WorldWideScience

Sample records for two-segment dike intrusion

  1. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes

    Science.gov (United States)

    L., Passarelli; E., Rivalta; A., Shuler

    2014-01-01

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process. PMID:24469260

  2. Hazard Models From Periodic Dike Intrusions at Kı¯lauea Volcano, Hawai`i

    Science.gov (United States)

    Montgomery-Brown, E. K.; Miklius, A.

    2016-12-01

    The persistence and regular recurrence intervals of dike intrusions in the East Rift Zone (ERZ) of Kı¯lauea Volcano lead to the possibility of constructing a time-dependent intrusion hazard model. Dike intrusions are commonly observed in Kı¯lauea Volcano's ERZ and can occur repeatedly in regions that correlate with seismic segments (sections of rift seismicity with persistent definitive lateral boundaries) proposed by Wright and Klein (USGS PP1806, 2014). Five such ERZ intrusions have occurred since 1983 with inferred locations downrift of the bend in Kı¯lauea's ERZ, with the first (1983) being the start of the ongoing ERZ eruption. The ERZ intrusions occur on one of two segments that are spatially coincident with seismic segments: Makaopuhi (1993 and 2007) and Nāpau (1983, 1997, and 2011). During each intrusion, the amount of inferred dike opening was between 2 and 3 meters. The times between ERZ intrusions for same-segment pairs are all close to 14 years: 14.07 (1983-1997), 14.09 (1997-2011), and 13.95 (1993-2007) years, with the Nāpau segment becoming active about 3.5 years after the Makaopuhi segment in each case. Four additional upper ERZ intrusions are also considered here. Dikes in the upper ERZ have much smaller opening ( 10 cm), and have shorter recurrence intervals of 8 years with more variability. The amount of modeled dike opening during each of these events roughly corresponds to the amount of seaward south flank motion and deep rift opening accumulated in the time between events. Additionally, the recurrence interval of 14 years appears to be unaffected by the magma surge of 2003-2007, suggesting that flank motion, rather than magma supply, could be a controlling factor in the timing and periodicity of intrusions. Flank control over the timing of magma intrusions runs counter to the historical research suggesting that dike intrusions at Kı¯lauea are driven by magma overpressure. This relatively free sliding may have resulted from decreased

  3. Graben Formation and Dike Arrest during the 2009 Harrat Lunayyir Dike Intrusion in Saudi Arabia: Insights from InSAR, Stress Calculations and Analog Experiments

    KAUST Repository

    Xu, Wenbin; Jonsson, Sigurjon; Corbi, Fabio; Rivalta, Eleonora

    2016-01-01

    Detailed spatial and temporal accounts of propagating dikes from crustal deformation data, including their interplay with faulting, are rare, leaving many questions about how this interplay affects graben formation and the arrest of dikes unanswered. Here we use InSAR observations, stress calculations and analog experiments to investigate the interaction between an intruding dike and normal faulting during the 2009 Harrat Lunayyir dike intrusion in western Saudi Arabia. We generated five displacement maps from InSAR data to unravel the temporal evolution of deformation covering the majority of the intrusion. We find that the observed surface displacements can be modeled by a ~2-m-thick dike with an upper tip ~2 km below the surface on 16 May 2009, four weeks after the onset of seismic unrest. In the following three days, the dike propagated to within ~1 km of the surface with graben-bounding normal faulting dominating the near-field deformation. The volume of the dike doubled between mid-May and mid-June. We carried out analog experiments that indicate that the wedge-shaped graben grew outwards with the faulting style changing progressively from normal faulting to oblique. Coulomb failure stress change calculations show that the intruding dike caused two zones of shallow horizontal tension on both sides of the dike, producing two zones of fissuring and normal faulting at the surface. In return, the faulting provoked compression around the upper tip of the dike, holding back its vertical propagation.

  4. Graben Formation and Dike Arrest during the 2009 Harrat Lunayyir Dike Intrusion in Saudi Arabia: Insights from InSAR, Stress Calculations and Analog Experiments

    KAUST Repository

    Xu, Wenbin

    2016-03-04

    Detailed spatial and temporal accounts of propagating dikes from crustal deformation data, including their interplay with faulting, are rare, leaving many questions about how this interplay affects graben formation and the arrest of dikes unanswered. Here we use InSAR observations, stress calculations and analog experiments to investigate the interaction between an intruding dike and normal faulting during the 2009 Harrat Lunayyir dike intrusion in western Saudi Arabia. We generated five displacement maps from InSAR data to unravel the temporal evolution of deformation covering the majority of the intrusion. We find that the observed surface displacements can be modeled by a ~2-m-thick dike with an upper tip ~2 km below the surface on 16 May 2009, four weeks after the onset of seismic unrest. In the following three days, the dike propagated to within ~1 km of the surface with graben-bounding normal faulting dominating the near-field deformation. The volume of the dike doubled between mid-May and mid-June. We carried out analog experiments that indicate that the wedge-shaped graben grew outwards with the faulting style changing progressively from normal faulting to oblique. Coulomb failure stress change calculations show that the intruding dike caused two zones of shallow horizontal tension on both sides of the dike, producing two zones of fissuring and normal faulting at the surface. In return, the faulting provoked compression around the upper tip of the dike, holding back its vertical propagation.

  5. Geodetic evidence for en echelon dike emplacement and concurrent slow slip during the June 2007 intrusion and eruption at Kīlauea volcano, Hawaii

    Science.gov (United States)

    Montgomery-Brown, E. K.; Sinnett, D.K.; Poland, M.; Segall, P.; Orr, T.; Zebker, H.; Miklius, Asta

    2010-01-01

    A series of complex events at Kīlauea Volcano, Hawaii, 17 June to 19 June 2007, began with an intrusion in the upper east rift zone (ERZ) and culminated with a small eruption (1500 m3). Surface deformation due to the intrusion was recorded in unprecedented detail by Global Positioning System (GPS) and tilt networks as well as interferometric synthetic aperture radar (InSAR) data acquired by the ENVISAT and ALOS satellites. A joint nonlinear inversion of GPS, tilt, and InSAR data yields a deflationary source beneath the summit caldera and an ENE-striking uniform-opening dislocation with ~2 m opening, a dip of ∼80° to the south, and extending from the surface to ~2 km depth. This simple model reasonably fits the overall pattern of deformation but significantly misfits data near the western end of an inferred dike-like source. Three more complex dike models are tested that allow for distributed opening including (1) a dike that follows the surface trace of the active rift zone, (2) a dike that follows the symmetry axis of InSAR deformation, and (3) two en echelon dike segments beneath mapped surface cracks and newly formed steaming areas. The en echelon dike model best fits near-field GPS and tilt data. Maximum opening of 2.4 m occurred on the eastern segment beneath the eruptive vent. Although this model represents the best fit to the ERZ data, it still fails to explain data from a coastal tiltmeter and GPS sites on Kīlauea's southwestern flank. The southwest flank GPS sites and the coastal tiltmeter exhibit deformation consistent with observations of previous slow slip events beneath Kīlauea's south flank, but inconsistent with observations of previous intrusions. Slow slip events at Kīlauea and elsewhere are thought to occur in a transition zone between locked and stably sliding zones of a fault. An inversion including slip on a basal decollement improves fit to these data and suggests a maximum of ~15 cm of seaward fault motion, comparable to previous slow

  6. Dike/Drift Interactions

    Energy Technology Data Exchange (ETDEWEB)

    E. Gaffiney

    2004-11-23

    This report presents and documents the model components and analyses that represent potential processes associated with propagation of a magma-filled crack (dike) migrating upward toward the surface, intersection of the dike with repository drifts, flow of magma in the drifts, and post-magma emplacement effects on repository performance. The processes that describe upward migration of a dike and magma flow down the drift are referred to as the dike intrusion submodel. The post-magma emplacement processes are referred to as the post-intrusion submodel. Collectively, these submodels are referred to as a conceptual model for dike/drift interaction. The model components and analyses of the dike/drift interaction conceptual model provide the technical basis for assessing the potential impacts of an igneous intrusion on repository performance, including those features, events, and processes (FEPs) related to dike/drift interaction (Section 6.1).

  7. Dike/Drift Interactions

    International Nuclear Information System (INIS)

    Gaffiney, E.

    2004-01-01

    This report presents and documents the model components and analyses that represent potential processes associated with propagation of a magma-filled crack (dike) migrating upward toward the surface, intersection of the dike with repository drifts, flow of magma in the drifts, and post-magma emplacement effects on repository performance. The processes that describe upward migration of a dike and magma flow down the drift are referred to as the dike intrusion submodel. The post-magma emplacement processes are referred to as the post-intrusion submodel. Collectively, these submodels are referred to as a conceptual model for dike/drift interaction. The model components and analyses of the dike/drift interaction conceptual model provide the technical basis for assessing the potential impacts of an igneous intrusion on repository performance, including those features, events, and processes (FEPs) related to dike/drift interaction (Section 6.1)

  8. Pre-eruption deformation caused by dike intrusion beneath Kizimen volcano, Kamchatka, Russia, observed by InSAR

    Science.gov (United States)

    Ji, Lingyun; Lu, Zhong; Dzurisin, Daniel; Senyukov, Sergey

    2013-01-01

    Interferometric synthetic aperture radar (InSAR) images reveal a pre-eruption deformation signal at Kizimen volcano, Kamchatka, Russia, where an ongoing eruption began in mid-November, 2010. The previous eruption of this basaltic andesite-to-dacite stratovolcano occurred in 1927–1928. InSAR images from both ascending and descending orbital passes of Envisat and ALOS PALSAR satellites show as much as 6 cm of line-of-sight shortening from September 2008 to September 2010 in a broad area centered at Kizimen. About 20 cm of opening of a nearly vertical dike provides an adequate fit to the surface deformation pattern. The model dike is approximately 14 km long, 10 km high, centered 13 km beneath Kizimen, and strikes NE–SW. Time-series analysis of multi-temporal interferograms indicates that (1) intrusion started sometime between late 2008 and July 2009, (2) continued at a nearly constant rate, and (3) resulted in a volume expansion of 3.2 × 107 m3 by September 2010, i.e., about two months before the onset of the 2010 eruption. Earthquakes located above the tip of the dike accompanied the intrusion. Eventually, magma pressure in the dike exceeded the confining strength of the host rock, triggering the 2010 eruption. Our results provide insight into the intrusion process that preceded an explosive eruption at a Pacific Rim stratovolcano following nearly a century of quiescence, and therefore have implications for monitoring and hazards assessment at similar volcanoes elsewhere.

  9. On the physical links between the dynamics of the Izu Islands 2000 dike intrusions and the statistics of the induced seismicity

    Science.gov (United States)

    Passarelli, Luigi; Rivalta, Eleonora; Simone, Cesca; Aoki, Yosuke

    2014-05-01

    The emplacement of magma-filled dikes often induce abundant seismicity in the surrounding host rocks. Most of the earthquakes are thought to occur close to the propagating tip (or edges, in 3D) of the dike, where stresses are concentrated. The resulting seismicity often appears as a swarm, controlled mainly by dike-induced stresses and stressing rate and by other factors, such as the background stressing rate, tectonic setting, regional stresses and tectonic history. The spatial distribution and focal mechanisms of the seismicity bear information on the interaction of the dike stress field and the tectonic setting of the area. The seismicity accompanying the intrusion of a dike is usually characterized by weak events, for which it is difficult to calculate the focal mechanisms. Therefore, only for a few well-recorded dike intrusions a catalog of focal mechanisms, allowing to perform a robust statistical analysis, is available. The 2000 dike intrusion at Miyakejima is in this sense an outstanding case, as about 18000 seismic events were recorded in a time span of three months. This seismic swarm was one of the most energetic ever recorded with five M>6 earthquakes. For this swarm a catalog of 1500 focal mechanisms is avalable (NIED, Japan). We perform a clustering analysis of the focal mechanism solutions, in order to infer the most frequent focal mechanism features prior to the intrusion (pre-diking period) and during the co-diking period. As previously suggested, we find that the dike stress field modified substantially the pre-existing seismicity pattern, by shadowing some non-optimally oriented strike-slip structures and increasing seismic rate on optimally oriented strike-slip tectonic structures. Alongside, during the co-diking period a large number of normal and oblique-normal faulting were observed. These events cannot be explained within the tectonics of the intrusion area. We suggest they are directly generated by the intense stress field induced at the

  10. Structural control on basaltic dike and sill emplacement, Paiute Ridge mafic intrusion complex, southern Nevada

    International Nuclear Information System (INIS)

    Carter Krogh, K.E.; Valentine, G.A.

    1996-08-01

    Late Miocene basaltic sills and dikes in the Paiute Ridge area of southern nevada show evidence that their emplacement was structurally controlled. Basaltic dikes in this area formed by dilating pre-existing vertical to steeply E-dipping normal faults. Magma propagation along these faults must have required less energy than the creation of a self-propagated fracture at dike tips and the magma pressure must have been greater than the compressive stress perpendicular to the fault surface. N- to NE-trending en echelon dikes formed locally and are not obviously attached to the three main dikes in the area. The en echelon segments are probably pieces of deeper dikes, which are segmented perhaps as a result of a documented rotation of the regional stresses. Alternatively, changes in orientation of principal stresses in the vicinity of each en echelon dike could have resulted from local loads associated with paleotopographic highs or nearby structures. Sills locally branched off some dikes within 300 m of the paleosurface. These subhorizontal bodies occur consistently in the hanging wall block of the dike-injected faults, and intrude Tertiary tuffs near the Paleozoic-Tertiary contact. The authors suggest that the change in stresses near the earth's surface, the material strength of the tuff and paleozoic rocks, and the Paleozoic bedding dip direction probably controlled the location of sill formation and direction of sill propagation. The two largest sills deflected the overlying tuffs to form lopoliths, indicating that the magma pressure exceeded vertical stresses at that location and that the shallow level and large size of the sills allowed interaction with the free (earth's) surface. 32 refs., 4 figs., 1 tab

  11. Dike/Drift Interactions

    Energy Technology Data Exchange (ETDEWEB)

    E.S. Gaffney

    2003-10-08

    This report documents the model of events associated with a potential intrusion of magma from a volcanic dike into a drift or drifts in the Yucca Mountain Nuclear Waste Repository. The following topics are included in this report: (1) A discussion of dike propagation, which provides the basis for describing the path that a representative dike, or swarm of dikes, would follow during an event. (2) A discussion of magma flow, which evaluates the interaction at the junction of the propagating dike with the drift and the movement of magmatic products into and down drifts and, potentially, through a drift to the surface by way of access drift or a secondary dike opened up along the drift. (3) A discussion of gas flow and conductive cooling of a magma-filled drift, describing how an adjacent drift that has not been intersected by a dike could be affected by post-intrusion phenomena. Note that a gas flow analysis is also addressed in ''Igneous Intrusion Impacts on Waste Form and Waste Packages'' (BSC 2003 [DIRS 161810]), and those results are consistent with the results presented in this report.

  12. Dike/Drift Interactions

    International Nuclear Information System (INIS)

    E.S. Gaffney

    2003-01-01

    This report documents the model of events associated with a potential intrusion of magma from a volcanic dike into a drift or drifts in the Yucca Mountain Nuclear Waste Repository. The following topics are included in this report: (1) A discussion of dike propagation, which provides the basis for describing the path that a representative dike, or swarm of dikes, would follow during an event. (2) A discussion of magma flow, which evaluates the interaction at the junction of the propagating dike with the drift and the movement of magmatic products into and down drifts and, potentially, through a drift to the surface by way of access drift or a secondary dike opened up along the drift. (3) A discussion of gas flow and conductive cooling of a magma-filled drift, describing how an adjacent drift that has not been intersected by a dike could be affected by post-intrusion phenomena. Note that a gas flow analysis is also addressed in ''Igneous Intrusion Impacts on Waste Form and Waste Packages'' (BSC 2003 [DIRS 161810]), and those results are consistent with the results presented in this report

  13. Lunar floor-fractured craters: Modes of dike and sill emplacement and implications of gas production and intrusion cooling on surface morphology and structure

    Science.gov (United States)

    Wilson, Lionel; Head, James W.

    2018-05-01

    Lunar floor-fractured craters (FFCs) represent the surface manifestation of a class of shallow crustal intrusions in which magma-filled cracks (dikes) rising to the surface from great depth encounter contrasts in host rock lithology (breccia lens, rigid solidified melt sheet) and intrude laterally to form a sill, laccolith or bysmalith, thereby uplifting and deforming the crater floor. Recent developments in the knowledge of lunar crustal thickness and density structure have enabled important revisions to models of the generation, ascent and eruption of magma, and new knowledge about the presence and behavior of magmatic volatiles has provided additional perspectives on shallow intrusion processes in FFCs. We use these new data to assess the processes that occur during dike and sill emplacement with particular emphasis on tracking the fate and migration of volatiles and their relation to candidate venting processes. FFCs result when dikes are capable of intruding close to the surface, but fail to erupt because of the substructure of their host impact craters, and instead intrude laterally after encountering a boundary where an increase in ductility (base of breccia lens) or rigidity (base of solidified melt sheet) occurs. Magma in dikes approaching the lunar surface experiences increasingly lower overburden pressures: this enhances CO gas formation and brings the magma into the realm of the low pressure release of H2O and sulfur compounds, both factors adding volatiles to those already collected in the rising low-pressure part of the dike tip. High magma rise velocity is driven by the positive buoyancy of the magma in the part of the dike remaining in the mantle. The dike tip overshoots the interface and the consequent excess pressure at the interface drives the horizontal flow of magma to form the intrusion and raise the crater floor. If sill intrusion were controlled by the physical properties at the base of the melt sheet, dikes would be required to approach to

  14. How diking affects the longer-term structure and evolution of divergent plate boundaries

    KAUST Repository

    Trippanera, Daniele

    2015-04-01

    Recurrent diking episodes along divergent plate boundaries, as at Dabbahu (2005, Afar) or at Bardarbunga (2014, Iceland) , highlight the possibility to have m-wide opening in a short time (days to weeks). This suggests a prominent role of magma enhancing transient plate separations. However, the role of diking on a longer term (> 102 years) and its influence on the structure and the evolution of a divergent plate boundary is still poorly investigated. Here we use field surveys along the oceanic Icelandic and continental Ethiopian plate boundaries, along five eruptive fissures and four rift segments. Field observations have also been integrated with analogue and numerical models of dike emplacement to better understand the effect of dike emplacement at depth and at the surface. Our results show that the dike-fed eruptive fissures are systematically associated with graben structures formed by inward dipping normal faults having throws up to 10 m and commonly propagating downward. Moreover, rift segments (i.e. mature rift zones), despite any asymmetry and repetition, are characterized by the same features as the eruptive fissures, the only difference lying in the larger size (higher fault throws, up to 40 m, and wider deformation zones). Analogue and numerical models of dike intrusion confirm that all the structural features observed along the rift segments may be dike-induced; these features include downward propagating normal faults bordering graben structures, contraction at the base of the hanging walls of the faults and upward propagating faults. Simple calculations based on the deeper structure of the eroded rift segments in eastern and western Iceland also suggest that all the fault slip in the active rift segments may result from diking. These results suggest that the overall deformation pattern of eruptive fissures and rift segments may be explained only by dike emplacement. In a magmatic rift, the regional tectonic stress may rarely be high enough to be

  15. Modeling Thermal Pressurization Around Shallow Dikes Using Temperature-Dependent Hydraulic Properties: Implications for Deformation Around Intrusions

    Science.gov (United States)

    Townsend, Meredith R.

    2018-01-01

    Pressurization and flow of groundwater around igneous intrusions depend in part on the hydraulic diffusivity of the host rocks and processes that enhance diffusivity, such as fracturing, or decrease diffusivity, such as mineral precipitation during chemical alteration. Characterizing and quantifying the coupled effects of alteration, pore pressurization, and deformation have significant implications for deformation around intrusions, geothermal energy, contact metamorphism, and heat transfer at mid-ocean ridges. Fractures around dikes at Ship Rock, New Mexico, indicate that pore pressures in the host rocks exceeded hydrostatic conditions by at least 15 MPa following dike emplacement. Hydraulic measurements and petrographic analysis indicate that mineral precipitation clogged the pores of the host rock, reducing porosity from 0.25 to reducing permeability by 5 orders of magnitude. Field data from Ship Rock are used to motivate and constrain numerical models for thermal pore fluid pressurization adjacent to a meter-scale dike, using temperature-dependent hydraulic properties in the host rock as a proxy for porosity loss by mineral precipitation during chemical alteration. Reduction in permeability by chemical alteration has a negligible effect on pressurization. However, reduction in porosity by mineral precipitation increases fluid pressure by constricting pore volume and is identified as a potentially significant source of pressure. A scaling relationship is derived to determine when porosity loss becomes important; if permeability is low enough, pressurization by porosity loss outweighs pressurization by thermal expansion of fluids.

  16. The May 2005 eruption of Fernandina volcano, Galápagos: The first circumferential dike intrusion observed by GPS and InSAR

    Science.gov (United States)

    Chadwick, W.W.; Jonsson, Sigurjon; Geist, Dennis J.; Poland, M.; Johnson, Daniel J.; Batt, S.; Harpp, Karen S.; Ruiz, A.

    2011-01-01

    The May 2005 eruption of Fernandina volcano, Galápagos, occurred along circumferential fissures parallel to the caldera rim and fed lava flows down the steep southwestern slope of the volcano for several weeks. This was the first circumferential dike intrusion ever observed by both InSAR and GPS measurements and thus provides an opportunity to determine the subsurface geometry of these enigmatic structures that are common on Galápagos volcanoes but are rare elsewhere. Pre- and post- eruption ground deformation between 2002 and 2006 can be modeled by the inflation of two separate magma reservoirs beneath the caldera: a shallow sill at ~1 km depth and a deeper point-source at ~5 km depth, and we infer that this system also existed at the time of the 2005 eruption. The co-eruption deformation is dominated by uplift near the 2005 eruptive fissures, superimposed on a broad subsidence centered on the caldera. Modeling of the co-eruption deformation was performed by including various combinations of planar dislocations to simulate the 2005 circumferential dike intrusion. We found that a single planar dike could not match both the InSAR and GPS data. Our best-fit model includes three planar dikes connected along hinge lines to simulate a curved concave shell that is steeply dipping (~45–60°) toward the caldera at the surface and more gently dipping (~12–14°) at depth where it connects to the horizontal sub-caldera sill. The shallow sill is underlain by the deep point source. The geometry of this modeled magmatic system is consistent with the petrology of Fernandina lavas, which suggest that circumferential eruptions tap the shallowest parts of the system, whereas radial eruptions are fed from deeper levels. The recent history of eruptions at Fernandina is also consistent with the idea that circumferential and radial intrusions are sometimes in a stress-feedback relationship and alternate in time with one another.

  17. The May 2005 eruption of Fernandina volcano, Galápagos: The first circumferential dike intrusion observed by GPS and InSAR

    KAUST Repository

    Chadwick, William W Jr; Jonsson, Sigurjon; Geist, Dennis J.; Poland, Michael P.; Johnson, Daniel J.; Batt, Spencer; Harpp, Karen S.; Ruiz, André s Gorki

    2010-01-01

    The May 2005 eruption of Fernandina volcano, Galápagos, occurred along circumferential fissures parallel to the caldera rim and fed lava flows down the steep southwestern slope of the volcano for several weeks. This was the first circumferential dike intrusion ever observed by both InSAR and GPS measurements and thus provides an opportunity to determine the subsurface geometry of these enigmatic structures that are common on Galápagos volcanoes but are rare elsewhere. Pre- and post- eruption ground deformation between 2002 and 2006 can be modeled by the inflation of two separate magma reservoirs beneath the caldera: a shallow sill at ~1 km depth and a deeper point-source at ~5 km depth, and we infer that this system also existed at the time of the 2005 eruption. The co-eruption deformation is dominated by uplift near the 2005 eruptive fissures, superimposed on a broad subsidence centered on the caldera. Modeling of the co-eruption deformation was performed by including various combinations of planar dislocations to simulate the 2005 circumferential dike intrusion. We found that a single planar dike could not match both the InSAR and GPS data. Our best-fit model includes three planar dikes connected along hinge lines to simulate a curved concave shell that is steeply dipping (~45-60°) toward the caldera at the surface and more gently dipping (~12-14°) at depth where it connects to the horizontal sub-caldera sill. The shallow sill is underlain by the deep point source. The geometry of this modeled magmatic system is consistent with the petrology of Fernandina lavas, which suggest that circumferential eruptions tap the shallowest parts of the system, whereas radial eruptions are fed from deeper levels. The recent history of eruptions at Fernandina is also consistent with the idea that circumferential and radial intrusions are sometimes in a stress-feedback relationship and alternate in time with one another. © 2010 Springer-Verlag.

  18. The May 2005 eruption of Fernandina volcano, Galápagos: The first circumferential dike intrusion observed by GPS and InSAR

    KAUST Repository

    Chadwick, William W Jr

    2010-12-15

    The May 2005 eruption of Fernandina volcano, Galápagos, occurred along circumferential fissures parallel to the caldera rim and fed lava flows down the steep southwestern slope of the volcano for several weeks. This was the first circumferential dike intrusion ever observed by both InSAR and GPS measurements and thus provides an opportunity to determine the subsurface geometry of these enigmatic structures that are common on Galápagos volcanoes but are rare elsewhere. Pre- and post- eruption ground deformation between 2002 and 2006 can be modeled by the inflation of two separate magma reservoirs beneath the caldera: a shallow sill at ~1 km depth and a deeper point-source at ~5 km depth, and we infer that this system also existed at the time of the 2005 eruption. The co-eruption deformation is dominated by uplift near the 2005 eruptive fissures, superimposed on a broad subsidence centered on the caldera. Modeling of the co-eruption deformation was performed by including various combinations of planar dislocations to simulate the 2005 circumferential dike intrusion. We found that a single planar dike could not match both the InSAR and GPS data. Our best-fit model includes three planar dikes connected along hinge lines to simulate a curved concave shell that is steeply dipping (~45-60°) toward the caldera at the surface and more gently dipping (~12-14°) at depth where it connects to the horizontal sub-caldera sill. The shallow sill is underlain by the deep point source. The geometry of this modeled magmatic system is consistent with the petrology of Fernandina lavas, which suggest that circumferential eruptions tap the shallowest parts of the system, whereas radial eruptions are fed from deeper levels. The recent history of eruptions at Fernandina is also consistent with the idea that circumferential and radial intrusions are sometimes in a stress-feedback relationship and alternate in time with one another. © 2010 Springer-Verlag.

  19. Seismic Amplitude Ratio Analysis of the 2014-2015 Bár∂arbunga-Holuhraun Dike Propagation and Eruption

    Science.gov (United States)

    Caudron, Corentin; White, Robert S.; Green, Robert G.; Woods, Jennifer; Ágústsdóttir, Thorbjörg; Donaldson, Clare; Greenfield, Tim; Rivalta, Eleonora; Brandsdóttir, Bryndís.

    2018-01-01

    Magma is transported in brittle rock through dikes and sills. This movement may be accompanied by the release of seismic energy that can be tracked from the Earth's surface. Locating dikes and deciphering their dynamics is therefore of prime importance in understanding and potentially forecasting volcanic eruptions. The Seismic Amplitude Ratio Analysis (SARA) method aims to track melt propagation using the amplitudes recorded across a seismic network without picking the arrival times of individual earthquake phases. This study validates this methodology by comparing SARA locations (filtered between 2 and 16 Hz) with the earthquake locations (same frequency band) recorded during the 2014-2015 Bár∂arbunga-Holuhraun dike intrusion and eruption in Iceland. Integrating both approaches also provides the opportunity to investigate the spatiotemporal characteristics of magma migration during the dike intrusion and ensuing eruption. During the intrusion SARA locations correspond remarkably well to the locations of earthquakes. Several exceptions are, however, observed. (1) A low-frequency signal was possibly associated with a subglacial eruption on 23 August. (2) A systematic retreat of the seismicity was also observed to the back of each active segment during stalled phases and was associated with a larger spatial extent of the seismic energy source. This behavior may be controlled by the dike's shape and/or by dike inflation. (3) During the eruption SARA locations consistently focused at the eruptive site. (4) Tremor-rich signal close to ice cauldrons occurred on 3 September. This study demonstrates the power of the SARA methodology, provided robust site amplification; Quality Factors and seismic velocities are available.

  20. Finite element analysis of ground deformation due to dike intrusion with applications to Mt. Etna volcano

    Directory of Open Access Journals (Sweden)

    G. La Rosa

    2004-06-01

    Full Text Available A 2D finite elements study was carried out to analyse the effects caused by dike intrusion inside a heterogeneous medium and with a realistic topography of Mt. Etna volcano. Firstly, the method (dimension domain, elements type was calibrated using plane strain models in elastic half-spaces; the results were compared with those obtained from analytical dislocation models. Then the effects caused both by the topographic variations and the presence of multi-layered medium on the surface, were studied. In particular, an application was then considered to Mt. Etna by taking into account the real topography and the stratification deduced from seismic tomography. In these conditions, the effects expected by the dike, employed to model the 2001 eruption under simple elastic half-space medium conditions, were computed, showing that topography is extremely important, at least in the near field.

  1. Constraints on dike propagation from continuous GPS measurements

    Science.gov (United States)

    Segall, P.; Cervelli, Peter; Owen, S.; Lisowski, M.; Miklius, Asta

    2001-01-01

    The January 1997 East Rift Zone eruption on Kilauea volcano, Hawaii, occurred within a network of continuous Global Positioning System (GPS) receivers. The GPS measurements reveal the temporal history of deformation during dike intrusion, beginning ??? 8 hours prior to the onset of the eruption. The dike volume as a function of time, estimated from the GPS data using elastic Green's functions for a homogeneous half-space, shows that only two thirds of the final dike volume accumulated prior to the eruption and the rate of volume change decreased with time. These observations are inconsistent with simple models of dike propagation, which predict accelerating dike volume up to the time of the eruption and little or no change thereafter. Deflationary tilt changes at Kilauea summit mirror the inferred dike volume history, suggesting that the rate of dike propagation is limited by flow of magma into the dike. A simple, lumped parameter model of a coupled dike magma chamber system shows that the tendency for a dike to end in an eruption (rather than intrusion) is favored by high initial dike pressures, compressional stress states, large, compressible magma reservoirs, and highly conductive conduits linking the dike and source reservoirs. Comparison of model predictions to the observed dike volume history, the ratio of erupted to intruded magma, and the deflationary history of the summit magma chamber suggest that most of the magma supplied to the growing dike came from sources near to the eruption through highly conductive conduits. Interpretation is complicated by the presence of multiple source reservoirs, magma vesiculation and cooling, as well as spatial variations in dike-normal stress. Reinflation of the summit magma chamber following the eruption was measured by GPS and accompanied a rise in the level of the Pu'u O'o lava lake. For a spheroidal chamber these data imply a summit magma chamber volume of ??? 20 km3, consistent with recent estimates from seismic

  2. Experiments of dike-induced deformation: Insights on the long-term evolution of divergent plate boundaries

    KAUST Repository

    Trippanera, D.

    2015-10-22

    The shallow transport of magma occurs through dikes causing surface deformation. Our understanding of the effects of diking at the surface is limited, especially on the long term, for repeated intrusive episodes. We use analogue models to study the upper crustal deformation induced by dikes. We insert metal plates within cohesive sand with three setups: in setup A, the intrusion rises upward with constant thickness and in setups B and C, the intrusion thickens at a fixed depth, with final rectangular (setup B) or triangular (setup C) shape in section. Setup A creates a doming delimited by reverse faults, with secondary apical graben, without close correspondence in nature. In setups B and C, a depression flanked by two uplifted areas is bordered by inward dipping normal faults propagating downward and, for deeper intrusions in setup B, also by inner faults, reverse at the surface; this deformation is similar to what is observed in nature, suggesting a consistent physical behavior. Dikes in nature initially propagate developing a mode I fracture at the tip, subsequently thickened by magma intrusion, without any host rock translation in the propagation direction (as in setup A). The deformation pattern in setups B and C depends on the intrusion depth and thickness, consistently to what is observed along divergent plate boundaries. The early deformation in setups B and C is similar to that from a single rifting episode (i.e., Lakagigar, Iceland, and Dabbahu, Afar), whereas the late stages resemble the structure of mature rifts (i.e., Krafla, Iceland), confirming diking as a major process in shaping divergent plate boundaries.

  3. Dike Propagation Near Drifts

    International Nuclear Information System (INIS)

    2002-01-01

    The purpose of this Analysis and Model Report (AMR) supporting the Site Recommendation/License Application (SR/LA) for the Yucca Mountain Project is the development of elementary analyses of the interactions of a hypothetical dike with a repository drift (i.e., tunnel) and with the drift contents at the potential Yucca Mountain repository. This effort is intended to support the analysis of disruptive events for Total System Performance Assessment (TSPA). This AMR supports the Process Model Report (PMR) on disruptive events (CRWMS M and O 2000a). This purpose is documented in the development plan (DP) ''Coordinate Modeling of Dike Propagation Near Drifts Consequences for TSPA-SR/LA'' (CRWMS M and O 2000b). Evaluation of that Development Plan and the work to be conducted to prepare Interim Change Notice (ICN) 1 of this report, which now includes the design option of ''Open'' drifts, indicated that no revision to that DP was needed. These analyses are intended to provide reasonable bounds for a number of expected effects: (1) Temperature changes to the waste package from exposure to magma; (2) The gas flow available to degrade waste containers during the intrusion; (3) Movement of the waste package as it is displaced by the gas, pyroclasts and magma from the intruding dike (the number of packages damaged); (4) Movement of the backfill (Backfill is treated here as a design option); (5) The nature of the mechanics of the dike/drift interaction. These analyses serve two objectives: to provide preliminary analyses needed to support evaluation of the consequences of an intrusive event and to provide a basis for addressing some of the concerns of the Nuclear Regulatory Commission (NRC) expressed in the Igneous Activity Issue Resolution Status Report

  4. Along-Axis Structure and Crustal Construction Processes of Spreading Segments in Iceland: Implications for Magmatic Rifts

    Science.gov (United States)

    Siler, D. L.; Karson, J. A.

    2017-10-01

    Magmatic rift systems are composed of discrete spreading segments defined by morphologic, structural, and volcanic features that vary systematically along strike. In Iceland, structural features mapped in the glaciated and exhumed Miocene age upper crust correlate with analogous features in the seismically and volcanically active neovolcanic zone. Integrating information from both the active rift zones and ancient crust provides a three-dimensional perspective of crustal structure and the volcanic and tectonic processes that construct crust along spreading segments. Crustal exposures in the Skagi region of northern Iceland reveal significant along-strike variations in geologic structure. The upper crust at exhumed magmatic centers (segment centers) is characterized by a variety of intrusive rocks, high-temperature hydrothermal alteration, and geologic evidence for kilometer-scale subsidence. In contrast, the upper crust along segment limbs, which extend along strike from magmatic centers, is characterized by thick sections of gently dipping lava flows, cut by varying proportions of subvertical dikes. This structure implies relatively minor upper crustal subsidence and lateral dike intrusion. The differing modes of subsidence beneath segment centers and segment limbs require along-axis mass redistribution in the underlying upper, middle, and lower crust during crustal construction. This along-axis material transport is accomplished through lateral dike intrusion in the upper crust and by along-axis flow of magmatic to high-temperature solid-state gabbroic material in the middle and lower crust. These processes, inferred from outcrop evidence in Skagi, are consistent with processes inferred to be important during active rifting in Iceland and at analogous magmatic oceanic and continental rifts.

  5. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  6. Tectonic implications of a paleomagnetic direction obtained from a Miocene dike swarm in central Honshu, Japan

    Science.gov (United States)

    Hoshi, H.; Sugisaki, Y.

