shanxiong Chen

    2016-01-01

    Full Text Available Intrusion detection needs to deal with a large amount of data; particularly, the technology of network intrusion detection has to detect all of network data. Massive data processing is the bottleneck of network software and hardware equipment in intrusion detection. If we can reduce the data dimension in the stage of data sampling and directly obtain the feature information of network data, efficiency of detection can be improved greatly. In the paper, we present a SVM intrusion detection model based on compressive sampling. We use compressed sampling method in the compressed sensing theory to implement feature compression for network data flow so that we can gain refined sparse representation. After that SVM is used to classify the compression results. This method can realize detection of network anomaly behavior quickly without reducing the classification accuracy.

  5. Vapor Intrusion Facility Boundaries - Approximate Extent of Contamination

    Data.gov (United States)

    U.S. Environmental Protection Agency — Theses polygons represent the approximate extent of contamination for Vapor Intrusion facilities. Polygons for non-Federal Facility sites were updated in January,...

  6. An expert system application for network intrusion detection

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Dubois, D.H.; Stallings, C.A.

    1991-01-01

    The paper describes the design of a prototype intrusion detection system for the Los Alamos National Laboratory's Integrated Computing Network (ICN). The Network Anomaly Detection and Intrusion Reporter (NADIR) differs in one respect from most intrusion detection systems. It tries to address the intrusion detection problem on a network, as opposed to a single operating system. NADIR design intent was to copy and improve the audit record review activities normally done by security auditors. We wished to replace the manual review of audit logs with a near realtime expert system. NADIR compares network activity, as summarized in user profiles, against expert rules that define network security policy, improper or suspicious network activities, and normal network and user activity. When it detects deviant (anomalous) behavior, NADIR alerts operators in near realtime, and provides tools to aid in the investigation of the anomalous event. 15 refs., 2 figs.

  7. Tropical upper tropospheric humidity variations due to potential vorticity intrusions

    Science.gov (United States)

    Sandhya, M.; Sridharan, S.; Indira Devi, M.

    2015-09-01

    Four cases (March 2009, May 2009, April 2010 and February 2012) are presented in which the ERA-interim relative humidity (RH) shows consistent increase by more than 50 % in the upper troposphere (200-250 hPa) over tropics at the eastward side of the potential vorticity (PV) intrusion region. The increase in RH is confirmed with the spaceborne microwave limb sounder observations and radiosonde observations over Gadanki (13.5° N, 79.2° E) and is observed irrespective of whether the PV intrusions are accompanied by deep convection or not. It is demonstrated that the increase in RH is due to poleward advection induced by the PV intrusions in their eastward side at the upper tropospheric heights. It is suggested that the low-latitude convection, which is not necessarily triggered by the PV intrusion, might have transported water vapour to the upper tropospheric heights.

  8. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against obse

  9. Novel Non-Intrusive Vibration Monitoring System for Turbopumps Project

    Data.gov (United States)

    National Aeronautics and Space Administration — AI Signal Research, Inc. proposes to develop a Non-Intrusive Vibration Measurement System (NI-VMS) for turbopumps which will provide effective on-board/off-board...

  10. Novel Non-Intrusive Vibration Monitoring System for Turbopumps Project

    Data.gov (United States)

    National Aeronautics and Space Administration — ASRI proposes to develop an advanced and commercially viable Non-Intrusive Vibration Monitoring System (NI-VMS) which can provide effective on-line/off-line engine...

  11. Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection

    CERN Document Server

    Farid, Dewan Md; Rahman, Mohammad Zahidur; 10.5121/ijnsa.2010.2202

    2010-01-01

    In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesian classifier and decision tree is presented, which performs balance detections and keeps false positives at acceptable level for different types of network attacks, and eliminates redundant attributes as well as contradictory examples from training data that make the detection model complex. The proposed algorithm also addresses some difficulties of data mining such as handling continuous attribute, dealing with missing attribute values, and reducing noise in training data. Due to the large volumes of security audit data as well as the complex and dynamic properties of intrusion behaviours, several data miningbased intrusion detection techniques have been applied to network-based traffic data and host-based data in the last decades. However, there remain various issues needed to be examined towards current intrusion detection systems (IDS). We tested the performance of our proposed algorithm with existing learn...

  12. Environmental data processor of the adaptive intrusion data system

    Energy Technology Data Exchange (ETDEWEB)

    Rogers, M.S.

    1977-06-01

    A data acquisition system oriented specifically toward collection and processing of various meteorological and environmental parameters has been designed around a National Semiconductor IMP-16 microprocessor, This system, called the Environmental Data Processor (EDP), was developed specifically for use with the Adaptive Intrusion Data System (AIDS) in a perimeter intrusion alarm evaluation, although its design is sufficiently general to permit use elsewhere. This report describes in general detail the design of the EDP and its interaction with other AIDS components.

  13. A Subset Feature Elimination Mechanism for Intrusion Detection System

    OpenAIRE

    Herve Nkiama; Syed Zainudeen Mohd Said; Muhammad Saidu

    2016-01-01

    several studies have suggested that by selecting relevant features for intrusion detection system, it is possible to considerably improve the detection accuracy and performance of the detection engine. Nowadays with the emergence of new technologies such as Cloud Computing or Big Data, large amount of network traffic are generated and the intrusion detection system must dynamically collected and analyzed the data produce by the incoming traffic. However in a large dataset not all features con...

  14. Enhancing BATTLEMIND: Preventing PTSD by Coping with Intrusive Thoughts

    Science.gov (United States)

    2013-05-01

    replace it right away. This thought replacing skill is especially good to use late at night if you are having trouble sleeping . But, you will need to...then this is a good skill for you to practice with at home so that you can learn to be decent toward yourself. When you spend your time and energy...about intrusive thoughts ◦ CONTROL: traditional CBT skills for coping ◦ RESET: Mindfulness-based skills for coping Thoughts on intrusive thoughts

  15. Managing Temporal and Spatial Variability in Vapor Intrusion Data

    Science.gov (United States)

    2012-03-28

    Managing Temporal and Spatial Variability in Vapor Intrusion Data Todd McAlary, M.Sc., P.Eng., P.G. Geosyntec Consultants, Inc...TITLE AND SUBTITLE Managing Temporal and Spatial Variability in Vapor Intrusion Data 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...Koc (mL/g) OSWER indoor conc. at 10-6 risk (ppb) Vapour pressure (atm) Water solubility (g/l) 1,1,1-Trichloroethane 110 400

  16. Intrusion and extrusion of water in hydrophobic mesopores

    OpenAIRE

    Barrat, Jean-Louis; Lefevre, Benoit; Bocquet, Lyderic; Saugey, Anthony; Vigier, Gérard; Gobin, Pierre-François; Charlaix, Elisabeth

    2003-01-01

    We present experimental and theoretical results on intrusion-extrusion cycles of water in hydrophobic mesoporous materials, characterized by independent cylindrical pores. The intrusion, which takes place above the bulk saturation pressure, can be well described using a macroscopic capillary model. Once the material is saturated with water, extrusion takes place upon reduction of the externally applied pressure; Our results for the extrusion pressure can only be understood by assuming that th...

  17. Biochemical and Clinical Assessments of Segmental Maxillary Posterior Tooth Intrusion

    Science.gov (United States)

    Tasanapanont, Jintana; Wattanachai, Tanapan; Apisariyakul, Janya; Pothacharoen, Peraphan; Kongtawelert, Prachya; Midtbø, Marit

    2017-01-01

    Objective. To compare chondroitin sulphate (CS) levels around maxillary second premolars, first molars, and second molars between the unloaded and the loaded periods and to measure the rates of intrusion of maxillary posterior teeth during segmental posterior tooth intrusion. Materials and Methods. In this prospective clinical study, 105 teeth (from 15 patients exhibiting anterior open bite and requiring maxillary posterior tooth intrusion) were studied. Competitive ELISA was used to detect CS levels. Dental casts (during the unloaded and loaded periods) were scanned, and posterior tooth intrusion distances were measured. Results. During the unloaded period, the median CS levels around maxillary second premolars, first molars, second molars (experimental teeth), and mandibular first molars (negative control) were 0.006, 0.055, 0.056, and 0.012 and during the loaded period were 2.592, 5.738, 4.727, and 0.163 ng/μg of total protein, respectively. The median CS levels around experimental teeth were significantly elevated during the loaded period. The mean rates of maxillary second premolar and first and second molar intrusion were 0.72, 0.58, and 0.40 mm/12 weeks, respectively. Conclusions. Biochemical and clinical assessments suggested that the segmental posterior tooth intrusion treatment modality with 50 g of vertical force per side was sufficient. Trial Registration. The study is registered as TCTR20170206006. PMID:28321256

  18. Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Dewan Md. Farid

    2010-04-01

    Full Text Available In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesian classifier and decision tree is presented, which performs balance detections and keeps false positives at acceptable level for different types of network attacks, and eliminates redundant attributes as well as contradictory examples from training data that make the detection model complex. The proposedalgorithm also addresses some difficulties of data mining such as handling continuous attribute, dealing with missing attribute values, and reducing noise in training data. Due to the large volumes of security audit data as well as the complex and dynamic properties of intrusion behaviours, several data miningbased intrusion detection techniques have been applied to network-based traffic data and host-based data in the last decades. However, there remain various issues needed to be examined towards current intrusion detection systems (IDS. We tested the performance of our proposed algorithm with existing learning algorithms by employing on the KDD99 benchmark intrusion detection dataset. The experimental results prove that the proposed algorithm achieved high detection rates (DR andsignificant reduce false positives (FP for different types of network intrusions using limited computational resources

  19. The effects of nicotine on intrusive memories in nonsmokers.

    Science.gov (United States)

    Hawkins, Kirsten A; Cougle, Jesse R

    2013-12-01

    Correlational research suggests that smoking increases risk of posttraumatic stress disorder (PTSD), though such research by nature cannot rule out third variable explanations for this relationship. The present study used an analogue trauma film design to experimentally test the effects of nicotine on the occurrence of intrusive memories. Fifty-four healthy nonsmokers were randomly assigned to ingest either a nicotine or placebo lozenge before viewing a film depicting motor vehicle accidents. Participants recorded intrusive memories immediately after the film and for a week via diary. Participants in the nicotine condition reported significantly more intrusive memories immediately after watching the film, yet no group differences emerged on intrusions or intrusion-related distress reported during the following week. Among participants low in dispositional rumination, those who had ingested a nicotine lozenge reported more intrusions in the subsequent week than those in the placebo condition. These findings provide novel experimental evidence for the role of nicotine in increasing risk of PTSD and suggest that nicotine may contribute to trauma-related rumination but not heightened reactivity to trauma cues.

  20. Saltwater intrusion in coastal regions of North America

    Science.gov (United States)

    Barlow, Paul M.; Reichard, Eric G.

    2010-01-01

    Saltwater has intruded into many of the coastal aquifers of the United States, Mexico, and Canada, but the extent of saltwater intrusion varies widely among localities and hydrogeologic settings. In many instances, the area contaminated by saltwater is limited to small parts of an aquifer and to specific wells and has had little or no effect on overall groundwater supplies; in other instances, saltwater contamination is of regional extent and has resulted in the closure of many groundwater supply wells. The variability of hydrogeologic settings, three-dimensional distribution of saline water, and history of groundwater withdrawals and freshwater drainage has resulted in a variety of modes of saltwater intrusion into coastal aquifers. These include lateral intrusion from the ocean; upward intrusion from deeper, more saline zones of a groundwater system; and downward intrusion from coastal waters. Saltwater contamination also has occurred along open boreholes and within abandoned, improperly constructed, or corroded wells that provide pathways for vertical migration across interconnected aquifers. Communities within the coastal regions of North America are taking actions to manage and prevent saltwater intrusion to ensure a sustainable source of groundwater for the future. These actions can be grouped broadly into scientific monitoring and assessment, engineering techniques, and regulatory approaches.

  1. Three Dimensional Vapor Intrusion Modeling: Model Validation and Uncertainty Analysis

    Science.gov (United States)

    Akbariyeh, S.; Patterson, B.; Rakoczy, A.; Li, Y.

    2013-12-01

    Volatile organic chemicals (VOCs), such as chlorinated solvents and petroleum hydrocarbons, are prevalent groundwater contaminants due to their improper disposal and accidental spillage. In addition to contaminating groundwater, VOCs may partition into the overlying vadose zone and enter buildings through gaps and cracks in foundation slabs or basement walls, a process termed vapor intrusion. Vapor intrusion of VOCs has been recognized as a detrimental source for human exposures to potential carcinogenic or toxic compounds. The simulation of vapor intrusion from a subsurface source has been the focus of many studies to better understand the process and guide field investigation. While multiple analytical and numerical models were developed to simulate the vapor intrusion process, detailed validation of these models against well controlled experiments is still lacking, due to the complexity and uncertainties associated with site characterization and soil gas flux and indoor air concentration measurement. In this work, we present an effort to validate a three-dimensional vapor intrusion model based on a well-controlled experimental quantification of the vapor intrusion pathways into a slab-on-ground building under varying environmental conditions. Finally, a probabilistic approach based on Monte Carlo simulations is implemented to determine the probability distribution of indoor air concentration based on the most uncertain input parameters.