    2017-12-01

    Central Honshu of Japan is an ideal field for the study of crustal deformation related to arc-arc collision. In this study we obtained rock magnetic and paleomagnetic results from early Miocene igneous rocks in central Honshu in order to examine rotational deformation caused by the collision of the Izu-Bonin-Mariana (IBM) arc with central Honshu. In Takane of the Hida region, gabbro intrusions and older sedimentary rocks are intruded by numerous andesitic dikes that comprise a parallel dike swarm. The dikes formed under two different normal-faulting paleostress conditions, which were suggested using a method of clustering dike orientations. Cross-cutting relationships indicate that the two paleostress conditions existed during the same period. More than 240 oriented cores were taken at 38 sites in two localities for magnetic study. The andesites and gabbros generally have magnetite, and some andesites also contain pyrrhotite. The magnetite records easterly deflected remanent magnetization directions of dual polarities that pass the reversals test. Positive baked contact tests at two sites demonstrate that the easterly deflected direction is a thermoremanent magnetization acquired at the time of intrusion. The overall in situ (i.e., in geographic coordinates) mean direction for andesitic dikes is judged to be highly reliable, although there are two possible scenarios for explaining the easterly deflection: (1) clockwise rotation and (2) tilting to the northwest. We prefer the former scenario and conclude that 45° clockwise rotation occurred in Takane with respect to the North China Block of the Asian continent. This rotation must represent the clockwise rotation of entire Southwest Japan during the opening period of the Japan Sea. Very little difference is observed between the amount of the easterly deflection in Takane and those in the Tokai and Hokuriku regions, indicating no significant relative rotation. Thus, the crust beneath Takane has not suffered rotation

  7. Dike intrusions into bituminous coal, Illinois Basin: H, C, N, O isotopic responses to rapid and brief heating

    Science.gov (United States)

    Schimmelmann, A.; Mastalerz, Maria; Gao, L.; Sauer, P.E.; Topalov, K.

    2009-01-01

    Unlike long-term heating in subsiding sedimentary basins, the near-instantaneous thermal maturation of sedimentary organic matter near magmatic intrusions is comparable to artificial thermal maturation in the laboratory in terms of short duration and limited extent. This study investigates chemical and H, C, N, O isotopic changes in high volatile bituminous coal near two Illinois dike contacts and compares observed patterns and trends with data from other published studies and from artificial maturation experiments. Our study pioneers in quantifying isotopically exchangeable hydrogen and measuring the D/H (i.e., 2H/1H) ratio of isotopically non-exchangeable organic hydrogen in kerogen near magmatic contacts. Thermal stress in coal caused a reduction of isotopically exchangeable hydrogen in kerogen from 5% to 6% in unaltered coal to 2-3% at contacts, mostly due to elimination of functional groups (e.g., {single bond}OH, {single bond}COOH, {single bond}NH2). In contrast to all previously published data on D/H in thermally matured organic matter, the more mature kerogen near the two dike contacts is D-depleted, which is attributed to (i) thermal elimination of D-enriched functional groups, and (ii) thermal drying of hydrologically isolated coal prior to the onset of cracking reactions, thereby precluding D-transfer from relatively D-enriched water into kerogen. Maxima in organic nitrogen concentration and in the atomic N/C ratio of kerogen at a distance of ???2.5 to ???3.5 m from the thicker dike indicate that reactive N-compounds had been pyrolytically liberated at high temperature closer to the contact, migrated through the coal seam, and recombined with coal kerogen in a zone of lower temperature. The same principle extends to organic carbon, because a strong ??13Ckerogen vs. ??15Nkerogen correlation across 5.5 m of coal adjacent to the thicker dike indicates that coal was functioning as a flow-through reactor along a dynamic thermal gradient facilitating back

  8. Changes in optical properties, chemistry, and micropore and mesopore characteristics of bituminous coal at the contact with dikes in the Illinois Basin

    Science.gov (United States)

    Mastalerz, Maria; Drobniak, A.; Schimmelmann, A.

    2009-01-01

    Changes in high-volatile bituminous coal (Pennsylvanian) near contacts with two volcanic intrusions in Illinois were investigated with respect to optical properties, coal chemistry, and coal pore structure. Vitrinite reflectance (Ro) increases from 0.62% to 5.03% within a distance of 5.5??m from the larger dike, and from 0.63% to 3.71% within 3.3??m from the small dike. Elemental chemistry of the coal shows distinct reductions in hydrogen and nitrogen content close to the intrusions. No trend was observed for total sulfur content, but decreases in sulfate content towards the dikes indicate thermochemical sulfate reduction (TSR). Contact-metamorphism has a dramatic effect on coal porosity, and microporosity in particular. Around the large dike, the micropore volume, after a slight initial increase, progressively decreases from 0.0417??cm3/g in coal situated 4.7??m from the intrusive contact to 0.0126??cm3/g at the contact. Strongly decreasing mesopore and micropore volumes in the altered zone, together with frequent cleat and fracture filling by calcite, indicate deteriorating conditions for both coalbed gas sorption and gas transmissibility. ?? 2008 Elsevier B.V. All rights reserved.

  9. Chemical and isotopic characterization of water-rock interactions in shales induced by the intrusion of a basaltic dike: A natural analogue for radioactive waste disposal

    International Nuclear Information System (INIS)

    Techer, Isabelle; Rousset, Davy; Clauer, Norbert; Lancelot, Joel; Boisson, Jean-Yves

    2006-01-01

    Disposal of nuclear waste in deep geological formations is expected to induce thermal fluxes for hundreds of years with maximum temperature reaching about 100-150 deg. C in the nearfield argillaceous environment. The long-term behavior of clays subjected to such thermal gradients needs to be perfectly understood in safety assessment considerations. In this respect, a Toarcian argillaceous unit thermally disturbed by the intrusion of a 1.1-m wide basaltic dike at the Perthus pass (Herault, France), was studied in detail as a natural analogue. The thermal imprint induced by the dike was evaluated by a mineralogical, chemical and K-Ar study of the <2 μm clay fraction of shale samples collected at increasing distance from the basalt. The data suggest that the mineral composition of the shales was not significantly disturbed when the temperature was below 100-150 deg. C. Closer to the dike at 150-300 deg. C, changes such as progressive dissolution of chlorite and kaolinite, increased content of the mixed layers illite-smectite with more illite layers, complete decalcification and subsequent increased content of quartz, were found. At the eastern contact with the dike, the mineral and chemical compositions of both the shales and the basalt suggest water-rock interactions subsequent to the intrusion with precipitation of palagonite and renewed but discrete deposition of carbonate. A pencil cleavage developed in the shales during the dike emplacement probably favored water circulation along the contact. Strontium isotopic data suggest that the fluids of probable meteoric origin, reacted with Bathonian and Bajocian limestones before entering the underlying Toarcian shales. By analogy with deep geological radioactive waste repositories, the results report discrete mineralogical variations of the clays when subjected to temperatures of 100-150 deg. C that are expected in deep storage conditions. Beyond 150 deg. C, significant mineralogical changes may alter the physical and

  10. Mandibular canine intrusion with the segmented arch technique: A finite element method study.

    Science.gov (United States)

    Caballero, Giselle Milagros; Carvalho Filho, Osvaldo Abadia de; Hargreaves, Bernardo Oliveira; Brito, Hélio Henrique de Araújo; Magalhães Júnior, Pedro Américo Almeida; Oliveira, Dauro Douglas

    2015-06-01

    Mandibular canines are anatomically extruded in approximately half of the patients with a deepbite. Although simultaneous orthodontic intrusion of the 6 mandibular anterior teeth is not recommended, a few studies have evaluated individual canine intrusion. Our objectives were to use the finite element method to simulate the segmented intrusion of mandibular canines with a cantilever and to evaluate the effects of different compensatory buccolingual activations. A finite element study of the right quadrant of the mandibular dental arch together with periodontal structures was modeled using SolidWorks software (Dassault Systèmes Americas, Waltham, Mass). After all bony, dental, and periodontal ligament structures from the second molar to the canine were graphically represented, brackets and molar tubes were modeled. Subsequently, a 0.021 × 0.025-in base wire was modeled with stainless steel properties and inserted into the brackets and tubes of the 4 posterior teeth to simulate an anchorage unit. Finally, a 0.017 × 0.025-in cantilever was modeled with titanium-molybdenum alloy properties and inserted into the first molar auxiliary tube. Discretization and boundary conditions of all anatomic structures tested were determined with HyperMesh software (Altair Engineering, Milwaukee, Wis), and compensatory toe-ins of 0°, 4°, 6°, and 8° were simulated with Abaqus software (Dassault Systèmes Americas). The 6° toe-in produced pure intrusion of the canine. The highest amounts of periodontal ligament stress in the anchor segment were observed around the first molar roots. This tooth showed a slight tendency for extrusion and distal crown tipping. Moreover, the different compensatory toe-ins tested did not significantly affect the other posterior teeth. The segmented mechanics simulated in this study may achieve pure mandibular canine intrusion when an adequate amount of compensatory toe-in (6°) is incorporated into the cantilever to prevent buccal and lingual crown

  11. Lunar floor-fractured craters as magmatic intrusions: Geometry, modes of emplacement, associated tectonic and volcanic features, and implications for gravity anomalies

    Science.gov (United States)

    Jozwiak, Lauren M.; Head, James W.; Wilson, Lionel

    2015-03-01

    Lunar floor-fractured craters are a class of 170 lunar craters with anomalously shallow, fractured floors. Two end-member processes have been proposed for the floor formation: viscous relaxation, and subcrater magmatic intrusion and sill formation. Recent morphometric analysis with new Lunar Reconnaissance Orbiter Laser Altimeter (LOLA) and image (LROC) data supports an origin related to shallow magmatic intrusion and uplift. We find that the distribution and characteristics of the FFC population correlates strongly with crustal thickness and the predicted frequency distribution of overpressurization values of magmatic dikes. For a typical nearside lunar crustal thickness, dikes with high overpressurization values favor surface effusive eruptions, medium values favor intrusion and sill formation, and low values favor formation of solidified dikes concentrated lower in the crust. We develop a model for this process, make predictions for the morphologic, morphometric, volcanic, and geophysical consequences of the process and then compare these predictions with the population of observed floor-fractured craters. In our model, the process of magmatic intrusion and sill formation begins when a dike propagates vertically towards the surface; as the dike encounters the underdense brecciated region beneath the crater, the magmatic driving pressure is insufficient to continue vertical propagation, but pressure in the stalled dike exceeds the local lithostatic pressure. The dike then begins to propagate laterally forming a sill which does not propagate past the crater floor region because increased overburden pressure from the crater wall and rim crest pinch off the dike at this boundary; the sill then continues to inflate, further raising and fracturing the brittle crater floor. When the intrusion diameter to intrusion depth ratio is smaller than a critical value, the intrusion assumes a laccolith shape with a domed central region. When the ratio exceeds a critical value

  12. Magma Expansion and Fragmentation in a Propagating Dike (Invited)

    Science.gov (United States)

    Jaupart, C. P.; Taisne, B.

    2010-12-01

    The influence of magma expansion due to volatile exsolution and gas dilation on dike propagation is studied using a new numerical code. Many natural magmas contain sufficient amounts of volatiles for fragmentation to occur well below Earth's surface. Magma fragmentation has been studied for volcanic flows through open conduits but it should also occur within dikes that rise towards Earth's surface. We consider the flow of a volatile-rich magma in a hydraulic fracture. The mixture of melt and gas is treated as a compressible viscous fluid below the fragmentation level and as a gas phase carrying melt droplets above it. A numerical code solves for elastic deformation of host rocks, the flow of the magmatic mixture and fracturing at the dike tip. With volatile-free magma, a dike fed at a constant rate in a uniform medium adopts a constant shape and width and rises at a constant velocity. With volatiles involved, magma expands and hence the volume flux of magma increases. With no fragmentation, this enhanced flux leads to acceleration of the dike. Simple scaling laws allow accurate predictions of dike width and ascent rate for a wide range of conditions. With fragmentation, dike behavior is markedly different. Due to the sharp drop of head loss that occurs in gas-rich fragmented material, large internal overpressures develop below the tip and induce swelling of the nose region, leading to deceleration of the dike. Thus, the paradoxical result is that, with no viscous impediment on magma flow and a large buoyancy force, the dike stalls. This process may account for some of the tuffisite veins and intrusions that are found in and around magma conduits, notably in the Unzen drillhole, Japan. We apply these results to the two-month long period of volcanic unrest that preceded the May 1980 eruption of Mount St Helens. An initial phase of rapid earthquake migration from the 7-8 km deep reservoir to shallow levels was followed by very slow progression of magma within the

  13. Magma Reservoirs Feeding Giant Radiating Dike Swarms: Insights from Venus

    Science.gov (United States)

    Grosfils, E. B.; Ernst, R. E.

    2003-01-01

    Evidence of lateral dike propagation from shallow magma reservoirs is quite common on the terrestrial planets, and examination of the giant radiating dike swarm population on Venus continues to provide new insight into the way these complex magmatic systems form and evolve. For example, it is becoming clear that many swarms are an amalgamation of multiple discrete phases of dike intrusion. This is not surprising in and of itself, as on Earth there is clear evidence that formation of both magma reservoirs and individual giant radiating dikes often involves periodic magma injection. Similarly, giant radiating swarms on Earth can contain temporally discrete subswarms defined on the basis of geometry, crosscutting relationships, and geochemical or paleomagnetic signatures. The Venus data are important, however, because erosion, sedimentation, plate tectonic disruption, etc. on Earth have destroyed most giant radiating dike swarm's source regions, and thus we remain uncertain about the geometry and temporal evolution of the magma sources from which the dikes are fed. Are the reservoirs which feed the dikes large or small, and what are the implications for how the dikes themselves form? Does each subswarm originate from a single, periodically reactivated reservoir, or do subswarms emerge from multiple discrete geographic foci? If the latter, are these discrete foci located at the margins of a single large magma body, or do multiple smaller reservoirs define the character of the magmatic center as a whole? Similarly, does the locus of magmatic activity change with time, or are all the foci active simultaneously? Careful study of giant radiating dike swarms on Venus is yielding the data necessary to address these questions and constrain future modeling efforts. Here, using giant radiating dike swarms from the Nemesis Tessera (V14) and Carson (V43) quadrangles as examples, we illustrate some of the dike swarm focal region diversity observed on Venus and briefly explore some

  14. New insights into the origin of ladder dikes: Implications for punctuated growth and crystal accumulation in the Cathedral Peak granodiorite

    Science.gov (United States)

    Wiebe, R. A.; Jellinek, A. M.; Hodge, K. F.

    2017-04-01

    Ladder dikes are steep tabular bodies, typically a meter or less thick, composed of moderately dipping, concave upward, alternating dark (i.e. schlieren) and light bands oriented roughly perpendicular to the ladder dike margins. These structures occur widely but sparsely in granitic rocks and are found prominently in the Cathedral Peak granodiorite (CPG) of the Tuolumne Intrusive suite. Previous studies have interpreted that ladder dikes form as a result of processes including the downward flow of crystal mush in cracks within strong crystal mush or by upward flow in steep tubes that migrate within a strong crystal mush. Our new observations indicate that ladder dikes formed by downward flow of crystal mush in troughs or valleys, in a manner potentially comparable to trough bands in mafic layered intrusions. Extensions of the schlieren outward and upward away from the ladder dike margins into the host granite demonstrate that the host granite was deposited as mounds on both sides at the same time as the ladder dikes. Ladder dikes, therefore, record lateral flows of crystal mush on a magma chamber floor. Vertical exposures suggest these flows are on the order of ten meters thick. Some steep exposures on granite domes indicate multiple ladder dikes (and flows) over a stratigraphic height of 80-100 m. Later (stratigraphically higher) flows commonly deform and erode the top of an earlier flow, and granitic material rich in K-feldspar megacrysts has locally engulfed large blocks of ladder dikes, demonstrating that the megacrysts were also transported in flows. Flows in the CPG are directed away from the center of the pluton toward the western and eastern margins and apparently spread along a strong crystal mush floor and into a rheologically complex CPG magma. Whereas established dynamical models for spreading (single phase) gravity currents with simple and complex rheologies explain the elongate geometry, spacing and orientation of the tabular bodies, the origin and

  15. A hybrid composite dike suite from the northern Arabian Nubian Shield, southwest Jordan: Implications for magma mixing and partial melting of granite by mafic magma

    Science.gov (United States)

    Jarrar, Ghaleb H.; Yaseen, Najel; Theye, Thomas

    2013-03-01

    The Arabian Nubian Shield is an exemplary juvenile continental crust of Neoproterozoic age (1000-542 Ma). The post-collisional rift-related stage (~ 610 to 542 Ma) of its formation is characterized among others by the intrusion of several generations of simple and composite dikes. This study documents a suite of hybrid composite dikes and a natural example of partial melting of granite by a mafic magma from the northernmost extremity of Arabian Nubian Shield in southwest Jordan. The petrogenesis of this suite is discussed on the basis of field, petrographic, geochemical, and Rb/Sr isotopic data. These dikes give spectacular examples of the interaction between basaltic magma and the granitic basement. This interaction ranges from brecciation, partial melting of the host alkali feldspar granite to complete assimilation of the granitic material. Field structures range from intrusive breccia (angular partially melted granitic fragments in a mafic groundmass) to the formation of hybrid composite dikes that are up to 14 m in thickness. The rims of these dikes are trachyandesite (latite) with alkali feldspar ovoids (up to 1 cm in diameter); while the central cores are trachydacite to dacite and again with alkali feldspar ovoids and xenoliths from the dike rims. The granitic xenoliths in the intrusive breccia have been subjected to at least 33% partial melting. A seven-point Rb/Sr isochron from one of these composite dikes yields an age of 561 ± 33 Ma and an initial 87Sr/86Sr ratio of 0.70326 ± 0.0003 (2σ) and MSWD of 0.62. Geochemical modeling using major, trace, rare earth elements and isotopes suggests the generation of the hybrid composite dike suite through the assimilation of 30% to 60% granitic crustal material by a basaltic magma, while the latter was undergoing fractional crystallization at different levels in the continental crust.

  16. Three-Dimensional Analysis of dike/fault interaction at Mono Basin (California) using the Finite Element Method

    Science.gov (United States)

    La Marra, D.; Battaglia, M.

    2013-12-01

    Mono Basin is a north-trending graben that extends from the northern edge of Long Valley caldera towards the Bodie Hills and is bounded by the Cowtrack Mountains on the east and the Sierra Nevada on the west. The Mono-Inyo Craters volcanic chain forms a north-trending zone of volcanic vents extending from the west moat of the Long Valley caldera to Mono Lake. The Hartley Springs fault transects the southern Mono Craters-Inyo Domes area between the western part of the Long Valley caldera and June Lake. Stratigraphic data suggest that a series of strong earthquakes occurred during the North Mono-Inyo eruption sequence of ~1350 A.D. The spatial and temporal proximity between Hartley Springs Fault motion and the North Mono-Inyo eruption sequence suggests a possible relation between seismic events and eruptions. We investigate the interactions between slip along the Hartley Springs fault and dike intrusion beneath the Mono-Inyo craters using a three-dimensional finite element model of the Mono Basin. We employ a realistic representation of the Basin that includes topography, vertical and lateral heterogeneities of the crust, contact relations between fault planes, and a physical model of the pressure required to propagate the dike. We estimate (a) the distribution of Coulomb stress changes to study the influence of dike intrusion on Hartley Springs fault, and (b) the local stress and volumetric dilatation changes to understand how fault slip may influence the propagation of a dike towards the surface.

  17. Dikes under Pressure - Monitoring the Vulnerability of Dikes by Means of SAR Interferometry

    Science.gov (United States)

    Marzahn, Philip; Seidel, Moritz; Ludwig, Ralf

    2016-04-01

    Dikes are the main man made structures in flood protection systems for the protection of humans and economic values. Usually dikes are built with a sandy core and clay or concrete layer covering the core. Thus, dikes are prone to a vertical shrinkage due to soil physical processes such as reduction of pore space and gravity increasing the risk of a crevasse during floods. In addition, this vulnerability is amplified by a sea level rise due to climate change. To guarantee the stability of dikes, a labourer intensive program is carried out by national authorities monitoring the dikes by visual inspection. In the presented study, a quantitative approach is presented using SAR Interferometry for the monitoring of the stability of dikes from space. In particular, the vertical movement of dikes due to shrinkage is monitored using persistent scatterer interferometry. Therefore three different types of dikes have been investigated: a sea coast dike with a concrete cover, a sea coast dike with short grass cover and a smaller river dike with grass cover. All dikes are located in Germany. Results show the potential of the monitoring technique as well as spatial differences in the stability of dikes with subsidence rates in parts of a dike up to 7 mm/a.

  18. Overview of Hole GT3A: The sheeted dike/gabbro transition

    Science.gov (United States)

    Abe, N.; Harris, M.; Michibayashi, K.; de Obeso, J. C.; Kelemen, P. B.; Takazawa, E.; Teagle, D. A. H.; Coggon, J. A.; Matter, J. M.; Phase I Science Party, T. O. D. P.

    2017-12-01

    the relative timing of dike and gabbro intrusion, and identify that the Upper Gabbro Sequence intrudes into dikes, whereas the Lower Gabbro Sequence is intruded by dikes.

  19. A laser profilometry technique for monitoring fluvial dike breaching in laboratory experiments

    Science.gov (United States)

    Dewals, Benjamin; Rifai, Ismail; Erpicum, Sébastien; Archambeau, Pierre; Violeau, Damien; Pirotton, Michel; El kadi Abderrezzak, Kamal

    2017-04-01

    A challenging aspect for experimental modelling of fluvial dike breaching is the continuous monitoring of the transient breach geometry. In dam breaching cases induced by flow overtopping over the whole breach crest (plane erosion), a side view through a glass wall is sufficient to monitor the breach formation. This approach can be extended for 3D dam breach tests (spatial erosion) if the glass wall is located along the breach centreline. In contrast, using a side view does not apply for monitoring fluvial dike breaching, because the breach is not symmetric in this case. We present a non-intrusive, high resolution technique to record the breach development in experimental models of fluvial dikes by means of a laser profilometry (Rifai et al. 2016). Most methods used for monitoring dam and dike breaching involve the projection of a pattern (fringes, grid) on the dam or dike body and the analysis of its deformation on images recorded during the breaching (e.g., Pickert et al. 2011, Frank and Hager 2014). A major limitation of these methods stems from reflection on the water surface, particularly in the vicinity of the breach where the free surface is irregular and rippled. This issue was addressed by Spinewine et al. (2004), who used a single laser sheet so that reflections on the water surface were strongly limited and did not hamper the accurate processing of each image. We have developed a similar laser profilometry technique tailored for laboratory experiments on fluvial dike breaching. The setup is simple and relatively low cost. It consists of a digital video camera (resolution of 1920 × 1080 pixels at 60 frames per second) and a swiping red diode 30 mW laser that enables the projection of a laser sheet over the dike body. The 2D image coordinates of each deformed laser profile incident on the dike are transformed into 3D object coordinates using the Direct Linear Transformation (DLT) algorithm. All 3D object coordinates computed over a swiping cycle of the

  20. Asymmetrical to symmetrical magnetic fabric of dikes: Paleo-flow orientations and Paleo-stresses recorded on feeder-bodies from the Motru Dike Swarm (Romania)

    Science.gov (United States)

    Féménias, Olivier; Diot, Hervé; Berza, Tudor; Gauffriau, Antoine; Demaiffe, Daniel

    2004-08-01

    The fabric in a dike is representative of the magmatic flow, considered as Newtonian. The anisotropy of magnetic susceptibility of the rocks gives a good representation of the shape-preferred orientation which, in turn, is a marker of the magmatic flow. Generally, a symmetrical pattern of the fabric across the dike is in agreement with a flow of magma within a channel: the flow direction is then reliable with this imbrication. An asymmetrical fabric is dependent on the flow and displacement of the wall. We present the case of both symmetrical and asymmetrical dike fabrics recording different emplacements. From a Pan-African calc-alkaline dike swarm (of basaltic-andesitic-dacitic-rhyolitic composition) of the Alpine Danubian window from South Carpathians (Romania), two populations of dikes have been described: thick (1-30 m) N-S-trending dikes and thin (movement of the walls. In contrast, the thin dikes are symmetrical and frequently display an arteritic morphology that limits the dike length, with no cartographic extension. We propose to relate the two types of dikes to the same regional stress field in a continuum of emplacement during a regional brittle event.

  1. Controlling factors on earthquake swarms associated with magmatic intrusions; constraints from Iceland

    Science.gov (United States)

    Pedersen, R.; Sigmundsson, F.; Einarsson, P.; Brandsdottir, B.; Arnadottir, T.

    2005-12-01

    Intrusion of magma into the Earth's crust is frequently associated with seismic activity, often occurring as distinct earthquake swarms. Understanding the nature of these swarms is important for evaluating crisis situations in volcanic areas. However, there often seem to be little correlation between the amount of seismic energy release, the spatial extent of the volume of rock affected by the stress perturbations, and the volume of magma on the move, which complicates the immediate risk evaluation. A number of factors may influence the evolution of a magmatically induced seismic swarm and the resulting seismic energy release. A number of factors need to be evaluated in each individual case. These are, in random order: the crustal thickness, presence/absence of a crustal magma chamber, geothermal gradient, magmatic flow rate/stressing rate, intrusion volume, depth of intrusion, tectonic setting of the intruded area, regional stresses and tectonic history. Based on three case studies, where seismic swarm activities have been confirmed through deformation measurements to be related to magmatic movements, we attempt to evaluate the relative importance of the assumed controlling factors. All case examples are located within Iceland, but in different tectonic settings. 1. The Hengill triple junction, situated where two extensional plate boundaries join a transform zone. The area experienced a period of unusually persistent earthquake activity from 1994 to 1999, contemporaneously with ground uplift at a rate of 1-2 cm/yr. The uplift was modeled as a response to magma injection at about 7 km depth. 2. The Eyjafjallajokull volcano, situated in a volcanic flank zone where extensional fractures are only poorly developed. Two minor seismic swarms, in 1994 and 1999; were associated with a cumulative surface uplift of more than 35 cm. The two uplift events were modeled as sill intrusions at depths of 4.5 to 6.5 km. 3. The Krafla rift segment, forming part of an extensional

  2. Adapting to climate change: a comparison of two strategies for dike heightening

    NARCIS (Netherlands)

    Hoekstra, Arjen Ysbert; de Kok, Jean-Luc

    2008-01-01

    In the Netherlands the current dike design policy is to design flood defence structures corresponding to an agreed flooding probability with an extra safety board of at least 0.5 m. For river dikes a return period of 1,250 years is used to determine the design water levels. A problem with this

  3. Modeling of self-potential anomalies near vertical dikes.

    Science.gov (United States)

    Fitterman, D.V.

    1983-01-01

    The self-potential (SP) Green's function for an outcropping vertical dike is derived from solutions for the dc resistivity problem for the same geometry. The Green's functions are numerically integrated over rectangular source regions on the contacts between the dike and the surrounding material to obtain the SP anomaly. The analysis is valid for thermoelectrical source mechanisms. Two types of anomalies can be produced by this geometry. When the two source planes are polarized in opposite directions, a monopolar anomaly is produced. This corresponds to the thermoelectrical properties of the dike being in contrast with the surrounding material. When the thermoelectric coefficients change monotonically across the dike, a dipolar anomaly is produced. In either case positive and negative anomalies are possible, and the greatest variation in potential will occur in the most resistive regions. -Author

  4. Geological influence of andesite intrusion on diatomite. Pt. 2. Physical property changes of diatomite and self-sealing mechanism

    Energy Technology Data Exchange (ETDEWEB)

    Chigira, Masahiro; Nakata, Eiji [Central Research Inst. of Electric Power Industry, Abiko, Chiba (Japan). Abiko Research Lab.

    1996-03-01

    Diatomite alteration by andesite intrusion was studied especially on their physical property changes and the dynamic alteration processes for the diatomite of the Miocene Iwaya Formation in the Akita Prefecture, northern Japan. Diatomite is altered in different ways according to the extent of infiltration of hydrothermal solution into diatomite from dike. When the solution infiltrates into diatomite in large amount, smectite is formed in diatomite which is subsequently compacted to the most, and amorphous silica and poorly crystallized opal-CT precipitate in the compacted zone to form impermeable opaline chert. The chert zone becomes a hydraulic barrier against the infiltration of hydrothermal solution to make a closed system around the heat source, where opal-A transforms into opal-CT. When hydrothermal solution does not infiltrate into diatomite, diatomite is altered only by the heat from the andesitic dike: diatomite is compacted under higher temperatures near the dike, and consequently permeability is lowered. In both cases, diatomite is altered so as to mitigate the influence of magma intrusion. (author). 66 refs.

  5. Geological influence of andesite intrusion on diatomite. Pt. 2. Physical property changes of diatomite and self-sealing mechanism

    International Nuclear Information System (INIS)

    Chigira, Masahiro; Nakata, Eiji

    1996-01-01

    Diatomite alteration by andesite intrusion was studied especially on their physical property changes and the dynamic alteration processes for the diatomite of the Miocene Iwaya Formation in the Akita Prefecture, northern Japan. Diatomite is altered in different ways according to the extent of infiltration of hydrothermal solution into diatomite from dike. When the solution infiltrates into diatomite in large amount, smectite is formed in diatomite which is subsequently compacted to the most, and amorphous silica and poorly crystallized opal-CT precipitate in the compacted zone to form impermeable opaline chert. The chert zone becomes a hydraulic barrier against the infiltration of hydrothermal solution to make a closed system around the heat source, where opal-A transforms into opal-CT. When hydrothermal solution does not infiltrate into diatomite, diatomite is altered only by the heat from the andesitic dike: diatomite is compacted under higher temperatures near the dike, and consequently permeability is lowered. In both cases, diatomite is altered so as to mitigate the influence of magma intrusion. (author). 66 refs

  6. Petrology of the gabbro and sheeted basaltic intrusives at North Cape, New Zealand

    International Nuclear Information System (INIS)

    Hopper, D.J.; Smith, I.E.M.

    1996-01-01

    The North Cape massif consists of a semi-conformable sequence of serpentinite, gabbro, sheeted sill and dike units, and pillow lavas. Although structurally disrupted, they can be interpreted in terms of an idealised ophiolite sequence and represent the most complete sequence in the Northland Ophiolite. Their age is considered to be Late Cretaceous-Paleocene on the basis of microfossils in associated sediments. Early Miocene K-Ar ages from igneous rocks are thought to reflect the time of emplacement as a thrust sheet of oceanic crust and upper mantle. The gabbros are divided into a lower unit characterised by well-developed cumulate layering and an upper unit which is massive; the sheeted sills and dikes are quartz-diorite and microgabbro interleaved with minor pillow lava. Two phases of alteration are observed, a pervasive low-grade greenschist metamorphism attributed to sea-water interaction after formation as oceanic crust, and an overprinting zeolitic alteration which is possibly post-emplacement. Their tholeiitic nature as well as overlapping geochemical compositions suggest that the gabbros and sheeted dikes and sills represent different components of a single magmatic system related by simple fractionation processes. Several lines of evidence suggest that the magmas that formed the North Cape gabbro and sheeted intrusives have subduction-related chemical characteristics. In the gabbro, calcic plagioclase (An 86-92 ) and depleted Zr and Y abundances, and in the sheeted intrusives depleted high field strength element abundances relative to typical MORB, is indicative of a subduction signature. The presence of subduction-related characteristics within the Northland Ophiolite suggests that it may have originated at a back-arc basin rather than a major ocean ridge spreading centre. (author). 64 refs., 12 figs., 7 tabs

  7. Fusion of arkosic sand by intrusive andesite

    Science.gov (United States)

    Bailey, Roy A.

    1954-01-01

    An andesite dike in the Valles Mountains of northern New Mexico has intruded and partly fused arkosic sediments for a distance of 50 feet from its contacts. The dike is semi-circular in form, has a maximum width of about 100 feet, and is about 500 feet long. Small associated arcuate dikes are arranged in spiral fashion around the main dike, suggesting that they were intruded along shear fractures similar to those described by Burbank (1941). The fused rocks surrounding the andesite dike are of three general types: 1) partly fused arkosic sand, 2) fused clay, and 3) hybrid rocks. The fused arkosic sand consists of relict detrital grains of quartz, orthoclose, and plagioclase, imbedded in colorless glass containing microlites of tridymite, cordierite, and magnetite. The relict quartz grains are corroded and embayed by glass; the orthoclase is sanidinized and partly fused; and the plagioclase is inverted to the high temperature form and is partly fused. The fused clay, which was originally a mixture of montmorillonite and hydromica, consists primarily of cordierite but also contains needle-like crystals of sillimanite (?) or mullite (?). The hybrid rocks originated in part by intermixing of fused arkosic sediments and andesitic liquid and in part by diffusion of mafic constituents through the fused sediments. They are rich in cordierite and magnetite and also contain hypersthene, augite, and plagioclase. The composition of pigeonite in the andesite indicates that the temperature of the andesite at the time of intrusion probably did not exceed 1200?C. Samples of arkosic sand were fused in the presence of water in a Morey bomb at 1050?C. Stability relations of certain minerals in the fused sand suggest that fusion may have taken place at a lower temperature, however, and the fluxing action of volatiles from the andesite are thought to have made this possible.

  8. Experimental investigation of fluvial dike breaching due to flow overtopping

    Science.gov (United States)

    El Kadi Abderrezzak, K.; Rifai, I.; Erpicum, S.; Archambeau, P.; Violeau, D.; Pirotton, M.; Dewals, B.

    2017-12-01

    The failure of fluvial dikes (levees) often leads to devastating floods that cause loss of life and damages to public infrastructure. Overtopping flows have been recognized as one of the most frequent cause of dike erosion and breaching. Fluvial dike breaching is different from frontal dike (embankments) breaching, because of specific geometry and boundary conditions. The current knowledge on the physical processes underpinning fluvial dike failure due to overtopping remains limited. In addition, there is a lack of a continuous monitoring of the 3D breach formation, limiting the analysis of the key mechanisms governing the breach development and the validation of conceptual or physically-based models. Laboratory tests on breach growth in homogeneous, non-cohesive sandy fluvial dikes due to flow overtopping have been performed. Two experimental setups have been constructed, permitting the investigation of various hydraulic and geometric parameters. Each experimental setup includes a main channel, separated from a floodplain by a dike. A rectangular initial notch is cut in the crest to initiate dike breaching. The breach development is monitored continuously using a specific developed laser profilometry technique. The observations have shown that the breach develops in two stages: first the breach deepens and widens with the breach centerline being gradually shifted toward the downstream side of the main channel. This behavior underlines the influence of the flow momentum component parallel to the dike crest. Second, the dike geometry upstream of the breach stops evolving and the breach widening continues only toward the downstream side of the main channel. The breach evolution has been found strongly affected by the flow conditions (i.e. inflow discharge in the main channel, downstream boundary condition) and floodplain confinement. The findings of this work shed light on key mechanisms of fluvial dike breaching, which differ substantially from those of dam

  9. Intrusion of Magmatic Bodies Into the Continental Crust: 3-D Numerical Models

    Science.gov (United States)

    Gorczyk, Weronika; Vogt, Katharina

    2018-03-01

    Magma intrusion is a major material transfer process in the Earth's continental crust. Yet the mechanical behavior of the intruding magma and its host are a matter of debate. In this study we present a series of numerical thermomechanical simulations on magma emplacement in 3-D. Our results demonstrate the response of the continental crust to magma intrusion. We observe change in intrusion geometries between dikes, cone sheets, sills, plutons, ponds, funnels, finger-shaped and stock-like intrusions, and injection time. The rheology and temperature of the host are the main controlling factors in the transition between these different modes of intrusion. Viscous deformation in the warm and deep crust favors host rock displacement and plutons at the crust-mantle boundary forming deep-seated plutons or magma ponds in the lower to middle crust. Brittle deformation in the cool and shallow crust induces cone-shaped fractures in the host rock and enables emplacement of finger- or stock-like intrusions at shallow or intermediate depth. Here the passage of magmatic and hydrothermal fluids from the intrusion through the fracture pattern may result in the formation of ore deposits. A combination of viscous and brittle deformation forms funnel-shaped intrusions in the middle crust. Intrusion of low-density magma may more over result in T-shaped intrusions in cross section with magma sheets at the surface.