  2. Towards Multi-Stage Intrusion Detection using IP Flow Records

    Directory of Open Access Journals (Sweden)

    Muhammad Fahad Umer

    2016-10-01

    Full Text Available Traditional network-based intrusion detection sys-tems using deep packet inspection are not feasible for modern high-speed networks due to slow processing and inability to read encrypted packet content. As an alternative to packet-based intrusion detection, researchers have focused on flow-based intrusion detection techniques. Flow-based intrusion detection systems analyze IP flow records for attack detection. IP flow records contain summarized traffic information. However, flow data is very large in high-speed networks and cannot be processed in real-time by the intrusion detection system. In this paper, an efficient multi-stage model for intrusion detection using IP flows records is proposed. The first stage in the model classifies the traffic as normal or malicious. The malicious flows are further analyzed by a second stage. The second stage associates an attack type with malicious IP flows. The proposed multi-stage model is efficient because the majority of IP flows are discarded in the first stage and only malicious flows are examined in detail. We also describe the implementation of our model using machine learning techniques.

  3. Differentiated rare-element mineralization in an ongonite − topazite composite dike at the Xianghualing tin district, Southern China: an electron-microprobe study on the evolution from niobium-tantalum-oxides to cassiterite

    OpenAIRE

    Huang, Fang-fang; Wang, Ru-Cheng; Xie, Lei; Zhu, Jin-Chu; Erdmann, Saskia; Che, Xu-Dong; Zhang, Rong-Qing

    2015-01-01

    International audience; Our study characterizes in detail the mineralogical, textural and compositional features of a highly evolved, composite ongonite-topazite dike and its magmatic differentiation history. We present compositional data collected by established techniques, i.e. by electron microprobe and wet-chemical analysis, which provide a detailed framework for future studies that employ state-of-the-art analytical techniques. The studied dike (referred to as the No. 431 dike) crops out...

  4. Non-Intrusive Battery Health Monitoring

    Directory of Open Access Journals (Sweden)

    Gajewski Laurent

    2017-01-01

    Full Text Available The “Non-intrusive battery health monitoring”, developed by Airbus Defence and Space (ADS in cooperation with the CIRIMAT-CNRS laboratory and supported by CNES, aims at providing a diagnosis of the battery ageing in flight, called State of Health (SOH, using only the post-treatment of the battery telemetries. The battery current and voltage telemetries are used by a signal processing tool on ground to characterize and to model the battery at low frequencies which allows monitoring the evolution of its degradation with great accuracy. The frequential behaviour estimation is based on inherent disturbances on the current during the nominal functioning of the battery. For instance, on-board thermal control or equipment consumption generates random disturbances on battery current around an average current. The battery voltage response to these current random disturbances enables to model the low frequency impedance of the battery by a signal processing tool. The re-created impedance is then compared with the evolution model of the low frequencies impedance as a function of the battery ageing to estimate accurately battery degradation. Hence, this method could be applied to satellites which are already in orbit and whose battery telemetries acquisition system fulfils the constraints determined in the study. This innovative method is an improvement of present state-of-the-art and is important to have a more accurate in-flight knowledge of battery ageing which is crucial for mission and operation planning and also for possible satellite mission extension or deorbitation. This method is patented by Airbus Defence and Space and CNES.

  5. A Fiber-Optical Intrusion Alarm System Based on Quasi-Distributed Fiber Bragg Grating Sensors

    Institute of Scientific and Technical Information of China (English)

    Qi Jiang; Yun-Jiang Rao; De-Hong Zeng

    2008-01-01

    A fiber-optical intrusion alarm system based on quasi-distributed fiber Bragg grating (FBG) sensors is demonstrated in this paper. The algorithms of empirical mode decomposition (EMD) and wavelet packet characteristic entropy are adopted to determine the intrusion location. The intrusion alarm software based on the Labview is developed, and it is also proved by the experiments. The results show that such a fiber-optical intrusion alarm system can offer the automatic intrusion alarm in real-time.

  6. Constraints of dike thicknesses on the metallogenesis and its application to the Shihu gold deposit%岩墙厚度对成矿作用的约束:以石湖金矿为例

    Institute of Scientific and Technical Information of China (English)

    李德东; 罗照华; 周久龙; 杨宗锋; 刘翠

    2011-01-01

    diabase in Shihu gold mine. Simulation results are consistent with the occurrence of ore bodies, suggesting that they are of practical value According to the length/width ratio of the dike, the minimal critical ore-forming intrusion outcrop area is esti- mated : 312-1561 m2 for diabase, 0. 014-0. 068 km2 for quartz diorite and 0. 011-0. 034 kmz for granite por- phyry. This kind of estimation provides a qualitative standard for field geological prospecting, and has certain reference value for rapid exploration

  7. Rb-Sr and Nd-Sr isotope geochemistry and petrogenesis of the Misho Mountains mafic dikes (NW Iran

    Directory of Open Access Journals (Sweden)

    Maryam Ahankoub

    2017-02-01

    Full Text Available Introduction There are some theories about the Paleotethys event during the Paleozoic that have been proposed by geologists (Metcalfe, 2006. Some scientist offered some pieces of evidence about the northern margin of Gondwana (Zhu et al., 2010. The Paleotethys Ocean and Hercynian orogenic report first in Iran, have been Offered from the Morrow and Misho Mountain (Eftekharnejad, 1981. Misho Mountains is located between the north and south Misho faults and cause the formation of a positive flower structure (Moayyed and Hossainzade, 2011. There is theory about Misho southern fault as the best candidate of the Paleotethys suture zone (Moayyed and Hossainzade, 2011. Geochemistry and Sr –Nd isotopic data of the A2 granitic and Synite rocks of the East Misho, indicate that the magmatism post collision has occurred in the active continental margin by extensional zones of the following the closure of the Paleotethys (Ahankoub, 2012. Granite and syenite rocks have been cut by mafic dikes. Mafic dikes are often formed in extensional tectonic settings related to mantle plume or continental break –up (Zhu et al., 2009. In this paper, we use the geochemistry and Nd-Sr isotope data to determined petrogenesis, tectono-magmatic setting and age of Misho mafic dikes. Materials and methods After petrography study of 30 thin sections of mafic dike rocks, 8 samples were selected for whole-rock chemical analyses using ICP-MS and ICP-AES instruments by ACME Company in Vancouver, Canada. We prepared 6 sample For Sm-Nd and Rb-Sr analysis. Sr and Nd isotope ratios were measured with a thermal ionization mass spectrometer, VG Sector 54–30 at the Nagoya University. The isotope abundances of Rb, Sr, Nd, and Sm were measured by the ID method with a Finnigan MAT Thermoquad THQ thermal ionization quadrupole mass spectrometer at the Nagoya University. NBS987 and JNdi-1 were measured as natural Sr and Nd isotope ratio standards (Tanaka et al., 2000. Averages and 2σ errors

  8. A preliminary geochemical study of zircons and monazites from Deccan felsic dikes, Rajula, Gujarat, India: Implications for crustal melting

    Indian Academy of Sciences (India)

    Nilanjan Chatterjee; Somdev Bhattacharji

    2004-12-01

    Zircons of 10–100 m size and monazites of up to 10 m size are present in rhyolite and trachyte dikes associated with Deccan basalts around Rajula in the southern Saurashtra Peninsula of Gujarat. On the basis of structural conformity of the felsic and basaltic dikes, K-Ar ages and trace element considerations, a previous study concluded that the felsic rocks are coeval with the Deccan Volcanics and originated by crustal anatexis. The felsic rocks contain two populations of zircons and monazites, one that crystallized from the felsic melt and the other that contains inherited crustal material. Trace element variations in the rhyolites and trachytes indicate that zircons and monazites crystallized from the felsic melts, but compositional analysis of a zircon indicates the presence of a small core possibly inherited from the crust. Hf compositional zoning profile of this zircon indicates that it grew from the host rhyolitic melt while the melt differentiated, and Y and LREE contents suggest that this zircon crystallized from the host melt. Pb contents of some monazites also suggest the presence of inherited crustal cores. Hence, any age determination by the U-Th-Pb isotopic method should be interpreted with due consideration to crustal inheritance. Temperatures estimated from zircon and monazite saturation thermometry indicate that the crust around Rajula may have been heated to a maximum of approximately 900°C by the intruding Deccan magma. Crustal melting models of other workers indicate that a 1-2 million year emplacement time for the Deccan Traps may be appropriate for crustal melting characteristics observed in the Rajula area through the felsic dikes.

  9. The 2009 Magmatic Intrusion and Faulting in Harrat Al-Shaqah (Lunayyir), western Saudi Arabia, Observed by Satellite Radar Interferometry (InSAR) (Invited)

    Science.gov (United States)

    Jonsson, S.; Lu, Z.; El-Hadidy, S.; Zahran, H.

    2009-12-01

    One of the volcanic provinces in western Saudi Arabia, Harrat Al-Shaqah (also known as Harrat Lunayyir), suffered from numerous small to moderate-size earthquakes in May-July 2009. The most intensive activity occurred on 17-19 May when six magnitude 4.6-5.7 earthquakes occurred. Following the events the Saudi Civil Protection Agency evacuated the area and relocated over 20000 people to the neighboring cities of Yanbu and Medina. The activity continued throughout June with several magnitude 4-5 earthquakes but then quieted down in July. Following the activity in mid-May we sent a request for emergency satellite radar data acquisitions to the European Space Agency and later activated an International Charter to guarantee satellite data collection of the area. We have analyzed a number of satellite radar interferograms (InSAR) of the activity and the results are outstanding, owing to the stable surface conditions of this near vegetation-free region. Interferograms spanning the activity in mid-May exhibit strong deformation that extends across a large 40 km x 40 km area, showing over a meter of WSW-ENE extension. In addition, the data show clear signs of surface faulting and graben-like subsidence in the middle of the deformed area with the graben subsidence exceeding 50 cm. The deformation appears to be caused by a near-vertical dike intrusion with a WNW-ESE orientation, parallel to the Red Sea rift, and the intruded volume is of the order of 0.1 cubic km. The dike caused faulting on graben-forming normal faults. The shallowest part of the dike appears to have reached within only 2-3 km of the surface, right below where the graben is the narrowest and under an area with a number of cinder cones from previous volcanic events. The dike appears to have continued to grow after the initial strong phase of activity in mid-May, as a deformation interferogram spanning the time period from the end of may until early July shows similar deformation pattern, although with a much

  10. [Textual research on "Chigu Decoction" in Wooden Slips from the Site of the Ancient People's Dike in Zhangjiajie].

    Science.gov (United States)

    Ding, Yuan; Zhang, Ru-Qing

    2011-07-01

    In 1987, wooden slips named Zhi Chigu Fang (Chigu Decoction) were discovered on the site of the Ancient People's Dike in Zhangjiajie, Hunan Province. 15 drugs with dosage were listed on the front of the wooden slip and processing on the reverse side. Though there are two academic opinions about Chigu Decoction neither of them is convincing. Zhi means treatment and Chigu is the name of an ancient exogenous febrile disease with the symptoms of aversion to cold, fever, headache and neck pain, ankylosis, cough and asthma or cold pain in the gastric area and diarrhea. Chi is a descriptive word describing the appearance of exogenous febrile fever.

  11. Important aspects of residue sampling in drilling dikes; Aspectos importantes para a amostragem de residuos em diques de perfuracao

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Gilvan Ferreira da [PETROBRAS, Rio de Janeiro (Brazil). Centro de Pesquisas. Div. de Explotacao

    1989-12-31

    This paper describes the importance of sampling in the evaluation of physical and chemical properties of residues found in drilling dikes, considering the later selection of treatment methods or discard of these residues. We present the fundamental concepts of applied statistics, which are essential to the elaboration of sampling plans, with views of obtaining exact and precise results. Other types of samples are also presented, as well as sampling equipment and methods for storage and preservation of the samples. As a conclusion, we the example of the implementation of a sampling plan. (author) 3 refs., 9 figs., 3 tabs.

  12. Thermal and barometric constraints on the intrusive and unroofing history of the Black Mountains: Implications for timing, initial dip, and kinematics of detachment faulting in the Death Valley Region, California

    Science.gov (United States)

    Holm, Daniel K.; Snow, J. Kent; Lux, Daniel R.

    1992-06-01

    Unroofing of the Black Mountains, Death Valley, California, has resulted in the exposure of 1.7 Ga crystalline basement, late Precambrian amphibolite facies metasedimentary rocks, and a Tertiary magmatic complex. The 40Ar/39Ar cooling ages, obtained from samples collected across the entire length of the range (>55 km), combined with geobarometric results from synextensional intrusions, provide time-depth constraints on the Miocene intrusive history and extensional unroofing of the Black Mountains. Data from the southeastern Black Mountains and adjacent Greenwater Range suggest unroofing from shallow depths between 9 and 10 Ma. To the northwest in the crystalline core of the range, biotite plateau ages from ˜13 to 6.8 Ma from rocks making up the Death Valley turtlebacks indicate a midcrustal residence (with temperatures >300°C) prior to extensional unroofing. Biotite 40Ar/39Ar ages from both Precambrian basement and Tertiary plutons reveal a diachronous cooling pattern of decreasing ages toward the northwest, subparallel to the regional extension direction. Diachronous cooling was accompanied by dike intrusion which also decreases in age toward the northwest. The cooling age pattern and geobarometric constraints in crystalline rocks of the Black Mountains suggest denudation of 10-15 km along a northwest directed detachment system, consistent with regional reconstructions of Tertiary extension and with unroofing of a northwest deepening crustal section. Mica cooling ages that deviate from the northwest younging trend are consistent with northwestward transport of rocks initially at shallower crustal levels onto deeper levels along splays of the detachment. The well-known Amargosa chaos and perhaps the Badwater turtleback are examples of this "splaying" process. Considering the current distance of the structurally deepest samples away from moderately to steeply east tilted Tertiary strata in the southeastern Black Mountains, these data indicate an average initial

  13. A water-budget approach to restoring a sedge fen affected by diking and ditching

    Science.gov (United States)

    Wilcox, Douglas A.; Sweat, Michael J.; Carlson, Martha L.; Kowalski, Kurt P.