  10. Compressible magma flow in a two-dimensional elastic-walled dike

    NARCIS (Netherlands)

    Woods, A.W.; Bokhove, Onno; de Boer, A; Hill, B.E.

    2006-01-01

    The ascent of magma to the Earth's surface is commonly modeled by assuming a fixed dike or flow geometry from a deep subsurface reservoir to the surface. In practice, however, this flow geometry is produced by deformation of the crust by ascending overpressured magma. Here, we explore how this

  11. Morphology versus U-Pb systematics in zircon: A high-resolution isotopic study of a zircon population from a Variscan dike in the Central Alps

    International Nuclear Information System (INIS)

    Bossart, P.J.; Meier, M.; Oberli, F.; Steiger, R.H.

    1986-01-01

    U/Pb isotopic measurements on individual zircon crystals combined with morphological analyses permit the identification of three distinct components within the zircon population of the Saedelhorn diorite, a Variscan dike from the western Gotthard (Central Alps, Switzerland): (i) 94% of the grains in the zircon population are elongate crystals with pronounced skeletal morphology indicative of rapid growth from a supercooled melt. (ii) 5% of the population consist of turbid, mostly subhedral zircons frequently showing D-type morphology and elevated uranium contents compared to the skeletal variety. Single-crystal and multi-grain U-Pb isotopic data of group (i) and (ii) zircons define an intrusion age of 293 + 5/ -4 m.y. for the dike. (iii) Rare, transparent zircon crystals (< 1% of the zircons population) yield apparent U-Pb ages in the range of 370-490 m.y. and display morphological and isotopic characteristics closely resembling those of a Caledonian orthogneiss intruded by the dike. This implies presence of assimilated wall-rock components in the macroscopically homogeneous dike sample. (orig./WB)

  12. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  13. [Estimation of spur dike-affected fish habitat area].

    Science.gov (United States)

    Ray-Shyan, Wu; Yan-Ru, Chen; Yi-Liang, Ge

    2012-04-01

    Based on the HEC-RAS and River 2D modes, and taking 5% change rate of weighted usable area (WUA) as the threshold to define the spur dike- affected area of target fish species Acrossocheilus paradoxus in Fazi River in Taiwan, this paper studied the affected area of the fish habitat by spur dike, and, in combining with the references about the installations of spur dikes in Taiwan in recent 10 years, analyzed the relative importance of related affecting factors such as dike height, dike length (water block rate), average slope gradient of river way, single or double spur dike, and flow discharge. In spite of the length of the dike, the affected area in downstream was farther, and was about 2-6 times as large as that in upstream. The ratio of the affected area in downstream / upstream decreased with increasing slope gradient, but increased with increasing dike length and flow discharge. When the discharge was approximate to 10 years return periods, the ratio of the affected area would be close to a constant of 2. Building double spur dike would produce a better WUA than building single spur dike.

  14. The Experiences and Challenges in Drilling into Semi molten or Molten Intrusive in Menengai Geothermal Field

    Science.gov (United States)

    Mortensen, A. K.; Mibei, G. K.

    2017-12-01

    Drilling in Menengai has experienced various challenges related to drilling operations and the resource itself i.e. quality discharge fluids vis a vis gas content. The main reason for these challenges is related to the nature of rocks encountered at depths. Intrusives encountered within Menengai geothermal field have been group into three based on their geological characteristics i.e. S1, S2 and S3.Detailed geology and mineralogical characterization have not been done on these intrusive types. However, based on physical appearances, S1 is considered as a diorite dike, S2 is syenite while S3 is molten rock material. This paper summarizes the experiences in drilling into semi molten or molten intrusive (S3).

  15. Breach growth in clay-dikes

    OpenAIRE

    Zhu, Y.

    2006-01-01

    Numerous flood disasters occur every year worldwide, mostly resulting from failure of dikes, some with catastrophic outcomes. Examples are the dike failures along the Yangtze River in China in 1931 due to heavy rainstorms and those in the Netherlands in 1953 due to a storm surge at the North Sea. Both floods induced many deaths and enormous economic losses. The consequences of a flood induced by a dike burst can vary strongly and depend mainly on the speed and rate of inundation of the polder...

  16. Geometric and kinematic features of the dike complex at Mt. Somma, Vesuvio (Italy)

    Science.gov (United States)

    Porreca, M.; Acocella, V.; Massimi, E.; Mattei, M.; Funiciello, R.; De Benedetti, A. A.

    2006-05-01

    Dikes provide important information on the structure, state of stress and activity of a volcano. Mt. Somma borders part of the Vesuvio cone (Italy), displaying ˜ 100 dikes emplaced between ˜ 18 and 30 ka. Field, AMS (anisotropy of magnetic susceptibility) and thin section analyses are used to characterize their geometry and kinematics (direction and sense of flow). The dikes mostly have a NNW-SSE to NE-SW strike. Approximately 57% are radial to the older Somma edifice, ˜ 27% are oblique and ˜ 16% tangential. Among the latter two groups, ˜ 32% are outward dipping and ˜ 11% inward dipping. The dike thickness varies between 0.2 and 3 m, with a mean value of 1.17 m. The kinematics of 19 dikes is determined through a combination of field (8 dikes), AMS (16 dikes) and thin section analyses (15 dikes). Thirteen dikes have a vertical upward flow, whereas six have an oblique-subhorizontal flow, suggesting a lateral propagation from the summit or eccentric vents of the former Somma edifice. These propagation paths differ from those deducible from the recent activity, as all the seven major fissure eruptions between 1631 and 1944 were related to the lateral propagation of radial dikes. We propose that these different behaviours in dike propagation may be mainly related to the opening conditions of the summit conduit. The laterally propagating dikes in 1631-1944 formed with an open conduit. Conversely, the vertically propagating dikes may have formed, between 18 and 30 ka, with a closed conduit.

  17. Bald Mountain gold mining district, Nevada: A Jurassic reduced intrusion-related gold system

    Science.gov (United States)

    Nutt, C.J.; Hofstra, A.H.

    2007-01-01

    The Bald Mountain mining district has produced about 2 million ounces (Moz) of An. Geologic mapping, field relationships, geochemical data, petrographic observations, fluid inclusion characteristics, and Pb, S, O, and H isotope data indicate that An mineralization was associated with a reduced Jurassic intrusion. Gold deposits are localized within and surrounding a Jurassic (159 Ma) quartz monzonite porphyry pluton and dike complex that intrudes Cambrian to Mississippian carbonate and clastic rocks. The pluton, associated dikes, and An mineralization were controlled by a crustal-scale northwest-trending structure named the Bida trend. Gold deposits are localized by fracture networks in the pluton and the contact metamorphic aureole, dike margins, high-angle faults, and certain strata or shale-limestone contacts in sedimentary rocks. Gold mineralization was accompanied by silicification and phyllic alteration, ??argillic alteration at shallow levels. Although An is typically present throughout, the system exhibits a classic concentric geochemical zonation pattern with Mo, W, Bi, and Cu near the center, Ag, Pb, and Zn at intermediate distances, and As and Sb peripheral to the intrusion. Near the center of the system, micron-sized native An occurs with base metal sulfides and sulfosalts. In peripheral deposits and in later stages of mineralization, Au is typically submicron in size and resides in pyrite or arsenopyrite. Electron microprobe and laser ablation ICP-MS analyses show that arsenopyrite, pyrite, and Bi sulfide minerals contain 10s to 1,000s of ppm Au. Ore-forming fluids were aqueous and carbonic at deep levels and episodically hypersaline at shallow levels due to boiling. The isotopic compositions of H and O in quartz and sericite and S and Pb in sulfides are indicative of magmatic ore fluids with sedimentary sulfur. Together, the evidence suggests that Au was introduced by reduced S-bearing magmatic fluids derived from a reduced intrusion. The reduced

  18. An analysis of resistivity monitoring data on the sea dike, Teaan, South Korea

    Science.gov (United States)

    Song, S. Y.; Nam, M. J.; Cho, S. O.; Lim, S. K.

    2017-12-01

    Many coastal levees have been constructed within the peninsula of the South Korea to prevent tidal waves from overflowing. For a proper maintenance of the levees, it is important to monitor the embankments from being deteriorated. For the monitoring, this study make a feasibility study on the application of time-lapse (TL) electrical resistivity surveys. The survey can detect anomalies within the embankments, which are possibly generated by defects of facilities or seawater intrusion. Among coastal levees in Korea, we made TL surveys over the Iwon dike located on the Taean-gun, Chungcheongnam-do in the south-west of the South Korea in April 2015. Since visible seepage of the seewater was observed nearby the dike, we conducted monitoring in this area. TL resistivity surveys had been made 11 times for the duration of nine days along a survey line, which located 10 m away from the crest and parallel to the dike. For the analysis and interpretation of the TL data, we first analysed the effects of sea-level variation on the TL electrical resistivity data through numerical simulation. The simulation of TL data are made using dipole-dipole array with an electrode spacing of 3 m along a survey line longer than 100 m. Numerical test showed that it can be difficult to analyse effects of seawater on the dike in single data. So we conducted 4D DC inversion of TL data to analyse spatial distribution of seawater to detect possible seepage region. For the improvement of inversion resolution, we considered a spatial regularization properly representing the characteristics of levees whose major seepage occur across the embankment in order to improve the resolution. In making 4D inversion, we chose several TL data sets which are obtained at a similar conditions, e.g., similar sea level or similar time of a day. From this 4D inversion, we could analyse weak zone to be necessary to monitor continuously.

  19. Petrology, composition, and age of intrusive rocks associated with the Quartz Hill molybdenite deposit, southeastern Alaska.

    Science.gov (United States)

    Hudson, T.; Smith, James G.; Elliott, R.L.

    1979-01-01

    A large porphyry molybdenum deposit (Quartz Hill deposit) was recently discovered in the heart of the Coast Range batholithic complex about 70 km E of Ketchikan, SE Alaska. Intrusive rocks associated with the mineral deposit form two composite epizonal to hypabyssal stocks and many dikes in country rocks. All observed metallization and alteration is within the Quartz Hill stock. Molybdenite forms fracture coatings and occurs in veins with quartz. Alteration is widespread and includes development of secondary quartz, pyrite, K-feldspar, biotite, white mica, chlorite, and zeolite. Field relations indicate that the stocks were emplaced after regional uplift and erosion of the Coast Range batholithic complex, and K-Ar data show that intrusion and alteration took place in late Oligocene time, about 27 to 30 Ma ago. Data from the Ketchikan quadrangle indicate that porphyry molybdenum metallization in the Coast Range batholithic complex is associated with regionally extensive but spotty, middle Tertiary or younger, felsic magmatism. -from Authors

  20. METHODOLOGY FOR HYDRAULIC CALCULATION OF RIVER REGULATION AND DETERMINATION OF DIKE PARAMETERS

    Directory of Open Access Journals (Sweden)

    E. I. Mikhnevich

    2017-01-01

    Full Text Available Territory protection against flood water inundation and creation of polder systems are carried out with the help of protection dikes. One of the main requirements to the composition of polder systems in flood plains is a location of border dikes beyond meander belt in order to avoid their erosion when meander development occurs. Meander belt width can be determined on the basis of the analysis of multi-year land surveying pertaining top river-bed building and in the case when such data is not available this parameter is calculated in accordance with the Snishchenko formula. While banking-up a river bed a flooded area is decreasing and, consequently, water level in inter-dike space and rate of flood water are significantly increasing. For this reason it is necessary to locate dikes at a such distance from a river bed which will not cause rather high increase in water level and flow velocity in the inter-dike space. Methodology for hydraulic calculation of river regulation has been developed in order to substantiate design parameters for levee systems, creation of favourable hydraulic regime in these systems and provision of sustainability for dikes. Its main elements are calculations of pass-through capacity of the leveed channel and rise of water level in inter-dike space, and distance between dikes and their crest level. Peculiar feature of the proposed calculated formulae is an interaction consideration of channel and inundated flows. Their mass-exchanging process results in slowing-down of the channel flow and acceleration of the inundated flow. This occurrence is taken into account and coefficients of kinematic efficiency are introduced to the elements of water flow rate in the river channel and flood plain, respectively. The adduced dependencies for determination of a dike crest level (consequently their height take into consideration a rise of water level in inter-dike space for two types of polder systems: non-inundable (winter dikes with

  1. Dike zones on Venus

    Science.gov (United States)

    Markov, M. S.; Sukhanov, A. L.

    1987-01-01

    Venusian dike zone structures were identified from Venera 15 and 16 radar images. These include: a zone of subparallel rows centered at 30 deg N, 7 deg E; a system of intersecting bands centered at 67 deg N, 284 deg E; polygonal systems in lavas covering the structural base uplift centered at 47 deg N, 200 deg E; a system of light bands in the region of the ring structure centered at 43 deg N, 13 deg E; and a dike band centered at 27 deg N, 36 deg E.

  2. Experiments and Numerical Simulations of Dike Erosion due to a Wave Impact

    Directory of Open Access Journals (Sweden)

    Stefania Evangelista

    2015-10-01

    Full Text Available Dike erosion is a crucial issue in coastal and fluvial flood risk management. These defense structures appear vulnerable to extreme hydrological events, whose potential occurrence risk seems to be recently increased due to climate change. Their design and reinforcement is, however, a complex task, and although numerical models are very powerful nowadays, real processes cannot be accurately predicted; therefore, physical models constitute a useful tool to investigate different features under controlled conditions. This paper presents some laboratory experimental results of erosion of a sand dike produced by the impact of a dam break wave. Experiments have been conducted in the Water Engineering Laboratory at the University of Cassino and Southern Lazio, Italy, in a rectangular channel: here, the sudden opening of a gate forming the reservoir generates the wave impacting the dike, made in turn of two different, almost uniform sands. The physical evidence proves that the erosion process is strongly unsteady and significantly different from a gradual overtopping and highlights the importance of apparent cohesion for the fine sand dike. The experimental results have also been compared against the ones obtained through the numerical integration of a two-phase model, which shows the reasonable predictive capability of the temporal free surface and dike profile evolution.

  3. Magma flow through elastic-walled dikes

    NARCIS (Netherlands)

    Bokhove, Onno; Woods, A.W.; de Boer, A

    2005-01-01

    A convection–diffusion model for the averaged flow of a viscous, incompressible magma through an elastic medium is considered. The magma flows through a dike from a magma reservoir to the Earth’s surface; only changes in dike width and velocity over large vertical length scales relative to the

  4. Paleomagnetism of the Miocene intrusive suite of Kidd Creek: Timing of deformation in the Cascade arc, southern Washington

    Science.gov (United States)

    Hagstrum, J.T.; Swanson, D.A.; Snee, L.W.

    1998-01-01

    Paleomagnetic study of the intrusive suite of Kidd Creek in the southern Washington Cascades (23 sites in dikes and sills) was undertaken to help determine if these rocks are comagmatic and whether they postdate regional folding of the volcanic arc. Fission track and 40Ar-39Ar age determinations indicate an age of ???12.7 Ma (middle Miocene) for these rocks. The similarity of normal-polarity characteristic directions for most samples corroborate the available geochemical data indicating that these rocks are most likely comagmatic. Reversed-polarity directions for samples from four sites, however, show that emplacement of Kidd Creek intrusions spanned at least one reversal of the geomagnetic field. The paleomagnetic directions for the dikes and sills fail a fold test at the 99% confidence level indicating that the Kidd Creek rocks postdate regional folding. The mean in situ direction also indicates that the Kidd Creek and older rocks have been rotated 22?? ?? 6?? clockwise about a vertical or near-vertical axis from the expected Miocene direction. Compression and regional folding of the Cascade arc in southern Washington therefore had ended by ???12 Ma prior to the onset of deformation resulting in rotation of these rocks.

  5. Hydraulic model tests of an innovative dike crest design

    NARCIS (Netherlands)

    Verhagen, H.J.; Kortenhaus, A.; Bollinger, K.; Dassayanake, D.

    2007-01-01

    Report on laboratory tests on a crest drainage dike; investigation if a channel in the crest of the dike is able to decrease the amount of overtopping over the dike. Chapter 2 provides details about findings from previous studies and the relevance of those findings to this research project.

  6. Context-aware local Intrusion Detection in SCADA systems : a testbed and two showcases

    NARCIS (Netherlands)

    Chromik, Justyna Joanna; Haverkort, Boudewijn R.H.M.; Remke, Anne Katharina Ingrid; Pilch, Carina; Brackmann, Pascal; Duhme, Christof; Everinghoff, Franziska; Giberlein, Artur; Teodorowicz, Thomas; Wieland, Julian

    2017-01-01

    This paper illustrates the use of a testbed that we have developed for context-aware local intrusion detection. This testbed is based on the co-simulation framework Mosaik and allows for the validation of local intrusion detection mechanisms at field stations in power distribution networks. For two

  7. The Morphological Characteristics and Mechanical Formation of Giant Radial Dike Swarms on Venus: An Overview Emphasizing Recent Numerical Modeling Insights

    Science.gov (United States)

    McGovern, P. J., Jr.; Grosfils, E. B.; Le Corvec, N.; Ernst, R. E.; Galgana, G. A.

    2017-12-01

    Over 200 giant radial dike swarms have been identified on Venus using Magellan data, yielding insight into morphological characteristics long since erased by erosion and other processes on Earth. Since such radial dike systems are typically associated with magma reservoirs, large volcanoes and/or larger-scale plume activity—and because dike geometry reflects stress conditions at the time of intrusion—assessing giant radial dike formation in the context of swarm morphology can place important constraints upon this fundamental volcanotectonic process. Recent numerical models reveal that, contrary to what is reported in much of the published literature, it is not easy, mechanically, to produce either large or small radial dike systems. After extensive numerical examination of reservoir inflation, however, under conditions ranging from a simple halfspace to complex flexural loading, we have thus far identified four scenarios that produce radial dike systems. Two of these scenarios yield dike systems akin to those often associated with shield and stratocone volcanoes on Earth, while the other two, our focus here, are more consistent with the giant radial dike system geometries catalogued on Venus. In this presentation we will (a) review key morphological characteristics of the giant radial systems identified on Venus, (b) briefly illustrate why it is not easy, mechanically, to produce a radial dike system, (c) present the two volcanological circumstances we have identified that do allow a giant radial dike system to form, and (d) discuss current model limitations and potentially fruitful directions for future research.

  8. Buffered and unbuffered dike emplacement on Earth and Venus - Implications for magma reservoir size, depth, and rate of magma replenishment

    Science.gov (United States)

    Parfitt, E. A.; Head, J. W., III

    1993-01-01

    Models of the emplacement of lateral dikes from magma chambers under constant (buffered) driving pressure conditions and declining (unbuffered) driving pressure conditions indicate that the two pressure scenarios lead to distinctly different styles of dike emplacement. In the unbuffered case, the lengths and widths of laterally emplaced dikes will be severely limited and the dike lengths will be highly dependent on chamber size; this dependence suggests that average dike length can be used to infer the dimensions of the source magma reservoir. On Earth, the characteristics of many mafic-dike swarms suggest that they were emplaced in buffered conditions (e.g., the Mackenzie dike swarm in Canada and some dikes within the Scottish Tertiary). On Venus, the distinctive radial fractures and graben surrounding circular to oval features and edifices on many size scales and extending for hundreds to over a thousand km are candidates for dike emplacement in buffered conditions.

  9. Influence of Clastic Dikes on Vertical Migration of Contaminants in the Vadose Zonde at Hanford

    International Nuclear Information System (INIS)

    Murray, Christopher J.; Ward, Anderson L.; Wilson, John L.

    2004-01-01

    The purpose of this study was to examine the hypothesis that clastic dikes could form a preferential flow path through the vadose zone to the water table at the Hanford Site. Clastic dikes are subvertical structures that form within sedimentary sequences after deposition and cut across the original sedimentary layers. They are common throughout the Hanford Site, often occurring in organized polygonal networks. In the initial phase of the project, we analyzed the large-scale geometry of the clastic dikes and developed an algorithm for simulating their spatial distribution. This result will be useful in providing maps of the potential distribution of clastic dikes in areas where they are not exposed at the surface (e.g., where covered by windblown sand or construction of facilities like tank farms at the surface). In addition to the study of the large-scale distribution of the dikes, a major focus of the project was on field, laboratory, and modeling studies of the hydrogeological properties of the clastic dikes and the effect that they have on transport of water through the vadose zone. These studies were performed at two field locations at the Hanford Site. We performed an extensive series of field and laboratory measurements of a large number of samples from the clastic dikes, linked with infrared (IR) and visual imagery of the clastic dikes and surrounding matrix. We developed a series of correlations from the sample data that allowed us to estimate the unsaturated hydraulic conductivity of the dike and matrix at an extremely high resolution (approximately 1 mm). The resulting grids, each of which measured several meters on a side and included nearly four million grid nodes, were used to study the distribution of moisture between the clastic dike and surrounding matrix, as well as the relative velocities that moisture would have through the clastic dike and matrix for a number of different recharge scenarios. Results show the development of complex flow networks

  10. Petrography and mineral chemistry of wehrlites in contact zone of gabbro intrusions and mantle peridotites of the Naein ophiolite

    Directory of Open Access Journals (Sweden)

    Farhad Ghaseminejad

    2014-10-01

    Full Text Available Introduction Geological background Ophiolites have played a major role in our understanding of Earth’s processes ranging from seafloor spreading, melt evolution and magma transport in oceanic spreading centers, and hydrothermal alteration and mineralization of oceanic crust to collision tectonics, mountain building processes, and orogeny. They provide the essential structural, petrological, geochemical, and geochronological evidence to document the evolutionary history of ancient continental margins and ocean basin. Ophiolites include a peridotitic mantle sequence, generally characterized by high-temperature plastic deformation and residual chemistry, and a comagmatic crustal sequence (gabbros, diabase dikes, and submarine basalts, weakly or not deformed. According to this interpretation, ophiolites were allochthonous with respect to their country rocks. They were assembled during a primary accretion stage at an oceanic spreading center, and later tectonically emplaced on a continental margin or island arc (Dilek, 2003. The indigenous dikes of pyroxenites and gabbros that were injected into a melting peridotite, or intrusive dikes of pyroxenite and gabbro that injected when the peridotite was fresh and well below its solidus, are discussed in different ophiolite papers. Pyroxenite formation and contact of gabbro and mantle peridotite are discussed in different articles (Dilek, 2003. When a gabbro intrude a fresh mantle peridotite could not significantly react with it, but if intrusion occurs during the serpentinization, the gabbro will change to rodingite. Geological setting The Naein ophiolitic melanges comprise the following rock units: mantle peridotites (harzburgite, lherzolite, dunite, with associated chromitite, gabbro, pyroxenite, sheeted and swarm dikes, massive basalts, pillow lava, plagiogranite, radiolarian chert, glaubotruncana limestone, rodingite, listvenite, and metamorphic rocks (foliated amphibolitic dike, amphibolite, skarn

  11. Engineering evaluation of porous-dike intake screening systems

    International Nuclear Information System (INIS)

    Roberge, J.C.

    1978-01-01

    As one of many concepts currently under investigation for use in screening fish and larvae from power plant intakes, the porous-dike system presents unique challenges to the designer and constructor. A complete understanding of the hydraulic losses through such a structure is necessary to properly size and locate the intake and to ensure proper pump selection and performance. In the study described in this report, an analogy with frictional losses in conduits was employed, and empirical data on losses were determined for three sizes of filter stone typical of the types used in the construction of a porous-dike intake system. These empirical data were compared with additional information from the literature. The dependence of hydraulic losses through large-diameter media on stone shape and porosity were demonstrated although no empirical expression of this dependence was developed. A hypothetical porous-dike intake installation was developed, demonstrating the fundamental design considerations which must be made for such a structure. Finally, a cursory economic comparison of various intake screening systems demonstrated that the porous-dike intake concept was economically competitive with all others

  12. Propagation of dikes at Vesuvio (Italy) and the effect of Mt. Somma

    Science.gov (United States)

    Acocella, V.; Porreca, M.; Neri, M.; Massimi, E.; Mattei, M.

    2006-04-01

    Dikes provide crucial information on how magma propagates within volcanoes. Somma-Vesuvio (Italy) consists of the active Vesuvio cone, partly bordered by the older Mt. Somma edifice. Historical chronicles on the fissure eruptions in 1694-1944 are matched with an analytical solution to define the propagation path of the related dikes and to study any control of the Mt. Somma relief. The fissures always consisted of the downslope migration of vents from an open summit conduit, indicating lateral propagation as the predominant mechanism for shallow dike emplacement. No fissure emplaced beyond Mt. Somma, suggesting that its buttressing hinders the propagation of the radial dikes. An analytical solution is defined to describe the mechanism of formation of the laterally propagating dikes and to evaluate the effect of topography. The application to Somma-Vesuvio suggests that, under ordinary excess magmatic pressures, the dikes should not propagate laterally at depths >240-480 m below the surface, as the increased lithostatic pressure requires magmatic pressures higher than average. This implies that, when the conduit is open, the lateral emplacement of dikes is expectable on the S, W and E slopes. The lack of fissures N of Mt. Somma is explained by its buttressing, which hinders dike propagation.

  13. Mean Flow and Turbulence Near a Series of Dikes

    Science.gov (United States)

    Yaeger, M. A.; Duan, J. G.

    2008-12-01

    Scour around various structures obstructing flow in an open channel is a common problem faced by river engineers. To better understand why this occurs, two questions must be answered: what are the mean flow and turbulence distributions around these structures and how do these two fields affect sediment transport? In addition, are the mean flow or turbulence properties more important in predicting the local transport rate? To answer these questions, a near-bed turbulence and shear stress study was conducted in a flat, fixed bed laboratory flume. Three dikes were placed on the left wall at right angles to the flow, extending partway into the flow, and remaining fully emerged throughout the experiment. A micro acoustic Doppler velocimeter (ADV) was used to measure velocities near the bed in the x, y, and z directions and then the turbulence intensities and Reynolds stresses were calculated from these measurements. Preliminary results showed that mean velocity has no relation to the formation of scour near the tips of the dikes but that Reynolds stresses and turbulence intensities do. It was shown that the horizontal component of the Reynolds stress near the bed contributed the most to the formation of scour. The maximum value of this component was over 200 times that of the mean bed shear stress of the incoming flow, whereas in a single dike field, the same Reynolds stress is about 60 times that of the incoming flow. The magnitudes of the other two components of the Reynolds stress were less than that of the horizontal component, with magnitudes about 20 times that of the incoming flow. This may be attributed to the very small contribution of the vertical velocity in these components. Turbulence intensity magnitudes were about 3 to 5 times that of the incoming flow, with the largest being u'. The largest values for both Reynolds stresses and turbulence intensities were seen at the tip of the second dike in the series. Better understanding of these flow processes will

  14. Automatic Monitoring System Design and Failure Probability Analysis for River Dikes on Steep Channel

    Science.gov (United States)

    Chang, Yin-Lung; Lin, Yi-Jun; Tung, Yeou-Koung

    2017-04-01

    The purposes of this study includes: (1) design an automatic monitoring system for river dike; and (2) develop a framework which enables the determination of dike failure probabilities for various failure modes during a rainstorm. The historical dike failure data collected in this study indicate that most dikes in Taiwan collapsed under the 20-years return period discharge, which means the probability of dike failure is much higher than that of overtopping. We installed the dike monitoring system on the Chiu-She Dike which located on the middle stream of Dajia River, Taiwan. The system includes: (1) vertical distributed pore water pressure sensors in front of and behind the dike; (2) Time Domain Reflectometry (TDR) to measure the displacement of dike; (3) wireless floating device to measure the scouring depth at the toe of dike; and (4) water level gauge. The monitoring system recorded the variation of pore pressure inside the Chiu-She Dike and the scouring depth during Typhoon Megi. The recorded data showed that the highest groundwater level insides the dike occurred 15 hours after the peak discharge. We developed a framework which accounts for the uncertainties from return period discharge, Manning's n, scouring depth, soil cohesion, and friction angle and enables the determination of dike failure probabilities for various failure modes such as overtopping, surface erosion, mass failure, toe sliding and overturning. The framework was applied to Chiu-She, Feng-Chou, and Ke-Chuang Dikes on Dajia River. The results indicate that the toe sliding or overturning has the highest probability than other failure modes. Furthermore, the overall failure probability (integrate different failure modes) reaches 50% under 10-years return period flood which agrees with the historical failure data for the study reaches.

  15. Intrusion mechanics according to Burstone with the NiTi-SE-steel uprighting spring.

    Science.gov (United States)

    Sander, F G; Wichelhaus, A; Schiemann, C

    1996-08-01

    Intrusion mechanics according to Burstone can be regarded as a practicable method for the intrusion of incisors. 1. By applying the NiTi-SE-steel uprighting spring, relatively constant forces can be exerted over a large range of intrusion on both sides of the anterior tooth archwire. 2. By bending a 150 degrees tip-back bend or a curvature into the steel portion, the uprighting spring presented here is brought into the plastic range of the characteristic curve of force. 3. Application of sliding hooks on the intrusion spring permits readjustment for force transfer onto the anterior archwire. 4. Connecting the anterior archwire with the posterior elements by means of a steel ligature can be recommended only in some cases, because sagittally directed forces may be produced. 5. The adult patients presented showed an average intrusion of 0.6 mm/month, if a linear connection was presupposed. 6. An intrusive effect on the incisors could first be detected clinically after 6 to 8 weeks. 7. Application of a torque-key proves especially useful in controlling the incisor position during intrusion in order to avoid unnecessary radiography. 8. Actual prediction of the centre of resistance with the help of a cephalometric radiograph proved not to be feasible. 9. The calculated maximal intrusion of the mandibular incisors was 7 mm. 10. The torque-segmented archwire with crimped hooks and pseudoelastic springs between the molars and the crimped hooks proved very effective for retrusion and intrusion of maxillary incisors. The maxillary anterior teeth can be retruded by a total of 7 mm without readjustment. 11. Constant moments and forces could be transferred by applying preformed arch wires and segmented arch wires.

  16. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    International Nuclear Information System (INIS)

    P. Bernot

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  17. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  18. Ancient igneous intrusions and early expansion of the Moon revealed by GRAIL gravity gradiometry.

    Science.gov (United States)

    Andrews-Hanna, Jeffrey C; Asmar, Sami W; Head, James W; Kiefer, Walter S; Konopliv, Alexander S; Lemoine, Frank G; Matsuyama, Isamu; Mazarico, Erwan; McGovern, Patrick J; Melosh, H Jay; Neumann, Gregory A; Nimmo, Francis; Phillips, Roger J; Smith, David E; Solomon, Sean C; Taylor, G Jeffrey; Wieczorek, Mark A; Williams, James G; Zuber, Maria T

    2013-02-08

    The earliest history of the Moon is poorly preserved in the surface geologic record due to the high flux of impactors, but aspects of that history may be preserved in subsurface structures. Application of gravity gradiometry to observations by the Gravity Recovery and Interior Laboratory (GRAIL) mission results in the identification of a population of linear gravity anomalies with lengths of hundreds of kilometers. Inversion of the gravity anomalies indicates elongated positive-density anomalies that are interpreted to be ancient vertical tabular intrusions or dikes formed by magmatism in combination with extension of the lithosphere. Crosscutting relationships support a pre-Nectarian to Nectarian age, preceding the end of the heavy bombardment of the Moon. The distribution, orientation, and dimensions of the intrusions indicate a globally isotropic extensional stress state arising from an increase in the Moon's radius by 0.6 to 4.9 kilometers early in lunar history, consistent with predictions of thermal models.

  19. Geological characteristics of dike-structural belt in Taoshan orefield and its relationship to uranium deposits

    International Nuclear Information System (INIS)

    Zhang Wanliang; Zou Maoqing; Shao Fei; Nie Bin

    2009-01-01

    Taoshan uranium field is occurred in the Taoshan composite batholith in the central Jiangxi Province. The main body of the batholith was formed in Triassic-Early Cretaceous. In Late Cretaceous-Eogene, NE strike fault structure and dike belt were developed in the batholith. From the north to the south, there are successive Xiaobu-Matian dike-structural belt, Wangnitian dike- structural belt, Huangtan-Yueyuan dike-structural belt, Xibei-Shangluo dike-structural belt, Jipoling dike-structural belt, Wangce dike-structural belt and Shiyuanling dike-structural belt. These belts are controlled by the main fault, share the same space and similar time with the uranium mineralization, which is one of the important factors in positioning the uranium ore as well as the prospecting direction of exploration. (authors)

  20. Rock mass joint treated by jet grouting at Diavik A418 dike south abutment

    Energy Technology Data Exchange (ETDEWEB)

    Baisre, C.A. [SNC-Lavalin, Montreal, PQ (Canada); Hatch Energy, Montreal, PQ (Canada)

    2009-07-01

    In order to exploit the diamond pipes at the Diavik mines, located in the Northwest Territories, two dikes were built into the Lac de Gras, dikes A154 and A418. However, during the construction of the curtain grouting of the A418 Dike, the pressure grouting technique did not achieve the desired closure of a subhorizontal joint located at variable depth beneath the dike foundation into the granite rock mass at the south abutment. The joint was filled mainly with silt, sand and gravel. This paper reviewed the problems with the pressure grouting treatment methodology, and the final decision of the designers and construction manager to treat the joint by jet grouting. The paper outlined pressure grouting, with particular reference to technical specifications; curtain grouting analysis; and joint grouting investigation. The joint treatment by jet grouting was described and the most important features of the core drilling after jetting were outlined. The permeability of the joint was reduced significantly in the treated area, according to observations made during jetting and in the recovered cores and the permeability tests. 1 tab., 7 figs.

  1. Clastic dike from Baga, Goa

    Digital Repository Service at National Institute of Oceanography (India)

    Setty, M.G.A.P.; Wagle, B.G.

    analogous to igneous dikes in appearance and also in their field relationships. These are injections of mobilized sediment into fracture zones and bedding planes of sedimentary sequences and reported from widely scattered regions throughout the world...

  2. New Experiences in Dike Construction with Soil-Ash Composites and Fine-Grained Dredged Materials

    Directory of Open Access Journals (Sweden)

    Duszyński Remigiusz

    2017-12-01

    Full Text Available The supporting structure inside a coastal dike is often made of dredged non-uniform sand with good compaction properties. Due to the shortage of natural construction material for both coastal and river dikes and the surplus of different processed materials, new experiments were made with sand-ash mixtures and fine-grained dredged materials to replace both dike core and dike cover materials resulting in economical, environmentally friendly and sustainable dikes. Ash from EC Gdańsk and dredged sand from the Vistula river were mixed to form an engineering material used for dike construction. The optimum sand-ash composites were applied at a field test site to build a large-scale research dike. Fine-grained dredged materials from Germany were chosen to be applied in a second full-scale research dike in Rostock. All materials were investigated according to the standards for soil mechanical analysis. This includes basic soil properties, mechanical characteristics, such as grain-size distribution, compaction parameters, compressibility, shear strength, and water permeability. In the field, the infiltration of water into the dike body as well as the erosion resistance of the cover material against overflowing water was determined. Results of both laboratory and field testing are discussed in this paper. In conclusion, the mixing of bottom ash with mineral soil, such as relatively uniform dredged sand, fairly improves the geotechnical parameters of the composite, compared to the constituents. Depending on the composite, the materials may be suitable to build a dike core or an erosion-resistant dike cover.

  3. New Experiences in Dike Construction with Soil-Ash Composites and Fine-Grained Dredged Materials

    Science.gov (United States)

    Duszyński, Remigiusz; Duszyńska, Angelika; Cantré, Stefan

    2017-12-01

    The supporting structure inside a coastal dike is often made of dredged non-uniform sand with good compaction properties. Due to the shortage of natural construction material for both coastal and river dikes and the surplus of different processed materials, new experiments were made with sand-ash mixtures and fine-grained dredged materials to replace both dike core and dike cover materials resulting in economical, environmentally friendly and sustainable dikes. Ash from EC Gdańsk and dredged sand from the Vistula river were mixed to form an engineering material used for dike construction. The optimum sand-ash composites were applied at a field test site to build a large-scale research dike. Fine-grained dredged materials from Germany were chosen to be applied in a second full-scale research dike in Rostock. All materials were investigated according to the standards for soil mechanical analysis. This includes basic soil properties, mechanical characteristics, such as grain-size distribution, compaction parameters, compressibility, shear strength, and water permeability. In the field, the infiltration of water into the dike body as well as the erosion resistance of the cover material against overflowing water was determined. Results of both laboratory and field testing are discussed in this paper. In conclusion, the mixing of bottom ash with mineral soil, such as relatively uniform dredged sand, fairly improves the geotechnical parameters of the composite, compared to the constituents. Depending on the composite, the materials may be suitable to build a dike core or an erosion-resistant dike cover.