    2006-04-01

    A vast, ground-water-supported sedge fen in the Upper Peninsula of Michigan, USA was ditched in the early 1900 s in a failed attempt to promote agriculture. Dikes were later constructed to impound seasonal sheet surface flows for waterfowl management. The US Fish and Wildlife Service, which now manages the wetland as part of Seney National Wildlife Refuge, sought to redirect water flows from impounded C-3 Pool to reduce erosion in downstream Walsh Ditch, reduce ground-water losses into the ditch, and restore sheet flows of surface water to the peatland. A water budget was developed for C-3 Pool, which serves as the central receiving and distribution body for water in the affected wetland. Surface-water inflows and outflows were measured in associated ditches and natural creeks, ground-water flows were estimated using a network of wells and piezometers, and precipitation and evaporation/evapotranspiration components were estimated using local meteorological data. Water budgets for the 1999 springtime peak flow period and the 1999 water year were used to estimate required releases of water from C-3 Pool via outlets other than Walsh Ditch and to guide other restoration activities. Refuge managers subsequently used these results to guide restoration efforts, including construction of earthen dams in Walsh Ditch upslope from the pool to stop surface flow, installation of new water-control structures to redirect surface water to sheet flow and natural creek channels, planning seasonal releases from C-3 Pool to avoid erosion in natural channels, stopping flow in downslope Walsh Ditch to reduce erosion, and using constructed earthen dams and natural beaver dams to flood the ditch channel below C-3 Pool. Interactions between ground water and surface water are critical for maintaining ecosystem processes in many wetlands, and management actions directed at restoring either ground- or surface-water flow patterns often affect both of these components of the water budget. This

  14. Geochemistry and zircon ages of mafic dikes in the South Qinling, central China: evidence for late Neoproterozoic continental rifting in the northern Yangtze block

    Science.gov (United States)

    Zhu, Xiyan; Chen, Fukun; Liu, Bingxiang; Zhang, He; Zhai, Mingguo

    2015-01-01

    Neoproterozoic volcanic-sedimentary sequences of the southern Qinling belt, central China, were intruded by voluminous mafic dikes. secondary ion mass spectrometry zircon U-Pb dating indicates that these dikes were emplaced at 650.8 ± 5.2 Ma, coeval with mafic rocks occurring at the northern margin of the Yangtze block. The dikes are characterized by enrichment of large ion lithophile elements, high Ti contents (up to 3.73 wt%) and Nb/Ta ratios between 14.5 and 19.6, suggesting a mantle source of oceanic island basalt affinity. Initial 87Sr/86Sr ratios show positive correlation with SiO2 contents and negative correlation with Zr/Nb ratios, implying that these rocks were affected by crustal contamination during the magma ascend and emplacement process. The dikes have initial ɛ Nd values of +0.2 to +3.3, low 206Pb/204Pb ratios of 16.96-17.45, and moderate 87Sr/86Sr ratios of 0.7043-0.7076, likely pointing to the involvement of an enriched mantle source. The mafic dikes and coeval mafic volcanic equivalents in the South Qinling and the northern Yangtze are hypothesized to be related with the prolonged breakup of the supercontinent Rodinia, suggesting that continental rifting lasted until ca. 650 Ma.

  15. Analysis on Yellow River dike slope stability with strength reduction method%黄河大堤边坡稳定的强度折减法分析

    Institute of Scientific and Technical Information of China (English)

    姜波

    2012-01-01

    The article calculates and analyzes Yellow River dike slope stability with finite element strength reduction method, and respectively calculates the dike slope stability security coefficients under two conditions of riverside upstream and riverside levee. Results show that : under the first condition, the security coefficient Fs = 1. 963 〉 1, which shows that the dike slope is safe and stable, under the second condition, the securi- ty coefficient Fs = 1. 395 〉 1, the security coefficient reduces a little, while the dike slope is still safe. Thus, the Yellow River dike slope is safe and reliable.%采用有限元强度折减法对黄河大堤边坡稳定问题进行了计算和分析,分别计算了临河堤坡未迎水和河床水位达到堤顶两种工况下的堤坡稳定安全系数,结果表明,第一种工况下安全系数Fs=1.963〉1,堤坡安全稳定,第二种工况下安全系数F=1.395〉1,安全系数有所减小,但堤坡仍然是安全的,由此可知黄河大堤的边坡是安全可靠的。

  16. Intrusion of incisors in adult patients with marginal bone loss.

    Science.gov (United States)

    Melsen, B; Agerbaek, N; Markenstam, G

    1989-09-01

    Elongated and spaced incisors are common problems in patients suffering from severe periodontal disease. Thirty patients characterized by marginal bone loss and deep overbite were treated by intrusion of incisors. Three different methods for intrusion were applied: (1) J hooks and extraoral high-pull headgear, (2) utility arches, (3) intrusion bent into a loop in a 0.17 x 0.25-inch wire, and (4) base arch as described by Burstone. The intrusion was evaluated from the displacement of the apex, incision, and the center of resistance of the most prominent or elongated central incisor. Change in the marginal bone level and the amount of root resorption were evaluated on standardized intraoral radiographs. The pockets were assessed by standardized probing and the clinical crown length was measured on study casts. The results showed that the true intrusion of the center of resistance varied from 0 to 3.5 mm and was most pronounced when intrusion was performed with a base arch. The clinical crown length was generally reduced by 0.5 to 1.0 mm. The marginal bone level approached the cementoenamel junction in all but six cases. All cases demonstrated root resorption varying from 1 to 3 mm. The total amount of alveolar support--that is, the calculated area of the alveolar wall--was unaltered or increased in 19 of the 30 cases. The dependency of the results on the oral hygiene, the force distribution, and the perioral function was evaluated in relation to the individual cases. It was obvious that intrusion was best performed when (1) forces were low (5 to 15 gm per tooth) with the line of action of the force passing through or close to the center of resistance, (2) the gingiva status was healthy, and (3) no interference with perioral function was present.

  17. How Saccade Intrusions Affect Subsequent Motor and Oculomotor Actions

    Science.gov (United States)

    Terao, Yasuo; Fukuda, Hideki; Tokushige, Shin-ichi; Inomata-Terada, Satomi; Ugawa, Yoshikazu

    2017-01-01

    In daily activities, there is a close spatial and temporal coupling between eye and hand movements that enables human beings to perform actions smoothly and accurately. If this coupling is disrupted by inadvertent saccade intrusions, subsequent motor actions suffer from delays, and lack of coordination. To examine how saccade intrusions affect subsequent voluntary actions, we used two tasks that require subjects to make motor/oculomotor actions in response to a visual cue. One was the memory guided saccade (MGS) task, and the other the hand reaction time (RT) task. The MGS task required subjects to initiate a voluntary saccade to a memorized target location, which is indicated shortly before by a briefly presented cue. The RT task required subjects to release a button on detection of a visual target, while foveating on a central fixation point. In normal subjects of various ages, inadvertent saccade intrusions delayed subsequent voluntary motor, and oculomotor actions. We also studied patients with Parkinson's disease (PD), who are impaired not only in initiating voluntary saccades but also in suppressing unwanted reflexive saccades. Saccade intrusions also delayed hand RT in PD patients. However, MGS was affected by the saccade intrusion differently. Saccade intrusion did not delay MGS latency in PD patients who could perform MGS with a relatively normal latency. In contrast, in PD patients who were unable to initiate MGS within the normal time range, we observed slightly decreased MGS latency after saccade intrusions. What explains this paradoxical phenomenon? It is known that motor actions slow down when switching between controlled and automatic behavior. We discuss how the effect of saccade intrusions on subsequent voluntary motor/oculomotor actions may reflect a similar switching cost between automatic and controlled behavior and a cost for switching between different motor effectors. In contrast, PD patients were unable to initiate internally guided MGS in

  18. Intrusão dentária utilizando mini-implantes Orthodontic intrusion with mini-implant anchorage

    Directory of Open Access Journals (Sweden)

    Telma Martins de Araújo

    2008-10-01

    Full Text Available INTRODUÇÃO: dentre os diversos tipos de movimentos dentários induzidos ortodonticamente, o de intrusão é, sem dúvida, um dos mais difíceis de serem conseguidos. A mecânica intrusiva convencional, apesar de viável, é complexa, no que diz respeito ao controle de seus efeitos colaterais. Isso, em grande parte, refere-se à dificuldade em se obter uma ancoragem satisfatória. Neste contexto, os mini-implantes, por oferecerem efetiva ancoragem esquelética, têm se mostrado de extrema valia para os ortodontistas, tornando a intrusão, tanto de dentes anteriores quanto posteriores, um procedimento cada vez mais simples, do ponto de vista mecânico. OBJETIVO: pretende-se, então, neste artigo, descrever e demonstrar, clinicamente, as diversas possibilidades de utilização dos mini-implantes como recurso de ancoragem para o movimento de intrusão.INTRODUCTION: Among all different varieties of orthodontically induced tooth movement, intrusion is, without doubt, one of the most difficult movements to be reached. Conventional intrusive biomechanics, although possible, may lead to undesirable side-effects. These events, in most cases, are related to the difficulty in obtaining an efficient anchorage unit. Then, mini-implants, because of their high success rates of effective skeletal anchorage, are valuable devices to orthodontists, transforming the intrusion movement, both at the anterior and the posterior regions, a more and more uncomplicated biomechanical procedure. AIM: to describe and show, clinically, different ways of using mini-implants as an anchorage system to intrusion movement.

  19. Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS

    CERN Document Server

    Sangeetha, S; 10.5121/ijnsa.2010.2204

    2010-01-01

    The objective of this is to develop a Fuzzy aided Application layer Semantic Intrusion Detection System (FASIDS) which works in the application layer of the network stack. FASIDS consist of semantic IDS and Fuzzy based IDS. Rule based IDS looks for the specific pattern which is defined as malicious. A non-intrusive regular pattern can be malicious if it occurs several times with a short time interval. For detecting such malicious activities, FASIDS is proposed in this paper. At application layer, HTTP traffic's header and payload are analyzed for possible intrusion. In the proposed misuse detection module, the semantic intrusion detection system works on the basis of rules that define various application layer misuses that are found in the network. An attack identified by the IDS is based on a corresponding rule in the rule-base. An event that doesn't make a 'hit' on the rule-base is given to a Fuzzy Intrusion Detection System (FIDS) for further analysis.

  20. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  1. A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    Hossein Jadidoleslamy

    2011-10-01

    Full Text Available Networks protection against different types of attacks is one of most important posed issue into the network andinformation security application domains. This problem on Wireless Sensor Networks (WSNs, in attention to theirspecial properties, has more importance. Now, there are some of proposed architectures and guide lines to protectWireless Sensor Networks (WSNs against different types of intrusions; but any one of them do not has acomprehensive view to this problem and they are usually designed and implemented in single-purpose; but, theproposed design in this paper tries to has been a comprehensive view to this issue by presenting a complete andcomprehensive Intrusion Detection Architecture (IDA. The main contribution of this architecture is its hierarchicalstructure; i.e., it is designed and applicable, in one or two levels, consistent to the application domain and itsrequired security level. Focus of this paper is on the clustering WSNs, designing and deploying Cluster-basedIntrusion Detection System (CIDS on cluster-heads and Wireless Sensor Network wide level Intrusion DetectionSystem (WSNIDS on the central server. Suppositions of the WSN and Intrusion Detection Architecture (IDA are:static and heterogeneous network, hierarchical and clustering structure, clusters' overlapping and using hierarchicalrouting protocol such as LEACH, but along with minor changes. Finally, the proposed idea has been verified bydesigning a questionnaire, representing it to some (about 50 people experts and then, analyzing and evaluating itsacquired results.

  2. Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Jingyu Wang

    2011-02-01

    Full Text Available Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources and reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. In order to address the problem of intrusion tolerance of cloud computing platform and sensitive data in new enterprise data center, this paper constructs a virtualization intrusion tolerance system based on cloud computing by researching on the existing virtualization technology, and then presents a method of intrusion tolerance to protect sensitive data in cloud data center based on virtual adversary structure by utilizing secret sharing. This system adopts the method of hybrid fault model, active and passive replicas, state update and transfer, proactive recovery and diversity, and initially implements to tolerate F faulty replicas in N=2F+1 replicas and ensure that only F+1 active replicas to execute during the intrusion-free stage. The remaining replicas are all put into passive mode, which significantly reduces the resource consuming in cloud platform. At last we prove the reconstruction and confidentiality property of sensitive data by utilizing secret sharing.