  4. Prediction of changes due to mandibular autorotation following miniplate-anchored intrusion of maxillary posterior teeth in open bite cases.

    Science.gov (United States)

    Kassem, Hassan E; Marzouk, Eiman S

    2018-05-14

    Prediction of the treatment outcome of various orthodontic procedures is an essential part of treatment planning. Using skeletal anchorage for intrusion of posterior teeth is a relatively novel procedure for the treatment of anterior open bite in long-faced subjects. Data were analyzed from lateral cephalometric radiographs of a cohort of 28 open bite adult subjects treated with intrusion of the maxillary posterior segment with zygomatic miniplate anchorage. Mean ratios and regression equations were calculated for selected variables before and after intrusion. Relative to molar intrusion, there was approximately 100% vertical change of the hard and soft tissue mention and 80% horizontal change of the hard and soft tissue pogonion. The overbite deepened two folds with 60% increase in overjet. The lower lip moved forward about 80% of the molar intrusion. Hard tissue pogonion and mention showed the strongest correlations with molar intrusion. There was a general agreement between regression equations and mean ratios at 3 mm molar intrusion. This study attempted to provide the clinician with a tool to predict the changes in key treatment variables following skeletally anchored maxillary molar intrusion and autorotation of the mandible.

  5. Red-Sea rift magmatism near Al Lith, Kingdom of Saudi Arabia

    Science.gov (United States)

    Pallister, J.S.

    1986-01-01

    A newly recognized Tertiary dike complex and comagmatic volcanic rocks exposed on the central Saudi Arabian coastal plain record early stages of magmatism related to Red Sea rifting. Intrusive and stratigraphic relationships, and new potassium-argon dating indicate episodic magmatism from about 30 Ma to the present. Additional stratigraphic and radiometric evidence suggests that limited rift-related magmatism may have began as early as about 50 Ma ago. An early phase of crustal extension in the region was accompanied by faulting and graben formation and by dike-swarm intrusion. The style of extension and intrusion changed approximately 20 Ma ago. Localized volcanism and sheeted dike injection ceased and were replaced by the intrusion of thick gabbro dikes. This change may mark the onset of sea-floor spreading in the central Red Sea.

  6. Inflation and Collapse of the Wai'anae Volcano (Oahu,Hawaii, USA):Insights from Magnetic Fabric Studies of Dikes

    Science.gov (United States)

    Lau, J. K. S.; Herrero-Bervera, E.; Moreira, M. A. D. A.

    2016-12-01

    The Waianae Volcano is the older of two shield volcanoes that make up the island of Oahu. Previous age determinations suggest that the subaerial portion of the edifice erupted between approximately 3.7 and 2.7 Ma. The eroded Waianae Volcano had a well-developed caldera centered near the back of its two most prominent valleys and two major rift zones: a prominent north-west rift zone, well-defined by a complex of sub-parallel dikes trending approximately N52W, and a more diffuse south rift zone trending between S20W to due South. In order to investigate the volcanic evolution, the plumbing and the triggering mechanisms of the catastrophic mass wasting that had occurred in the volcano, we have undertaken an AMS study of 7 dikes from the volcano. The width of the dikes ranged between 0.5 to 4 m. Low-field susceptibility versus temperature (k-T) and SIRM experiments were able to identify magnetite at 575 0C and at about 250-300 0C, corresponding to titanomagnetite.. Magnetic fabric studies of the dikes along a NW-SE section across the present southwestern part of the Waianae volcano have been conducted. The flow direction was studied using the imbrication angle between the dike walls and the magnetic foliation. The flow direction has been obtained in the 7 studied dikes. For the majority of the cases, the maximum axis, K1, appears to be perpendicular to the flow direction, and in some cases, with a permutation with respect to the intermediate axis, K2, or even with respect to the minimum axis, K3. In addition, in one of the sites studied, the minimum axis, K3, is very close to the flow direction. In all cases, the magma flowed along a direction with a moderate plunge. For six of the dikes, the interpreted flow was from the internal part of the volcano towards the volcano border, and corresponds probably to the inflation phase of the volcano. In two cases (dikes located on the northwestern side of the volcano), the flow is slightly downwards, possibly related to the

  7. Analysis of Overtopping Flow on Sea Dikes in Oblique and Short-Crested Waves

    DEFF Research Database (Denmark)

    Nørgaard, Jørgen Harck; Andersen, Thomas Lykke; Burcharth, Hans F.

    2013-01-01

    -empirical formulae for the estimation of flow depths and flow velocities across a dike. The results have been coupled to the actual erosion of the landward dike slope determined by full-scale 2D tests using the so-called “Overtopping Simulator”. This paper describes the results from 96 small-scale tests carried out...... directions on the dike, and the statistical distribution of individual flow parameters are needed to obtain more realistic estimates of dike erosion caused by wave overtopping....

  8. Dike-induced contraction along oceanic and continental divergent plate boundaries

    KAUST Repository

    Trippanera, D.

    2014-10-28

    The axis of divergent plate boundaries shows extension fractures and normal faults at the surface. Here we present evidence of contraction along the axis of the oceanic ridge of Iceland and the continental Main Ethiopian Rift. Contraction is found at the base of the tilted hanging wall of dilational normal faults, balancing part of their extension. Our experiments suggest that these structures result from dike emplacement. Multiple dike injection induces subsidence above and uplift to the sides of the dikes; the transition in between is accommodated by reverse faults and subsequent peripheral inward dipping normal faults. Our results suggest that contraction is a direct product of magma emplacement along divergent plate boundaries, at various scales, marking a precise evolutionary stage and initiating part of the extensional structures (extension fractures and normal faults). Key Points Contraction along divergent plate boundaries results from dike emplacementContraction generates extensional structures along divergent plate boundariesSurface deformation along divergent plate boundaries may be magma induced

  9. Dike-induced contraction along oceanic and continental divergent plate boundaries

    KAUST Repository

    Trippanera, D.; Acocella, V.; Ruch, Joel

    2014-01-01

    The axis of divergent plate boundaries shows extension fractures and normal faults at the surface. Here we present evidence of contraction along the axis of the oceanic ridge of Iceland and the continental Main Ethiopian Rift. Contraction is found at the base of the tilted hanging wall of dilational normal faults, balancing part of their extension. Our experiments suggest that these structures result from dike emplacement. Multiple dike injection induces subsidence above and uplift to the sides of the dikes; the transition in between is accommodated by reverse faults and subsequent peripheral inward dipping normal faults. Our results suggest that contraction is a direct product of magma emplacement along divergent plate boundaries, at various scales, marking a precise evolutionary stage and initiating part of the extensional structures (extension fractures and normal faults). Key Points Contraction along divergent plate boundaries results from dike emplacementContraction generates extensional structures along divergent plate boundariesSurface deformation along divergent plate boundaries may be magma induced

  10. Mathematical investigation of tsunami-like long waves interaction with submerge dike of different thickness

    Science.gov (United States)

    Zhiltsov, Konstantin; Kostyushin, Kirill; Kagenov, Anuar; Tyryshkin, Ilya

    2017-11-01

    This paper presents a mathematical investigation of the interaction of a long tsunami-type wave with a submerge dike. The calculations were performed by using the freeware package OpenFOAM. Unsteady two-dimensional Navier-Stokes equations were used for mathematical modeling of incompressible two-phase medium. The Volume of Fluid (VOF) method is used to capture the free surface of a liquid. The effects caused by long wave of defined amplitude motion through a submerged dike of varying thickness were discussed in detail. Numerical results show that after wave passing through the barrier, multiple vortex structures were formed behind. Intensity of vortex depended on the size of the barrier. The effectiveness of the submerge barrier was estimated by evaluating the wave reflection and transmission coefficients using the energy integral method. Then, the curves of the dependences of the reflection and transmission coefficients were obtained for the interaction of waves with the dike. Finally, it was confirmed that the energy of the wave could be reduced by more than 50% when it passed through the barrier.

  11. GPR Imaging of Clastic Dikes at the Hanford Site, Hanford, Washington

    International Nuclear Information System (INIS)

    Clement, William P.; Murray, Christopher J.

    2007-01-01

    We use ground penetrating radar (GPR) data to help determine the spatial distribution and the subsurface geometry of clastic injection dikes at the Hanford site. This information will help to improve the understanding of the hydrological role of these ubiquitous clastic dikes at the Hanford Site. We collected 100 MHz ground penetrating radar (GPR) 3D surface reflection data at two sites, the S-16 Pond and the Army Loop Road sites, and 2D reflection data along a 6.9 km linear transect near the Army Loop Road site. The dikes are distinguished in the GPR data by a strongly attenuated zone, disruptions in the continuity of reflections, and diffractions where reflections are disrupted. In general, the data quality is better at the Army Loop Road and Traverse sites than at the S-16 Pond site, probably due to the presence of cobbles at the S-16 Pond site. A high-moisture, fine-grained unit probably causes the strong reflections at the Army Loop Road site and the Traverse survey site. The signal penetration varies between 5 to 12 m below the land surface

  12. Generation, ascent and eruption of magma on the Moon: New insights into source depths, magma supply, intrusions and effusive/explosive eruptions (Part 2: Predicted emplacement processes and observations)

    Science.gov (United States)

    Head, James W.; Wilson, Lionel

    2017-02-01

    We utilize a theoretical analysis of the generation, ascent, intrusion and eruption of basaltic magma on the Moon to develop new insights into magma source depths, supply processes, transport and emplacement mechanisms via dike intrusions, and effusive and explosive eruptions. We make predictions about the intrusion and eruption processes and compare these with the range of observed styles of mare volcanism, and related features and deposits. Density contrasts between the bulk mantle and regions with a greater abundance of heat sources will cause larger heated regions to rise as buoyant melt-rich diapirs that generate partial melts that can undergo collection into magma source regions; diapirs rise to the base of the anorthositic crustal density trap (when the crust is thicker than the elastic lithosphere) or, later in history, to the base of the lithospheric rheological trap (when the thickening lithosphere exceeds the thickness of the crust). Residual diapiric buoyancy, and continued production and arrival of diapiric material, enhances melt volume and overpressurizes the source regions, producing sufficient stress to cause brittle deformation of the elastic part of the overlying lithosphere; a magma-filled crack initiates and propagates toward the surface as a convex upward, blade-shaped dike. The volume of magma released in a single event is likely to lie in the range 102 km3 to 103 km3, corresponding to dikes with widths of 40-100 m and both vertical and horizontal extents of 60-100 km, favoring eruption on the lunar nearside. Shallower magma sources produce dikes that are continuous from the source region to the surface, but deeper sources will propagate dikes that detach from the source region and ascend as discrete penny-shaped structures. As the Moon cools with time, the lithosphere thickens, source regions become less abundant, and rheological traps become increasingly deep; the state of stress in the lithosphere becomes increasingly contractional

  13. A two-stage flow-based intrusion detection model for next-generation networks.

    Science.gov (United States)

    Umer, Muhammad Fahad; Sher, Muhammad; Bi, Yaxin

    2018-01-01

    The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results.

  14. Scattering of electromagnetic plane waves by a buried vertical dike

    Directory of Open Access Journals (Sweden)

    Batista Lurimar S.

    2003-01-01

    Full Text Available The complete and exact solution of the scattering of a TE mode frequency domain electromagnetic plane wave by a vertical dike under a conductive overburden has been established. An integral representation composed of one-sided Fourier transforms describes the scattered electric field components in each one of the five media: air, overburden, dike, and the country rocks on both sides of the dike. The determination of the terms of the series that represents the spectral components of the Fourier integrals requires the numerical inversion of a sparse matrix, and the method of successive approaches. The zero-order term of the series representation for the spectral components of the overburden, for given values of the electrical and geometrical parameters of the model, has been computed. This result allowed to determine an approximate value of the variation of the electric field on the top of the overburden in the direction perpendicular to the strike of the dike. The results demonstrate the efficiency of this forward electromagnetic modeling, and are fundamental for the interpretation of VLF and Magnetotelluric data.

  15. Stability of the anterior maxillary segment and teeth after segmental le fort I osteotomy and postoperative skeletal elastic fixation with or without occlusal splint.

    Science.gov (United States)

    Blæhr, Tue Lindberg; Jensen, Thomas; Due, Karen Margrethe; Neumann-Jensen, Bjarne

    2014-07-01

    To assess the short term dental and skeletal stability of the anterior maxillary segment after segmental Le Fort I osteotomy with postoperative skeletal elastic fixation with or without occlusal splint. 29 consecutive patients underwent segmental Le Fort I osteotomy and elastic skeletal fixation was applied. Patients were divided into two groups according to whether a fixed occlusal splint was used for six weeks (group A) or dismounted perioperatively (group B). Changes in landmarks and reference planes between the two timepoints were estimated on lateral cephalometric radiographs. The upper incisor had a mean intrusion of -0.56 mm (SD 0.77; range -2.04 to 1.08 mm) and a mean posterior movement of -0.93 mm (SD 1.03; range -2.52 to 0.96 mm). The mean change in the axial inclination of the upper incisor was -0.33° (SD 2.56; range -6° to 4°) (95% CI: -1.75 to 1.08°). Group B: The upper incisor had a mean intrusion of -0.13 mm (SD 1.36; range -1.92 to 3.6 mm) and a mean anterior movement of 0.11 mm (SD 1.78; range -2.88 to 3.84 mm). The mean change in the axial inclination of the upper incisor was -0.07° (SD 3.05; range -5° to 5°) (95% CI: -1.83 to 1.69°). There was no statistically significant difference in stability between the two groups at the P value 0.05. The skeletal anterior fixation with postoperative elastics for eight weeks may not compromise the early postoperative dental and skeletal stability of the anterior segment in segmental Le Fort I osteotomy.

  16. Stability of the Anterior Maxillary Segment and Teeth after Segmental Le Fort I Osteotomy and Postoperative Skeletal Elastic Fixation With or Without Occlusal Splint

    Directory of Open Access Journals (Sweden)

    Tue Lindberg

    2014-10-01

    Full Text Available Objectives: To assess the short term dental and skeletal stability of the anterior maxillary segment after segmental Le Fort I osteotomy with postoperative skeletal elastic fixation with or without occlusal splint. Material and Methods: 29 consecutive patients underwent segmental Le Fort I osteotomy and elastic skeletal fixation was applied. Patients were divided into two groups according to whether a fixed occlusal splint was used for six weeks (group A or dismounted perioperatively (group B. Changes in landmarks and reference planes between the two timepoints were estimated on lateral cephalometric radiographs. Results: Group A: The upper incisor had a mean intrusion of -0.56 mm (SD 0.77; range -2.04 to 1.08 mm and a mean posterior movement of -0.93 mm (SD 1.03; range -2.52 to 0.96 mm. The mean change in the axial inclination of the upper incisor was -0.33° (SD 2.56; range -6° to 4° (95% CI: -1.75 to 1.08°. Group B: The upper incisor had a mean intrusion of -0.13 mm (SD 1.36; range -1.92 to 3.6 mm and a mean anterior movement of 0.11 mm (SD 1.78; range -2.88 to 3.84 mm. The mean change in the axial inclination of the upper incisor was -0.07° (SD 3.05; range -5° to 5° (95% CI: -1.83 to 1.69°. There was no statistically significant difference in stability between the two groups at the P value 0.05. Conclusions: The skeletal anterior fixation with postoperative elastics for eight weeks may not compromise the early postoperative dental and skeletal stability of the anterior segment in segmental Le Fort I osteotomy.

  17. Reliability analysis of the Red River dikes system in Viet Nam

    NARCIS (Netherlands)

    Pham Quang, T.

    2014-01-01

    This dissertation presents the applications of probabilistic-based frameworks in geotechnical and hydraulic engineering, for the assessment of the Red River dikes in Viet Nam. Dike along rivers often spread over the deltaic environment and its earthen structures are parts of a long civilian history,

  18. Wind turbines and dike safety : Influence of time dependant loads and focus on long term behavior

    NARCIS (Netherlands)

    Holscher, P.; Kothuis, Baukje; Kok, Matthijs

    2017-01-01

    Dikes are attractive locations to construct wind turbines. Wind turbines can accentuate the dike as a linear element in the landscape. Dikes are often windy spots, that are accessible for construction and maintenance using the existing work road along the dike. With

  19. Impact of lime treated soils performance on design of earthfill dikes

    Directory of Open Access Journals (Sweden)

    Nerincx Nicolas

    2016-01-01

    Full Text Available Nowadays soil treatment with lime in civil engineering is widespread in many countries on all continents, within several construction fields. The interest of the hydraulic works community regarding this technique is currently growing. It has been indeed shown during the last decade that appropriate treatment technologies provide lime treated soils with high level properties such as excellent homogeneity, low permeability, internal and external erosion resistance and mechanical stability. Those have been shown in laboratory and for some properties with full scale experiments. The so conferred soil properties can lead to innovative earthfill dams and dikes designs by addressing some of the typical designer’s problems, such as stability, watertightness, internal erosion, surface protection and flood control. However, lime treated soil external erosion resistance is still to be quantified in the field for proper designing and dimensioning of lime treated soil external erosion protection or spillways. With this purpose, an experimental earthfill dike has been built along the river Vidourle (France in July 2015, in the frame of the French R&D program “DigueELITE”. This 50 m long and 3,5 m high dike is made of lime treated silt and is provided with sensors (succion, water content and temperature and piezometer in order to be monitored. It will also be tested against surface erosion. The final objective of this R&D program is to provide guidelines for designing innovative overflow resistant earthfill dikes. This article describes the performance reached by lime treated soils and associated design requirements and application; the experimental dike construction and lessons learned; the monitoring program; the dike design perspectives opened by soil treatment.

  20. Evaluation of Major Dike-Impounded Ground-Water Reservoirs, Island of Oahu

    Science.gov (United States)

    Takasaki, Kiyoshi J.; Mink, John Francis

    1985-01-01

    Ground-water reservoirs impounded by volcanic dikes receive a substantial part of the total recharge to ground water on the island of Oahu because they generally underlie the rainiest areas. These reservoirs accumulate the infiltration from rainfall, store it temporarily, and steadily leak it to abutting basal reservoirs or to streams cutting into them. The dike reservoirs have high hydraulic heads and are mostly isolated from saline water. The most important and productive of the dike-impounded reservoirs are in an area of about 135 square miles in the main fissure zone of the Koolau volcano where the top of the dike-impounded water reaches an altitude of at least 1,000 feet. Water is impounded and stored both above and below sea level. The water stored above sea level in the 135 square mile area has been roughly estimated at 560 billion gallons. In comparison, the water stored above sea level in reservoirs underlying a dike-intruded area of about 53 square miles in the Waianae Range has been roughly estimated at 100 billion gallons. Storage below sea level is indeterminable, owing to uncertainties about the ability of the rock to store water as dike density increases and porosity decreases. Tunnels, by breaching dike controls, have reduced the water stored above sea level by at least 50 billion gallons in the Koolau Range and by 5 1/2 billion gallons in the Waianae Range, only a small part of the total water stored. Total leakage from storage in the Koolau Range has been estimated at about 280 Mgal/d (million gallons per day). This estimated leakage from the dike-impounded reservoirs makes up a significant part of the ground-water yield of the Koolau Range, which has been estimated to range from 450 to 580 Mgal/d. The largest unused surface leakage is in the Kaneohe, Kahana, and Punaluu areas, and the largest unused underflow occurs in the Waialee, Hauula-Laie, Punaluu, and Kahana areas. The unused underflow leakage is small in areas near and east of Waialae, but

  1. Distributed optical fiber-based monitoring approach of spatial seepage behavior in dike engineering

    Science.gov (United States)

    Su, Huaizhi; Ou, Bin; Yang, Lifu; Wen, Zhiping

    2018-07-01

    The failure caused by seepage is the most common one in dike engineering. As to the characteristics of seepage in dike, such as longitudinal extension engineering, the randomness, strong concealment and small initial quantity order, by means of distributed fiber temperature sensor system (DTS), adopting an improved optical fiber layer layout scheme, the location of initial interpolation point of the saturation line is obtained. With the barycentric Lagrange interpolation collocation method (BLICM), the infiltrated surface of dike full-section is generated. Combined with linear optical fiber monitoring seepage method, BLICM is applied in an engineering case, which shows that a real-time seepage monitoring technique is presented in full-section of dike based on the combination method.

  2. Case Study: Wenduine, Belgium : Vulnerability of buildings on a coastal dike

    NARCIS (Netherlands)

    Chen, X.; Kothuis, Baukje; Kok, Matthijs

    2017-01-01

    On coastal dikes in Belgium, many residential buildings are found. Most of the old buildings are masonry structures with two to three floors (Figure 1). The ground floors are always elevated (Figure 2), and the entrances of the basements are closed by shutters

  3. Experimental study of the interplay between magmatic rift intrusion and flank instability with application to the 2001 Mount Etna eruption

    KAUST Repository

    Le Corvec, Nicolas

    2014-07-01

    Mount Etna volcano is subject to transient magmatic intrusions and flank movement. The east flank of the edifice, in particular, is moving eastward and is dissected by the Timpe Fault System. The relationship of this eastward motion with intrusions and tectonic fault motion, however, remains poorly constrained. Here we explore this relationship by using analogue experiments that are designed to simulate magmatic rift intrusion, flank movement, and fault activity before, during, and after a magmatic intrusion episode. Using particle image velocimetry allows for a precise temporal and spatial analysis of the development and activity of fault systems. The results show that the occurrence of rift intrusion episodes has a direct effect on fault activity. In such a situation, fault activity may occur or may be hindered, depending on the interplay of fault displacement and flank acceleration in response to dike intrusion. Our results demonstrate that a complex interplay may exist between an active tectonic fault system and magmatically induced flank instability. Episodes of magmatic intrusion change the intensity pattern of horizontal flank displacements and may hinder or activate associated faults. We further compare our results with the GPS data of the Mount Etna 2001 eruption and intrusion. We find that syneruptive displacement rates at the Timpe Fault System have differed from the preeruptive or posteruptive periods, which shows a good agreement of both the experimental and the GPS data. Therefore, understanding the flank instability and flank stability at Mount Etna requires consideration of both tectonic and magmatic forcing. Key Points Analyzing Mount Etna east flank dynamics during the 2001 eruption Good correlation between analogue models and GPS data Understanding the different behavior of faulting before/during/after an eruption © 2014. American Geophysical Union. All Rights Reserved.

  4. Experimental study of the interplay between magmatic rift intrusion and flank instability with application to the 2001 Mount Etna eruption

    KAUST Repository

    Le Corvec, Nicolas; Walter, Thomas R.; Ruch, Joel; Bonforte, Alessandro; Puglisi, Giuseppe

    2014-01-01

    Mount Etna volcano is subject to transient magmatic intrusions and flank movement. The east flank of the edifice, in particular, is moving eastward and is dissected by the Timpe Fault System. The relationship of this eastward motion with intrusions and tectonic fault motion, however, remains poorly constrained. Here we explore this relationship by using analogue experiments that are designed to simulate magmatic rift intrusion, flank movement, and fault activity before, during, and after a magmatic intrusion episode. Using particle image velocimetry allows for a precise temporal and spatial analysis of the development and activity of fault systems. The results show that the occurrence of rift intrusion episodes has a direct effect on fault activity. In such a situation, fault activity may occur or may be hindered, depending on the interplay of fault displacement and flank acceleration in response to dike intrusion. Our results demonstrate that a complex interplay may exist between an active tectonic fault system and magmatically induced flank instability. Episodes of magmatic intrusion change the intensity pattern of horizontal flank displacements and may hinder or activate associated faults. We further compare our results with the GPS data of the Mount Etna 2001 eruption and intrusion. We find that syneruptive displacement rates at the Timpe Fault System have differed from the preeruptive or posteruptive periods, which shows a good agreement of both the experimental and the GPS data. Therefore, understanding the flank instability and flank stability at Mount Etna requires consideration of both tectonic and magmatic forcing. Key Points Analyzing Mount Etna east flank dynamics during the 2001 eruption Good correlation between analogue models and GPS data Understanding the different behavior of faulting before/during/after an eruption © 2014. American Geophysical Union. All Rights Reserved.

  5. How integrating 3D LiDAR data in the dike surveillance protocol: The French case

    Science.gov (United States)

    Bretar, F.; Mériaux, P.; Fauchard, C.

    2012-04-01

    The recent and dramatic floods of the last years in Europe (e.g. Rhône river major flood, December 2003, Windstorm Xynthia, February 2010, in France) and in the United-States (Hurricane Katrina, August 2005) showed the vulnerability of flood or coastal defence systems. The first key point for avoiding these dramatic damages and the high cost of a failure and its consequences lies in the appropriate conception and construction of the dikes, but above all in the relevance of the surveillance protocol. Many factors introduce weaknesses in the fluvial or maritime dikes. Most of them are old embankment structures. For instance, some of the French Loire River dikes were built several centuries ago. They may have been rebuilt, modified, heightened several times, with some materials that do not necessarily match the original conception of the structure. In other respects, tree roots or animal burrows could modify the structure of the dike and reduce the watertightness or mechanical properties. The French government has built a national database, "BarDigues", since 1999 to inventory and characterize dikes. Today, there are approx. 9000 km of dikes protecting 1.5 to 2 millions of people. In the meantime, a GIS application, called « Dike SIRS » [Maurel P., 2004] , provides an operational and accurate tool to several great stakeholders in charge of managing more than 100 km of dikes. Today, the dike surveillance and diagnosis protocol consists in identifying the weaknesses of the structure and providing the degree of safety by making a preliminary study (historical research, geological and morphodynamic study, topography), geophysical study (e.g. electromagnetic methods and electrical resistivity tomography) and at last geotechnical study (e.g. drillings and stability modelling) at the very local scale when necessary [Mériaux P. & Royet P, 2007] . Considering the stretch of hundreds of kilometres, rapid, cost-effective and reliable techniques for surveying the dike must be

  6. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  7. Setting of the Father's Day Eruption at Kilauea

    Science.gov (United States)

    Swanson, D. A.

    2007-12-01

    The Father's Day eruption and associated intrusion took place within a 10-km segment of Kilauea's east rift zone between Hi`iaka and Napau Craters--a segment that has had more numerous eruptions and intrusions than any other of comparable length during the past 200, probably the past 1000, years. Fifteen known eruptions started in this area in the past 200 years: 1840, 1922, 1923, 1962, August and October 1963, March and December 1965, August and October 1968, February and May 1969, May and November 1973, and March 1980 (only 3 cubic meters!). Three others, not previously designated as distinct eruptions despite having all the appropriate characteristics, took place during on-going eruptions: two in `Alo`i Crater in 1970 and 1972, and one in Napau Crater in 1997. Two of the largest shields on the east rift zone formed during long-lasting eruptions within this area--Kane Nui o Hamo at an unknown date, perhaps the 11-12th century, and Mauna Ulu (1969-1974). In addition, many small intrusions without eruptions are known. Seven short eruptions punctuated a prolonged eruption: four within the segment during the Mauna Ulu eruption, two at the summit and southwest rift zone during that same eruption, and one in Napau Crater in 1997 during the Pu`u `O`o eruption. Thus the Father's Day eruption is not unique by virtue of taking place during an ongoing eruption elsewhere along the rift zone. The increased frequency of activity in the segment during the 20th century is obvious, particularly after 1962. For most of the past 1,000 years, eruptions were centered at Kilauea's summit, with significant but lesser activity along the rift zones. A large summit deflation in 1924 ended the nearly continuous lava lake in Halemaumau, eventually leading to the past 5 decades of dominantly east rift zone activity. This segment of the rift zone contains most of the pit craters on Kilauea and gradually changes from a SE trend near the caldera to an ENE trend that characterizes the rest of

  8. Survival of the Lhasa Terrane during its collision with Asia due to crust-mantle coupling revealed by ca. 114 Ma intrusive rocks in western Tibet

    Science.gov (United States)

    Wang, Qing; Zhu, Di-Cheng; Liu, An-Lin; Cawood, Peter A.; Liu, Sheng-Ao; Xia, Ying; Chen, Yue; Wang, Hao; Zhang, Liang-Liang; Zhao, Zhi-Dan

    2018-04-01

    Survival of the Lhasa Terrane during its drift across the Tethyan Ocean and subsequent collision with Asia was likely maintained by mechanical coupling between its ancient lithospheric mantle and the overlying crust. Evidence for this coupling is provided by geochronological and geochemical data from high-Mg dioritic porphyrite dikes that intruded into granodiorites with dioritic enclaves within the Nixiong Batholith in the western segment of the central Lhasa subterrane, southern Tibet. Zircon LA-ICP-MS U-Pb dating indicates synchronous emplacement of dioritic porphyrite dikes (113.9 ± 2 Ma), dioritic enclaves (113.9 ± 1 Ma), and host granodiorites (113.1 ± 2 Ma). The hornblende-bearing granodiorites are metaluminous to weakly peraluminous (A/CNK = 0.95-1.05) and belong to high-K calc-alkaline I-type granite. These rocks are characterized by low Mg# (37-43), negative zircon εHf(t) values (-6.8 to -1.2), and negative whole-rock εNd(t) values (-8.1 to -5.4), suggestive of derivation through anatexis of ancient lower crust. The two least-mixed or contaminated dioritic porphyrite dike samples have high MgO (8.46-8.74 wt%), high Mg# (69-70), and high abundances of compatible elements (e.g., Cr = 673-646 ppm, Ni = 177-189 ppm), which are close to those of primitive magma. They are high-K calc-alkaline and show negative whole-rock εNd(t) values (-1.9 to -1.2), indicating that these samples are most likely derived from the partial melting of ancient lithospheric mantle that was metasomatized by slab-derived fluids. The dioritic enclave samples are metaluminous high-K calc-alkaline and have varying negative whole-rock εNd(t) values (-7.8 to -3.7), which are interpreted as the result of magma mixing between the ancient lower crust-derived melts and asthenospheric mantle- (rather than lithospheric mantle-) derived melts. The Nd isotope mantle model ages of the least-mixed or contaminated high-Mg dioritic porphyrite dike samples (1.1-1.4 Ga) are close to the Nd isotope

  9. Structure - Riverine Flow Structure (Dike/Wingdam)

    Data.gov (United States)

    Army Corps of Engineers, Department of the Army, Department of Defense — A natural or man-made flow (or sediment) control structure in a water course or water body such as a dike or weir. This feature should not be used to model a levee....

  10. 3-D flow and scour near a submerged wing dike: ADCP measurements on the Missouri River

    Science.gov (United States)

    Jamieson, E.C.; Rennie, C.D.; Jacobson, R.B.; Townsend, R.D.

    2011-01-01

    Detailed mapping of bathymetry and three-dimensional water velocities using a boat-mounted single-beam sonar and acoustic Doppler current profiler (ADCP) was carried out in the vicinity of two submerged wing dikes located in the Lower Missouri River near Columbia, Missouri. During high spring flows the wing dikes become submerged, creating a unique combination of vertical flow separation and overtopping (plunging) flow conditions, causing large-scale three-dimensional turbulent flow structures to form. On three different days and for a range of discharges, sampling transects at 5 and 20 m spacing were completed, covering the area adjacent to and upstream and downstream from two different wing dikes. The objectives of this research are to evaluate whether an ADCP can identify and measure large-scale flow features such as recirculating flow and vortex shedding that develop in the vicinity of a submerged wing dike; and whether or not moving-boat (single-transect) data are sufficient for resolving complex three-dimensional flow fields. Results indicate that spatial averaging from multiple nearby single transects may be more representative of an inherently complex (temporally and spatially variable) three-dimensional flow field than repeated single transects. Results also indicate a correspondence between the location of calculated vortex cores (resolved from the interpolated three-dimensional flow field) and the nearby scour holes, providing new insight into the connections between vertically oriented coherent structures and local scour, with the unique perspective of flow and morphology in a large river.

  11. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    International Nuclear Information System (INIS)

    Bernot, P.

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  12. Soldered Power Arm: An Easy and Effective Method for Intrusion and Retraction of Anterior Teeth

    OpenAIRE

    Ketan K Vakil; Pawankumar Dnyandeo Tekale; Jeegar K Vakil

    2014-01-01

    The orthodontic correction of deep overbite can be achieved with several mechanisms that will result in true intrusion of anterior teeth, extrusion of posterior teeth, or a combination of both. For the orthodontic correction of bimaxillary dentoalveolar protrusion with deep bite, there are several treatment modalities like segmented arch approach, retraction and intrusion utility arches, temporary anchorage devices. Though not a novel therapeutic concept, the use of miniscrew implants to obta...

  13. Nonexplosive and explosive magma/wet-sediment interaction during emplacement of Eocene intrusions into Cretaceous to Eocene strata, Trans-Pecos igneous province, West Texas

    Science.gov (United States)

    Befus, K.S.; Hanson, R.E.; Miggins, D.P.; Breyer, J.A.; Busbey, A.B.

    2009-01-01

    Eocene intrusion of alkaline basaltic to trachyandesitic magmas into unlithified, Upper Cretaceous (Maastrichtian) to Eocene fluvial strata in part of the Trans-Pecos igneous province in West Texas produced an array of features recording both nonexplosive and explosive magma/wet-sediment interaction. Intrusive complexes with 40Ar/39Ar dates of ~ 47-46??Ma consist of coherent basalt, peperite, and disrupted sediment. Two of the complexes cutting Cretaceous strata contain masses of conglomerate derived from Eocene fluvial deposits that, at the onset of intrusive activity, would have been > 400-500??m above the present level of exposure. These intrusive complexes are inferred to be remnants of diatremes that fed maar volcanoes during an early stage of magmatism in this part of the Trans-Pecos province. Disrupted Cretaceous strata along diatreme margins record collapse of conduit walls during and after subsurface phreatomagmatic explosions. Eocene conglomerate slumped downward from higher levels during vent excavation. Coherent to pillowed basaltic intrusions emplaced at the close of explosive activity formed peperite within the conglomerate, within disrupted Cretaceous strata in the conduit walls, and within inferred remnants of the phreatomagmatic slurry that filled the vents during explosive volcanism. A younger series of intrusions with 40Ar/39Ar dates of ~ 42??Ma underwent nonexplosive interaction with Upper Cretaceous to Paleocene mud and sand. Dikes and sills show fluidal, billowed, quenched margins against the host strata, recording development of surface instabilities between magma and groundwater-rich sediment. Accentuation of billowed margins resulted in propagation of intrusive pillows into the adjacent sediment. More intense disruption and mingling of quenched magma with sediment locally produced fluidal and blocky peperite, but sufficient volumes of pore fluid were not heated rapidly enough to generate phreatomagmatic explosions. This work suggests that

  14. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  15. Influence of crystallised igneous intrusions on fault nucleation and reactivation during continental extension

    Science.gov (United States)

    Magee, Craig; McDermott, Kenneth G.; Stevenson, Carl T. E.; Jackson, Christopher A.-L.

    2014-05-01

    Continental rifting is commonly accommodated by the nucleation of normal faults, slip on pre-existing fault surfaces and/or magmatic intrusion. Because crystallised igneous intrusions are pervasive in many rift basins and are commonly more competent (i.e. higher shear strengths and Young's moduli) than the host rock, it is theoretically plausible that they locally intersect and modify the mechanical properties of pre-existing normal faults. We illustrate the influence that crystallised igneous intrusions may have on fault reactivation using a conceptual model and observations from field and subsurface datasets. Our results show that igneous rocks may initially resist failure, and promote the preferential reactivation of favourably-oriented, pre-existing faults that are not spatially-associated with solidified intrusions. Fault segments situated along strike from laterally restricted fault-intrusion intersections may similarly be reactivated. This spatial and temporal control on strain distribution may generate: (1) supra-intrusion folds in the hanging wall; (2) new dip-slip faults adjacent to the igneous body; or (3) sub-vertical, oblique-slip faults oriented parallel to the extension direction. Importantly, stress accumulation within igneous intrusions may eventually initiate failure and further localise strain. The results of our study have important implications for the structural of sedimentary basins and the subsurface migration of hydrocarbons and mineral-bearing fluids.