  3. Perception of the English intrusive stops by Korean listeners

    Science.gov (United States)

    Han, Jeong-Im

    2002-05-01

    This paper reports results of an experiment examining Korean listeners' perception of English intrusive stops in nasal-obstruent clusters. The experiment tests (1) how often intrusive stops are perceived; (2) how language-specific syllable structure constraints influence the perception, given the fact that Korean does not allow consonant clusters in syllable onsets and codas; (3) whether even the perception of phonetic variables like intrusive stops, not phonemes, could be improved by learning. Ninety English non-words with a monosyllable structure of CVC1C2 were created, where C1=/m,n,N/, and C2=/p,k,s/. The stimuli including additional 90 filler items were recorded by three native English speakers and one representative data among them was given to three groups of native Korean listeners in terms of their English proficiency. Each was asked to monitor the target sounds [Warner and Weber, J. Phonetics 29, 23-52 (2001)]. The preliminary results show that identification of intrusive stops in English is totally dependent on Korean syllable structure, so even stimuli with strong acoustic cues were misparsed. Nonetheless, there's a high correlation between perception of intrusive stops and listeners' English proficiency, showing the possibility of the improvement of perception by learning.

  4. Orthodontic intrusive movement to reduce infrabony defects in periodontal pacients

    Directory of Open Access Journals (Sweden)

    Aldrieli Regina Ambrósio

    2008-01-01

    Full Text Available The adult tends to be an excellent orthodontic patient, because he/she is motivated and cooperative. Nevertheless, many adult patientspresent periodontal problems. Intrusive movement is usually necessary against an area with infrabony defects, and in order for treatmentto be successful, it is necessary for all related aspects to be well understood. The aim of this study was to discuss the feasibility and efficacy of orthodontic intrusion as a means of reducing infrabony defects caused by periodontal disease. The methodology used was reviewed in the literature, from which articles were selected using the MEDLINE, LILACS and BBO databases. After periodontal treatment and maintenance with suitable bacterial plaque control has been performed, orthodontic treatment with intrusive tooth movement can be performed in case of pathological tooth migration and extrusion. The segmented arch technique is the most indicated for intruding teeth with infrabony defects because it is capable of developing light and continuous forces. Furthermore, although studies did not confirm, they suggested that orthodontic intrusion could lead to the formation of new periodontal support tissue. With a multidisciplinary approach, it is possible to successfully perform intrusion movements in teeth that present infrabony defects, provided that periodontal inflammation has been treated and the patient presents an excellent level of plaque control. Among the benefits of this approach are: better appearance, better access to dental hygiene, restitution of incisal occlusion and reduction in non axial load.

  5. Distributed intrusion detection for mobile ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Jiang Xinghao; Wu Yue; Liu Ning

    2008-01-01

    Mobile ad hoc networking(MANET)has become an exciting and important technology in recent years,because of the rapid proliferation of wireless devices.Mobile ad hoc networks is highly vulnerable to attacks due to the open medium,dynamically changing network topology,cooperative algorithms,and lack of centralized monitoring and management point.The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features.A distributed intrusion detection approach based on timed automata is given.A cluster-based detection scheme is presented,where periodically a node is elected as the monitor node for a cluster.These monitor nodes can not only make local intrusion detection decisions,but also cooperatively take part in global intrusion detection.And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing(DSR).The monitor nodes can verify the behaviour of every nodes by timed automata,and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent,the approach is much more efficient while maintaining the same level of effectiveness.Finally,the intrusion detection method is evaluated through simulation experiments.

  6. Asymmetrical magnetic fabrics in the Egersund doleritic dike swarm (SW Norway) reveal sinistral oblique rifting before the opening of the Iapetus

    Science.gov (United States)

    Montalbano, Salvatrice; Diot, Hervé; Bolle, Olivier

    2016-04-01

    The 616 ± 3 Ma (Ediacaran) Egersund doleritic dike swarm cuts across the Rogaland anorthosite province and its granulitic country rocks, in SW Norway. The structure of eight out of eleven main dikes of the swarm was investigated using the anisotropy of magnetic susceptibility (AMS) technique. Thermomagnetic data and values of the bulk magnetic susceptibility reveal a magnetic mineralogy dominated by Ti-poor titanomagnetite. Magnetic fabric and global petrofabric are coaxial, except in sites strongly affected by hydrothermal alteration, as demonstrated through image analysis. Asymmetrical dispositions of the magnetic foliation and lineation support the existence of a syn-emplacement, sinistral strike-slip shearing resolved on dike walls. Such asymmetrical fabrics are attributed to a transtension tectonic regime, in a context of oblique extension during the continental rifting phase which preceded the opening of the Iapetus Ocean along the SW margin (present-day orientation) of Baltica.

  7. 浅谈南四湖湖东堤堤防的管理%Discussion on the Management of the Eastern Dike of Nansi Lake

    Institute of Scientific and Technical Information of China (English)

    马辉

    2011-01-01

    Nansi Lake is the largest freshwater lake in northern China, and is a lake with multi-functions, so the management of its dike is very important.Based on the analysis of the geography of Nansi Lake, this paper briefly describes the progress status of the project of eastern dike of Nansi Lake, raised the management measures of dike and the principles of unified management.%南四湖是我国北方最大的淡水湖,并且是一个多功能湖泊,所以其堤防的管理非常重要.本文在分析南四湖地理概况的基础上简单介绍了南四湖湖东堤的工程的进展情况,从提出了堤防的管理措施以及堤防统一管理的原则.

  8. Selection of general design scheme for Pinglang Flood Dike in Wuzhou City%梧州市平浪防洪堤总体设计方案选择

    Institute of Scientific and Technical Information of China (English)

    陈桂斌

    2016-01-01

    An introduction was made on the design of Pinglang Flood Dike in Wuzhou City,including the selection principle and concept of dike-line and dike type,the general design scheme integrating the concept of sustainable development and ecological water conservancy. The principles of environmental protection,humanity,sustainable development,harmonious coexistence between human being and nature were followed in the overall design process.%介绍了梧州市平浪防洪堤堤线、堤型的选择原则、思路,总体设计方案等基本情况。该设计方案融入可持续发展及生态水利的理念,将环保、人文以及可持续发展等贯彻于设计的全过程,体现了人与自然的和谐共处。

  9. SEAWATER INTRUSION TYPES AND REGIONAL DIVISIONS IN THE SOUTHERN COAST OF LAIZHOU BAY

    Institute of Scientific and Technical Information of China (English)

    孟广兰; 韩有松; 王少青; 王珍岩

    2002-01-01

    The southern coast of Laizhou Bay, Bohai Sea, is one of the areas in China most seriously impacted by seawater intrusion. Based on the sources of intruding waterbedies, seawater intrusion can be divided into two types: intrusion of saline water derived from modern seawater, and intrusion of subsurface brine and saline water derived from paleo-seawater in shallow Quaternary sediments. There are some distinct differences in their formation, mechanism and damage. The subsurface brine intrusion is a special type, which can cause very serious disaster. The coastal landform and the Quaternary hydrogeological environment are predominant factors in the classification of seawater intrusion types. Various coastal environments in different coastal sections result in three types of intrusion: seawater intrusion, saline groundwater intrusion, and mixed seawater and saline water intrusion, in the southern coast of Laizhou Bay, which can be divided into four areas: the sea-water intrusion area in the northern Laizhou City coast, the mixed seawater and saline groundwater intrusion area in the Baisha River-Jiaolai River mouth plain area, the mixed seawater and saline groundwater intrusion area in the Weihe River mouth plain area northern Changyi county coast, and the saline ground-water intrusion area in the northern Shouguang plains.

  10. Distress and recurrence of intrusive thoughts in younger and older adults.

    Science.gov (United States)

    Magee, Joshua C; Teachman, Bethany A

    2012-03-01

    The current study incorporated a life span perspective into existing theories of intrusive thoughts to examine age-related differences in the difficulty controlling intrusive thoughts, the distress following intrusive thought recurrences, and the meanings assigned to these recurrences. Younger (N = 51) and older (N = 49) community adults were randomly assigned to suppress (i.e., keep out of mind) or monitor an intrusive thought. Participants rated their positive and negative affect throughout engagement with the intrusive thought, and they also rated the meanings they gave to recurrences of their everyday intrusive thoughts. The results demonstrated that older adults tended to perceive greater difficulty with controlling the intrusive thought than younger adults despite the fact that they did not differ in the actual recurrence of the intrusive thought. With regard to distress, older adults experienced steadier levels of positive affect than younger adults throughout engagement with the intrusive thought. However, older adults also reported greater residual negative affect after engaging with the intrusive thought than younger adults. Finally, older and younger adults appeared to assign meanings to recurrences of intrusive thoughts in line with age-relevant concerns. Specifically, older adults were prone to interpret the recurrence of intrusive thoughts as a sign of cognitive decline, but they were less likely than younger adults to see intrusive thoughts as a sign of moral failure. Together, these results highlight a range of potential risk and protective factors in older adults for experiencing emotion dysregulation after intrusive thoughts.

  11. Geochemical Characteristics and Genesis of the Luxi-Xianrenzhang Diabase Dikes in Xiazhuang Uranium Orefield, Northern Guangdong Province

    Institute of Scientific and Technical Information of China (English)

    LING Hongfei; SHEN Weizhou; DENG Ping; JIANG Shaoyong; JIANG Yaohui; YE Haimin; PU Wei; TAN Zhengzhong

    2005-01-01

    The Luxi-Xianrenzhang diabase dikes were emplaced into the eastern part of the Guidong composite granitoids in northern Guangdong Province at the end of the Early Cretaceous.They show tholeiitic features,enrichment in large ion lithophile elements,slight enrichment in light rare earth elements,depletion in Zr and Hf,and basically no depletion in Nb and Ta and no Eu anomaly.They are similar to intraplate basalt in terms of trace element characteristics.They have high εNd(t) values (3.6-4.9),initial 87Sr/86Sr ratios (0.70530-0.70641) and δ18O values and Dupal anomaly of Pb isotope compositions.Their Sr-Nd,Pb-Sr,Pb-Nd and Pb-Pb isotopes plot between DMM and EMⅡ,with Pb similar to EMⅡ,Nd relatively close to DMM and Sr in between.This profile suggests that the diabase dikes studied were derived from partial melting of a mantle source that had been subjected to metasomatism by fluids originated from a subduction zone under a tectonic environment of crustal extension and lithosphere thinning in the late Yanshanian.

  12. 基于 FLUENT的丁坝回流区数值模拟%Sim ulation of the Backflow Zone aor und Spur Dike Based on FLUE NT

    Institute of Scientific and Technical Information of China (English)

    雷亚; 刘杰

    2015-01-01

    The flow field in the backflow zone of the round -head, turn-head and trapezoidal dike has been simulated based on the k-ε and VOF model in fluent. First, comparisons about the simu-lation and experiment are made and the results are good .Further , simulations of different dikes are conducted , it is concluded that the backflow zone of the round -head dike is the largest , that of the turn-head dike is the second , and that of the trapezoidal dike is the third .The range of the back-flow is smaller and smaller with the water depth increasing , and this tend is slow near the surface . The result of the trapezoidal dike is opposite because of the slope .%利用FLUENT中的k-ε湍流模型和VOF模型,对非淹没的圆头、拐头和梯形丁坝回流区流场进行了数值模拟。首先将文献试验与模型计算进行了对比,结果吻合良好。然后进一步对不同类型丁坝进行了模拟。计算结果表明,不同类型丁坝的坝后回流区范围不同,圆头坝坝后回流区范围最大(涡长和涡宽),拐头坝次之,梯形坝最小。同一丁坝下,随着水深增加,圆头坝和拐头坝坝后回流区范围减小,且越接近水面减小越慢;梯形坝由于有坡度,结果与前两个丁坝结果相反。

  13. A Cooperative Network Intrusion detection Based on Fuzzy SVMs

    Directory of Open Access Journals (Sweden)

    Shaohua Teng

    2010-04-01

    Full Text Available There is a large number of noise in the data obtained from network, which deteriorates intrusion detection performance. To delete the noise data, data preprocessing is done before the construction of hyperplane in support vector machine (SVM. By introducing fuzzy theory into SVM, a new method is proposed for network intrusion detection.  Because the attack behavior is different for different network protocol, a different fuzzy membership function is formatted, such that for each class of protocol there is a SVM. To implement this approach, a fuzzy SVM-based cooperative network intrusion detection system with multi-agent architecture is presented. It is composed of three types of agents corresponding to TCP, UDP, and ICMP protocols, respectively. Simulation experiments are done by using KDD CUP 1999 data set, results show that the training time is significantly shortened, storage space requirement is reduced, and classification accuracy is improved.

  14. Intrusion detection based on system calls and homogeneous Markov chains

    Institute of Scientific and Technical Information of China (English)

    Tian Xinguang; Duan Miyi; Sun Chunlai; Li Wenfa

    2008-01-01

    A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain model to characterize the normal behavior of a privileged program, and associates the states of the Markov chain with the unique system calls in the training data. At the detection stage, the probabilities that the Markov chain model supports the system call sequences generated by the program are computed. A low probability indicates an anomalous sequence that may result from intrusive activities. Then a decision rule based on the number of anomalous sequences in a locality frame is adopted to classify the program's behavior. The method gives attention to both computational efficiency and detection accuracy, and is especially suitable for on-line detection. It has been applied to practical host-based intrusion detection systems.