  16. Early Permian intrusions of the Alai range: Understanding tectonic settings of Hercynian post-collisional magmatism in the South Tien Shan, Kyrgyzstan

    Science.gov (United States)

    Konopelko, D.; Wilde, S. A.; Seltmann, R.; Romer, R. L.; Biske, Yu. S.

    2018-03-01

    We present geochemical and Sr-Nd-Pb-Hf isotope data as well as the results of single grain U-Pb zircon dating for ten granitoid and alkaline intrusions of the Alai segment of Kyrgyz South Tien Shan (STS). The intrusions comprise four geochemically contrasting series or suites, including (1) I-type and (2) shoshonitic granitoids, (3) peraluminous granitoids including S-type leucogranites and (4) alkaline rocks and carbonatites, closely associated in space. New geochronological data indicate that these diverse magmatic series of the Alai segment formed in a post-collisional setting. Five single grain U-Pb zircon ages in the range 287-281 Ma, in combination with published ages, define the main post-collisional magmatic pulse at 290-280 Ma, which is similar to ages of post-collisional intrusions elsewhere in the STS. An age of 287 ± 4 Ma, obtained for peraluminous graniodiorite of the Liayliak massif, emplaced in amphibolite-facies metamorphic rocks of the Zeravshan-Alai block, is indistinguishable from ca. 290 Ma age of peraluminous granitoids emplaced coevally with Barrovian-type metamorphism in the Garm block, located ca. 40 km south-west of the research area. The Sr-Nd-Pb-Hf isotopic compositions of the studied intrusions are consistent with the reworking of crustal material with 1.6-1.1 Ga average crustal residence times, indicating the formation of the Alai segment on a continental basement with Mesoproterozoic or older crust. The pattern of post-collisional magmatism in the Alai segment, characterized by emplacement of I-type and shoshoninitic granitoids in combination with coeval Barrovian-type metamorphism, is markedly different from the pattern of post-collisional magmatism in the adjacent Kokshaal segment of the STS with predominant A-type granitoids that formed on a former passive margin of the Tarim Craton. We suggest that during the middle-late Carboniferous the Alai segment probably comprised a microcontinent with Precambrian basement located between

  17. Investigation of hydrodynamics on local scour by shape of single spur dike in river bend

    International Nuclear Information System (INIS)

    Masjedi, A; Foroushani, E P

    2012-01-01

    A series of experiments were conducted in which the the scour hole associated with model spur dike was measured in a 180 degree laboratory flume bend under clear-water overtopping flows. In this study, the local scour were conducted for three different shapes of oblong, rectangulat chamfered of straight spur dikes at the bend with various Froude number. The main goals of the experiments were to evaluate the effect of the three different shapes of straight spur dikes on the volume of scour and potential aquatic habitat and on minimizing erosion adjacent to the streambanks. The experiments showed that of the three different shapes of straight spur dikes tested, the least erosion of the around in the near bank region was associated with the spur dikes with oblong shape, while the greatest volume of the scour hole was associated with the rectangular shape. So it was observed that, as Froude number increases, the scour increases.

  18. Pandora and Dike in Hesiod’s Works and days

    Directory of Open Access Journals (Sweden)

    Katherine Olstein

    1980-12-01

    Full Text Available Pandora and Dike are negative and positive analogues integral as such to the most important themes of the poem. Pandora's myth explains why strife is deadly and must be rejected for accumulating Bios on the land. As punishment for Prometheus' attempts to trick Zeus, Pandora and her descendants eternally trick men who also cheat each other, neglecting productive work. The evils from Pandora's jar and the several ages of unjust men destroyed by Zeus represent respectively individual and generational mortality. Nevertheless, through Dike —harmonious work and Bios attained in the Just City, a new Golden Age— men may hope to recapture their immortality.

  19. Magma-maintained rift segmentation at continental rupture in the 2005 Afar dyking episode.

    Science.gov (United States)

    Wright, Tim J; Ebinger, Cindy; Biggs, Juliet; Ayele, Atalay; Yirgu, Gezahegn; Keir, Derek; Stork, Anna

    2006-07-20

    Seafloor spreading centres show a regular along-axis segmentation thought to be produced by a segmented magma supply in the passively upwelling mantle. On the other hand, continental rifts are segmented by large offset normal faults, and many lack magmatism. It is unclear how, when and where the ubiquitous segmented melt zones are emplaced during the continental rupture process. Between 14 September and 4 October 2005, 163 earthquakes (magnitudes greater than 3.9) and a volcanic eruption occurred within the approximately 60-km-long Dabbahu magmatic segment of the Afar rift, a nascent seafloor spreading centre in stretched continental lithosphere. Here we present a three-dimensional deformation field for the Dabbahu rifting episode derived from satellite radar data, which shows that the entire segment ruptured, making it the largest to have occurred on land in the era of satellite geodesy. Simple elastic modelling shows that the magmatic segment opened by up to 8 m, yet seismic rupture can account for only 8 per cent of the observed deformation. Magma was injected along a dyke between depths of 2 and 9 km, corresponding to a total intrusion volume of approximately 2.5 km3. Much of the magma appears to have originated from shallow chambers beneath Dabbahu and Gabho volcanoes at the northern end of the segment, where an explosive fissural eruption occurred on 26 September 2005. Although comparable in magnitude to the ten year (1975-84) Krafla events in Iceland, seismic data suggest that most of the Dabbahu dyke intrusion occurred in less than a week. Thus, magma intrusion via dyking, rather than segmented normal faulting, maintains and probably initiated the along-axis segmentation along this sector of the Nubia-Arabia plate boundary.

  20. K-Ar geology, geochemistry and geochronology from the Maria River region dikes, Parana State southeastern part, Brazil

    International Nuclear Information System (INIS)

    Silva Junior, Renato Oliveira da; Dall'Agnol, Roberto; Oliveira, Elson Paiva de

    1996-01-01

    The paper synthesizes the geological, petrographical, geochemical and geochronological data from the Maria River region dikes, situated at the southeastern part of the Para State, Brazil. It identifies five groups of dikes and determines the age of these dikes, through the Potassium-Argon (K-Ar) methodology

  1. Rifts of deeply eroded Hawaiian basaltic shields: A structural analog for large Martian volcanoes

    Science.gov (United States)

    Knight, Michael D.; Walker, G. P. L.; Mouginis-Mark, P. J.; Rowland, Scott K.

    1988-01-01

    Recently derived morphologic evidence suggests that intrusive events have not only influenced the growth of young shield volcanoes on Mars but also the distribution of volatiles surrounding these volcanoes: in addition to rift zones and flank eruptions on Arsia Mons and Pavonis Mons, melt water channels were identified to the northwest of Hecates Tholus, to the south of Hadriaca Patera, and to the SE of Olympus Mons. Melt water release could be the surface expression of tectonic deformation of the region or, potentially, intrusive events associated with dike emplacement from each of these volcanoes. In this study the structural properties of Hawaiian shield volcanoes were studied where subaerial erosion has removed a sufficient amount of the surface to enable a direct investigation of the internal structure of the volcanoes. The field investigation of dike morphology and magma flow characteristics for several volcanoes in Hawaii is reported. A comprehensive investigation was made of the Koolau dike complex that passes through the summit caldera. A study of two other dissected Hawaiian volcanoes, namely Waianae and East Molokai, was commenced. The goal is not only to understand the emplacement process and magma flow within these terrestrial dikes, but also to explore the possible role that intrusive events may have played in volcano growth and the distribution of melt water release on Mars.

  2. Rifts of deeply eroded Hawaiian basaltic shields: a structural analog for large Martian volcanoes

    International Nuclear Information System (INIS)

    Knight, M.D.; Walker, G.P.L.; Mouginis-Mark, P.J.; Rowland, S.K.

    1988-01-01

    Recently derived morphologic evidence suggests that intrusive events have not only influenced the growth of young shield volcanoes on Mars but also the distribution of volatiles surrounding these volcanoes: in addition to rift zones and flank eruptions on Arsia Mons and Pavonis Mons, melt water channels were identified to the northwest of Hecates Tholus, to the south of Hadriaca Patera, and to the SE of Olympus Mons. Melt water release could be the surface expression of tectonic deformation of the region or, potentially, intrusive events associated with dike emplacement from each of these volcanoes. In this study the structural properties of Hawaiian shield volcanoes were studied where subaerial erosion has removed a sufficient amount of the surface to enable a direct investigation of the internal structure of the volcanoes. The field investigation of dike morphology and magma flow characteristics for several volcanoes in Hawaii is reported. A comprehensive investigation was made of the Koolau dike complex that passes through the summit caldera. A study of two other dissected Hawaiian volcanoes, namely Waianae and East Molokai, was commenced. The goal is not only to understand the emplacement process and magma flow within these terrestrial dikes, but also to explore the possible role that intrusive events may have played in volcano growth and the distribution of melt water release on Mars

  3. Wind turbines along highways and on the dikes Houtribdijk and Afsluitdijk in the Netherlands

    International Nuclear Information System (INIS)

    Johanson, J.C.P.; Meesters, H.J.N.

    1993-01-01

    Attention is paid to the safety, control and maintenance of dikes with regard to the placing of wind turbines on the dikes, as mentioned in the title. Also the possible damage to the bird population and the visual impact of wind turbines are dealt with. 5 refs

  4. Environmental Characteristics of Carbonatite and Alkaline Intrusion-related Rare Earth Element (REE) Deposits

    Science.gov (United States)

    Seal, R. R., II; Piatak, N. M.

    2017-12-01

    Carbonatites and alkaline intrusions are important sources of REEs. Environmental risks related to these deposit types have been assessed through literature review and evaluation of the geochemical properties of representative samples of mill tailings and their leachates. The main ore mineral in carbonatite deposits is bastnasite [(Ce,La)(CO3)F], which is found with dolomite and calcite ( 65 %), barite (20 - 25 %), plus a number of minor accessory minerals including sulfides such as galena and pyrite. Generally, alkaline intrusion-related REE deposits either occur in layered complexes or with dikes and veins cutting alkaline intrusions. Such intrusions have a more diverse group of REE ore minerals that include fluorcarbonates, oxides, silicates, and phosphates. Ore also can include minor calcite and iron (Fe), lead (Pb), and zinc (Zn) sulfides. The acid-generating potential of both deposit types is low because of a predominance of carbonate minerals in the carbonatite deposits, the presence of feldspars and minor calcite in alkaline intrusion-related deposits, and to only minor to trace occurrence of potentially acid-generating sulfide minerals. Both deposit types, however, are produced by igneous and hydrothermal processes that enrich high-field strength, incompatible elements, which typically are excluded from common rock-forming minerals. Elements such as yttrium (Y), niobium Nb), zirconium (Zr), hafnium (Hf), tungsten (W), titanium (Ti), tantalum (Ta), scandium (Sc), thorium (Th), and uranium (U) can be characteristic of these deposits and may be of environmental concern. Most of these elements, including the REEs, but with the exception of U, have low solubilities in water at the near-neutral pH values expected around these deposits. Mill tailings from carbonatite deposits can exceed residential soil and sediment criteria for Pb, and leachates from mill tailings can exceed drinking water guidelines for Pb. The greatest environmental challenges, however, are

  5. Surface deformation induced by magmatic processes at Pacaya Volcano, Guatemala revealed by InSAR

    Science.gov (United States)

    Wnuk, K.; Wauthier, C.

    2017-09-01

    Pacaya Volcano, Guatemala is a continuously active, basaltic volcano with an unstable western flank. Despite continuous activity since 1961, a lack of high temporal resolution geodetic surveying has prevented detailed modeling of Pacaya's underlying magmatic plumbing system. A new, temporally dense dataset of Interferometric Synthetic Aperture Radar (InSAR) RADARSAT-2 images, spanning December 2012 to March 2014, show magmatic deformation before and during major eruptions in January and March 2014. Inversion of InSAR surface displacements using simple analytical forward models suggest that three magma bodies are responsible for the observed deformation: (1) a 4 km deep spherical reservoir located northwest of the summit, (2) a 0.4 km deep spherical source located directly west of the summit, and (3) a shallow dike below the summit. Periods of heightened volcanic activity are instigated by magma pulses at depth, resulting in rapid inflation of the edifice. We observe an intrusion cycle at Pacaya that consists of deflation of one or both magma reservoirs followed by dike intrusion. Intrusion volumes are proportional to reservoir volume loss and do not always result in an eruption. Periods of increased activity culminate with larger dike-fed eruptions. Large eruptions are followed by inter-eruptive periods marked by a decrease in crater explosions and a lack of detected deformation. Co-eruptive flank motion appears to have initiated a new stage of volcanic rifting at Pacaya defined by repeated NW-SE oriented dike intrusions. This creates a positive feedback relationship whereby magmatic forcing from eruptive dike intrusions induce flank motion.

  6. Adjustable Two-Tier Cache for IPTV Based on Segmented Streaming

    Directory of Open Access Journals (Sweden)

    Kai-Chun Liang

    2012-01-01

    Full Text Available Internet protocol TV (IPTV is a promising Internet killer application, which integrates video, voice, and data onto a single IP network, and offers viewers an innovative set of choices and control over their TV content. To provide high-quality IPTV services, an effective strategy is based on caching. This work proposes a segment-based two-tier caching approach, which divides each video into multiple segments to be cached. This approach also partitions the cache space into two layers, where the first layer mainly caches to-be-played segments and the second layer saves possibly played segments. As the segment access becomes frequent, the proposed approach enlarges the first layer and reduces the second layer, and vice versa. Because requested segments may not be accessed frequently, this work further designs an admission control mechanism to determine whether an incoming segment should be cached or not. The cache architecture takes forward/stop playback into account and may replace the unused segments under the interrupted playback. Finally, we conduct comprehensive simulation experiments to evaluate the performance of the proposed approach. The results show that our approach can yield higher hit ratio than previous work under various environmental parameters.

  7. Emplacement controls for the basaltic-andesitic radial dikes of Summer Coon volcano and implications for flank vents at stratovolcanoes

    Science.gov (United States)

    Harp, A. G.; Valentine, G. A.

    2018-02-01

    Mafic flank eruptions are common events that pose a serious hazard to the communities and infrastructure often encroaching on the slopes of stratovolcanoes. Flank vent locations are dictated by the propagation path of their feeder dikes. The dikes are commonly thought to propagate either laterally from the central conduit or vertically from a deeper source. However, these interpretations are often based on indirect measurements, such as surface deformation and seismicity at active systems, and several studies at eroded volcanoes indicate the propagation paths may be more complex. We investigated the Oligocene age Summer Coon volcano (Colorado, USA), where erosion has exposed over 700 basaltic-andesitic radial dikes, to constrain the propagation directions, geometries, and spatial distributions of mafic dikes within a stratovolcano. The mean fabric angle of aligned plagioclase crystals was measured in oriented samples from the margins of 77 dikes. Of the 41 dikes with statistically significant flow fabrics, 85% had fabric angles that were inclined—plunging both inward and outward relative to the center of the volcano. After comparing fabric angles to those reported in other studies, we infer that, while most of the dikes with outward-plunging fabrics descended toward the flanks from a source within the edifice and near its axis, dikes with inward-plunging fabrics ascended through the edifice and toward the flanks from a deeper source. A possible control for the inclination of ascending dikes was the ratio between magma overpressure and the normal stress in the host rock. While higher ratios led to high-angle propagation, lower ratios resulted in inclined emplacement. Dikes crop out in higher frequencies within a zone surrounding the volcano axis at 2500 m radial distance from the center and may be the result of ascending dikes, emplaced at similar propagation angles, intersecting the current level of exposure at common distances from the volcano axis. The process

  8. Rare Mineralogy in Alkaline Ultramafic Rocks, Western Kentucky Fluorspar District

    Science.gov (United States)

    Anderson, W.

    2017-12-01

    The alkaline ultramafic intrusive dike complex in the Western Kentucky Fluorspar District contains unusual mineralogy that was derived from mantle magma sources. Lamprophyre and peridotite petrologic types occur in the district where altered fractionated peridotites are enriched in Rare Earth Elements (REE) and some lamprophyre facies are depleted in incompatible elements. Unusual minerals in dikes, determined by petrography and X-ray diffraction, include schorlomite and andradite titanium garnets, astrophyllite, spodumene, niobium rutile, wüstite, fluoro-tetraferriphlogopite, villiaumite, molybdenite, and fluocerite, a REE-bearing fluoride fluorescent mineral. Mixing of MVT sphalerite ore fluids accompanies a mid-stage igneous alteration and intrusion event consistent with paragenetic studies. The presence of lithium in the spodumene and fluoro-tetraferriphlogopite suggests a lithium phase in the mineral fluids, and the presence of enriched REE in dikes and fluorite mineralization suggest a metasomatic event. Several of these rare minerals have never been described in the fluorspar district, and their occurrence suggests deep mantle metasomatism. Several REE-bearing fluoride minerals occur in the dikes and in other worldwide occurrences, they are usually associated with nepheline syenite and carbonatite differentiates. There is an early and late stage fluoride mineralization, which accompanied dike intrusion and was also analyzed for REE content. One fluorite group is enriched in LREE and another in MREE, which suggests a bimodal or periodic fluorite emplacement. Whole-rock elemental analysis was chondrite normalized and indicates that some of the dikes are slightly enriched in light REE and show a classic fractionation enrichment. Variations in major-element content; high titanium, niobium, and zirconium values; and high La/Yb, Zr/Y, Zr/Hf, and Nb/Ta ratios suggest metasomatized lithospheric-asthenospheric mantle-sourced intrusions. The high La/Yb ratios in some

  9. Investigation of the geochemical and mineralogical characteristics of the dikes associated with copper mineralization at the southeastern Ardestan (NE Isfahan

    Directory of Open Access Journals (Sweden)

    Maryam Salehi

    2017-07-01

    Full Text Available The Ardestan study area lies in the northeast of Isfahan and at the outer margin of Urumieh -Dokhtar Volcanic Arc (UDMA. In this area, copper mineralization is associated with dikes. Mineralization occurred as sulfides (chalcocite, chalcopyrite and bornite and oxides (malachite and azurite. According to field studies as well as petrographic and geochemical investigations, two different types of dikes are present. The first type, trending NW-SE and comprising fine crystalline gabbro, whereas the second type with relatively E-W trend are gabbro and pyroxene diorite. Geochemically, these rock are characterized by SiO2 = 45.8 to 52.8 wt.%, MgO with 6.9 wt.% (average, Na2O+K2O = 5.6 wt.%, and Al2O3/TiO2 = 16.8%. All dikes are alkaline, related to back-arc tectonic setting in a wider concept associated with changing in source of magmatism. The second type shows enrichment in Ba, Sr, Rb, K, Zr, Nb, Ti, Cr and Ni in comparison to the first type. The first type is generated as a result of a subducted modified mantle while the latter shows an enriched astenospheric mantle source. It appears that there is a weak correlation between ore-forming and volatile elements in the mafic dikes. Overall, the same tectonic stresses are an essential controlling factor for the formation of second type E-W dikes associated with mineralization.

  10. A model, describing the influence of water management alternatives on dike stability

    Directory of Open Access Journals (Sweden)

    J. W. M. Lambert

    2015-11-01

    Full Text Available The awareness is rising that economic effects of Land Subsidence are high. Nevertheless, quantifying these economic losses is difficult and, as far as known, not yet done in a sophisticated way. Also, to be able to decide about future strategies, for example to avoid or decrease subsidence, it is necessary to know the financial consequences of measures and possible solutions. As a first step to quantify these economic effects, a MODFLOW-SCR (coupled MODFLOW-Settlements model is coupled with the model DAM. Based on the local stratigraphy, the shape and composition of the existing dike or levee, the level of the surface water and the surface level, macro-stability of the dike is calculated and – if the dike does not meet the required stability – adaptions are proposed. The model enables to separate effects that are caused by sea-level rise and the effects of subsidence. Coupling the DAM model with an economic model to calculate costs of these adaptions is under construction.

  11. A jurassic-cretaceous dolerite dike from Sri Lanka

    International Nuclear Information System (INIS)

    Yoshida, M.; Vitanage, P.W.

    1989-01-01

    A dolerite dike from southwestern Sri Lanka gave whole-rock K-Ar ages of 152.6 ± 7.6 Ma and 143.3 ± 7.2 Ma. Many of the other dolerite dikes of Sri Lanka are considered to be of Mesozoic ages judging from the present age data and tectonometamorphic history of Sri Lanka. Petrographic similarities should not be used for age correlations, because dolerites of different age may have the same petrography. Preliminary natural remanent magnetization (NRM) after AF and thermal demagnetization gave a mean inclination of 24.6deg and declination of 67.5deg with α95=21.7deg. A virtual geomagnetic pole position calculated from the mean NRM was rotated relative to Antarctica so as to fit with that obtained from the Jurassic Ferrar dolerite of Antarctica. This rotation results in the location and attitude of Sri Lanka to attach with Antarctica at Lutzow-Holm Bay as suggested by Barron et al. (1978). (author). 18 refs

  12. Effect of inflow discharges on the development of matric suction and volumetric water content for dike during overtopping tests

    Science.gov (United States)

    Hassan, Marwan A.; Ismail, Mohd A. M.

    2017-10-01

    The point of this review is to depict the impact of various inflow discharge rate releases on the instruments of matric suction and volumetric water content during an experimental test of spatial overtopping failure at school of civil engineering in universiti Sains of Malaysia. A dry sand dike was conducted inside small flume channel with twelve sensors of tensiometer and Time-Domain Reflectometer (TDR). Instruments are installed in the soil at different locations in downstream and upstream slopes of the dike for measuring the response of matric suction and volumetric water content, respectively. Two values of inflow discharge rates of 30 and 40 L/min are utilized as a part of these experiments to simulate the effectiveness of water reservoirs in erosion mechanism. The outcomes demonstrate that the matric suction and volumetric water content are decreased and increased, respectively for both inflow discharges. The higher inflow discharges accelerate the saturation of dike soil and the erosion process faster than that for the lower inflow discharges.

  13. Case studies of extended model-based flood forecasting: prediction of dike strength and flood impacts

    Science.gov (United States)

    Stuparu, Dana; Bachmann, Daniel; Bogaard, Tom; Twigt, Daniel; Verkade, Jan; de Bruijn, Karin; de Leeuw, Annemargreet

    2017-04-01

    Flood forecasts, warning and emergency response are important components in flood risk management. Most flood forecasting systems use models to translate weather predictions to forecasted discharges or water levels. However, this information is often not sufficient for real time decisions. A sound understanding of the reliability of embankments and flood dynamics is needed to react timely and reduce the negative effects of the flood. Where are the weak points in the dike system? When, how much and where the water will flow? When and where is the greatest impact expected? Model-based flood impact forecasting tries to answer these questions by adding new dimensions to the existing forecasting systems by providing forecasted information about: (a) the dike strength during the event (reliability), (b) the flood extent in case of an overflow or a dike failure (flood spread) and (c) the assets at risk (impacts). This work presents three study-cases in which such a set-up is applied. Special features are highlighted. Forecasting of dike strength. The first study-case focusses on the forecast of dike strength in the Netherlands for the river Rhine branches Waal, Nederrijn and IJssel. A so-called reliability transformation is used to translate the predicted water levels at selected dike sections into failure probabilities during a flood event. The reliability of a dike section is defined by fragility curves - a summary of the dike strength conditional to the water level. The reliability information enhances the emergency management and inspections of embankments. Ensemble forecasting. The second study-case shows the setup of a flood impact forecasting system in Dumfries, Scotland. The existing forecasting system is extended with a 2D flood spreading model in combination with the Delft-FIAT impact model. Ensemble forecasts are used to make use of the uncertainty in the precipitation forecasts, which is useful to quantify the certainty of a forecasted flood event. From global

  14. Fish assemblages, connectivity, and habitat rehabilitation in a diked Great Lakes coastal wetland complex

    Science.gov (United States)

    Kowalski, Kurt P.; Wiley, Michael J.; Wilcox, Douglas A.

    2014-01-01

    Fish and plant assemblages in the highly modified Crane Creek coastal wetland complex of Lake Erie were sampled to characterize their spatial and seasonal patterns and to examine the implications of the hydrologic connection of diked wetland units to Lake Erie. Fyke netting captured 52 species and an abundance of fish in the Lake Erie–connected wetlands, but fewer than half of those species and much lower numbers and total masses of fish were captured in diked wetland units. Although all wetland units were immediately adjacent to Lake Erie, there were also pronounced differences in water quality and wetland vegetation between the hydrologically isolated and lake-connected wetlands. Large seasonal variations in fish assemblage composition and biomass were observed in connected wetland units but not in disconnected units. Reestablishment of hydrologic connectivity in diked wetland units would allow coastal Lake Erie fish to use these vegetated habitats seasonally, although connectivity does appear to pose some risks, such as the expansion of invasive plants and localized reductions in water quality. Periodic isolation and drawdown of the diked units could still be used to mimic intermediate levels of disturbance and manage invasive wetland vegetation.

  15. Assessment of Shallow-Water Habitat Availability in Modified Dike Structures, Lower Missouri River, 2004

    Science.gov (United States)

    Jacobson, Robert B.; Elliott, Caroline M.; Johnson, Harold E.

    2004-01-01

    This study documented the effects of wing-dike notching on the availabilit of shallow water habitat in the Lower Missouri River. Five wing dikes were surveyed in late May 2004 after they were notched in early May as part of shallow-water habitat (SWH) rehabilitation activities undertaken by the U.S. Army Corps of Engineers. Surveys included high-resolution hydroacoustic depth, velocity, and substrate mapping. Relations of bottom elevations within the wing dike fields to index discharges and water-surface elevations indicate that little habitat meeting the SWH definition was created immediately following notching. This result is not unexpected, as significant geomorphic adjustment may require large flow events. Depth, velocity, and substrate measurements in the post-rehabilitation time period provide baseline data for monitoring ongoing changes. Differences in elevation and substrate were noted at all sites. Most dike fields showed substantial aggradation and replacement of mud substrate with sandier sediment, although the changes did not result in increased availability of SWH at the index discharge. It is not known how much of the elevation and substrate changes can be attributed directly to notching and how much would result from normal sediment transport variation.

  16. Dike Strength Analysis on a Regional Scale Based On a Stochastic Subsoil Model

    Science.gov (United States)

    Koelewijn, A. R.; Vastenburg, E. W.

    2013-12-01

    About two-third of the Netherlands is protected against flooding by dikes and levees. The subsoil can be characterized by fluvial and marine sediments. Maintaining the safety of these dikes and levees is of vital importance. Insufficient safety is not permissible, but excessive safety would imply a waste of money and other resources. Therefore safety assessments are carried out on a regular basis. Over the past decades, a practice has grown to calculate a limited number of cross-sections, roughly one every 500 to 1000 meters. For this purpose, a representative cross-section is selected as an estimate of the most vulnerable surface geometry and the subsoil conditions determined from boreholes and cone penetration tests, for which slope stability and piping analyses are carried out. This is a time-consuming procedure which is not only expensive, but also neglects geological knowledge. A method to incorporate geological knowledge of an area, including updating on the basis of additional investigations, has been described in Koelewijn et al. [2011]. In addition, various groups have worked to incorporate geotechnical stability models and detailed Lidar-measurements of the surface into a more efficient and rational calculation process [Knoeff et al. 2011, Lam et al. 2013, van den Ham & Mastbergen, 2013]. Combining this experience with the 3D subsoil model opens possibilities for cost-effective additional soil investigations for those locations where ruling out unfavorable conditions really influences the decisions to be made regarding rejection and improvement, see the figure for examples of different subsoil profiles along a dike. The resulting system has been applied for semi-automated calculations of dikes in various parts of the Netherlands, totalling over 4000 km by now, and a part of the Mississippi levee system. [van den Ham & Mastbergen, 2013] G.A. van den Ham & D.R. Mastbergen, A semi-probabilistic assessment method for flow slides. AGU Fall meeting, 2013

  17. Aligning petrology with geophysics: the Father's Day intrusion and eruption, Kīlauea Volcano, Hawai`i

    Science.gov (United States)

    Salem, L. C.; Edmonds, M.; Maclennan, J.; Houghton, B. F.; Poland, M. P.

    2016-12-01

    compared to timescales of lateral dike intrusion measured using tilt, GPS and seismology to refine our understanding of horizontal and vertical magma flow in dikes between the summit reservoir and ERZ.

  18. Human intrusion: New ideas?

    International Nuclear Information System (INIS)

    Cooper, J.R.

    2002-01-01

    Inadvertent human intrusion has been an issue for the disposal of solid radioactive waste for many years. This paper discusses proposals for an approach for evaluating the radiological significance of human intrusion as put forward by ICRP with contribution from work at IAEA. The approach focuses on the consequences of the intrusion. Protective actions could, however, include steps to reduce the probability of human intrusion as well as the consequences. (author)

  19. Temporal Evolution of Surface Deformation and Magma Sources at Pacaya Volcano, Guatemala Revealed by InSAR

    Science.gov (United States)

    Wnuk, K.; Wauthier, C.

    2016-12-01

    Pacaya Volcano, Guatemala is a persistently active volcano whose western flank is unstable. Despite continuous activity since 1961, a lack of high temporal resolution geodetic surveying has prevented detailed modeling of Pacaya's underlying magmatic plumbing system. A new, temporally dense dataset of Interferometric Synthetic Aperture Radar (InSAR) RADARSAT-2 images, spanning December 2012 to March 2014, shows magmatic deformation before and during major eruptions in January and March 2014. Inverse modeling of InSAR surface displacements suggest that three magma bodies are responsible for observed deformation: (1) a 3.7 km deep spherical reservoir located northwest of the summit, (2) a 0.4 km deep spherical source located directly west of the summit, and (3) a shallow dike below the summit that provides the primary transport pathway for erupted materials. Periods of heightened activity are brought on by magma pulses at depth, which result in rapid inflation of the edifice. We observe an intrusion cycle at Pacaya that consists of deflation of one or both magma reservoirs followed by dike intrusion. Intrusion volumes are proportional to reservoir volume loss, and do not always result in an eruption. Periods of increased activity culminate with larger dike fed eruptions. Large eruptions are followed by inter eruptive periods marked by a decrease in crater explosions and a lack of deformation. A full understanding of magmatic processes at Pacaya is required to assess potential impacts on other aspects of the volcano such as the unstable western flank. Co-eruptive flank motion appears to have initiated a new stage of volcanic rifting at Pacaya defined by repeated NW-SE dike intrusions. This creates a positive feedback relationship whereby magmatic forcing from eruptive dike intrusions induces flank motion

  20. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  1. Evaluation of computer-based library services at Kenneth Dike ...

    African Journals Online (AJOL)

    This study evaluated computer-based library services/routines at Kenneth Dike Library, University of Ibadan. Four research questions were developed and answered. A survey research design was adopted; using questionnaire as the instrument for data collection. A total of 200 respondents randomly selected from 10 ...

  2. Evidential reasoning research on intrusion detection

    Science.gov (United States)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  3. Effective use of surface-water management to control saltwater intrusion

    Science.gov (United States)

    Hughes, J. D.; White, J.

    2012-12-01

    The Biscayne aquifer in southeast Florida is susceptible to saltwater intrusion and inundation from rising sea-level as a result of high groundwater withdrawal rates and low topographic relief. Groundwater levels in the Biscayne aquifer are managed by an extensive canal system that is designed to control flooding, supply recharge to municipal well fields, and control saltwater intrusion. We present results from an integrated surface-water/groundwater model of a portion of the Biscayne aquifer to evaluate the ability of the existing managed surface-water control network to control saltwater intrusion. Surface-water stage and flow are simulated using a hydrodynamic model that solves the diffusive-wave approximation of the depth-integrated shallow surface-water equations. Variable-density groundwater flow and fluid density are solved using the Oberbeck--Boussinesq approximation of the three-dimensional variable-density groundwater flow equation and a sharp interface approximation, respectively. The surface-water and variable-density groundwater domains are implicitly coupled during each Picard iteration. The Biscayne aquifer is discretized into a multi-layer model having a 500-m square horizontal grid spacing. All primary and secondary surface-water features in the active model domain are discretized into segments using the 500-m square horizontal grid. A 15-year period of time is simulated and the model includes 66 operable surface-water control structures, 127 municipal production wells, and spatially-distributed daily internal and external hydrologic stresses. Numerical results indicate that the existing surface-water system can be effectively used in many locations to control saltwater intrusion in the Biscayne aquifer resulting from increases in groundwater withdrawals or sea-level rise expected to occur over the next 25 years. In other locations, numerical results indicate surface-water control structures and/or operations may need to be modified to control

  4. Origin of ore-forming fluids of the Haigou gold deposit in the eastern Central Asian Orogenic belt, NE China: Constraints from H-O-He-Ar isotopes

    Science.gov (United States)

    Zeng, Qingdong; He, Huaiyu; Zhu, Rixiang; Zhang, Song; Wang, Yongbin; Su, Fei

    2017-08-01

    The Haigou lode deposit contains 40 t of gold at an average grade of 3.5 g/t, and is one of the largest deposits in the Jiapigou gold belt located along the eastern segment of the northern margin of the North China Craton. The deposit comprises 15 gold-bearing quartz veins hosted in a Carboniferous monzonite-monzogranite stock. Cretaceous dikes consisting of diorite, diabase, and granodiorite porphyries are well developed in the deposit. The diorite porphyry dikes (130.4 ± 6.3 Ma) occur together with gold-bearing quartz veins in NNE- and NE-striking faults. Gold-bearing quartz veins crosscut the diorite porphyry dikes, and the veins are in turn crosscut by E-W-striking 124.6 ± 2.2 Ma granodiorite porphyry dikes. The mineralization mainly occurs as auriferous quartz veins with minor amounts of sulfide minerals, including pyrite, galena, chalcopyrite, and molybdenite. Gold occurs as either native gold or calaverite. Common gangue minerals in the deposit include quartz, sericite, and calcite. The deposit is characterized by various types of hydrothermal alteration, including silicification, sericitization, chloritization, potassic alteration, and carbonatization. Three stages of hydrothermal activity have been recognized in the deposit: (1) a barren quartz stage; (2) a polymetallic sulfide (gold) stage; (3) a calcite stage. Fluid inclusions in hydrothermal pyrites have 3He/4He ratios of 0.3 to 3.3 Ra and 40Ar/36Ar ratios of 351 to 1353, indicating mixing of fluids of mantle and crustal origin. Hydrothermal quartz yielded δ18O values of -1.3‰ to +7.2‰ and δD values of fluid inclusions in the quartz vary between -80‰ and -104‰. These stable isotope data also suggest mixing of magmatic and meteoric fluids. Noble gas and stable isotopic data suggest that the ore fluids have a predominant mantle source with a significant crustal component. Based on the spatial association of gold-bearing quartz veins with early Cretaceous intrusions, and the H-O-He-Ar isotopic

  5. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  6. Topographic and Structural Effects on Dike Propagation and Eruption

    International Nuclear Information System (INIS)

    E. Gaffney

    2006-01-01

    We have modeled magma flow in a dike rising in a crack whose strike runs from a highland or ridge to an adjacent lowland to determine the effect of topography on the flow, using a 3D hydromechanical code, FLAC3D (http://www.itascacg.com). The aperture, a, is calculated as a variable in a sheet of zones of fixed width d during the simulation as a function of model deformation. The permeability tensor of each zone is adjusted at each time step in response to the pressure in the cell according to the relationship k ij = (delta) ij α 3 /12μd, which is obtained by equating the flow through the layer of permeable zones from Darcy's law with Poiseuille's law under the same gradient. The fluid viscosity is μ, and the crack width is a We found a distinct tendency for the flow to be diverted away from the highland end of the strike toward the lowland. For the 4-km long strike length we modeled, eruption was offset between 500 and 1250 m toward the lowland from the center of the strike length. Separation of the geometric effect of the topography from the topographic overburden effect on lateral confining stresses at the crack indicates that both contribute to the effect. Although this analysis explains a tendency for volcanic eruptions to occur in low lands, it does not preclude eruptions on highlands. If the strike on the dike is parallel to the length of a ridge, the effect described here will not operate. Another possibility is that the strike length of a dike may be so short that its strike does not extend far beyond the edge of the ridge. A separate simulation used a 2D discrete element code, UDEC (http://www.itascacg.com) to investigate the interaction of magma in a vertical dike with normal faults and stratigraphy. We found that steeper faults are more easily intruded and that, as the magma rises to within a few hundred meters of the surface, sills are intruded into stratigraphic discontinuities in the hanging wall but not into the foot wall. The particular

  7. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  8. Intrusive Memories of Distressing Information: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Eva Battaglini

    Full Text Available Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42 viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13 demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13. Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC and dorsolateral prefrontal cortex (dlPFC, inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories.