  15. CUSUM-Based Intrusion Detection Mechanism for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Bishan Ying

    2014-01-01

    Full Text Available The nature of wireless sensor networks (WSNs makes them very vulnerable to adversary's malicious attacks. Therefore, network security is an important issue to WSNs. Due to the constraints of WSN, intrusion detection in WSNs is a challengeable task. In this paper, we present a novel intrusion detection mechanism for WSNs, which is composed of a secure data communication algorithm and an intrusion detection algorithm. The major contribution of this paper is that we propose an original secure mechanism to defend WSNs against malicious attacks by using the information generated during data communication. The approach is able to protect the data communication in a WSN even if some sensor nodes are compromised by adversary. The proposed approach is easy to be implemented and performed in resource-constrained WSN. We also evaluate the proposed approach by a simulation experiment and analyze the simulation results in detail.

  16. Physical model simulations of seawater intrusion in unconfined aquifer

    Directory of Open Access Journals (Sweden)

    Tanapol Sriapai

    2012-12-01

    Full Text Available The objective of this study is to simulate the seawater intrusion into unconfined aquifer near shoreline and to assessthe effectiveness of its controlling methods by using scaled-down physical models. The intrusion controlled methods studiedhere include fresh water injection, saltwater extraction, and subsurface barrier. The results indicate that under natural dynamicequilibrium between the recharge of fresh water and the intrusion well agree with the Ghyben-Herzberg mathematical solution.Fresh water pumping from the aquifer notably move the fresh-salt water interface toward the pumping well, depending on thepumping rates and the head differences (h between the aquifer recharge and the salt water level. The fresh water injectionmethod is more favorable than the salt water extraction and subsurface barrier method. The fresh water injection rate of about10% of the usage rate can effectively push the interface toward the shoreline, and keeping the pumping well free of salinity.

  17. Distributed intrusion detection system based on fuzzy rules

    Science.gov (United States)

    Qiao, Peili; Su, Jie; Liu, Yahui

    2006-04-01

    Computational Intelligence is the theory and method solving problems by simulating the intelligence of human using computer and it is the development of Artificial Intelligence. Fuzzy Technique is one of the most important theories of computational Intelligence. Genetic Fuzzy Technique and Neuro-Fuzzy Technique are the combination of Fuzzy Technique and novel techniques. This paper gives a distributed intrusion detection system based on fuzzy rules that has the characters of distributed parallel processing, self-organization, self-learning and self-adaptation by the using of Neuro-Fuzzy Technique and Genetic Fuzzy Technique. Specially, fuzzy decision technique can be used to reduce false detection. The results of the simulation experiment show that this intrusion detection system model has the characteristics of distributed, error tolerance, dynamic learning, and adaptation. It solves the problem of low identifying rate to new attacks and hidden attacks. The false detection rate is low. This approach is efficient to the distributed intrusion detection.

  18. Hybrid Intrusion Detection and Prediction multiAgent System HIDPAS

    CERN Document Server

    Jemili, Farah; Ahmed, Mohamed Ben

    2009-01-01

    This paper proposes an intrusion detection and prediction system based on uncertain and imprecise inference networks and its implementation. Giving a historic of sessions, it is about proposing a method of supervised learning doubled of a classifier permitting to extract the necessary knowledge in order to identify the presence or not of an intrusion in a session and in the positive case to recognize its type and to predict the possible intrusions that will follow it. The proposed system takes into account the uncertainty and imprecision that can affect the statistical data of the historic. The systematic utilization of an unique probability distribution to represent this type of knowledge supposes a too rich subjective information and risk to be in part arbitrary. One of the first objectives of this work was therefore to permit the consistency between the manner of which we represent information and information which we really dispose.

  19. Intrusion Awareness Based on Data Fusion and SVM Classification

    Directory of Open Access Journals (Sweden)

    Ramnaresh Sharma

    2012-06-01

    Full Text Available Network intrusion awareness is important factor for risk analysis of network security. In the current decade various method and framework are available for intrusion detection and security awareness. Some method based on knowledge discovery process and some framework based on neural network. These entire model take rule based decision for the generation of security alerts. In this paper we proposed a novel method for intrusion awareness using data fusion and SVM classification. Data fusion work on the biases of features gathering of event. Support vector machine is super classifier of data. Here we used SVM for the detection of closed item of ruled based technique. Our proposed method simulate on KDD1999 DARPA data set and get better empirical evaluation result in comparison of rule based technique and neural network model.

  20. Intrusion Awareness Based on Data Fusion and SVM Classification

    Directory of Open Access Journals (Sweden)

    Ramnaresh Sharma

    2012-06-01

    Full Text Available Network intrusion awareness is important factor forrisk analysis of network security. In the currentdecade various method and framework are availablefor intrusion detection and security awareness.Some method based on knowledge discovery processand some framework based on neural network.These entire model take rule based decision for thegeneration of security alerts. In this paper weproposed a novel method for intrusion awarenessusing data fusion and SVM classification. Datafusion work on the biases of features gathering ofevent. Support vector machine is super classifier ofdata. Here we used SVM for the detection of closeditem of ruled based technique. Our proposedmethod simulate on KDD1999 DARPA data set andget better empirical evaluation result in comparisonof rule based technique and neural network model.

  1. HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NETWORK

    Directory of Open Access Journals (Sweden)

    Seyedeh Yasaman Rashida

    2013-06-01

    Full Text Available In order to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. Therefore, it is necessary that this security concern must be articulate right from the beginning of the network design and deployment. The intrusion detection technology is the process of identifying network activity that can lead to a compromise of security policy. Lot of work has been done in detection of intruders. But the solutions are not satisfactory. In this paper, we propose a novel Distributed Intrusion Detection System using Multi Agent In order to decrease false alarms and manage misuse and anomaly detects.

  2. Research of Intrusion Detection Technology and its Formal Modeling

    Directory of Open Access Journals (Sweden)

    PENG Yali

    2009-10-01

    Full Text Available The intrusion detection technology is one of the most important dynamic security technologies, which can be used in the critical security system construction and the basic service protection. Apparently, applying formal specification to the procedure of developing an intrusion detection system can fulfill their security requirement and win the confidence of users of the secured systems. Taking a DDoS intrusion detection system as an example, we establish integrity sub-regular database through analyzing the default characteristics and universal characteristics in communication of DDoS attack, which can guarantee fast and effective detection in each appeared DDoS attack. At the same time, we use the association rules mining algorithm mine new rules and their association pattern to detect the unknown attack, and illustrate how Z can be used to specify and model the security-critical systems.

  3. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  4. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Science.gov (United States)

    Trickl, Thomas; Vogelmann, Hannes; Fix, Andreas; Schäfler, Andreas; Wirth, Martin; Calpini, Bertrand; Levrat, Gilbert; Romanens, Gonzague; Apituley, Arnoud; Wilson, Keith M.; Begbie, Robert; Reichardt, Jens; Vömel, Holger; Sprenger, Michael

    2016-07-01

    A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison). The measurements were carried out at four observational sites: Payerne (Switzerland), Bilthoven (the Netherlands), Lindenberg (north-eastern Germany), and the Zugspitze mountain (Garmisch-Partenkichen, German Alps), and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg). The dryness hardens the findings of a preceding study ("Part 1", Trickl et al., 2014) that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in "Part 1" from the Zugspitze CO observations. The trajectories qualitatively explain

  5. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  6. A national inventory of seawater intrusion vulnerability for Australia

    Directory of Open Access Journals (Sweden)

    Leanne K. Morgan

    2015-09-01

    New hydrological insights for the region: The combination of methods identified areas of highest risk to SWI including unconfined aquifers at Derby (WA and Esperance (WA, and confined aquifers at Esperance (WA and Adelaide (SA. The combination of analytic and qualitative approaches offers a more comprehensive and less subjective seawater intrusion characterization than arises from applying the methods in isolation, thereby imparting enhanced confidence in the outcomes. Importantly, active seawater intrusion conditions occur in many of Australia’s confined coastal aquifers, obviating the use of the analytical solution, and suggesting that offshore groundwater resources provide significant contributions to these systems.

  7. Hybrid Optimization of Support Vector Machine for Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    XI Fu-li; YU Song-nian; HAO Wei

    2005-01-01

    Support vector machine (SVM) technique has recently become a research focus in intrusion detection field for its better generalization performance when given less priori knowledge than other soft-computing techniques. But the randomicity of parameter selection in its implement often prevents it achieving expected performance. By utilizing genetic algorithm (GA) to optimize the parameters in data preprocessing and the training model of SVM simultaneously, a hybrid optimization algorithm is proposed in the paper to address this problem. The experimental results demonstrate that it's an effective method and can improve the perfornance of SVM-based intrusion detection system further.

  8. Research and Implementation of Unsupervised Clustering-Based Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    Luo Min; Zhang Huan-guo; Wang Li-na

    2003-01-01

    An unsupervised clustering-based intrusion de tection algorithm is discussed in this paper. The basic idea of the algorithm is to produce the cluster by comparing the distances of unlabeled training data sets. With the classified data instances, anomaly data clusters can be easily identified by normal cluster ratio and the identified cluster can be used in real data detection. The benefit of the algorithm is that it doesnt need labeled training data sets. The experiment concludes that this approach can detect unknown intrusions efficiently in the real network connections via using the data sets of KDD99.

  9. Research and Implementation of Unsupervised Clustering-Based Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    LuoMin; ZhangHuan-guo; WangLi-na

    2003-01-01

    An unsupervised clustering-based intrusion detection algorithm is discussed in this paper. The basic idea of the algorithm is to produce the cluster by comparing the distances of unlabeled training data sets. With the classified data instances, anomaly data clusters can be easily identified by normal duster ratio and the identified cluster can be used in real data detection. The benefit of the algorithm is that it doesn't need labeled training data sets. The experiment coneludes that this approach can detect unknown intrusions efficiently in the real network connections via using the data sets of KDD99.

  10. Volcanism on Mercury (dikes, lava flows, pyroclastics): Crust/mantle density contrasts, the evolution of compressive stress and the presence of mantle volatiles

    Science.gov (United States)

    Wilson, L.; Head, J. W., III

    2008-09-01

    have assumed a series of permutations of crustal density, crustal thickness, mantle density, magma density, source depth in mantle of melt generation, and crustal compressive stress, and investigated which permutations will allow the transfer of magma from source to surface. With so many variables it is easiest to illustrate the results by choosing one set of densities and varying the depths and stresses. We begin with crustal density of 2700 kg m-3, a mantle density of 3400 kg m-3 and a melt density of 3000 kg m-3. Table 1 then shows, as a function of the thickness of the crust (Hc), the minimum depth below the surface (Hm) from which mantle melts must be derived if their positive buoyancy in the mantle is to just compensate for their negative buoyancy in the crust and so enable them to reach the surface and erupt. For the values of Hm in Table 1 to be valid, the stress conditions in the crust must be such that a dike can remain open at all depths. However, this may not be possible in the presence of a horizontal compressive stress. The third and fourth columns of the table show the maximum horizontal compressive stress allowed if a dike is to remain open when the compressive stress is either uniform, i.e. the same at all depths in the crust (Su), or variable, specifically decreasing from the value given (Sv) at the surface to zero at the base of the crust. We now increase the crustal density slightly to 2800 kg m-3 but keep the mantle and melt densities the same. The results in Table 2 show, as expected, that the reduced amount of negative buoyancy of magma in the crust means that mantle melt sources need not be quite as deep as before. However, if a pathway is to remain open at all depths, significantly smaller compressive stresses are needed than in the previous case. Implications: This comparison demonstrates the major trend that we find: as the crust becomes denser it is easier, in terms of magma buoyancy alone, to erupt magma from a given depth in the mantle

  11. Physical, chemical, and thermal interactions in the Pleasant Bay Layered Gabbro-Diorite Intrusion, Maine

    Science.gov (United States)

    Patwardhan, K.; Algeo, J.

    2012-12-01

    The approximately 3 km thick Pleasant Bay Layered Intrusion (PBLI) is interpreted to have formed (420 Ma) by repeated intrusions of gabbroic magma into a partly solidified dioritic magma chamber (Wiebe, 1993; Waight et. al., 2001) during the earliest stage of the Acadian orogeny (Tucker et. al., 2001). Typical field relationships in the PBLI include gradational gabbro-diorite layers of variable thicknesses with pipes of silicic composition intruding along the chilled lower contacts of gabbroic layers, chilled gabbroic blobs encased within diorite, and composite dikes consisting of intermingled gabbro blobs of rounded and/or angular geometries within a dioritic or granitic matrix. Detailed studies of similar relationships in the nearby Isle au Haut Igneous Complex (IHIC) have indicated that where diorite underlies gabbro, residual silicic melt was extracted from the underlying partly solidified diorite by compaction and migrated upwards to form a thin layer of buoyant melt that underwent a Rayleigh-Taylor (R-T) type instability producing the silicic pipes which were subsequently arrested by solidification of the overlying gabbro (Chapman & Rhodes, 1992; Patwardhan & Marsh, 2011). Whereas in the IHIC pipes typically are 11-12 cm in diameter and spaced ~30 cm apart, instability features in the PBLI occur at varying scales with pipe diameters commonly ranging from 4 to 100 cm and pipe spacing varying between 20 to 150 cm. Strong compositional differences between the gabbro (~48 wt.% SiO2), diorite (~57 wt.% SiO2), and pipes (~66 wt.% SiO2) correspond to significant differences in estimated density, liquid viscosity, and temperature (near liquidus gabbro: 2.68 g/cm3, 102.3 poise, 1210 oC, partly crystallized diorite: 2.61 g/cm3, 990 oC, and silicic melt derived from partly crystallized diorite: 2.36 g/cm3, 105 poise). The thickness of the buoyant silicic layer and the ascent rate of the pipes emanating from this layer are calculated using estimated viscosity ratios and

  12. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...