  9. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  10. Mineralogy and geochemistry of triassic carbonatites in the Matcha alkaline intrusive complex (Turkestan-Alai Ridge, Kyrgyz Southern Tien Shan), SW Central Asian orogenic belt

    Science.gov (United States)

    Vrublevskii, V. V.; Morova, A. A.; Bukharova, O. V.; Konovalenko, S. I.

    2018-03-01

    Postorogenic intrusions of essexites and alkaline and nepheline syenites in the Turkestan-Alai segment of the Kyrgyz Southern Tien Shan coexist with dikes and veins of carbonatites dated at ∼220 Ma by the Ar-Ar and Rb-Sr age methods. They are mainly composed of calcite and dolomite (60-85%), as well as sodic amphibole, phlogopite, clinopyroxene, microcline, albite, apatite, and magnetite, with accessory niobate, ilmenite, Nb-rutile, titanite, zircon, baddeleyite, monazite-(Ce), barite, and sulfides. The rocks share mineralogical and geochemical similarity with carbonatites that originated by liquid immiscibility at high temperatures above 500 °C. Alkaline silicate and salt-carbonate melts are derived from sources with mainly negative bulk εNd(t) ∼ from -11 to 0 and high initial 87Sr/86Sr ratios (∼0.7061-0.7095) which may be due to mixing of PREMA and EM-type mantle material. Pb isotopic ratios in accessory pyrrhotite (206Pb/204Pb = 18.38; 207Pb/204Pb = 15.64; 208Pb/204Pb = 38.41) exhibit an EM2 trend. The intrusions bear signatures of significant crustal contamination as a result of magma genesis by syntexis and hybridism. Concordant isotope composition changes of δ13C (-6.5 to -1.9‰), δ18O (9.2-23‰), δD (-58 to -41‰), and δ34S (12.6-12.8‰) in minerals and rocks indicate inputs of crustal material at the stage of melting and effect of hot fluids released during dehydration of metamorphosed oceanic basalts or sediments. The observed HFSE patterns of the oldest alkaline gabbro may be due to interaction of the primary mafic magma with IAB-type material. The isotope similarity of alkaline rocks with spatially proximal basalts of the Tarim large igneous province does not contradict the evolution of the Turkestan-Alai Triassic magmatism as the "last echo" of the Tarim mantle plume.

  11. Network Intrusion Forensic Analysis Using Intrusion Detection System

    OpenAIRE

    Manish Kumar; Dr. M. Hanumanthappa; Dr. T.V. Suresh Kumar

    2011-01-01

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investi...

  12. Conceptual model for reinforced grass on inner dike slopes

    NARCIS (Netherlands)

    Verhagen, H.J.; ComCoast

    2005-01-01

    A desk study has been carried out in order to develop a conceptual model for the erosion of inner dike slopes with reinforced grass cover. Based on the results the following can be concluded: The presence of a geosynthetic in a grass slope can be taken into account in the EPM method by increasing

  13. Crustal Structure of Active Deformation Zones in Africa: Implications for Global Crustal Processes

    Science.gov (United States)

    Ebinger, C. J.; Keir, D.; Bastow, I. D.; Whaler, K.; Hammond, J. O. S.; Ayele, A.; Miller, M. S.; Tiberi, C.; Hautot, S.

    2017-12-01

    The Cenozoic East African rift (EAR), Cameroon Volcanic Line (CVL), and Atlas Mountains formed on the slow-moving African continent, which last experienced orogeny during the Pan-African. We synthesize primarily geophysical data to evaluate the role of magmatism in shaping Africa's crust. In young magmatic rift zones, melt and volatiles migrate from the asthenosphere to gas-rich magma reservoirs at the Moho, altering crustal composition and reducing strength. Within the southernmost Eastern rift, the crust comprises 20% new magmatic material ponded in the lower crust and intruded as sills and dikes at shallower depths. In the Main Ethiopian Rift, intrusions comprise 30% of the crust below axial zones of dike-dominated extension. In the incipient rupture zones of the Afar rift, magma intrusions fed from crustal magma chambers beneath segment centers create new columns of mafic crust, as along slow-spreading ridges. Our comparisons suggest that transitional crust, including seaward dipping sequences, is created as progressively smaller screens of continental crust are heated and weakened by magma intrusion into 15-20 km thick crust. In the 30 Ma Recent CVL, which lacks a hot spot age progression, extensional forces are small, inhibiting the creation and rise of magma into the crust. In the Atlas orogen, localized magmatism follows the strike of the Atlas Mountains from the Canary Islands hot spot toward the Alboran Sea. CVL and Atlas magmatism has had minimal impact on crustal structure. Our syntheses show that magma and volatiles are migrating from the asthenosphere through the plates, modifying rheology, and contributing significantly to global carbon and water fluxes.

  14. A Survey on Anomaly Based Host Intrusion Detection System

    Science.gov (United States)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  15. Study of Water Quality Changes due to Offshore Dike Development Plan at Semarang Bay

    Science.gov (United States)

    Wibowo, M.; Hakim, B. A.

    2018-03-01

    Now, coast of Semarang Gulf is experiencing rapid growth because Semarang as a center economic growth in Central Java. On the other hand, coast of Gulf Semarang also experience a variety of very complex problems, such as tidal flood, land subsidence, as well as coastal damage due to erosion and sedimentation process. To overcome these problems BPPT and other institutions proposed construction of offshore dike. Construction of the offshore dike is a technology intervention to the marine environment that will certainly affect the hydrodynamic balance in coastal water including water quality in the Gulf of Semarang. Therefore, to determine changes in water quality that will happen is necessary to study the water quality modeling. The study was conducted by using a computational modeling software MIKE-21 Eco Lab Module from DHI. Based on this study result knowed that development offshore dike will change water quality in the west and east dam that formed. In west dam the average value of the DO decline 81.56% - 93.32 % and the average value of BOD rise from 22.01 to 31.19% and in the east dam, there is an increase average value DO of 83.19% - 75.80%, while the average value of BOD decrease by 95,04% - 96.01%. To prevent the downward trend in water quality due to the construction of the offshore dike, its necessary precautions at the upstream area before entering the Gulf of Semarang.

  16. Mesozoic mafic dikes from the Shandong Peninsula, North China Craton: Petrogenesis and tectonic implications

    International Nuclear Information System (INIS)

    Liu Shen; Hu Ruizhong; Zhao Junhong; Feng Caixia; Zou, Haibo

    2006-01-01

    Mesozoic mafic dikes are widely distributed in Luxi (Mengyin and Zichuan) and Jiaodong regions of the Shandong Peninsula, China, providing an opportunity of investigating the nature of the lost lithospheric mantle beneath the North China Craton (NCC). The mafic dikes are characterized by strong depletion in high field strength elements (HFSE), enrichment in light rare earth elements (LREE), highly variable Th/U ratios, high initial ( 87 Sr/ 86 Sr) i (0.7050-0.7099) and negative ε Nd (T) (-6.0 to -17.6). They were derived from melting of metasomatized portions of the subcontinental lithospheric mantle, followed by fractionation of clinopyroxenes. The similarity in Nd isotopic compositions between the Mengyin gabbro dikes and the Paleozoic peridotite xenoliths suggests that ancient lithospheric mantle was still retained at 120 Ma below Mengyin, although the ancient lithospheric mantle in many other places beneath NCC had been severely modified. There might be multiple enrichment events in the lithospheric mantle. An early-stage (before or during Paleozoic) rutile-rich metasomatism affected the lithospheric mantle below Mengyin, Jiaodong and Zichuan. Since then, the lithospheric mantle beneath Mengyin was isolated. A late-stage metasomatism by silicate melts modified the lithospheric mantle beneath Jiaodong and Zichuan but not Mengyin. The removal of the enriched lithospheric mantle and the generation of the mafic dikes may be mainly related to the convective overturn accompanying Jurassic-Cretaceous subduction of the paleo-Pacific plate. (author)

  17. Petrogenesis of postcollisional magmatism at Scheelite Dome, Yukon, Canada: Evidence for a lithospheric mantle source for magmas associated with intrusion-related gold systems

    Science.gov (United States)

    Mair, John L.; Farmer, G. Lang; Groves, David I.; Hart, Craig J.R.; Goldfarb, Richard J.

    2011-01-01

    The type examples for the class of deposits termed intrusion-related gold systems occur in the Tombstone-Tungsten belt of Alaska and Yukon, on the eastern side of the Tintina gold province. In this part of the northern Cordillera, extensive mid-Cretaceous postcollisional plutonism took place following the accretion of exotic terranes to the continental margin. The most cratonward of the resulting plutonic belts comprises small isolated intrusive centers, with compositionally diverse, dominantly potassic rocks, as exemplified at Scheelite Dome, located in central Yukon. Similar to other spatially and temporally related intrusive centers, the Scheelite Dome intrusions are genetically associated with intrusion-related gold deposits. Intrusions have exceptional variability, ranging from volumetrically dominant clinopyroxene-bearing monzogranites, to calc-alkaline minettes and spessartites, with an intervening range of intermediate to felsic stocks and dikes, including leucominettes, quartz monzonites, quartz monzodiorites, and granodiorites. All rock types are potassic, are strongly enriched in LILEs and LREEs, and feature high LILE/HFSE ratios. Clinopyroxene is common to all rock types and ranges from salite in felsic rocks to high Mg augite and Cr-rich diopside in lamprophyres. Less common, calcic amphibole ranges from actinolitic hornblende to pargasite. The rocks have strongly radiogenic Sr (initial 87Sr/86Sr from 0.711-0.714) and Pb isotope ratios (206Pb/204Pb from 19.2-19.7), and negative initial εNd values (-8.06 to -11.26). Whole-rock major and trace element, radiogenic isotope, and mineralogical data suggest that the felsic to intermediate rocks were derived from mafic potassic magmas sourced from the lithospheric mantle via fractional crystallization and minor assimilation of metasedimentary crust. Mainly unmodified minettes and spessartites represent the most primitive and final phases emplaced. Metasomatic enrichments in the underlying lithospheric mantle

  18. Sr-Nd-Pb isotope compositions of felsic intrusions in the El Teniente and Laguna La Huifa areas, Central Chile

    International Nuclear Information System (INIS)

    Rabbia, O.M.; Hernandez, L.B.; King, R.W.; Lopez Escobar, L

    2001-01-01

    The giant El Teniente porphyry Cu-Mo deposit is located in the Andes foothills of Central Chile (34 o S). In simplistic terms, the igneous rocks at the mine can be grouped in two major units: a felsic suite of silicic intrusives (the porphyries; SiO 2 ≥56wt%) with subvertical stock-like to dyke shapes, and a mafic volcanic to subvolcanic sequence (the Farellones formation; SiO 2 <≤56wt%) with a sub-horizontal nature. The felsic rocks intrude the volcanogenic Farellones formation, which is known at the mine site as 'Andesitas de la mina'. The major felsic intrusives are locally known as the 'Diorita Sewell' and 'Porfido Teniente' bodies, plus a series of minor plugs, apophyses and dikes. According to Cuadra (1986), the age of the main intrusive units spans from Late Miocene ('Diorita Sewell'; 7-8Ma) to Early Pliocene ('Porfido Teniente'; ∼4-5Ma). These felsic intrusives are closely related to copper mineralization ( ∼4-5Ma; Cuadra, 1986), particularly the younger 'Porfido Teniente' (Camus, 1975). Additionally, Skewes and Stern (1996) have suggested the existence of an even slightly younger porphyry pluton, not exposed at surface, but still linked to the ore genesis. Similar felsic intrusive bodies are also present in the Laguna La Huifa area (Reich, 2001), located less than 3 km to the NE from the main El Teniente body. The copper mineralization here, is interpreted to be almost contemporaneous with the El Teniente mineralization (Cuadra, 1986). Based on petrographic and geochemical information on the silicic intrusive suite, Rabbia et al. (2000) suggested that this magmatism could be considered as a Phanerozoic equivalent of an Archean high-Al TTG. Furthermore it may be classified as a modified (Na-rich) 'I' type granitoid, in the sense of Atherton and Petford (1993) and Petford and Atherton (1996). According to these authors, the younger (and hotter) lower Andean crust would be a better candidate than the older (and colder) subducted Nazca plate basalts

  19. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  20. Two-stage atlas subset selection in multi-atlas based image segmentation

    Energy Technology Data Exchange (ETDEWEB)

    Zhao, Tingting, E-mail: tingtingzhao@mednet.ucla.edu; Ruan, Dan, E-mail: druan@mednet.ucla.edu [The Department of Radiation Oncology, University of California, Los Angeles, California 90095 (United States)

    2015-06-15

    Purpose: Fast growing access to large databases and cloud stored data presents a unique opportunity for multi-atlas based image segmentation and also presents challenges in heterogeneous atlas quality and computation burden. This work aims to develop a novel two-stage method tailored to the special needs in the face of large atlas collection with varied quality, so that high-accuracy segmentation can be achieved with low computational cost. Methods: An atlas subset selection scheme is proposed to substitute a significant portion of the computationally expensive full-fledged registration in the conventional scheme with a low-cost alternative. More specifically, the authors introduce a two-stage atlas subset selection method. In the first stage, an augmented subset is obtained based on a low-cost registration configuration and a preliminary relevance metric; in the second stage, the subset is further narrowed down to a fusion set of desired size, based on full-fledged registration and a refined relevance metric. An inference model is developed to characterize the relationship between the preliminary and refined relevance metrics, and a proper augmented subset size is derived to ensure that the desired atlases survive the preliminary selection with high probability. Results: The performance of the proposed scheme has been assessed with cross validation based on two clinical datasets consisting of manually segmented prostate and brain magnetic resonance images, respectively. The proposed scheme demonstrates comparable end-to-end segmentation performance as the conventional single-stage selection method, but with significant computation reduction. Compared with the alternative computation reduction method, their scheme improves the mean and medium Dice similarity coefficient value from (0.74, 0.78) to (0.83, 0.85) and from (0.82, 0.84) to (0.95, 0.95) for prostate and corpus callosum segmentation, respectively, with statistical significance. Conclusions: The authors

  1. Two-stage atlas subset selection in multi-atlas based image segmentation.

    Science.gov (United States)

    Zhao, Tingting; Ruan, Dan

    2015-06-01

    Fast growing access to large databases and cloud stored data presents a unique opportunity for multi-atlas based image segmentation and also presents challenges in heterogeneous atlas quality and computation burden. This work aims to develop a novel two-stage method tailored to the special needs in the face of large atlas collection with varied quality, so that high-accuracy segmentation can be achieved with low computational cost. An atlas subset selection scheme is proposed to substitute a significant portion of the computationally expensive full-fledged registration in the conventional scheme with a low-cost alternative. More specifically, the authors introduce a two-stage atlas subset selection method. In the first stage, an augmented subset is obtained based on a low-cost registration configuration and a preliminary relevance metric; in the second stage, the subset is further narrowed down to a fusion set of desired size, based on full-fledged registration and a refined relevance metric. An inference model is developed to characterize the relationship between the preliminary and refined relevance metrics, and a proper augmented subset size is derived to ensure that the desired atlases survive the preliminary selection with high probability. The performance of the proposed scheme has been assessed with cross validation based on two clinical datasets consisting of manually segmented prostate and brain magnetic resonance images, respectively. The proposed scheme demonstrates comparable end-to-end segmentation performance as the conventional single-stage selection method, but with significant computation reduction. Compared with the alternative computation reduction method, their scheme improves the mean and medium Dice similarity coefficient value from (0.74, 0.78) to (0.83, 0.85) and from (0.82, 0.84) to (0.95, 0.95) for prostate and corpus callosum segmentation, respectively, with statistical significance. The authors have developed a novel two-stage atlas

  2. Two-stage atlas subset selection in multi-atlas based image segmentation

    International Nuclear Information System (INIS)

    Zhao, Tingting; Ruan, Dan

    2015-01-01

    Purpose: Fast growing access to large databases and cloud stored data presents a unique opportunity for multi-atlas based image segmentation and also presents challenges in heterogeneous atlas quality and computation burden. This work aims to develop a novel two-stage method tailored to the special needs in the face of large atlas collection with varied quality, so that high-accuracy segmentation can be achieved with low computational cost. Methods: An atlas subset selection scheme is proposed to substitute a significant portion of the computationally expensive full-fledged registration in the conventional scheme with a low-cost alternative. More specifically, the authors introduce a two-stage atlas subset selection method. In the first stage, an augmented subset is obtained based on a low-cost registration configuration and a preliminary relevance metric; in the second stage, the subset is further narrowed down to a fusion set of desired size, based on full-fledged registration and a refined relevance metric. An inference model is developed to characterize the relationship between the preliminary and refined relevance metrics, and a proper augmented subset size is derived to ensure that the desired atlases survive the preliminary selection with high probability. Results: The performance of the proposed scheme has been assessed with cross validation based on two clinical datasets consisting of manually segmented prostate and brain magnetic resonance images, respectively. The proposed scheme demonstrates comparable end-to-end segmentation performance as the conventional single-stage selection method, but with significant computation reduction. Compared with the alternative computation reduction method, their scheme improves the mean and medium Dice similarity coefficient value from (0.74, 0.78) to (0.83, 0.85) and from (0.82, 0.84) to (0.95, 0.95) for prostate and corpus callosum segmentation, respectively, with statistical significance. Conclusions: The authors

  3. Uncertainty assessment of a dike with an anchored sheet pile wall using FEM

    Directory of Open Access Journals (Sweden)

    Rippi Aikaterini

    2016-01-01

    Full Text Available The Dutch design codes for the dikes with retaining walls rely on Finite Element Analysis (FEM in combination with partial safety factors. However, this can lead to conservative designs. For this reason, in this study, a reliability analysis is carried out with FEM calculations aiming to demonstrate the feasibility of reliability analysis for a dike with an anchored sheet pile wall modelled in the 2D FEM, Plaxis. Sensitivity and reliability analyses were carried out and enabled by coupling the uncertainty package, OpenTURNS and Plaxis. The most relevant (ultimate limit states concern the anchor, the sheet pile wall, the soil body failure (global instability and finally the system. The case was used to investigate the applicability of the First Order Reliability Method (FORM and Directional Sampling (DS to analysing these limit states. The final goal is to estimate the probability of failure and identify the most important soil properties that affect the behaviour of each component and the system as a whole. The results of this research can be used to assess and optimize the current design procedure for dikes with retaining walls.

  4. Topographic and Structural Effects on Dike Propagation and Eruption

    Energy Technology Data Exchange (ETDEWEB)

    E. Gaffney

    2006-04-13

    We have modeled magma flow in a dike rising in a crack whose strike runs from a highland or ridge to an adjacent lowland to determine the effect of topography on the flow, using a 3D hydromechanical code, FLAC3D (http://www.itascacg.com). The aperture, a, is calculated as a variable in a sheet of zones of fixed width d during the simulation as a function of model deformation. The permeability tensor of each zone is adjusted at each time step in response to the pressure in the cell according to the relationship k{sub ij} = {delta}{sub ij} {alpha}{sup 3}/12{mu}d, which is obtained by equating the flow through the layer of permeable zones from Darcy's law with Poiseuille's law under the same gradient. The fluid viscosity is {mu}, and the crack width is a We found a distinct tendency for the flow to be diverted away from the highland end of the strike toward the lowland. For the 4-km long strike length we modeled, eruption was offset between 500 and 1250 m toward the lowland from the center of the strike length. Separation of the geometric effect of the topography from the topographic overburden effect on lateral confining stresses at the crack indicates that both contribute to the effect. Although this analysis explains a tendency for volcanic eruptions to occur in low lands, it does not preclude eruptions on highlands. If the strike on the dike is parallel to the length of a ridge, the effect described here will not operate. Another possibility is that the strike length of a dike may be so short that its strike does not extend far beyond the edge of the ridge. A separate simulation used a 2D discrete element code, UDEC (http://www.itascacg.com) to investigate the interaction of magma in a vertical dike with normal faults and stratigraphy. We found that steeper faults are more easily intruded and that, as the magma rises to within a few hundred meters of the surface, sills are intruded into stratigraphic discontinuities in the hanging wall but not into the

  5. Count out your intrusions: Effects of verbal encoding on intrusive memories

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.

    2009-01-01

    Peri-traumatic information processing is thought to affect the development of intrusive trauma memories. This study aimed to replicate and improve the study by Holmes, Brewin, and Hennessy (2004, Exp. 3) on the role of peri-traumatic verbal processing in analogue traumatic intrusion development.

  6. Options for human intrusion

    International Nuclear Information System (INIS)

    Bauser, M.; Williams, R.

    1993-01-01

    This paper addresses options for dealing with human intrusion in terms of performance requirements and repository siting and design requirements. Options are presented, along with the advantages and disadvantages of certain approaches. At the conclusion, a conceptual approach is offered emphasizing both the minimization of subjective judgements concerning future human activity, and specification of repository requirements to minimize the likelihood of human intrusion and any resulting, harmful effects should intrusion occur

  7. Magma Dynamics at Yucca Mountain, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    D. Krier

    2005-08-29

    Small-volume basaltic volcanic activity at Yucca Mountain has been identified as one of the potential events that could lead to release of radioactive material from the U.S. Department of Energy (DOE) designated nuclear waste repository at Yucca Mountain. Release of material could occur indirectly as a result of magmatic dike intrusion into the repository (with no associated surface eruption) by changing groundwater flow paths, or as a result of an eruption (dike intrusion of the repository drifts, followed by surface eruption of contaminated ash) or volcanic ejection of material onto the Earth's surface and the redistribution of contaminated volcanic tephra. Either release method includes interaction between emplacement drifts and a magmatic dike or conduit, and natural (geologic) processes that might interrupt or halt igneous activity. This analysis provides summary information on two approaches to evaluate effects of disruption at the repository by basaltic igneous activity: (1) descriptions of the physical geometry of ascending basaltic dikes and their interaction with silicic host rocks similar in composition to the repository host rocks; and (2) a summary of calculations developed to quantify the response of emplacement drifts that have been flooded with magma and repressurized following blockage of an eruptive conduit. The purpose of these analyses is to explore the potential consequences that could occur during the full duration of an igneous event.

  8. Magma Dynamics at Yucca Mountain, Nevada

    International Nuclear Information System (INIS)

    D. Krier

    2005-01-01

    Small-volume basaltic volcanic activity at Yucca Mountain has been identified as one of the potential events that could lead to release of radioactive material from the U.S. Department of Energy (DOE) designated nuclear waste repository at Yucca Mountain. Release of material could occur indirectly as a result of magmatic dike intrusion into the repository (with no associated surface eruption) by changing groundwater flow paths, or as a result of an eruption (dike intrusion of the repository drifts, followed by surface eruption of contaminated ash) or volcanic ejection of material onto the Earth's surface and the redistribution of contaminated volcanic tephra. Either release method includes interaction between emplacement drifts and a magmatic dike or conduit, and natural (geologic) processes that might interrupt or halt igneous activity. This analysis provides summary information on two approaches to evaluate effects of disruption at the repository by basaltic igneous activity: (1) descriptions of the physical geometry of ascending basaltic dikes and their interaction with silicic host rocks similar in composition to the repository host rocks; and (2) a summary of calculations developed to quantify the response of emplacement drifts that have been flooded with magma and repressurized following blockage of an eruptive conduit. The purpose of these analyses is to explore the potential consequences that could occur during the full duration of an igneous event

  9. Creating a two-layered augmented artificial immune system for application to computer network intrusion detection

    Science.gov (United States)

    Judge, Matthew G.; Lamont, Gary B.

    2009-05-01

    Computer network security has become a very serious concern of commercial, industrial, and military organizations due to the increasing number of network threats such as outsider intrusions and insider covert activities. An important security element of course is network intrusion detection which is a difficult real world problem that has been addressed through many different solution attempts. Using an artificial immune system has been shown to be one of the most promising results. By enhancing jREMISA, a multi-objective evolutionary algorithm inspired artificial immune system, with a secondary defense layer; we produce improved accuracy of intrusion classification and a flexibility in responsiveness. This responsiveness can be leveraged to provide a much more powerful and accurate system, through the use of increased processing time and dedicated hardware which has the flexibility of being located out of band.

  10. Magmatism during Gondwana breakup

    DEFF Research Database (Denmark)

    van der Meer, Quinten; Scott, J.M.; Waight, Tod Earle

    2013-01-01

    Newly determined mid-late Cretaceous 40Ar/39Ar ages on megacrystic kaersutite from lamprophyre dikes in central and north Westland (New Zealand) are presented. These ages (88 Ma, 86 Ma and 68 Ma) indicate that the intrusion of mafic dikes was not necessarily restricted to the previously establish...

  11. A Jurassic Shock-Aftershock Earthquake Sequence Recorded by Small Clastic Pipes and Dikes within Dune Cross-Strata, Zion National Park, Utah

    Science.gov (United States)

    Loope, D. B.; Zlotnik, V. A.; Kettler, R. M.; Pederson, D. T.

    2012-12-01

    Eolian sandstones of south-central and southeast Utah contain large volumes of contorted cross-strata that have long been recognized as products of liquefaction caused by seismic shaking. Unlike most sites where Navajo Sandstone is exposed, in Zion National Park (southwestern Utah), the Navajo contains very, very few contorted strata. We have, however, mapped the distribution of more than 1,000 small-scale, vertical pipes and dikes in uncontorted cross-strata of the Navajo at two small study sites in Zion. Pipes are 2-5 cm in diameter and up to 3 m long; dikes are ~6 cm wide. Clusters of the water-escape structures lie directly above and below numerous, near-horizontal bounding surfaces. Dikes are restricted to the wind-ripple strata that lie above the bounding surfaces. Pipes are common both above and below the bounding surfaces. In map view, most pipes are arranged in lines. Near the bounding surfaces, pipes merge upward with shallow dikes trending parallel to the lines of pipes. Pipes formed in grainflows—homogeneous, well-sorted sand lacking cohesion. Dikes formed above the bounding surface, in more-cohesive, poorly sorted, wind-ripple strata. As liquefaction began, expansion of subsurface sand caused spreading within the unliquified (capping) beds near the land surface. Dikes intruded cracks in the wind-ripple strata, and pipes rose from the better-sorted sand to interdune surfaces, following trends of cracks. Because the wind-ripple strata had low cohesive strength, a depression formed around each rupture, and ejected sand built upward to a flat-topped surface rather than forming the cone of a classic sand volcano. In one 3 m2 portion of the map area, a cluster of about 20 pipes and dikes, many with truncated tops, record eight stratigraphically distinct seismic events. The large dunes that deposited the Navajo cross-strata likely moved ~1m/yr. When, in response to seismic shaking, a few liters of fluidized sand erupted onto the lowermost portion of the

  12. Assessment of study space usage in the Kenneth Dike Library ...

    African Journals Online (AJOL)

    This paper explored the actual use of the physical space in Kenneth Dike Library by the students' population, the role these spaces are playing for learning and for related services in the university of Ibadan academic environment. It looked at the suitability of available spaces and suggestions for improvement. Survey ...

  13. Present-day Opening of the Natron Rift: Tectonic and Magmatic Processes at Work

    Science.gov (United States)

    Calais, E.; Dalaison, M.; Saria, E.; Doubre, C.; Masson, F.

    2017-12-01

    The young Natron basin (system, is an important locale to study the initial stage of continental rifting. It was the locus of a rarely observed tectono-magmatic event in July 2007, with slow slip on an intra-basin normal fault followed by a 10 km-long dike intrusion underneath the Gelai shield volcano. Here we report on a series of GPS observations over a 20-site network spanning the basin, measured repeatedly since 2013. We observe a long wavelength ( 200 km wide) extension with a horizontal rate of about 2 mm/yr, consistent with recentlty published regional kinematic models, and a velocity gradient centered on the west-bounding fault of the Natron basin. Initial models show that the data is best fit by a normal fault dipping 60 degrees to the east and slipping at a rate of 6 mm/yr. Superimposed on this long wavelength extension, we observe a smaller scale ( 30 km wide) extensional signal in the middle of the basin, roughly coincident with the location of the Gelai volcano, which was the locale of the 2007 seismic-magmatic crisis. We investigate the relative importance of tectonic faulting, post-diking relaxation following the 2007 intrusion (as observed for instance in Afar or Iceland after similar events), and melt recharge of the intra-basin magmatic system in present-day extension across this young segment of the East African Rift.

  14. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  15. When Intrusion Detection Meets Blockchain Technology: A Review

    OpenAIRE

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju; Wang, Yu; Han, Jinguang

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness ...

  16. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  17. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  18. Petrophysical characterization of the hydrothermal root zone in the sheeted dike complex from IODP Hole 1256D.

    Science.gov (United States)

    Violay, M.; Pezard, P. A.; Ildefonse, B.; Belghoul, A.; Mainprice, D.

    2009-04-01

    IODP (Integrated Ocean Drilling Program.) Site 1256 is located on the Cocos Plate in the Eastern Equatorial Pacific Ocean. It samples 15 Ma-old oceanic lithosphere that was formed at the EPR during a period of superfast spreading rate (> 200mm/yr). Drilling operations at Site 1256 were conducted during three ODP and IODP expeditions, and reached for the first time gabbros below the sheeted dike complex in Hole 1256D. This offers a unique opportunity to study in situ the fossil root zone of the sheeted dike complex in present-day oceanic crust. This zone is a boundary layer between the magmatic system of the melt lens (around 1100 °C), and the overlying high temperature hydrothermal system (≤ 450 °C). This boundary layer during crustal accretion is critical to our understanding of crustal processes along mid-ocean ridges. This work focuses on the petrophysical characterization of the root zone. Physical properties were determined from downhole geophysical profiles and images, and from laboratory petrophysical measurements from 21 minicores. Dikes, granoblastic dikes and gabbros testify to an important hydrothermal circulation in the vicinity of the magmatic lens. Porosity is primarily controlled by sample initial texture, hydrothermal alteration, and recrystallization processes. Green schist facies alteration of basalts is associated to relatively higher porosity values (≈ 2%) and a very variable organization of the pore space, as revealed by electrical properties. The electrical formation factor in diabase is high and variable (920 to 6087). Granoblastic dikes are characterized by locally recrystallized texture with Cpx and Opx (granulite facies) and little alteration at low temperature. The recrystallization induces abrupt decrease in porosity (fairly constant porosity, which likely consist mostly in microcracks. Crack density increases linearly with depth from 0.02 in diabase to 0.08 in gabbros. It is consistent with a fissural porosity (crack aspect ratio

  19. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  20. [Simultaneous intrusion and retraction of the anterior teeth using a three-piece base arch].

    Science.gov (United States)

    Liu, D; Bai, D; Wang, C; Sun, W; Guo, J; Xi, R

    2000-06-01

    To evaluate the effects of the three-piece base arch on overbite correction of Class II malocclusion. 20 patients with high angle, flared incisors were treated using a three-piece base arch appliance. The intrusion force of four upper incisors was adjusted to approximately 50 g. The line of force action was 2 mm distally to the resistant center(RC) and the retraction force was 20 g, the right and left posterior segments were joined by a palatal bar. Cephalograms were taken before treatment (T1) and six months after treatment (T2). The upper molars moved mesially 0.60 +/- 0.35 mm and the distance of the vertical extrusion was 0.80 +/- 0.52 mm. The distances of the upper central incisor retraction and intrusion were -4.20 +/- 2.12 mm and 3.10 +/- 0.54 mm respectively. The RC of the central incisor retracted -4.12 +/- 1.96 mm and intruded 3.20 +/- 0.66 mm. The axial inclination of the upper incisor-palatal plane changed from 123.21 degrees +/- 4.26 degrees to 116.00 degrees +/- 3.96 degrees. The three-piece segmented approach can effectively intrude and retract the upper anterior teeth for flared incisors and deep overbite.

  1. Resilience as strategy for climate adaptation under uncertainty. Case study on the area outside the dike of Rotterdam

    International Nuclear Information System (INIS)

    De Jong, A.

    2008-07-01

    This study has two aims; (1) to obtain insight in the concepts resilience and uncertainty; to gain insight in how a resilience oriented approach deals with uncertainties about the future; and (2) putting the resilience oriented approach into operation in a case: the area outside the dike of Rotterdam, the Netherlands, which is designated for new buildings [nl

  2. Detecting areal changes in tidal flats after sea dike construction ...

    Indian Academy of Sciences (India)

    The main objective of this study was to estimate changes in the area of tidal flats that occurred after sea dike construction on the western coast of South Korea using Landsat-TM images. Applying the ISODATA method of unsupervised classification for Landsat-TM images, the tidal flats were identified, and the resulting areas ...

  3. Experimental Investigation on the Scour Hole Geometric Dimensions in Different Spur Dikes in 90 Degree Bend for Non-Submerged Conditions

    Directory of Open Access Journals (Sweden)

    somayeh rahimi

    2017-06-01

    Full Text Available Introduction: Outer bank region is always exposed to destruction and scour due to secondary flow. Different methods are generally used to protect the outer bank. One of the most common and economical ways is spur dike. As an obstacle in the flow, spur dikes protect the outer bank through decreasing the velocity and forming vortexes between them and as a result sedimentation along that area. However, the spur dike increases the shear stress and local scour around the spur, especially its nose.. This study investigates the scour hole dimensions around three types of spur dike including permeable, impermeable and bandal-like spur dike which is done as a combination of permeable and impermeable spur dike. Few studies were focused on field applications and laboratory experiments to investigate the practical applicability of the bandal-like structure in natural rivers. Rahman et al. (4 Studied the prediction of main channel degradation and local scour around hydraulic structures (impermeable and bandal-like spur dikes under non-submerged condition. Teraguchi et al. (9 Investigated the influenced of submerged condition on flow characteristics and sediment transport process caused by bandal-like structures with different spacing and alignment under live-bed scour condition through laboratory experiments. Materials and Methods: Experiments were carried out in the Physical Modeling Laboratory of Faculty of Water Science Engineering of Shahid Chamran University, Ahwaz. The main channel consisted of a 5m long upstream and a 3m long downstream straight reaches. A 90 degree bend was located between the two straight reach. The channel was of rectangular cross section, having a width of 0.7m and depth of 0.6m, with mild bends (ratio of radius to a width equal to 4 and it was filled with almost uniform sediment with a median particle size of D50=1.5 mm. The discharges were measured using an ultrasonic flow meter, which was installed on the pipe inlet of the

  4. Sedimentation and contamination patterns of dike systems along the Rhône River (France)

    Science.gov (United States)

    Seignemartin, Gabrielle; Tena, Alvaro; Piégay, Hervé; Roux, Gwenaelle; Winiarski, Thierry

    2017-04-01

    Humans have historically modified the Rhône River, especially in the last centuries. In the 19th century, the river was systematically embanked for flood protection purposes, and works continued along the 20th century with dike system engineering work for navigation. The Rhône was canalised and its historical course by-passed by a series of hydroelectric dams. Besides, industrial activity polluted the river. For example, high levels of PCB's were attributed to the inputs of the heavily industrialized zone downstream from Lyon. During floods, these contaminants, associated with the suspended sediment, were trapped by the engineering works and the floodplain. Currently, a master plan to reactivate the river dynamics in the alluvial margins by removing the groyne-fields and dikes in the by-passed sections is being implemented. Within this context, this work aims to assess historical dynamics of sediment and associated contaminants in the floodplain (e.g. trace metal elements), notably in the dike system, in order to evaluate the contamination risk related to bank protection removal. With this objective, a transversal methodology has been applied coupling GIS diachronic analysis (old maps, bathymetric data, Orthophotos, LIDAR, etc.) to understand the historical floodplain evolution, sediment survey to obtain sediment thickness (metal rod and Ground Penetrating Radar), and sediment sampling (manual auger and core sampling) to obtain the metal element concentrations (X-Ray Fluorescence and Inductively Coupled Plasma Mass Spectrometry). By this way, metal element patterns were defined and used as contamination tracing indicators to apprehend the contamination history but also as geochemical background indicators to define the sediment source influence. We found that sediment temporal patterns are directly related with the by-pass construction year. Spatially, fine sediment deposition predominates in the dike systems, being lower in the floodplain already disconnected in

  5. Two-Level Evaluation on Sensor Interoperability of Features in Fingerprint Image Segmentation

    Directory of Open Access Journals (Sweden)

    Ya-Shuo Li

    2012-03-01

    Full Text Available Features used in fingerprint segmentation significantly affect the segmentation performance. Various features exhibit different discriminating abilities on fingerprint images derived from different sensors. One feature which has better discriminating ability on images derived from a certain sensor may not adapt to segment images derived from other sensors. This degrades the segmentation performance. This paper empirically analyzes the sensor interoperability problem of segmentation feature, which refers to the feature’s ability to adapt to the raw fingerprints captured by different sensors. To address this issue, this paper presents a two-level feature evaluation method, including the first level feature evaluation based on segmentation error rate and the second level feature evaluation based on decision tree. The proposed method is performed on a number of fingerprint databases which are obtained from various sensors. Experimental results show that the proposed method can effectively evaluate the sensor interoperability of features, and the features with good evaluation results acquire better segmentation accuracies of images originating from different sensors.

  6. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS.

  7. Monogenetic volcanoes fed by interconnected dikes and sills in the Hopi Buttes volcanic field, Navajo Nation, USA

    Science.gov (United States)

    Muirhead, James D.; Van Eaton, Alexa R.; Re, Giuseppe; White, James D. L.; Ort, Michael H.

    2016-01-01

    Although monogenetic volcanic fields pose hazards to major cities worldwide, their shallow magma feeders (networks. Analysis of vent alignments using the pyroclastic massifs and other eruptive centers (e.g., maar-diatremes) shows a NW-SE trend, parallel to that of dikes in the region. We therefore infer that dikes fed many of the eruptions. Dikes are also observed in places transforming to transgressive (ramping) sills. Estimates of the observable volume of dikes (maximum volume of 1.90 × 106 m3) and sills (minimum volume of 8.47 × 105 m3) in this study reveal that sills at Hopi Buttes make up at least 30 % of the shallow intruded volume (∼2.75 × 106 m3 total) within 350 m of the paeosurface. We have also identified saucer-shaped sills, which are not traditionally associated with monogenetic volcanic fields. Our study demonstrates that shallow feeders in monogenetic fields can form geometrically complex networks, particularly those intruding poorly consolidated sedimentary rocks. We conclude that the Hopi Buttes eruptions were primarily fed by NW-SE-striking dikes. However, saucer-shaped sills also played an important role in modulating eruptions by transporting magma toward and away from eruptive conduits. Sill development could have been accompanied by surface uplifts on the order of decimeters. We infer that the characteristic feeder systems described here for the Hopi Buttes may underlie monogenetic fields elsewhere, particularly where magma intersects shallow, and often weak, sedimentary rocks. Results from this study support growing evidence of the important role of shallow sills in active monogenetic fields.

  8. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...... the intersection of IDSs and blockchains. In particular, we introduce the background of intrusion detection and blockchain, discuss the applicability of blockchain to intrusion detection, and identify open challenges in this direction....

  9. Passive monitoring of a sea dike during a tidal cycle using sea waves as a seismic noise source

    Science.gov (United States)

    Joubert, Anaëlle; Feuvre, Mathieu Le; Cote, Philippe

    2018-05-01

    Over the past decade, ambient seismic noise has been used successfully to monitor various geological objects with high accuracy. Recently, it has been shown that surface seismic waves propagating within a sea dike body can be retrieved from the cross-correlation of ambient seismic noise generated by sea waves. We use sea wave impacts to monitor the response of a sea dike during a tidal cycle using empirical Green's functions. These are obtained either by cross-correlation or deconvolution, from signals recorded by sensors installed linearly on the crest of a dike. Our analysis is based on delay and spectral amplitude measurements performed on reconstructed surface waves propagating along the array. We show that localized variations of velocity and attenuation are correlated with changes in water level as a probable consequence of water infiltration inside the structure. Sea dike monitoring is of critical importance for safety and economic reasons, as internal erosion is generally only detected at late stages by visual observations. The method proposed here may provide a solution for detecting structural weaknesses, monitoring progressive internal erosion, and delineating areas of interest for further geotechnical studies, in view to understanding the erosion mechanisms involved.

  10. Geodetic measurements and numerical models of the Afar rifting sequence 2005-2010

    Science.gov (United States)

    Ali, T.; Feigl, K.; Calais, E.; Hamling, I. J.; Wright, T. J.

    2012-12-01

    Rifting episodes are characterized by magma migration and dike intrusions that perturb the stress field within the surrounding lithosphere, inducing viscous flow in the lower crust and upper mantle that leads to observable, transient surface deformation. The Manda Hararo-Dabbahu rifting episode that occurred in the Afar depression between 2005 and 2010 is the first such episode to unfold fully in the era of satellite geodesy, thus providing a unique opportunity to probe the rheology of lithosphere at a divergent plate boundary. GPS and SAR measurements over the region since 2005 show accelerated surface deformation rates during post-diking intervals [Wright et al., Nature Geosci., 2012]. Using these observations in combination with a numerical model, we estimate model parameters that best explain the deformation signal. Our model accounts for three distinct processes: (i) secular plate spreading between Nubian and Arabian plates, (ii) time dependent post-rifting viscoelastic relaxation following the 14 dike intrusions that occurred between 2005 and 2010, including the 60 km long mega dike intrusion of September 2005, and (iii) magma accumulation within crustal reservoirs that feed the dikes. To model the time dependent deformation field, we use the open-source unstructured finite element code, Defmod [Ali, 2011, http://defmod.googlecode.com/]. Using a gradient-based iterative scheme [Ali and Feigl, Geochem. Geophys. Geosyst., 2012], we optimize the fit between observed and modeled deformation to estimate parameters in the model, including the locking depth of the rift zone, geometry and depth of magma reservoirs and rheological properties of lower crust and upper mantle, along with their formal uncertainties.

  11. Transient deformation in the Asal-Ghoubbet Rift (Djibouti) since the 1978 diking event: Is deformation controlled by magma supply rates?

    Science.gov (United States)

    Smittarello, D.; Grandin, R.; de Chabalier, J. B.; Doubre, C.; Deprez, A.; Masson, F.; Socquet, A.; Ibrahim Ahmed, S.

    2016-12-01

    Within the Afar Depression, the Asal-Ghoubbet Rift (AG Rift)in Djibouti lies in the subaerial continuation of the Aden ridge system. This segment constitutes a natural laboratory to study rifting processes and mechanisms involved in continental breakup and oceanic spreading. In November 1978, an exceptional rifting event occurred in the AG Rift. Regularly upgraded and improved geodetic technology has been used to monitor this event and the postdiking deformation. In light of recent results obtained for the Manda Hararo-Dabbahu rifting event (2005-2010), we propose that the horizontal and vertical geodetic data can be modeled with a double source, involving a dike-like inflation component aligned along the rift axis and a spherical pressure source located at midsegment below the Fieale caldera. By revisiting the codiking data, we propose that the reservoir below Fieale could have fed, at least partially, the 1978 injection and the contemporaneous Ardoukoba eruption and potentially induced local subsidence due to magma draining out of the central reservoir. As an alternative to previously proposed viscoelastic relaxation models, we reinterpret postdiking observations using a purely elastic rheology. We determine the relative contribution of a midsegment reservoir inflation and a dike-like opening component, together with their respective time evolutions. Our results suggest that interactions between steadily accumulating tectonic strain and temporal variations in melt supply to the shallow magma plumbing system below the AG Rift may entirely explain the geodetic observations and that viscoelastic deformation processes played a minor role in the 30 years following the 1978 rifting event.

  12. Clinopyroxenite dikes crosscutting banded peridotites just above the metamorphic sole in the Oman ophiolite: early cumulates from the primary V3 lava

    Science.gov (United States)

    Ishimaru, Satoko; Arai, Shoji; Tamura, Akihiro

    2013-04-01

    Oman ophiolite is one of the well-known ophiolites for excellent exposures not only of the mantle section but also of the crustal section including effusive rocks and the underlying metamorphic rocks. In the Oman ophiolite, three types of effusive rocks (V1, V2 and V3 from the lower sequences) are recognized: i.e., V1, MORB-like magma, V2, island-arc type lava, and V3, intra-plate lava (Godard et al., 2003 and references there in). V1 and V2 lavas are dominant (> 95 %) as effusive rocks and have been observed in almost all the blocks of northern part of the Oman ophiolite (Godard et al., 2003), but V3 lava has been reported only from Salahi area (Alabaster et al., 1982). It is clear that there was a time gap of lava eruption between V1-2 and V3 based on the presence of pelagic sediments in between (Godard et al., 2003). In addition, V3 lavas are fed by a series of doleritic dikes crosscutting V2 lava (Alley unit) (Alabaster et al., 1982). We found clinopyroxenite (CPXITE) dikes crosscutting deformation structure of basal peridotites just above the metamorphic sole in Wadi Ash Shiyah. The sole metamorphic rock is garnet amphibolite, which overlies the banded and deformed harzburgite and dunite. The CPXITE is composed of coarse clinopyroxene (CPX) with minor amount of chlorite, garnet (hydrous/anhydrous grossular-andradite) with inclusions of titanite, and serpentine formed at a later low-temperature stage. The width of the CPXITE dikes is 2-5 cm (10 cm at maximum) and the dikes contain small blocks of wall harzburgite. Almost all the silicates are serpentinized in the harzburgite blocks except for some CPX. The Mg# (= Mg/(Mg + Fe) atomic ratio) of the CPX is almost constant (= 0.94-0.95) in the serpentinite blocks but varies within the dikes, highest at the contact with the block (0.94) and decreasing with the distance from the contact to 0.81 (0.85 on average). The contents of Al2O3, Cr2O3, and TiO2 in the CPX of the dikes are 0.5-2.0, 0.2-0.6, and 0

  13. Two-Segment Foot Model for the Biomechanical Analysis of Squat

    OpenAIRE

    Panero, E.; Gastaldi, L.; Rapp, W.

    2017-01-01

    Squat exercise is acquiring interest in many fields, due to its benefits in improving health and its biomechanical similarities to a wide range of sport motions and the recruitment of many body segments in a single maneuver. Several researches had examined considerable biomechanical aspects of lower limbs during squat, but not without limitations. The main goal of this study focuses on the analysis of the foot contribution during a partial body weight squat, using a two-segment foot model tha...

  14. Magmatic intrusions in the lunar crust

    Science.gov (United States)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  15. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M.; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N.; Mazzoni, Elvis; Pappas, Ilias O.; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M. S.; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS. PMID:27994566

  16. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Directory of Open Access Journals (Sweden)

    Agata Błachnio

    2016-12-01

    Full Text Available The increase in the number of users of social networking sites has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2,628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Measure, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively and low context (positively; of the personality variables, conscientiousness and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of social networking sites (SNS.

  17. Soldered Power Arm: An Easy and Effective Method for Intrusion and Retraction of Anterior Teeth

    Directory of Open Access Journals (Sweden)

    Ketan K Vakil

    2014-01-01

    Full Text Available The orthodontic correction of deep overbite can be achieved with several mechanisms that will result in true intrusion of anterior teeth, extrusion of posterior teeth, or a combination of both. For the orthodontic correction of bimaxillary dentoalveolar protrusion with deep bite, there are several treatment modalities like segmented arch approach, retraction and intrusion utility arches, temporary anchorage devices. Though not a novel therapeutic concept, the use of miniscrew implants to obtain absolute anchorage has recently become very popular in clinical orthodontic approaches. To allow the use of sliding mechanics for bodily retraction with intrusion of anterior teeth, we devised a soldered power arm (SPA on standard molar tube. It is simple, stable, precise and effective in cases where anterior teeth need to be simultaneously retracted and intruded. A power arm can be readily fabricated from 20 gauge stainless steel wire and soldered on the molar buccal tube so as to avoid any distortion or loosening of power arm from molar tube during the course of the treatment. The SPA works efficiently with the molar being stabilized in all three planes of space. The resultant force vector is directed more apically toward the center of resistance of the anchor unit, which resulted in the treatment outcome of retraction and intrusion of the anterior teeth and correction of the deep bite.

  18. Aspects of cold intrusions over Greece during autumn

    Science.gov (United States)

    Mita, Constantina; Marinaki, Aggeliki; Zeini, Konstantina; Konstantara, Metaxia

    2010-05-01

    This study is focused on the description of atmospheric disturbances that caused intense cold intrusions over Greece during autumn for a period of 25 years (1982-2006). The study was based on data analysis from the meteorological station network of the Hellenic National Meteorological Service (HNMS) and the European Centre for Medium Range Weather Forecasts (ECMWF). Initially, the days with temperature at the isobaric surface of 850 hPa less or equal to the mean temperature for the 10-day period the day under investigation belongs to are isolated, composing a new confined data set which was further used. An event of intense cold intrusion is identified based on a subjective set of criteria, considering the temperature decrease at the level of 850 hPa and its duration. In particular, the criteria that were used to identify a cold intrusion were: temperature variation between two successive days at the isobaric level of 850 hPa being equal or greater than 50 C at least once during the event and duration of the event of at least two successive days with continuous temperature decrease. Additionally, the synoptic analysis of the atmospheric disturbances involved using weather charts from ECMWF, revealed that all cases were related to low pressure systems at the level of 500 hPa, accompanied by cold air masses. Moreover, a methodology proposed to classify the cold intrusions based on general circulation characteristics of the atmosphere, resulted in seven major categories. More than half of the events belong in two categories, originated northwest of the greater Greek area (Greece and parts of neighbouring countries), between 400 and 600 N. Further analysis indicated that the frequency of events increases from September to November and the majority of the events lasted two to three days. Additionally, the non-parametric Mann-Kendall test was used for the investigation of the statistical significance of the trends appearing in the results. The tests revealed that over

  19. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  20. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  1. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  2. Titaniferous magnetite and barite from the San Gregorio de Polanco dike swarm, Paraná Magmatic Province, Uruguay

    Directory of Open Access Journals (Sweden)

    Rossana Muzio

    2013-07-01

    Full Text Available The San Gregorio de Polanco Dike Swarm (Tacuarembó Department, Uruguay is the southernmost set of dikes in the Paraná Magmatic Province of Uruguay. Five major dikes have been identified with two main structural trends: N140º–N170º and N50º–N80º. The dikes have tholeiitic affinities and are composed of plagioclase (An55, augite and augite-pigeonite, relicts of olivine and opaque minerals. These rocks have high contents of Fe–Ti oxides (titanomagnetites, the mineralogical and textural characteristics of which have been studied using scanning electron microscopy and energy dispersive spectrometry techniques (SEM – EDS. These features, along with other mineralogical and textural relationships, have been used to propose the following crystallization sequence for the dikes: (i crystallization of olivine, plagioclase and Ca-rich pyroxene phenocrysts; (ii precipitation of the first population of Ti-magnetite; (iii crystallization of plagioclase and pyroxene in the groundmass; (iv partial dissolution of Ti-magnetite by reaction with magmatic fluids; (v crystallization of the second population of Ti-magnetite and finally, (vi crystallization of interstitial barite.   Resumen El Haz de Diques de San Gregorio de Polanco (Departamento de Tacuarembó, Uruguay es la ocurrencia más meridional de diques pertenecientes a la Provincia Magmática Paraná en Uruguay. Fueron identificados cinco 5 diques principales con dos direcciones estructurales principales: N140º - N170º y N50º - N80º, respectivamente. Son diques de afinidad tholeítica compuestos por plagioclasa (An55, augita y augita-pigeonita, relictos de olivina y minerales opacos. Estos diques se caracterizan por el alto contenido de óxidos de Fe y Ti (titanomagnetitas, cuyas características mineralógicas y texturales fueron estudiadas con microscopio electrónico de barrido y espectrometría de energía dispersiva (SEM-EDS, incluyendo mapeos composicionales. Estas caracter

  3. Smoke regions extraction based on two steps segmentation and motion detection in early fire

    Science.gov (United States)

    Jian, Wenlin; Wu, Kaizhi; Yu, Zirong; Chen, Lijuan

    2018-03-01

    Aiming at the early problems of video-based smoke detection in fire video, this paper proposes a method to extract smoke suspected regions by combining two steps segmentation and motion characteristics. Early smoldering smoke can be seen as gray or gray-white regions. In the first stage, regions of interests (ROIs) with smoke are obtained by using two step segmentation methods. Then, suspected smoke regions are detected by combining the two step segmentation and motion detection. Finally, morphological processing is used for smoke regions extracting. The Otsu algorithm is used as segmentation method and the ViBe algorithm is used to detect the motion of smoke. The proposed method was tested on 6 test videos with smoke. The experimental results show the effectiveness of our proposed method over visual observation.

  4. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients

    Directory of Open Access Journals (Sweden)

    Usha Bapat

    2012-01-01

    Full Text Available To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients′ above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life

  5. Mississippian lamprophyre dikes in western Sierras Pampeanas, Argentina: Evidence of transtensional tectonics along the SW margin of Gondwana

    Science.gov (United States)

    Martina, Federico; Canelo, Horacio N.; Dávila, Federico M.; de Hollanda, María Helena M.; Teixeira, Wilson

    2018-04-01

    In the Famatina range, Sierras Pampeanas of Argentina (SW Gondwana), subvertical calc-alkaline lamprophyric dike swarms crop out through >300 km. The dikes cut Ordovician units with a prominent NW-SE trending and are covered by continental sedimentary successions of Pennsylvanian to Permian age. The dikes show a strong structural control associated with Riedel fault systems. Detailed field analysis suggested a ∼N-S opening direction oblique to the attitude of dike walls and a left-lateral transtensional tectonics during the emplacement. 40Ar/39Ar geochronology of a lamprophyric sample defined a crystallization age (plateau; whole rock) of 357.1 ± 7.1 Ma (MSWD = 2.3). Coetaneous ductile zones with dominant strike-slip motion, documented along western Argentina for >600 km, suggest a regional event in SW Gondwana during the Mississippian. We propose that this deformation was the result of the counterclockwise fast rotation of Gondwana between 365 and 345 Ma, when the Famatina range and western Argentina occupied a sub-polar position. A transform margin along SW Gondwana better explains our (and others) data rather than a subduction margin. This scenario is also consistent with the occurrence of A-type granites and normal-fault basins within the foreland as well as bimodal volcanics.

  6. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  7. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  8. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    Science.gov (United States)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    We will present a detailed microstructural and geochemical study of reactive liquid flow in Unit 9 of the Rum Eastern Layered Intrusion. In the study region, Unit 9 comprises an underlying lens-like body of peridotite overlain by a sequence of troctolite and gabbro (termed allivalite), with some local and minor anorthosite. The troctolite is separated from the overlying gabbro by a distinct, sub-horizontal, undulose horizon (the major wavy horizon). Higher in the stratigraphy is another, similar, horizon (the minor wavy horizon) that separates relatively clinopyroxene-poor gabbro from an overlying gabbro. To the north of the peridotite lens, both troctolite and gabbro grade into poikilitic gabbro. Clinopyroxene habit in the allivalite varies from thin rims around olivine in troctolite, to equigranular crystals in gabbro, to oikocrysts in the poikilitic gabbro. The poikilitic gabbros contain multiple generations of clinopyroxene, with Cr-rich (~1.1 wt.% Cr2O3), anhedral cores with moderate REE concentrations (core1) overgrown by an anhedral REE-depleted second generation with moderate Cr (~0.7 wt.% Cr2O3) (core2). These composite cores are rimmed by Cr-poor (~0.2 wt.% Cr2O3) and REE-poor to moderate clinopyroxene. We interpret these microstructures as a consequence of two separate episodes of partial melting triggered by the intrusion of hot olivine-phyric picrite to form the discontinuous lenses that comprise the Unit 9 peridotite. Loss of clinopyroxene-saturated partial melt from the lower part of the allivalite immediately following the early stages of sill intrusion resulted in the formation of clinopyroxene-poor gabbro. The spatial extent of clinopyroxene loss is marked by the minor wavy horizon. A further partial melting event stripped out almost all clinopyroxene from the lowest allivalite, to form a troctolite, with the major wavy horizon marking the extent of melting during this second episode. The poikilitic gabbro formed from clinopyroxene-saturated melt

  9. Erratum: Correction to: Emplacement controls for the basaltic-andesitic radial dikes of Summer Coon volcano and implications for flank vents at stratovolcanoes

    Science.gov (United States)

    Harp, A. G.; Valentine, G. A.

    2018-06-01

    In the article "Emplacement controls for the basaltic-andesitic radial dikes of Summer Coon volcano and implications for flank vents at stratovolcanoes", the vertical axis for Fig. 8 a was incorrectly labeled (i.e., the value for dikes per km2).

  10. Study on Two-segment Electric-mechanical Composite Braking Strategy of Tracked Vehicle Hybrid Transmission System

    OpenAIRE

    Ma, Tian; Gai, Jiangtao; Ma, Xiaofeng

    2010-01-01

    In order to lighten abrasion of braking system of hybrid electric tracked vehicle, according to characteristic of hybrid electric transmission, electric-mechanical composite braking method was proposed. By means of analyzing performance of electric braking and mechanical braking and three-segment composite braking strategy, two-segment electric-mechanical composite braking strategy was put forward in this paper. Simulation results of Matlab/Simulink indicated that the two-segment electric-mec...

  11. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection.

    Science.gov (United States)

    Hu, Weiming; Gao, Jun; Wang, Yanguo; Wu, Ou; Maybank, Stephen

    2014-01-01

    Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.

  12. Silurian extension in the Upper Connecticut Valley, United States and the origin of middle Paleozoic basins in the Québec embayment

    Science.gov (United States)

    Rankin, D.W.; Coish, R.A.; Tucker, R.D.; Peng, Z.X.; Wilson, S.A.; Rouff, A.A.

    2007-01-01

    Pre-Silurian strata of the Bronson Hill arch (BHA) in the Upper Connecticut Valley, NH-VT are host to the latest Ludlow Comerford Intrusive Suite consisting, east to west, of a mafic dike swarm with sheeted dikes, and an intrusive complex. The rocks are mostly mafic but with compositions ranging from gabbro to leucocratic tonalite. The suite is truncated on the west by the Monroe fault, a late Acadian thrust that carries rocks of the BHA westward over Silurian-Devonian strata of the Connecticut Valley-Gaspe?? trough (CVGT). Dikes intrude folded strata with a pre-intrusion metamorphic fabric (Taconian?) but they experienced Acadian deformation. Twenty fractions of zircon and baddeleyite from three sample sites of gabbrodiorite spanning nearly 40 km yield a weighted 207Pb/206Pb age of 419 ?? 1 Ma. Greenschist-facies dikes, sampled over a strike distance of 35 km, were tholeiitic basalts formed by partial melting of asthenospheric mantle, with little or no influence from mantle or crustal lithosphere. The dike chemistry is similar to mid-ocean ridge, within-plate, and back-arc basin basalts. Parent magmas originated in the asthenosphere and were erupted through severely thinned lithosphere adjacent to the CVGT. Extensive middle Paleozoic basins in the internides of the Appalachian orogen are restricted to the Que??bec embayment of the Laurentian rifted margin, and include the CVGT and the Central Maine trough (CMT), separated from the BHA by a Silurian tectonic hinge. The NE-trending Comerford intrusions parallel the CVGT, CMT, and the tectonic hinge, and indicate NW-SE extension. During post-Taconian convergence, the irregular margins of composite Laurentia and Avalon permitted continued collision in Newfoundland (St. Lawrence promontory) and coeval extension in the Que??bec embayment. Extension may be related to hinge retreat of the northwest directed Brunswick subduction complex and rise of the asthenosphere following slab break-off. An alternative hypothesis is

  13. An international perspective on Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  14. The rheological behavior of fracture-filling cherts: example of Barite Valley dikes, Barberton Greenstone Belt, South Africa

    Science.gov (United States)

    Ledevin, M.; Arndt, N.; Simionovici, A.

    2014-05-01

    A 100 m-thick complex of near-vertical carbonaceous chert dikes marks the transition from the Mendon to Mapepe Formations (3260 Ma) in the Barberton Greenstone Belt, South Africa. Fracturing was intense in this area, as shown by the profusion and width of the dikes (ca. 1 m on average) and by the abundance of completely shattered rocks. The dike-and-sill organization of the fracture network and the upward narrowing of some of the large veins indicate that at least part of the fluid originated at depth and migrated upward in this hydrothermal plumbing system. Abundant angular fragments of silicified country rock are suspended and uniformly distributed within the larger dikes. Jigsaw-fit structures and confined bursting textures indicate that hydraulic fracturing was at the origin of the veins. The confinement of the dike system beneath an impact spherule bed suggests that the hydrothermal circulations were triggered by the impact and located at the external margin of a large crater. From the geometry of the dikes and the petrography of the cherts, we infer that the fluid that invaded the fractures was thixotropic. On one hand, the injection of black chert into extremely fine fractures is evidence for low viscosity at the time of injection; on the other hand, the lack of closure of larger veins and the suspension of large fragments in a chert matrix provide evidence of high viscosity soon thereafter. The inference is that the viscosity of the injected fluid increased from low to high as the fluid velocity decreased. Such rheological behavior is characteristic of media composed of solid and colloidal particles suspended in a liquid. The presence of abundant clay-sized, rounded particles of silica, carbonaceous matter and clay minerals, the high proportion of siliceous matrix and the capacity of colloidal silica to form cohesive 3-D networks through gelation, account for the viscosity increase and thixotropic behavior of the fluid that filled the veins. Stirring and

  15. How diking affects the longer-term structure and evolution of divergent plate boundaries

    KAUST Repository

    Trippanera, Daniele; Acocella, Valerio; Ruch, Joel; Rivalta, Eleonora

    2015-01-01

    Recurrent diking episodes along divergent plate boundaries, as at Dabbahu (2005, Afar) or at Bardarbunga (2014, Iceland) , highlight the possibility to have m-wide opening in a short time (days to weeks). This suggests a prominent role of magma

  16. Intensively exploited Mediterranean aquifers: resilience and proximity to critical points of seawater intrusion

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2013-11-01

    We investigate here seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta Aquifer, the Israel Coastal Aquifer and the Cyprus Akrotiri Aquifer. Using a generalized analytical sharp-interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future sea intrusion forcings. We identify two different critical limits of sea intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete sea intrusion upto the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that sea intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that the advance of seawater currently seriously threatens the Nile Delta Aquifer and the Israel Coastal Aquifer. The Cyprus Akrotiri Aquifer is currently somewhat less threatened by increased seawater intrusion.

  17. Intensively exploited Mediterranean aquifers: resilience to seawater intrusion and proximity to critical thresholds

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2014-05-01

    We investigate seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta, Israel Coastal and Cyprus Akrotiri aquifers. Using a generalized analytical sharp interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future seawater intrusion forcings. We identify two different critical limits of seawater intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete seawater intrusion up to the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that seawater intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that (a) the intruding seawater currently seriously threatens the Nile Delta aquifer, (b) in the Israel Coastal aquifer the sharp interface toe approaches the well location and (c) the Cyprus Akrotiri aquifer is currently somewhat less threatened by increased seawater intrusion.

  18. The Weakest Link : Spatial Variability in the Piping Failure Mechanism of Dikes

    NARCIS (Netherlands)

    Kanning, W.

    2012-01-01

    Piping is an important failure mechanism of flood defense structures. A dike fails due to piping when a head difference causes first the uplift of an inland blanket layer, and subsequently soil erosion due to a ground water flow. Spatial variability of subsoil parameters causes the probability of

  19. Computational neural network regression model for Host based Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Gautam

    2016-09-01

    Full Text Available The current scenario of information gathering and storing in secure system is a challenging task due to increasing cyber-attacks. There exists computational neural network techniques designed for intrusion detection system, which provide security to single machine and entire network's machine. In this paper, we have used two types of computational neural network models, namely, Generalized Regression Neural Network (GRNN model and Multilayer Perceptron Neural Network (MPNN model for Host based Intrusion Detection System using log files that are generated by a single personal computer. The simulation results show correctly classified percentage of normal and abnormal (intrusion class using confusion matrix. On the basis of results and discussion, we found that the Host based Intrusion Systems Model (HISM significantly improved the detection accuracy while retaining minimum false alarm rate.

  20. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    Science.gov (United States)

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. Paleointensity determination on Neoarchaean dikes within the Vodlozerskii terrane of the Karelian craton

    Science.gov (United States)

    Shcherbakova, V. V.; Lubnina, N. V.; Shcherbakov, V. P.; Zhidkov, G. V.; Tsel'movich, V. A.

    2017-09-01

    The results of paleomagnetic studies and paleointensity determinations from two Neoarchaean Shala dikes with an age of 2504 Ma, located within the Vodlozerskii terrane of the Karelian craton, are presented. The characteristic components of primary magnetization with shallow inclinations I = -5.7 and 1.9 are revealed; the reliability of the determinations is supported by two contact tests. High paleointensity values are obtained by the Thellier-Coe and Wilson techniques. The calculated values of the virtual dipole moment (11.5 and 13.8) × 1022 A m2 are noticeably higher than the present value of 7.8 × 1022 A m2. Our results, in combination with the previous data presented in the world database, support the hypothesized existence of a period of high paleointensity in the Late Archaean-Early Proterozoic.

  2. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  3. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  4. Comb-like optical transmission spectra generated from one-dimensional two-segment-connected two-material waveguide networks optimized by genetic algorithm

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Yu [MOE Key Laboratory of Laser Life Science and Institute of Laser Life Science, College of Biophotonics, South China Normal University, Guangzhou 510631 (China); Yang, Xiangbo, E-mail: xbyang@scnu.edu.cn [MOE Key Laboratory of Laser Life Science and Institute of Laser Life Science, College of Biophotonics, South China Normal University, Guangzhou 510631 (China); School of Physical Education and Sports Science, South China Normal University, Guangzhou 510006 (China); Lu, Jian; Zhang, Guogang [MOE Key Laboratory of Laser Life Science and Institute of Laser Life Science, College of Biophotonics, South China Normal University, Guangzhou 510631 (China); Liu, Chengyi Timon [School of Physical Education and Sports Science, South China Normal University, Guangzhou 510006 (China)

    2014-03-01

    In this Letter, a one-dimensional (1D) two-segment-connected two-material waveguide network (TSCTMWN) is designed to produce comb-like frequency passbands, where each waveguide segment is composed of normal and anomalous dispersion materials and the length ratio of sub-waveguide segments is optimized by genetic algorithm (GA). It is found that 66 comb-like frequency passbands are created in the second frequency unit, maximal relative width difference of which is less than 2×10{sup −5}. It may be useful for the designing of dense wavelength division multiplexings (DWDMs) and multi-channel filters, etc., and provide new applications for GA.

  5. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  6. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    Part of the stakeholder consultation addressed strategies that media audiences are developing to cope with pressures and intrusions in a changing media environment, characterised by digitalisation and interactive possibilities. We interviewed ten stakeholders representing interests such as content...... production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...... no consensual motivation, nor any clear avenue for action. Therefore, we have analysed different discursive positions that prevent acknowledging or taking action upon the pressures and intrusions that we presented to these stakeholders. The discursive positions are outlined below....

  7. Structure and Geochemistry of the Continental-Oceanic Crust Boundary of the Red Sea and the Rifted Margin of Western Arabia

    Science.gov (United States)

    Dilek, Y.; Furnes, H.; Schoenberg, R.

    2009-12-01

    The continental-oceanic crust boundary and an incipient oceanic crust of the Red Sea opening are exposed within the Arabian plate along a narrow zone of the Tihama Asir coastal plain in SW Saudi Arabia. Dike swarms, layered gabbros, granophyres and basalts of the 22 Ma Tihama Asir (TA) continental margin ophiolite represent products of magmatic differentiation formed during the initial stages of rifting between the African and Arabian plates. Nearly 4-km-wide zone of NW-trending sheeted dikes are the first products of mafic magmatism associated with incipient oceanic crust formation following the initial continental breakup. Gabbro intrusions are composed of cpx-ol-gabbro, cpx-gabbro, and norite/troctolite, and are crosscut by fine-grained basaltic dikes. Granophyre bodies intrude the sheeted dike swarms and are locally intrusive into the gabbros. Regional Bouger gravity anomalies suggest that the Miocene mafic crust represented by the TA complex extends westward beneath the coastal plain sedimentary rocks and the main trough of the Red Sea. The TA complex marks an incipient Red Sea oceanic crust that was accreted to the NE side of the newly formed continental rift in the earliest stages of seafloor spreading. Its basaltic to trachyandesitic lavas and dikes straddle the subalkaline-mildly alkaline boundary. Incompatible trace element relationships (e.g. Zr-Ti, Zr-P) indicate two distinct populations. The REE concentrations show an overall enrichment compared to N-MORB; light REEs are enriched over the heavy ones ((La/Yb)n > 1), pointing to an E-MORB influence. Nd-isotope data show ɛNd values ranging from +4 to +8, supporting an E-MORB melt source. The relatively large variations in ɛNd values also suggest various degrees of involvement of continental crust during ascent and emplacement, or by mixing of another mantle source.

  8. Coordinating with supply chain contracts in the presence of two different consumer segments

    NARCIS (Netherlands)

    Nalla, V.R.; Venugopal, V.; Veen, van der J.A.A.

    2007-01-01

    This paper models a supply chain of a manufacturer, a retailer and two different consumer segments. One segment has a high willingness-to-pay and the other a low willingness-to-pay. The manufacturer decides on the wholesale price and the selling price is determined by the retailer. It is well known

  9. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  10. Ring faults and ring dikes around the Orientale basin on the Moon.

    Science.gov (United States)

    Andrews-Hanna, Jeffrey C; Head, James W; Johnson, Brandon; Keane, James T; Kiefer, Walter S; McGovern, Patrick J; Neumann, Gregory A; Wieczorek, Mark A; Zuber, Maria T

    2018-08-01

    The Orientale basin is the youngest and best-preserved multiring impact basin on the Moon, having experienced only modest modification by subsequent impacts and volcanism. Orientale is often treated as the type example of a multiring basin, with three prominent rings outside of the inner depression: the Inner Rook Montes, the Outer Rook Montes, and the Cordillera. Here we use gravity data from NASA's Gravity Recovery and Interior Laboratory (GRAIL) mission to reveal the subsurface structure of Orientale and its ring system. Gradients of the gravity data reveal a continuous ring dike intruded into the Outer Rook along the plane of the fault associated with the ring scarp. The volume of this ring dike is ~18 times greater than the volume of all extrusive mare deposits associated with the basin. The gravity gradient signature of the Cordillera ring indicates an offset along the fault across a shallow density interface, interpreted to be the base of the low-density ejecta blanket. Both gravity gradients and crustal thickness models indicate that the edge of the central cavity is shifted inward relative to the equivalent Inner Rook ring at the surface. Models of the deep basin structure show inflections along the crust-mantle interface at both the Outer Rook and Cordillera rings, indicating that the basin ring faults extend from the surface to at least the base of the crust. Fault dips range from 13-22° for the Cordillera fault in the northeastern quadrant, to 90° for the Outer Rook in the northwestern quadrant. The fault dips for both outer rings are lowest in the northeast, possibly due to the effects of either the direction of projectile motion or regional gradients in pre-impact crustal thickness. Similar ring dikes and ring faults are observed around the majority of lunar basins.