  13. SEAWATER INTRUSION TYPES AND REGIONAL DIVISIONS IN THE SOUTHERN COAST OF LAIZHOU BAY

    Institute of Scientific and Technical Information of China (English)

    孟广兰; 韩有松; 王少青; 王珍岩

    2002-01-01

    The southern coast of Laizhou Bay, Bohai Sea, is one of the areas in China most seriously impacted by seawater intrusion. Based on the sources of intruding wate rbodies, seawater intrusion can be divided into two types: intrusion of saline water derived from modern seawater, and intrusion of subsurface brine and saline water derived from paleo-seawater in shallow Quaternary sediments. There are so me distinct differences in their formation, mechanism and damage. The subsurface brine intrusion is a special typ e, which can cause very serious disaster.The coastal landform and the Quaternary hydrogeological environment are pr edominant factors in the classification of seawater intrusion types. Various coastal environments in diff erent coastal sections result in three types of intrusion: seawater intrusion, saline groundwater intrusion, and mixed seawater and saline water intrusion, in the southern coast of Laizhou Bay, which can be divided into four areas: the seawater intrusion area in the northern Laizhou City coast, the mixed seawater and saline groundwater in trusion area in the Baisha River-Jiaolai River mouth plain area, the mixed seawater and saline groundwater intrus ion area in the Weihe River mouth plain area northern Changyi county coast, and the saline groundwater intrusion area in the northern Shouguang plains.

  14. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  15. Geology and Geochemistry of Reworking Gold Deposits in Intrusive Rocks of China—Ⅰ. Features of the Intrusive Rocks

    Institute of Scientific and Technical Information of China (English)

    王秀璋; 程景平; 等

    1998-01-01

    Most gold deposits in intrusive rocks were formed as a result of reworking processes.the intrusive rocks containing gold deposits and consisting of ultramafic-mafic,intermediateacid and alkaline rocks of the Archean,Proterozoic,Caledonian,Hercynian and Yenshanian periods occur in cratons,activated zones of cratons and fold belts.Among them,ultramaficmafic rocks,diorite,alkaline rocks,and anorthosite are products of remelting in the mantle or mantle-crust or mantle with crustal contamination,However,auriferous intermediate-acid rocks are products of metasomatic-remelting in auriferous volcainc rocks or auriferous volcanosedimentary rocks in the deep crust.

  16. Raman spectra of carbonaceous material in Archean chert and silica dike: a thermal structure of ancient ocean floor

    Science.gov (United States)

    Kitajima, K.; Maruyama, S.

    2005-12-01

    Carbonaceous material (CM) is widespread in metamorphic rocks. CM is also reported from Archean rocks such as sedimentary rock and hydrothermal vein. Raman spectrum of CM changes with the degree of graphitization by metamorphism. The purpose of this study is to determine of the thermal structure of the low-grade zone in the Archean accretionary complex which was not able to determine using metamorphic petrology because of luck of index minerals, and to select of the best sample for analysis of molecular fossil. The North Pole area (3.5 Ga) is one of the best regions in the Archean greenstone belt, because this area had been subjected only to very low-grade metamorphism. A 1/5000 scale mapping was performed in the North Pole area. The mapped area is divided into seven units bounded by layer-parallel thrusts: Units-I, -II, -III, -IV, -V, -VI and -VII, in ascending order. These units are divided into MORB-type (Unit-I and -II) and OIB-type (Unit-III, -IV, -V, -VI and -VII) units by lithology and mode of occurrence. Microfossils are reported from the bedded chert and silica dike which is composed of very fine-grained silica in the Unit-I. We analyzed 20 bedded and silica dike samples collected from ancient seafloor (0 m) to 900 m depth of oceanic crust. The characterization of samples was performed by Raman microspectroscopy in situ using conventional petrologic double polished thin sections. All sample shows ordered peak (O-peak) and disordered peak (D-peak) around 1580-1610 cm-1 and ~1355 cm-1, respectively. There is no trend in D/O intensity and D/O area ratio. D/O width ratio and full width at half maximum (FWHM) of D-peak, however, indicate a clear trend, except bedded chert samples. D/O width ratio is decreasing with depth, from 2.2 to ~1, and FWHM of D-peak is also decreasing with depth from 100 cm-1 to 60 cm-1 between top of the unit and 180 m depth. It is considered that decreasing of D/O width ratio and FWHM of D-peak occurs with increasing of metamorphic

  17. 10 CFR 63.321 - Individual protection standard for human intrusion.

    Science.gov (United States)

    2010-01-01

    ... IN A GEOLOGIC REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion Standard § 63.321 Individual protection standard for human intrusion. (a) DOE...

  18. Lunar Intrusive Domes on the Floor of Grimaldi and Near Aristillus

    Science.gov (United States)

    Wöhler, C.; Lena, R.; Pau, K. C.

    2010-03-01

    In this contribution we examine two large lunar domes of probably intrusive origin. The morphometric properties of the domes are derived, and geophysical parameters (intrusion depth, magma pressure) are estimated based on modelling.

  19. The effect of intrusive orthodontic force on dental pulp of adults versus adolescents

    Directory of Open Access Journals (Sweden)

    Mostafa Abtahi

    2016-01-01

    Conclusion: Mild intrusive force in closed apex teeth causes no significant histologic changes in adolescents and adults. However, it seems that inflammatory-related histologic pulpal changes are more severe in adults after one month of intrusion.

  20. Enhancing Battlemind: Preventing PTSD by Coping with Intrusive Thoughts

    Science.gov (United States)

    2014-05-01

    normative across varied populations, those experiencing intrusive thoughts often report that the thoughts are disturbing, and they fear Coping With...tests of a cognitive model of generalized anxiety disorder: Metacognitions and worry in GAD, panic disorder, social phobia , depression, and nonpatients

  1. Revisiting anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, Damiano

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  2. MULTI SCALE TIME SERIES PREDICTION FOR INTRUSION DETECTION

    Directory of Open Access Journals (Sweden)

    G. Palanivel

    2014-01-01

    Full Text Available We propose an anomaly-based network intrusion detection system, which analyzes traffic features to detect anomalies. The proposed system can be used both in online as well as off-line mode for detecting deviations from the expected behavior. Although our approach uses network packet or flow data, it is general enough to be adaptable for use with any other network variable, which may be used as a signal for anomaly detection. It differs from most existing approaches in its use of wavelet transform for generating different time scales for a signal and using these scales as an input to a two-stage neural network predictor. The predictor predicts the expected signal value and labels considerable deviations from this value as anomalies. The primary contribution of our work would be to empirically evaluate the effectiveness of multi resolution analysis as an input to neural network prediction engine specifically for the purpose of intrusion detection. The role of Intrusion Detection Systems (IDSs, as special-purpose devices to detect anomalies and attacks in a network, is becoming more important. First, anomaly-based methods cannot achieve an outstanding performance without a comprehensive labeled and up-to-date training set with all different attack types, which is very costly and time-consuming to create if not impossible. Second, efficient and effective fusion of several detection technologies becomes a big challenge for building an operational hybrid intrusion detection system.

  3. An Overview of IP Flow-Based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Schaffrath, Gregor; Sadre, Ramin; Morariu, Cristian; Pras, Aiko; Stiller, Burkhard

    2010-01-01

    Intrusion detection is an important area of research. Traditionally, the approach taken to find attacks is to inspect the contents of every packet. However, packet inspection cannot easily be performed at high-speeds. Therefore, researchers and operators started investigating alternative approaches,

  4. SSHCure: SSH Intrusion Detection using NetFlow and IPFIX

    NARCIS (Netherlands)

    Hendriks, Luuk; Hofstede, Rick; Sperotto, Anna; Pras, Aiko

    2014-01-01

    With this poster, we present our SSH Intrusion Detection System named SSHCure: it is the first IDS capable of distinguishing successful attacks from unsuccessful attacks, thus detecting actual compromises. As powerful as SSH is to administrators, as attractive it is to anyone with malicious intents.

  5. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  6. Misleading reconstruction of seawater intrusion via integral depth sampling

    Science.gov (United States)

    Colombani, N.; Volta, G.; Osti, A.; Mastrocicco, M.

    2016-05-01

    Saltwater intrusion in coastal aquifers is an urgent issue for the actual and future groundwater supply and a detailed characterization of groundwater quality with depth is a fundamental prerequisite to correctly distinguish salinization processes. In this study, interpolated Cl- maps of the Po River delta coastal aquifer (Italy), gained with Integrated Depth Sampling (IDS) and Multi-Level Sampling (MLS) techniques, are compared. The data set used to build up the IDS and MLS interpolated Cl- maps come from numerous monitoring campaigns on surface and ground waters, covering the time frame from 2010 to 2014. The IDS interpolated Cl- map recalls the phenomenon of actual seawater intrusion, with Cl- concentration never exceeding that of seawater and the absence of hypersaline groundwater all over the study area. On the contrary, in the MLS interpolated Cl- maps the lower portion of the unconfined aquifer presents hypersaline groundwater making it necessary to consider salinization processes other than actual seawater intrusion, like upward flux from a saline aquitard. Results demonstrate the obligation of using MLS in reconstructing a reliable representation of the distribution of salinity, especially in areas where the density contrast between fresh and saline groundwater is large. Implications of the reported field case are not limited to the local situation but have a wider significance, since the IDS technique is often employed in saltwater intrusion monitoring even in recent works, with detrimental effect on the sustainable water resource management of coastal aquifers.

  7. Predicting The Intrusion Layer From Deep Ocean Oil Spills

    Science.gov (United States)

    Wang, Dayang; Chow, Aaron; Adams, E. Eric

    2015-11-01

    Oil spills from deep ocean blowout events motivate our study of multiphase plumes in a water column. Key to understanding the long-term fate of these plumes is the ability to predict the depth and persistence of intrusion layers. While intrusion layers from multiphase plumes have been studied under stagnant conditions, their behavior in the presence of crossflow, especially in mild crossflow, remains poorly understood. The classical classification of plume behavior identifies two regimes: crossflow-dominant and stratification-dominant--but it does not account for the interplay between the two effects, leaving the transition region unexplored. We conduct laboratory tank experiments to investigate the behavior of intrusion layers under the simultaneous action of crossflow and stratification. Our experiments use an inverted frame of reference, using glass beads with a range of sizes to simulate oil droplets. We find that crossflow creates enhanced mixing, which in turn leads to a shallower intrusion layer of the released fluid (correspondingly, a deeper layer in the case of a deep ocean blowout). We develop a mathematical formulation that extends previous models to account for crossflow effects, and use field observations to validate the analytical and experimental findings.

  8. Tracking salinity intrusions in a coastal forested freshwater wetland system

    Science.gov (United States)

    Anand D. Jayakaran; Thomas M. Williams; William H. Conner

    2016-01-01

    Coastal forested freshwater wetlands are sentinel sites for salinity intrusions associated with large, tidally influenced, storm-driven or drought-induced incursions of estuarine waters into freshwater ecosystems. These incursions may also be exacerbated by rising sea levels associated with climate change.

  9. A novel feature selection approach for intrusion detection data classification

    NARCIS (Netherlands)

    Ambusaidi, Mohammed A.; He, Xiangjian; Tan, Zhiyuan; Nanda, Priyadarsi; Lu, Liang Fu; Nagar, Upasana T.

    2014-01-01

    Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing daily activities occurring in computer systems to detect occurrences of security threats. However, the routinely produced analytical data from computer networks are usually of very huge in size. This creates a

  10. Sensitivity analysis on parameters and processes affecting vapor intrusion risk

    NARCIS (Netherlands)

    Picone, S.; Valstar, J.R.; Gaans, van P.; Grotenhuis, J.T.C.; Rijnaarts, H.H.M.

    2012-01-01

    A one-dimensional numerical model was developed and used to identify the key processes controlling vapor intrusion risks by means of a sensitivity analysis. The model simulates the fate of a dissolved volatile organic compound present below the ventilated crawl space of a house. In contrast to the v

  11. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    2008-01-01

    We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying a new method for anomaly detection on the

  12. SSHCure: a flow-based SSH intrusion detection system

    NARCIS (Netherlands)

    Hellemons, Laurens; Hendriks, Luuk; Hofstede, Rick; Sperotto, Anna; Sadre, Ramin; Pras, Aiko

    2012-01-01

    SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity. Most existing network intrusion detection systems designed for this purpose rely on the

  13. Poseidon: a 2-tier anomaly-based intrusion detection system

    NARCIS (Netherlands)

    Bolzoni, Damiano; Zambon, Emmanuele; Etalle, Sandro; Hartel, Pieter

    2005-01-01

    We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection r

  14. Evaluation of of μ-controller PIR Intrusion Detector

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    West African Journal of Industrial & Academic Research Vol.15 No.1 December 2015. 3 ... Intrusion detection is simply the process of recognizing that an object is located in a place ... the specific application and operational ... Figure 1: Block Diagram Showing Design Modules and the ..... Engineering Science Invention, Vol.

  15. Network Intrusion Detection System Based On Machine Learning Algorithms

    Directory of Open Access Journals (Sweden)

    Vipin Das

    2010-12-01

    Full Text Available Network and system security is of paramount importance in the present data communication environment. Hackers and intruders can create many successful attempts to cause the crash of the networks and web services by unauthorized intrusion. New threats and associated solutions to prevent these threats are emerging together with the secured system evolution. Intrusion Detection Systems (IDS are one of these solutions. The main function of Intrusion Detection System is to protect the resources from threats. It analyzes and predicts the behaviours of users, and then these behaviours will be considered an attack or a normal behaviour. We use Rough Set Theory (RST and Support Vector Machine (SVM to detect network intrusions. First, packets are captured from the network, RST is used to pre-process the data and reduce the dimensions. The features selected by RST will be sent to SVM model to learn and test respectively. The method is effective to decrease the space density of data. The experiments compare the results with Principal Component Analysis (PCA and show RST and SVM schema could reduce the false positive rate and increase the accuracy.

  16. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  17. Corporate Mergers in the Publishing Industry: Helpful or Intrusive?

    Science.gov (United States)

    Rudman, Herbert C.

    1990-01-01

    Examines the effects of corporate mergers in the publishing industry on the publishing of textbooks and standardized tests. Concludes that restructuring, acquisitions, and mergers have an intrusive effect on established practices of academic publishing and may severely limit the access of scholars to the academic marketplace. (FMW)

  18. Mitigating Intrusion and Vulnerabilities in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    I. Ohaeri

    Full Text Available The deployment of Cognitive Radio Networks has been greatly hindered in spite of its potentials by the rate at which intrusions and vulnerabilities replicate within every domain of the network. Cognitive Radio Network is expected to drive the next generat ...

  19. Implementation of Network Intrusion Detection System Based on Density-based Outliers Mining

    Institute of Scientific and Technical Information of China (English)

    Huang,Guangqiu; Peng,Xuyou; LV,Dingquan

    2005-01-01

    The paper puts forward a new method of densitybased anomaly data mining, the method is used to design the engine of network intrusion detection system (NIDS), thus a new NIDS is constructed based on the engine. The NIDS can find new unknown intrusion behaviors, which are used to updated the intrusion rule-base, based on which intrusion detections can be carried out online by the BM pattern match algorithm. Finally all modules of the NIDS are described by formalized language.

  20. A numerical study of the impact of hurricane-induced storm surge on the Herbert Hoover Dike at Lake Okeechobee, Florida

    Science.gov (United States)

    Li, Yuepeng; Teng, Yi-Cheng; Kelly, David M.; Zhang, Keqi

    2016-12-01

    Hurricanes Frances, Jeanne, and Wilma passed over Lake Okeechobee, Florida, in September 2004 and October 2005, respectively. Strong winds caused a large surface seiche on the lake during all three storms. These storms resulted in erosion damage to the Herbert Hoover Dike (HHD) on Lake Okeechobee. In this paper, we use the Fully Adaptive Storm Tide (FAST) model (Kelly et al. in Coast Eng J 57(4):1-30, 2015, Nat Hazards 83:53-74, 2016) to study the response of the lake (in terms of the water level fluctuations and induced currents) to hurricanes Frances, Jeanne, and Wilma. Comparisons of the modeled surface water level with the observations are in overall good agreement for all three hurricanes. The modeled results suggest that the strong currents induced by the storm winds may be the dominant factor controlling the dike erosion observed at the lake side. The locations of erosion damage to the dike are consistent with the modeled high velocity zones during these three storms. In addition, numerical experiments have been conducted with eight hypothetical category 5 hurricanes approaching from different directions to investigate the erosion-prone zones related to high velocities in the vicinity of the dike. The results of the study should help to provide insight into vulnerable reaches of the HHD and inform flood control in the Okeechobee region.

  1. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  2. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  3. Dating sub-20 micron zircons in granulite-facies mafic dikes from SW Montana: a new approach using automated mineralogy and SIMS U-Pb geochronology

    Science.gov (United States)

    Ault, A. K.; Mahan, K. H.; Flowers, R. M.; Chamberlain, K.; Appleby, S. K.; Schmitt, A. K.

    2010-12-01

    Geochronological data is fundamental to all tectonic studies, but a major limitation for many lithologies is a paucity of sizeable zircons suitable for conventional U-Pb techniques. In particular, mafic dike swarms provide important time markers for tectonometamorphic activity in Precambrian terranes, but commonly yield little or no zircon or baddeleyite sufficient for TIMS or standard ion-probe analysis of crystal separates. We apply a new approach involving in-situ automated mineralogy and high spatial resolution Secondary Ion Mass Spectrometry (SIMS) geochronology to a mafic dike swarm exposed in the Northern Madison Range of SW Montana. The dikes cross-cut early fabrics but are also variably deformed and metamorphosed to P-T conditions as high as 1.2 GPa and 850 C. The swarm emplacement age is inferred to be ca. 2.1 Ga based on similarities to dated dikes in the adjacent Tobacco Root Mountains. Resolving the timing of dike emplacement and high-grade metamorphism in the study area is important for understanding the extent of post-Archean modification to the northwest margin of the Wyoming craton. Identification and textural characterization of zircons were facilitated by in-situ automated mineralogical analysis, in contrast to a standard elemental X-ray mapping approach. Our technique uses an SEM-based platform coupling calibrated BSE data with X-ray data collected by multiple energy dispersive spectrometers to rapidly identify target accessory phases at high spatial resolution. Whole thin section search maps were generated in ~30 minutes at 4 µm pixel resolution. Our dike thin sections commonly contained >300 zircons in a variety of textural settings, with 80% having a short dimension 95% for 206Pb. SIMS data for 22 zircons from a granulite-facies mafic dike thin section define a chord with upper and lower intercepts of 1753.1 ± 9.5 Ma and 63.2 ± 7.9 Ma, respectively (2 sigma error, MSWD = 1.6). A positive correlation between U concentration and degree of

  4. Origin of the late Early Cretaceous granodiorite and associated dioritic dikes in the Hongqilafu pluton, northwestern Tibetan Plateau: A case for crust-mantle interaction

    Science.gov (United States)

    Li, Jiyong; Niu, Yaoling; Hu, Yan; Chen, Shuo; Zhang, Yu; Duan, Meng; Sun, Pu

    2016-09-01

    We present a detailed study of geochronology, mineral chemistries, bulk-rock major and trace element abundances, and Sr-Nd-Hf isotope compositions of the granodiorite and associated dioritic dikes in the Hongqilafu pluton at the northwestern margin of the Tibetan Plateau. The granodiorite and dioritic dikes yielded zircon U-Pb ages of 104 Ma and 100 Ma, respectively. The dioritic dikes comprise varying lithologies of gabbroic diorite, diorite porphyry and granodiorite porphyry, exhibiting a compositional spectrum from intermediate to felsic rocks. Their mineral compositions display disequilibrium features such as large major element compositional variations of plagioclase, clinopyroxene and amphibole crystals. These dioritic dikes are enriched in incompatible elements (Ba, Rb, Th, U, K) and Sr-Nd-Hf isotopes (87Sr/86Sri: 0.7066 to 0.7071, εNd(t): - 5.3 to - 7.4, εHf(t): - 3.6 to - 6.2). We suggest that the dioritic dikes were most likely derived from partial melting of mantle wedge metasomatized by the subducted/subducting seafloor with a sediment component, followed by AFC processes with fractional crystallization of clinopyroxene, amphibole and plagioclase and assimilation of lower continental crust. The mantle-wedge derived magma parental to the dioritic dikes underplated and induced the lower continental crust to melt, forming the felsic crustal magma parental to the granodiorite with mantle melt signatures and having more enriched isotope compositions (87Sr/86Sri: 0.7087 to 0.7125, εNd(t): - 9.5 to - 11.6, εHf(t): - 10.3 to - 14.1) than those of the dioritic dikes. The Hongqilafu pluton is thus the product of mantle-crust interaction at an active continental margin subduction setting over the period of several million years. This understanding further indicates that the closure timing of the Shyok back-arc basin and the collision between the Kohistan-Ladakh Arc and the Karakoram Terrane may have taken place later than 100 Ma.

  5. Dike control of hydrothermal circulation in the Tertiary Icelandic crust and implications for cooling of the seafloor

    Science.gov (United States)

    Pałgan, Dominik; Devey, Colin W.; Yeo, Isobel A.

    2016-04-01

    Hydrothermal activity along the Mid-Atlantic Ridge is predominantly high-temperature venting controlled by volcano-tectonic processes confined to the ridge axis and neotectonic zone, which extends ~ 20 km on each side of the axis (e.g. TAG or Logatchev 1). These vents cannot, however, account for all the heat which needs to be removed to cool the plate and a significant amount of heat is probably removed in the off-axis regions as well. These regions have previously not been systematically surveyed for hydrothermal activity due to a lack of predictive models for its nature, location or controlling structures. Here we use hot springs in the Tertiary Westfjords of Iceland as onshore analogs for hydrothermal activity along the off-axis Mid-Atlantic Ridge to better understand tectonic and volcanological controls on their occurrence, as well as the processes which support hydrothermal circulation. Our results show that even crust ≥ 10 Ma has abundant low-temperature hydrothermal activity. We show that 66% of hot springs investigated, and 100% of those for which a detailed geological setting could be determined, are associated with basaltic dikes cross-cutting the sub-horizontal lava sequence. This is in strong contrast to on-axis springs, which are known (both from underwater and on land) to be predominantly associated with faults. Absence of earthquakes in Westfjords suggests that the faults there are no longer active and possibly sealed by secondary minerals, suppressing fluid circulation. In such a situation, the jointed and fractures dike margins may provide the major pathways for fluid circulation. Extrapolating this idea to the off-axis regions of the Reykjanes Ridge, we suggest, based on bathymetric maps, potential sites for future exploration for off-axis hydrothermal systems.

  6. Application of a Hidden Bayes Naive Multiclass Classifier in Network Intrusion Detection

    Science.gov (United States)

    Koc, Levent

    2013-01-01

    With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…

  7. A reactive transport investigation of a seawater intrusion experiment in a shallow aquifer, Skansehage Denmark

    DEFF Research Database (Denmark)

    Christensen, Flemming Damgaard; Engesgaard, Peter Knudegaard; Kipp, K.L.

    2001-01-01

    Previous investigations on seawater intrusion have mainly focused on either the physical density flow system with transport of a single non-reactive species or focused on the geochemical aspects neglecting density effects. This study focuses on both the geochemical and physical aspects of seawater...... intrusion and their interaction during an intrusion experiment in a shallow, small-scale coastal aquifer in Denmark....

  8. Growth of plutons by incremental emplacement of sheets in crystal-rich host: Evidence from Miocene intrusions of the Colorado River region, Nevada, USA

    Science.gov (United States)

    Miller, C.F.; Furbish, D.J.; Walker, B.A.; Claiborne, L.L.; Koteas, G.C.; Bleick, H.A.; Miller, J.S.

    2011-01-01

    Growing evidence supports the notion that plutons are constructed incrementally, commonly over long periods of time, yet field evidence for the multiple injections that seem to be required is commonly sparse or absent. Timescales of up to several million years, among other arguments, indicate that the dominant volume does not remain largely molten, yet if growing plutons are constructed from rapidly solidifying increments it is unlikely that intrusive contacts would escape notice. A model wherein magma increments are emplaced into melt-bearing but crystal-rich host, rather than either solid or crystal-poor material, provides a plausible explanation for this apparent conundrum. A partially solidified intrusion undoubtedly comprises zones with contrasting melt fraction and therefore strength. Depending on whether these zones behave elastically or ductilely in response to dike emplacement, intruding magma may spread to form sheets by either of two mechanisms. If the melt-bearing host is elastic on the relevant timescale, magma spreads rather than continuing to propagate upward, where it encounters a zone of higher rigidity (higher crystal fraction). Similarly, if the dike at first ascends through rigid, melt-poor material and then encounters a zone that is weak enough (poor enough in crystals) to respond ductilely, the ascending material will also spread because the dike tip ceases to propagate as in rigid material. We propose that ascending magma is thus in essence trapped, by either mechanism, within relatively crystal-poor zones. Contacts will commonly be obscure from the start because the contrast between intruding material (crystal-poorer magma) and host (crystal-richer material) is subtle, and they may be obscured even further by subsequent destabilization of the crystal-melt framework. Field evidence and zircon zoning stratigraphy in plutons of the Colorado River region of southern Nevada support the hypothesis that emplacement of magma replenishments into a

  9. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora Group, Chhattisgarh Supergroup, India: Implications towards non-plume intrusive activity

    Indian Academy of Sciences (India)

    Priyabrata Das; Kaushik Das; Partha Pratim Chakraborty; S Balakrishnan

    2011-04-01

    Besides offering significant clues towards tracking the geochemical evolution of the mantle and architectural reconstruction of different ‘supercontinent’, geochronological and geochemical appraisal of igneous inputs are also important to bracket the depositional time frame of any lithopackage, particularly, the unfossiliferous sedimentary successions. The present study deals with diabasic intrusive within Mesoproterozoic Saraipalli Formation, which is an argillaceous constituent present at the basal part of nearly 400 m thick four-tiered unmetamorphosed but deformed sedimentary succession of Singhora Group, Chhattisgarh Supergroup, central India. The SE–NW trending intrusive comprises mainly of plagioclase and augite together with minor orthopyroxene, biotite and opaque minerals. Though some plagioclase laths are partially sericitized, the ophitic-to-subophitic texture of the rock is well preserved. Major and trace element geochemical data indicate that this intrusive is basalt-to-basaltic andesite in character and of subalkaline basalt affinity. Multi-element plot shows overall LILE-enrichment and enrichment of Pb and slight depletion of Nb and P, coupled with moderate La/Nb and Th/Nb ratios. Zr, Y and Nb ternary diagrams plot in the fields of within plate basalt. Selected HFSE ratios indicate a non-plume source with crustal assimilation/sediment mixing. Sm–Nd and Rb–Sr isotope data show that the intrusive has Srinitial and Ndinitial of 0.709377–0.706672 and 0.510919–0.510815, respectively. Positive tNd [t = 1420 Ma] values (+0.3 to + 2.3) indicate depleted isotopic nature of their protolith. The calculated DM age is 1.7–1.9 Ga. The mineral-whole rock isochron data (Sm–Nd systematics) of the intrusive implies an emplacement age of ca. 1420 Ma. Considering synchronous terrain boundary shear zone development in Bastar craton on the southeastern part of the Singhora basin, mafic magmatism in Eastern Ghats and large-scale basic intrusion in Sausar

  10. Syn-collision Hairhan layered intrusion, Lakes Zone, Western Mongolia

    Science.gov (United States)

    Vishnevskiy, A. V.; Izokh, A. E.; Kalugin, V. M.; Gertner, I. F.

    2012-04-01

    In the structure of the Lakes Zone of Western Mongolia, which is reconstructed as the Early Cambrian island arc (Lakes island arc terrane), there are several groups of contiguous space gabbroic intrusions, merged in Hirgisnuur complex. The largest (70 km2) is Hairhan intrusion, located in the central part of the Lake Zone in the Bumbat-Hairhan ridge. The structure of the intrusion disturbed by later tectonic movements and the subsequent formation of Cambrian granitoids Tohtoginshil complex. The structures of the body are two groups of rocks: layered series and marginal facies, fragmentary spread to the periphery of intrusion. Gabbronorites of marginal facies have intrusive contacts with the sedimentary rocks of Early Cambrian age Burgastay formation. The marginal facies, apparent thickness which is 1.5 km, is composed primarily of non-olivine gabbronorites in which there is trachytoid and sometimes bedding. Layered series composes the central part of the Hairhan intrusion, the direction of layering has a northwest strike, coaxial with the long axis of the intrusion. The lower part of the layered series consists mainly troctolites with minor olivine gabbroids. The upper part of the layered series consists mainly of olivine gabbro, troctolite occur here less frequently also observed small schlieren anorthosites. Of particular interest is the horizon taxitic gabbro and being above it - the horizon orbicular gabbro at the top of the layered series. The rocks are widely manifested magmatic disruptive and plastic deformation - both macro and micro levels. They are expressed in the collapse of layering of elements in small folds of varying amplitude (typically to a few tens centimeters), often passing into areas and zones taxitic disruption. The greatest number of these structural elements characteristic of the upper part of the layered series, including the orbicular gabbro and troctolites taxitic horizons. These features indicate intensive tectonic processes that

  11. A Real Time Intrusion Aggregation And Prevention Technique

    Directory of Open Access Journals (Sweden)

    Fouzia Sultana

    2013-03-01

    Full Text Available Alert aggregation is an important subtask of intrusion detection. The goal is to identify and to cluster different alerts produced by low-level intrusion detection systems, firewalls, etc. belonging to a specific attack instance which has been initiated by an attacker at a certain point in time. Thus, meta-alerts can be generated for the clusters that contain all the relevant information whereas the amount of data (i.e., alerts can be reduced substantially. Meta-alerts may then be the basis for reporting to security experts or for communication within a distributed intrusion detection system. We propose a novel technique for online alert aggregation which is based on a dynamic, probabilistic model of the current attack situation. Basically, it can be regarded as a data stream version of a maximum likelihood approach for the estimation of the model parameters. With three benchmark data sets, we demonstrate that it is possible to achieve reduction rates of up to 99.96 percent while the number of missing meta-alerts is extremely low. In addition, meta-alerts are generated with a delay of typically only a few seconds after observing the first alert belonging to a new attack instance. Two types of intrusions are detected in this work: Firstly a spam attack is detected based on the blacklisted IP addresses from Stop Forum Spam and secondly packet level intrusion is detected based on KDDcup data. A packet sniffer is designed which keeps sniffing and extracting all the packets that are exchanged over internet interface. The packets are filtered and the headers are extracted. The headers are further subdivided into TCP, IP and UDP headers. ICMP packets are then separated. The data is matched with the database intrusion entries using fast string matching techniques and possible attack entries are marked with different color codes. An attack signature may be visible in any header of the same packet. In such cases, the alerts are aggregated and a single

  12. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik;

    2016-01-01

    Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non......-intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results...

  13. EARLY WARNING MODEL OF NETWORK INTRUSION BASED ON D-S EVIDENCE THEORY

    Institute of Scientific and Technical Information of China (English)

    Tian Junfeng; Zhai Jianqiang; Du Ruizhong; Huang Jiancai

    2005-01-01

    Application of data fusion technique in intrusion detection is the trend of nextgeneration Intrusion Detection System (IDS). In network security, adopting security early warning technique is feasible to effectively defend against attacks and attackers. To do this, correlative information provided by IDS must be gathered and the current intrusion characteristics and situation must be analyzed and estimated. This paper applies D-S evidence theory to distributed intrusion detection system for fusing information from detection centers, making clear intrusion situation, and improving the early warning capability and detection efficiency of the IDS accordingly.

  14. 基于集对分析的堤防工程安全综合评价研究%Comprehensive Evaluation and Research on the Dike Engineering Safety Based on Set Pair Analysis

    Institute of Scientific and Technical Information of China (English)

    郭威; 付亭亭; 李芳

    2016-01-01

    科学评价堤防工程安全状况和灾害风险,合理采取补强加固措施,对保障堤防工程的安全,充分发挥工程的综合效益意义重大。本文针对堤防工程长距离线状结构特点,借助集对分析系统学理论与方法,开展了堤防工程安全综合评价模型和实现方法研究,并进行了工程实例分析验证。%It is signality for the protection of dike engineering safety and giving full play to the comprehensive benefit of the engineering by evaluating dike engineering security situation and disaster risk scientifically and adopting reinforcement measures reasonably. Dike engineering safety comprehensive evaluation model and implement methods are studied under the dike engineering safety multi-factor and multi-mode comprehensive evaluation issues, according to dike engineering long distance line structure features, following analysis mentality from the local (unit dike) to the global (dike system) is carried out by set pair analysis theories and methods.

  15. A Jurassic Shock-Aftershock Earthquake Sequence Recorded by Small Clastic Pipes and Dikes within Dune Cross-Strata, Zion National Park, Utah

    Science.gov (United States)

    Loope, D. B.; Zlotnik, V. A.; Kettler, R. M.; Pederson, D. T.

    2012-12-01

    Eolian sandstones of south-central and southeast Utah contain large volumes of contorted cross-strata that have long been recognized as products of liquefaction caused by seismic shaking. Unlike most sites where Navajo Sandstone is exposed, in Zion National Park (southwestern Utah), the Navajo contains very, very few contorted strata. We have, however, mapped the distribution of more than 1,000 small-scale, vertical pipes and dikes in uncontorted cross-strata of the Navajo at two small study sites in Zion. Pipes are 2-5 cm in diameter and up to 3 m long; dikes are ~6 cm wide. Clusters of the water-escape structures lie directly above and below numerous, near-horizontal bounding surfaces. Dikes are restricted to the wind-ripple strata that lie above the bounding surfaces. Pipes are common both above and below the bounding surfaces. In map view, most pipes are arranged in lines. Near the bounding surfaces, pipes merge upward with shallow dikes trending parallel to the lines of pipes. Pipes formed in grainflows—homogeneous, well-sorted sand lacking cohesion. Dikes formed above the bounding surface, in more-cohesive, poorly sorted, wind-ripple strata. As liquefaction began, expansion of subsurface sand caused spreading within the unliquified (capping) beds near the land surface. Dikes intruded cracks in the wind-ripple strata, and pipes rose from the better-sorted sand to interdune surfaces, following trends of cracks. Because the wind-ripple strata had low cohesive strength, a depression formed around each rupture, and ejected sand built upward to a flat-topped surface rather than forming the cone of a classic sand volcano. In one 3 m2 portion of the map area, a cluster of about 20 pipes and dikes, many with truncated tops, record eight stratigraphically distinct seismic events. The large dunes that deposited the Navajo cross-strata likely moved ~1m/yr. When, in response to seismic shaking, a few liters of fluidized sand erupted onto the lowermost portion of the

  16. A Pattern Matching Algorithm for Reducing False Positive in Signature Based Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    T. Sree Kala,

    2016-04-01

    Full Text Available Nowadays the organizations are facing the number of threats every day in the form of viruses and attack etc. Since many different mechanisms were preferred by organizations in the form of intrusion detection and prevention system to protect its organizations from these kinds of attacks. Intrusion Detection System (IDS is considered as a system integrated with intelligent subsystems. In this paper the signature based intrusion detection system is discussed. There are different pattern matching algorithms available to detect intrusion. Brute force and Knuth-Morris-Pratt are the single keyword pattern matching algorithms. If one or more occurrence of pattern present in the input text, then there is an intrusion and the intrusion alarm will be sent. The occurrence of false alarm will be high in intrusion detection. In this paper the string matching algorithm to reduce the percentage of false alarm will be discussed.

  17. The 2014-2015 eruption at Fogo volcano: constraining the geometry of the intrusion and erupted volumes with space-geodesy

    Science.gov (United States)

    Bagnardi, M.; González, P. J.; Hooper, A. J.; Wright, T. J.

    2015-12-01

    After twenty years of quiescence, Fogo volcano, the most active in the Cape Verde archipelago, erupted for more than two months between November 2014 and February 2015. Voluminous and fast-moving lava flows were erupted from a linear fissure located at the base of Pico do Fogo cone and inundated the summit area of the volcano, destroying two villages. In our work we first use interferometric synthetic aperture radar (InSAR) data from the European Space Agency's Sentinel-1A satellite, which had been operative for only a few weeks at the time of the onset of the eruption, to constrain the geometry of the intrusion that fed the eruption. The InSAR data was acquired in the TOPS (Terrain Observation by Progressive Scans) mode and the eruption at Fogo represents the first volcanic eruption imaged by Sentinel-1 in its standard acquisition mode. To accurately model TOPS data, variations in both incidence and squint angle of the satellite line-of-sight (LoS) vector need to be taken into account when projecting 3D displacements into the LoS direction. Following this approach, we perform a Bayesian inversion of the InSAR data and infer that the measured deformation is best explained by the intrusion of a sub-vertical dike beneath the southwestern flank of Pico do Fogo cone. This intrusion seems to have first propagated upwards beneath the cone and subsequently laterally towards the southwestern flank of Pico do Fogo, where it reached the surface. Successively, we evaluate differences between pre- and post-eruptive digital elevation models (DEMs) of the volcano to estimate the volume of the most recent lava flows. The DEMs are formed using synthetic aperture radar imagery from the TanDEM-X (TerraSAR add-on for Digital Elevation Measurements) satellite mission and tri-stereo optical imagery from the Pléiades satellite constellation. Preliminary results show that during the 2014-2015 eruption almost 50 million cubic meters of lava were emplaced at the surface of the volcano

  18. A survey on RBF Neural Network for Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Henali Sheth

    2014-12-01

    Full Text Available Network security is a hot burning issue nowadays. With the help of technology advancement intruders or hackers are adopting new methods to create different attacks in order to harm network security. Intrusion detection system (IDS is a kind of security software which inspects all incoming and outgoing network traffic and it will generate alerts if any attack or unusual behavior is found in a network. Various approaches are used for IDS such as data mining, neural network, genetic and statistical approach. Among this Neural Network is more suitable approach for IDS. This paper describes RBF neural network approach for Intrusion detection system. RBF is a feed forward and supervise technique of neural network.RBF approach has good classification ability but its performance depends on its parameters. Based on survey we find that RBF approach has some short comings. In order to overcome this we need to do proper optimization of RBF parameters.

  19. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  20. Analysis of transient saltwater intrusion in costal aquifers

    Science.gov (United States)

    Chang, Y.; Yeh, H.

    2009-12-01

    In a costal aquifer, the seawater intrusion is a classic environmental and economical problem in groundwater hydrology. For modeling this phenomenon, the Henry’s formulation was usually adopted to describe the coupled system of flow and transport equations with variable density. However, it is an arduous task to solve such a problem due to the complexity of the coupled governing equations. For practical applicability, the mixed boundary condition which differs from the Dirichlet boundary condition at the coastal side in Henry’s problem is considered in this study. A depth of interface between freshwater and seawater is specified at the coast boundary and the Neumann and Dirichlet conditions are used, respectively, to describe the costal boundary. The perturbation method with a small parameter is used to decouple the groundwater flow and transport equations and derive the solution for the transient saltwater intrusion model. The model will be compared with some results obtained from finite element simulations.