  11. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  12. Two-Segment Foot Model for the Biomechanical Analysis of Squat.

    Science.gov (United States)

    Panero, E; Gastaldi, L; Rapp, W

    2017-01-01

    Squat exercise is acquiring interest in many fields, due to its benefits in improving health and its biomechanical similarities to a wide range of sport motions and the recruitment of many body segments in a single maneuver. Several researches had examined considerable biomechanical aspects of lower limbs during squat, but not without limitations. The main goal of this study focuses on the analysis of the foot contribution during a partial body weight squat, using a two-segment foot model that considers separately the forefoot and the hindfoot. The forefoot and hindfoot are articulated by the midtarsal joint. Five subjects performed a series of three trials, and results were averaged. Joint kinematics and dynamics were obtained using motion capture system, two force plates closed together, and inverse dynamics techniques. The midtarsal joint reached a dorsiflexion peak of 4°. Different strategies between subjects revealed 4° supination and 2.5° pronation of the forefoot. Vertical GRF showed 20% of body weight concentrated on the forefoot and 30% on the hindfoot. The percentages varied during motion, with a peak of 40% on the hindfoot and correspondently 10% on the forefoot, while the traditional model depicted the unique constant 50% value. Ankle peak of plantarflexion moment, power absorption, and power generation was consistent with values estimated by the one-segment model, without statistical significance.

  13. Two-Segment Foot Model for the Biomechanical Analysis of Squat

    Directory of Open Access Journals (Sweden)

    E. Panero

    2017-01-01

    Full Text Available Squat exercise is acquiring interest in many fields, due to its benefits in improving health and its biomechanical similarities to a wide range of sport motions and the recruitment of many body segments in a single maneuver. Several researches had examined considerable biomechanical aspects of lower limbs during squat, but not without limitations. The main goal of this study focuses on the analysis of the foot contribution during a partial body weight squat, using a two-segment foot model that considers separately the forefoot and the hindfoot. The forefoot and hindfoot are articulated by the midtarsal joint. Five subjects performed a series of three trials, and results were averaged. Joint kinematics and dynamics were obtained using motion capture system, two force plates closed together, and inverse dynamics techniques. The midtarsal joint reached a dorsiflexion peak of 4°. Different strategies between subjects revealed 4° supination and 2.5° pronation of the forefoot. Vertical GRF showed 20% of body weight concentrated on the forefoot and 30% on the hindfoot. The percentages varied during motion, with a peak of 40% on the hindfoot and correspondently 10% on the forefoot, while the traditional model depicted the unique constant 50% value. Ankle peak of plantarflexion moment, power absorption, and power generation was consistent with values estimated by the one-segment model, without statistical significance.

  14. Uncertainty assessment of a dike with an anchored sheet pile wall using FEM

    NARCIS (Netherlands)

    Rippi, Aikaterini; Nuttall, Jonathan; Teixeira, Ana; Schweckendiek, T.; Lang, M.; Klijn, F.; Samuels, P.

    2016-01-01

    The Dutch design codes for the dikes with retaining walls rely on Finite Element Analysis (FEM) in combination with partial safety factors. However, this can lead to conservative designs. For this reason, in this study, a reliability analysis is carried out with FEM calculations aiming to

  15. A transitional alkalic dolerite dike suite of Mesozoic age in Southeastern New England

    Science.gov (United States)

    Hermes, O. Don; Rao, J. M.; Dickenson, M. P.; Pierce, T. A.

    1984-12-01

    Dike rocks from the New England platform of Rhode Island and adjacent Massachusetts consist of premetamorphic and post-metamorphic suites. The older group includes metamorphosed dolerite, minette, and schistose dioritic rocks. Post-metamorphic dikes consist of dolerite and sparse monchiquite. The post-metamorphic dolerites are of comparable age to the Eastern North American dolerite suite associated with the Mesozoic basins along the eastern seaboard of North America. However, the southeastern New England dolerites exhibit mineralogy and chemistry more typical of a transitional alkalic suite compared to the more subalkalic tholeiitic dolerites of the Eastern North American suite. Both suites are compatible with a rift tectonic setting, but the more alkalic dolerites may represent a deeper source of small volume melts compared to the Eastern North American dolerites. These more alkaline melts may have concentrated at local centers, or they may be typical of flank dolerites as opposed to the less alkalic varieties that occur within the central axial rift.

  16. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  17. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    International Conference on Computational Intelligence and Natural Computing, volume 2, pages 413–416, June 2009. • Rung Ching Chen, Kai -Fan Cheng, and...Chia-Fen Hsieh . “Using rough set and support vector machine for network intrusion detection.” International Journal of Network Security & Its...intrusion detection using FP tree rules.” Journal Of Advanced Networking and Applications, 1(1):30–39, 2009. • Ming-Yang Su, Gwo-Jong Yu , and Chun-Yuen

  18. Time, space, and composition relations among northern Nevada intrusive rocks and their metallogenic implications

    Science.gov (United States)

    duBray, E.A.

    2007-01-01

    Northern Nevada contains ∼360 igneous intrusions subequally distributed among three age groups: middle Tertiary, Cretaceous, and Jurassic. These intrusions are dominantly granodiorite and monzogranite, although some are more mafic. Major-oxide and trace-element compositions of intrusion age groups are remarkably similar, forming compositional arrays that are continuous, overlapping, and essentially indistinguishable. Within each age group, compositional diversity is controlled by a combination of fractional crystallization and two-component mixing. Mafic intrusions represent mixing of mantle-derived magma and assimilated continental crust, whereas intermediate to felsic intrusions evolved by fractional crystallization. Several petrologic parameters suggest that the northern Nevada intrusion age groups formed in a variety of subduction-related, magmatic arc settings: Jurassic intrusions were likely formed during backarc, slab-window magmatism related to breakoff of the Mezcalera plate; Cretaceous magmatism was related to rapid, shallow subduction of the Farallon plate and consequent inboard migration of arc magmatism; and Tertiary magmatism initially swept southward into northern Nevada in response to foundering of the Farallon plate and was followed by voluminous Miocene bimodal magmatism associated with backarc continental rifting.

  19. From intrusive to oscillating thoughts.

    Science.gov (United States)

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  20. Petrology, geochemistry, and tectonic setting of Tertiary volcanic and intrusive rocks in the north of Shahr-e-Firouzeh (northeast of Iran)

    International Nuclear Information System (INIS)

    Malekzadeh Shafaroudi, A.; Karimpour, M. H.; Zarei, A.

    2016-01-01

    The study area is located in 15 km of the north of Shahr-e-Firouzeh in Khorasan Razavi province. The area is situated in the southeast of Quchan-Sabzevar arc magmatic. Lithology of the district includes dacitic lavas, which are intruded by Oligocene porphyritic hornblende granodioritic stock and granodioritic dike as subvolcanic and plutonic rocks. Igneous rocks were overlapped by younger sedimentary rocks. The texture of dacitic unit is porphyric to glomeroporphic with flow groundmass. Quartz, plagioclase, K-feldspar, and hornblende are the main minerals. The texture of hornblende granodiorite porphyry is porphyric to glomeroporphic and plagioclase, K-feldspar, hornblende, and quartz are the common minerals, whereas granodiorite unit is granular and hornblende is not present. Based on geochemical studies, the acidic volcanic and intrusive rocks show metaluminous and medium-K nature. These rocks belong to the I-type granitoid. Enrichment of LREE versus HREE and enrichment of LILE and depletion in HFSE indicate magma formed in subduction zone. The melt originated from partial melting of amphibolite with 10 to 25% garnet. Based on the average amount of major oxides, enrichment of LREE, mostly positive Eu anomaly, high Sr (up to 499 ppm), and low Y (<13 ppm) and Yb (<1.4 ppm) contents, the magma show silica-rich adakitic nature. The intrusive and volcanic rocks of the northern Shahr-e-Firouzeh were generated by partial melting of Sabzevar Neotethyan young and hot subducted oceanic crust and mantle wedge in the continental margin of the Turan plate.

  1. Joint Segmentation of Multiple Thoracic Organs in CT Images with Two Collaborative Deep Architectures.

    Science.gov (United States)

    Trullo, Roger; Petitjean, Caroline; Nie, Dong; Shen, Dinggang; Ruan, Su

    2017-09-01

    Computed Tomography (CT) is the standard imaging technique for radiotherapy planning. The delineation of Organs at Risk (OAR) in thoracic CT images is a necessary step before radiotherapy, for preventing irradiation of healthy organs. However, due to low contrast, multi-organ segmentation is a challenge. In this paper, we focus on developing a novel framework for automatic delineation of OARs. Different from previous works in OAR segmentation where each organ is segmented separately, we propose two collaborative deep architectures to jointly segment all organs, including esophagus, heart, aorta and trachea. Since most of the organ borders are ill-defined, we believe spatial relationships must be taken into account to overcome the lack of contrast. The aim of combining two networks is to learn anatomical constraints with the first network, which will be used in the second network, when each OAR is segmented in turn. Specifically, we use the first deep architecture, a deep SharpMask architecture, for providing an effective combination of low-level representations with deep high-level features, and then take into account the spatial relationships between organs by the use of Conditional Random Fields (CRF). Next, the second deep architecture is employed to refine the segmentation of each organ by using the maps obtained on the first deep architecture to learn anatomical constraints for guiding and refining the segmentations. Experimental results show superior performance on 30 CT scans, comparing with other state-of-the-art methods.

  2. Intrusive thoughts in obsessive-compulsive disorder and eating disorder patients: a differential analysis.

    Science.gov (United States)

    García-Soriano, Gemma; Roncero, Maria; Perpiñá, Conxa; Belloch, Amparo

    2014-05-01

    The present study aims to compare the unwanted intrusions experienced by obsessive-compulsive (OCD) and eating disorder (ED) patients, their appraisals, and their control strategies and analyse which variables predict the intrusions' disruption and emotional disturbance in each group. Seventy-nine OCD and 177 ED patients completed two equivalent self-reports designed to assess OCD-related and ED-related intrusions, their dysfunctional appraisals, and associated control strategies. OCD and ED patients experienced intrusions with comparable frequency and emotional disturbance, but OCD patients experienced greater disruption. Differences appeared between groups on some appraisals and control strategies. Intolerance to uncertainty (OCD group) and thought importance (ED group) predicted their respective emotional disturbance and disruption. Additionally, control importance (OCD group) and thought-action fusion moral (OCD and ED groups) predicted their emotional disturbance. OCD and ED share the presence of intrusions; however, different variables explain why they are disruptive and emotionally disturbing. Cognitive intrusions require further investigation as a transdiagnostic variable. Copyright © 2014 John Wiley & Sons, Ltd and Eating Disorders Association.

  3. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  4. QOS and Control-Theoretic Techniques for Intrusion Tolerance

    National Research Council Canada - National Science Library

    Ye, Nong

    2004-01-01

    ...), even in the face of intrusions. This report examines two host-based resources, a router and a web server, and presents simulated models of modifications that can be made to these resources to make them QoS-capable...

  5. Timing of mafic magmatism in the Tapajós Province (Brazil) and implications for the evolution of the Amazon Craton: evidence from baddeleyite and zircon U Pb SHRIMP geochronology

    Science.gov (United States)

    Santos, João Orestes Schneider; Hartmann, Léo Afraneo; McNaughton, Neal Jesse; Fletcher, Ian Robert

    2002-09-01

    The precise timing and possible sources of the mafic rocks in the Amazon craton are critical for reconstruction of the Atlantica supercontinent and correlation of mafic magmatism worldwide. New SHRIMP U-Pb baddeleyite and zircon ages and the reinterpretation of 207 existing dates indicate one orogenic (Ingarana) and four postorogenic (Crepori, Cachoeira Seca, Piranhas, and Periquito) basaltic events in the Tapajós Province, south central Amazon craton. Orogenic gabbro dikes that host gold mineralization are 1893 Ma and interpreted as associated with the Ingarana gabbro intrusions of the bimodal calk-alkalic Parauari intrusive suite. The age of 1893 Ma can be used as a guide to discriminate older and mineralized orogenic dikes from younger and nonmineralized Crepori- and Cachoeira Seca-related mafic dikes. The baddeleyite U-Pb age of the postorogenic Crepori dolerite (gabbro-dolerite sills and dikes) is 1780±9 Ma, ˜150 my older than the ages provided by K-Ar. This value correlates well with the Avanavero tholeiitic intrusions in the Roraima group, in the northern part of the craton in Guyana, Venezuela, and Roraima in Brazil. Early Statherian tholeiitic magmatism was widespread not only in the Amazon craton, but also in the La Plata craton of southern South America, where it is known as the giant Piedra Alta swarm of Uruguay and the post-Trans-Amazonian dikes of Tandil in Argentina. The Cachoeira Seca troctolite represents laccoliths, Feixes, and São Domingos, whose baddeleyite U-Pb age is 1186±12 Ma, 120-150 my older than the known K-Ar ages. This age is comparable to other Stenian gabbroic rocks with alkalic affinity in the craton, such as the Seringa Formation in NE Amazonas and the basaltic flows of the Nova Floresta formation in Rondônia. Dolerite from the giant Piranhas dike swarm in the western Tapajós Province has a Middle Cambrian age (507±4 Ma, baddeleyite) and inherited zircons in the 2238-1229 Ma range. The Piranhas dikes fill extensional NNE and

  6. Growth of plutons by incremental emplacement of sheets in crystal-rich host: Evidence from Miocene intrusions of the Colorado River region, Nevada, USA

    Science.gov (United States)

    Miller, C.F.; Furbish, D.J.; Walker, B.A.; Claiborne, L.L.; Koteas, G.C.; Bleick, H.A.; Miller, J.S.

    2011-01-01

    Growing evidence supports the notion that plutons are constructed incrementally, commonly over long periods of time, yet field evidence for the multiple injections that seem to be required is commonly sparse or absent. Timescales of up to several million years, among other arguments, indicate that the dominant volume does not remain largely molten, yet if growing plutons are constructed from rapidly solidifying increments it is unlikely that intrusive contacts would escape notice. A model wherein magma increments are emplaced into melt-bearing but crystal-rich host, rather than either solid or crystal-poor material, provides a plausible explanation for this apparent conundrum. A partially solidified intrusion undoubtedly comprises zones with contrasting melt fraction and therefore strength. Depending on whether these zones behave elastically or ductilely in response to dike emplacement, intruding magma may spread to form sheets by either of two mechanisms. If the melt-bearing host is elastic on the relevant timescale, magma spreads rather than continuing to propagate upward, where it encounters a zone of higher rigidity (higher crystal fraction). Similarly, if the dike at first ascends through rigid, melt-poor material and then encounters a zone that is weak enough (poor enough in crystals) to respond ductilely, the ascending material will also spread because the dike tip ceases to propagate as in rigid material. We propose that ascending magma is thus in essence trapped, by either mechanism, within relatively crystal-poor zones. Contacts will commonly be obscure from the start because the contrast between intruding material (crystal-poorer magma) and host (crystal-richer material) is subtle, and they may be obscured even further by subsequent destabilization of the crystal-melt framework. Field evidence and zircon zoning stratigraphy in plutons of the Colorado River region of southern Nevada support the hypothesis that emplacement of magma replenishments into a

  7. Wind turbines along highways and on the dikes Houtribdijk and Afsluitdijk in the Netherlands. Windmolens langs autosnelwegen en op de waterkeringen Houtribdijk en Afsluitdijk

    Energy Technology Data Exchange (ETDEWEB)

    Johanson, J C.P.; Meesters, H J.N.

    1993-10-29

    Attention is paid to the safety, control and maintenance of dikes with regard to the placing of wind turbines on the dikes, as mentioned in the title. Also the possible damage to the bird population and the visual impact of wind turbines are dealt with. 5 refs.

  8. IJsselmij realises Europe's largest windfarm (7,5 MW) on the dike of the Noordoostpolder

    Energy Technology Data Exchange (ETDEWEB)

    Paes, H F; Nauta, Y

    1988-01-01

    IJsselmij is an energy distribution company in the eastern part of the Netherlands. The company realized in 1987 a 7.5 MW windfarm along the IJsselmeer-dike north of Urk village. The windfarm, erected in the Noordoostpolder at the inside of the dike, consists of 25 wind turbines with a rotordiameter of 25 meters and a rated power of 300 kW each. The total investment will be 23 million Dutch guilders. Successively the following items with regard to the project are discussed: selection of the location for the wind turbines; construction of the foundations; description of the wind turbines; the electric connection of the wind turbine transformers to the grid; the data-communication system which consists of the wind turbine computer and the central computer in the control building; financial-economical aspects and aspects on sound and birds. Finally technical specifications of the windfarm are given. 6 figs., 1 ref.

  9. Late Triassic Porphyritic Intrusions And Associated Volcanic Rocks From The Shangri-La Region, Yidun Terrane, Eastern Tibetan Plateau: Implications For Adakitic Magmatism And Porphyry Copper Mineralization

    Science.gov (United States)

    Wang, B.; Zhou, M.; Li, J.; Yan, D.

    2011-12-01

    The Yidun terrane, located on the eastern margin of the Tibetan plateau, has been commonly considered to be a Triassic volcanic arc produced by subduction of the Ganzi-Litang oceanic lithosphere. The Yidun terrane is characterized by numerous arc-affinity granitic intrusions located along a 500-km-long, north-south-trending belt. Among these granitic bodies, several small porphyritic intrusions in the southern segment of the terrane (Shangri-La region) are associated with large porphyry copper deposits. These porphyritc intrusions are composed of diorite and quartz diorite, and spatially associated with andesites and dacites. LA-ICP-MS zircon U-Pb ages of the intrusions range from 230 to 215 Ma. The andesites and dacites are intercalated with slates and sandstones and have ages of around 220 Ma. The intrusive and volcanic rocks have SiO2 contents from 56.6 to 67.1 wt.%, Al2O3 from 14.2 to 17.4 wt.% and MgO from 1.9 to 4.2 wt.%. They show significant negative Nb-Ta anomalies on primitive mantle-normalized spidergrams. They have high La/Yb (13-49) ratios with no prominent Eu anomalies. All the rocks have high Sr (258-1980 ppm), and low Y (13-21 ppm) with high Sr/Y ratios (29-102). The geochemical features indicate that both the volcanic rocks and porphyritic intrusions were derived from adakitic magmas. They have similar initial 87Sr/86Sr ratios (0.7058 to 0.7077) and ɛNd (-1.88 to -4.93) values, but can be further divided into two groups: high silica (HSA) and low silica adakitic rocks (LSA). The HSA, representing an early stage of magmatism (230 to 215 Ma), were derived from oceanic slab melts with limited interaction with the overlying mantle wedge. At 215 Ma, more extensive interaction resulted in the formation of LSA. We propose that HSA were produced by flat subduction leading to melting of oceanic slab, whereas subsequent slab break-off caused the significant interaction between slab melts and the mantle wedge and thus the generation of the LSA. Compared with

  10. Extension parallel to the rift zone during segmented fault growth: application to the evolution of the NE Atlantic

    Directory of Open Access Journals (Sweden)

    A. Bubeck

    2017-11-01

    Full Text Available The mechanical interaction of propagating normal faults is known to influence the linkage geometry of first-order faults, and the development of second-order faults and fractures, which transfer displacement within relay zones. Here we use natural examples of growth faults from two active volcanic rift zones (Koa`e, island of Hawai`i, and Krafla, northern Iceland to illustrate the importance of horizontal-plane extension (heave gradients, and associated vertical axis rotations, in evolving continental rift systems. Second-order extension and extensional-shear faults within the relay zones variably resolve components of regional extension, and components of extension and/or shortening parallel to the rift zone, to accommodate the inherently three-dimensional (3-D strains associated with relay zone development and rotation. Such a configuration involves volume increase, which is accommodated at the surface by open fractures; in the subsurface this may be accommodated by veins or dikes oriented obliquely and normal to the rift axis. To consider the scalability of the effects of relay zone rotations, we compare the geometry and kinematics of fault and fracture sets in the Koa`e and Krafla rift zones with data from exhumed contemporaneous fault and dike systems developed within a > 5×104 km2 relay system that developed during formation of the NE Atlantic margins. Based on the findings presented here we propose a new conceptual model for the evolution of segmented continental rift basins on the NE Atlantic margins.

  11. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  12. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  13. Intrusive trauma memory: A review and functional analysis

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.; Holmes, E.A.

    2009-01-01

    Our contribution to this special issue focuses on the phenomenon of intrusive trauma memory. While intrusive trauma memories can undoubtedly cause impairment, we argue that they may exist for a potentially adaptive reason. Theory and experimental research on intrusion development are reviewed and

  14. Comparison of invasive and non-invasive electromagnetic methods in soil water content estimation of a dike model

    International Nuclear Information System (INIS)

    Preko, Kwasi; Scheuermann, Alexander; Wilhelm, Helmut

    2009-01-01

    Water infiltration through a dike model under controlled flooding and drainage conditions was investigated using the gravimetric soil water sampling technique and electromagnetic techniques, in particular ground penetrating radar (GPR) applied in different forms, time domain reflectometry with intelligent microelements (TRIME-TDR) and spatial-time domain reflectometry (S-TDR). The experiments were conducted on the model in two phases. In the first phase, the model was flooded with varying water levels between 0 and 1.25 m above the waterproof base of the model. In the second phase, the characteristics of the temporal water content changes were investigated over a period of 65 days as the flood water drained off from the 1.25 m level. The dike model was constructed with soil of the texture class loamy sand. The aim of the experiment was to investigate whether GPR-based invasive and non-invasive methods were able to quantitatively observe and correctly monitor temporal changes in the volumetric water content (VWC) within embankment dams. The VWC values from the various techniques corresponded very well, especially with low VWC values. A comparison with the VWC of gravimetric soil water sampling showed a satisfactory reproducibility. Characteristic discrepancies were recorded with higher values of the VWC. Under saturated conditions only the invasive methods were able to produce reasonable values of the VWC. After the release of the highest flood level, the drainage phase could be characterized by two invasive methods based on the TDR and GPR techniques

  15. Magma sources during Gondwana breakup: chemistry and chronology of Cretaceous magmatism in Westland, New Zealand

    DEFF Research Database (Denmark)

    van der Meer, Quinten Har Adriaan; Waight, Tod Earle; Scott, James M.

    2013-01-01

    by emplacement of granitoid plutons, the deposition of terrestrial Pororari Group sediments in extensional half-grabens across on- and offshore Westland, and the intrusion of mafic dikes from 90 Ma. These dikes are concentrated in the swarms of the Paparoa and Hohonu Ranges and were intruded prior...... to and simultaneous with volumetrically minor A-type plutonism at 82 Ma. The emplacement of mafic dikes and A-type plutonism at 82 Ma is significant as it coincides with the age of the oldest seafloor in the Tasman Sea, therefore it represents magmatism coincident with the initiation of seafloor spreading which...

  16. THE PALEOPROTEROZOIC IMANDRA-VARZUGA RIFTING STRUCTURE (KOLA PENINSULA: INTRUSIVE MAGMATISM AND MINERAGENY

    Directory of Open Access Journals (Sweden)

    V. V. Chashchin

    2014-01-01

    Full Text Available The article provides data on the structure of the Paleoproterozoic intercontinental Imandra-Varzuga rifting structure (IVS and compositions of intrusive formations typical of the early stage of the IVS development and associated mineral resources. IVS is located in the central part of the Kola region. Its length is about 350 km, and its width varies from 10 km at the flanks to 50 km in the central part. IVS contains an association of the sedimentary-volcanic, intrusive and dyke complexes. It is a part of a large igneous Paleoproterozoic province of the Fennoscandian Shield spreading for a huge area (about 1 million km2, which probably reflects the settings of the head part of the mantle plume. Two age groups of layered intrusions were associated with the initial stage of the IVS development. The layered intrusions of the Fedorovo-Pansky and Monchegorsk complexes (about 2.50 Ga are confined to the northern flank and the western closure of IVS, while intrusions of the Imandra complex (about 2.45 Ga are located at the southern flank of IVS. Intrusions of older complexes are composed of rock series from dunite to gabbro and anorthosites (Monchegorsk complex and from orthopyroxenite to gabbro and anorthosites (Fedorovo-Pansky complex. Some intrusions of this complexes reveal features of multiphase ones. The younger Imandra complex intrusions (about 2.45 Ga are stratified from orthopyroxenite to ferrogabbro. Their important feature is comagmatical connection with volcanites. All the intrusive complexes have the boninite-like mantle origin enriched by lithophyle components. Rocks of these two complexеs with different age have specific geochemical characteristics. In the rocks of the Monchegorsk and Fedorovo-Pansky complexes, the accumulation of REE clearly depends on the basicity of the rocks, the spectrum of REE is non-fractionated and ‘flat’, and the Eu positive anomaly is slightly manifested. In the rocks of the Imandra complex, the level of

  17. A two-stage method for microcalcification cluster segmentation in mammography by deformable models

    International Nuclear Information System (INIS)

    Arikidis, N.; Kazantzi, A.; Skiadopoulos, S.; Karahaliou, A.; Costaridou, L.; Vassiou, K.

    2015-01-01

    Purpose: Segmentation of microcalcification (MC) clusters in x-ray mammography is a difficult task for radiologists. Accurate segmentation is prerequisite for quantitative image analysis of MC clusters and subsequent feature extraction and classification in computer-aided diagnosis schemes. Methods: In this study, a two-stage semiautomated segmentation method of MC clusters is investigated. The first stage is targeted to accurate and time efficient segmentation of the majority of the particles of a MC cluster, by means of a level set method. The second stage is targeted to shape refinement of selected individual MCs, by means of an active contour model. Both methods are applied in the framework of a rich scale-space representation, provided by the wavelet transform at integer scales. Segmentation reliability of the proposed method in terms of inter and intraobserver agreements was evaluated in a case sample of 80 MC clusters originating from the digital database for screening mammography, corresponding to 4 morphology types (punctate: 22, fine linear branching: 16, pleomorphic: 18, and amorphous: 24) of MC clusters, assessing radiologists’ segmentations quantitatively by two distance metrics (Hausdorff distance—HDIST cluster , average of minimum distance—AMINDIST cluster ) and the area overlap measure (AOM cluster ). The effect of the proposed segmentation method on MC cluster characterization accuracy was evaluated in a case sample of 162 pleomorphic MC clusters (72 malignant and 90 benign). Ten MC cluster features, targeted to capture morphologic properties of individual MCs in a cluster (area, major length, perimeter, compactness, and spread), were extracted and a correlation-based feature selection method yielded a feature subset to feed in a support vector machine classifier. Classification performance of the MC cluster features was estimated by means of the area under receiver operating characteristic curve (Az ± Standard Error) utilizing tenfold cross

  18. Petrogenesis of Early Cretaceous dioritic dikes in the Shanyang-Zhashui area, South Qinling, central China: Evidence for partial melting of thickened lower continental crust

    Science.gov (United States)

    Chen, Lei; Yan, Zhen; Wang, Zongqi; Wang, Kunming

    2018-06-01

    The dioritic dikes distributed in the Shanyang-Zhashui area of the South Qinling region play an important role in understanding the deep magmatic processes and tectonic evolution during the orogenic process. The zircon Usbnd Pb ages of the dioritic dikes indicate that they were emplaced at ∼144 Ma and therefore postdate the dikes that formed in the intracontinental orogenic background after the continental collision between the North China Block (NCB) and the South China Block (SCB). The dioritic dikes have SiO2 contents of 56.86-64.93 wt%; K2O contents of 1.65-3.21 wt%; low MgO (1.50-2.66 wt%), Y (14.4-25.5 ppm) and heavy rare earth element (HREE) contents; low Mg# values (39.9-49); high Sr contents (528-4833 ppm); and high Sr/Y ratios (32.8-189). They exhibit highly fractionated REE and flat HREE patterns, strong enrichment in large ion lithophile elements (LILEs; e.g., Rb, Ba, and U) and depletion in high field strength elements (HFSEs) (e.g., Nb), as well as positive Sr and negative Ti anomalies. Furthermore, these dioritic dikes exhibit (87Sr/86Sr)i ratios ranging from 0.7048 to 0.7083, εNd(t) values ranging from -3.3 to -1.4, and εHf(t) values ranging from -4.1 to 1.6. The geochemical patterns of the dioritic dikes indicate that they possess adakitic characteristics. Moreover, the low MgO contents, Mg# values, Ni contents, Th/Ce ratios, and Srsbnd Ndsbnd Hf isotopic features all indicate that these dioritic dikes were generated by the partial melting of thickened mafic lower crust. The high La/Yb and Sr/Y ratios, low Y and Yb contents, absence of significant Eu anomalies, flat HREE patterns, and low Nb/Ta ratios of these rocks suggest that the adakitic melts were derived from the melting of garnet-bearing amphibolite. The geochronologic, elemental and isotopic evidence suggests that the dioritic dikes may have formed in a locally extensional environment within an overall N-S compressional setting or during the transition from compressional to extensional

  19. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  20. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  1. Rapid laccolith intrusion driven by explosive volcanic eruption.

    Science.gov (United States)

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  2. Fracturing of doleritic intrusions and associated contact zones: Implications for fluid flow in volcanic basins

    Science.gov (United States)

    Senger, Kim; Buckley, Simon J.; Chevallier, Luc; Fagereng, Åke; Galland, Olivier; Kurz, Tobias H.; Ogata, Kei; Planke, Sverre; Tveranger, Jan

    2015-02-01

    Igneous intrusions act as both carriers and barriers to subsurface fluid flow and are therefore expected to significantly influence the distribution and migration of groundwater and hydrocarbons in volcanic basins. Given the low matrix permeability of igneous rocks, the effective permeability in- and around intrusions is intimately linked to the characteristics of their associated fracture networks. Natural fracturing is caused by numerous processes including magma cooling, thermal contraction, magma emplacement and mechanical disturbance of the host rock. Fracturing may be locally enhanced along intrusion-host rock interfaces, at dyke-sill junctions, or at the base of curving sills, thereby potentially enhancing permeability associated with these features. In order to improve our understanding of fractures associated with intrusive bodies emplaced in sedimentary host rocks, we have investigated a series of outcrops from the Karoo Basin of the Eastern Cape province of South Africa, where the siliciclastic Burgersdorp Formation has been intruded by various intrusions (thin dykes, mid-sized sheet intrusions and thick sills) belonging to the Karoo dolerite. We present a quantified analysis of fracturing in- and around these igneous intrusions based on five outcrops at three individual study sites, utilizing a combination of field data, high-resolution lidar virtual outcrop models and image processing. Our results show a significant difference between the three sites in terms of fracture orientation. The observed differences can be attributed to contrasting intrusion geometries, outcrop geometry (for lidar data) and tectonic setting. Two main fracture sets were identified in the dolerite at two of the sites, oriented parallel and perpendicular to the contact respectively. Fracture spacing was consistent between the three sites, and exhibits a higher degree of variation in the dolerites compared to the host rock. At one of the study sites, fracture frequency in the

  3. Abstracting massive data for lightweight intrusion detection in computer networks

    KAUST Repository

    Wang, Wei

    2016-10-15

    Anomaly intrusion detection in big data environments calls for lightweight models that are able to achieve real-time performance during detection. Abstracting audit data provides a solution to improve the efficiency of data processing in intrusion detection. Data abstraction refers to abstract or extract the most relevant information from the massive dataset. In this work, we propose three strategies of data abstraction, namely, exemplar extraction, attribute selection and attribute abstraction. We first propose an effective method called exemplar extraction to extract representative subsets from the original massive data prior to building the detection models. Two clustering algorithms, Affinity Propagation (AP) and traditional . k-means, are employed to find the exemplars from the audit data. . k-Nearest Neighbor (k-NN), Principal Component Analysis (PCA) and one-class Support Vector Machine (SVM) are used for the detection. We then employ another two strategies, attribute selection and attribute extraction, to abstract audit data for anomaly intrusion detection. Two http streams collected from a real computing environment as well as the KDD\\'99 benchmark data set are used to validate these three strategies of data abstraction. The comprehensive experimental results show that while all the three strategies improve the detection efficiency, the AP-based exemplar extraction achieves the best performance of data abstraction.

  4. Bookshelf faulting and transform motion between rift segments of the Northern Volcanic Zone, Iceland

    Science.gov (United States)

    Green, R. G.; White, R. S.; Greenfield, T. S.

    2013-12-01

    Plate spreading is segmented on length scales from 10 - 1,000 kilometres. Where spreading segments are offset, extensional motion has to transfer from one segment to another. In classical plate tectonics, mid-ocean ridge spreading centres are offset by transform faults, but smaller 'non-transform' offsets exist between slightly overlapping spreading centres which accommodate shear by a variety of geometries. In Iceland the mid-Atlantic Ridge is raised above sea level by the Iceland mantle plume, and is divided into a series of segments 20-150 km long. Using microseismicity recorded by a temporary array of 26 three-component seismometers during 2009-2012 we map bookshelf faulting between the offset Askja and Kverkfjöll rift segments in north Iceland. The micro-earthquakes delineate a series of sub-parallel strike-slip faults. Well constrained fault plane solutions show consistent left-lateral motion on fault planes aligned closely with epicentral trends. The shear couple across the transform zone causes left-lateral slip on the series of strike-slip faults sub-parallel to the rift fabric, causing clockwise rotations about a vertical axis of the intervening rigid crustal blocks. This accommodates the overall right-lateral transform motion in the relay zone between the two overlapping volcanic rift segments. The faults probably reactivated crustal weaknesses along the dyke intrusion fabric (parallel to the rift axis) and have since rotated ˜15° clockwise into their present orientation. The reactivation of pre-existing rift-parallel weaknesses is in contrast with mid-ocean ridge transform faults, and is an important illustration of a 'non-transform' offset accommodating shear between overlapping spreading segments.

  5. Preliminary study of the uranium favorability of Mesozoic intrusive and Tertiary volcanic and sedimentary rocks of the Central Mojave Desert, Kern and San Bernardino counties, California

    International Nuclear Information System (INIS)

    Leedom, S.H.; Kiloh, K.D.

    1978-02-01

    Numerous, small, low-grade, supergene uranium deposits are found in Tertiary volcanic and sedimentary rocks in the central Mojave Desert of southern California. Large thorium-to-uranium ratios in samples of Mesozoic intrusive rocks exposed in the area indicate that these rocks have been extensively weathered, eroded, and subsequently leached by ground waters, and that they may have been the primary source of uranium for the deposits. The uranium content of samples of volcanic intrusive and extrusive rocks is average for intermediate to silicic rocks, but samples of basalt flows in the area contain six times the average uranium content of mafic igneous rocks. Devitrified tuffs and tuffaceous sedimentary rocks, interbedded with calcareous units, are additional sources of uranium for supergene uranium deposits found in calcareous units. Uranium is also found in accessory minerals in a few Mesozoic quartz-rich pegmatite dikes. Uranium deposits in the central Mojave Desert have been formed by enrichment during diagenetic replacement of Tertiary carbonate rocks; by supergene enrichment along fractures, joints, and bedding planes in Tertiary volcanic and sedimentary rocks; during formation of Holocene caliche; and by deposition within hydrothermally altered shear zones. Within the area, the diagenetic replacement type of deposit has the greatest potential for large, low-grade uranium occurrences. The other type of uranium deposits are small, erratically distributed, and extensively covered by alluvium

  6. Down and Out at Pacaya Volcano: A Glimpse of Magma Storage and Diking as Interpreted From GPS Geodesy

    Science.gov (United States)

    Lechner, H. N.; Waite, G. P.; Wauthier, D. C.; Escobar-Wolf, R. P.; Lopez-Hetland, B.

    2017-12-01

    Geodetic data from an eight-station GPS network at Pacaya volcano Guatemala allows us to produce a simple analytical model of deformation sources associated with the 2010 eruption and the eruptive period in 2013-2014. Deformation signals for both eruptive time-periods indicate downward vertical and outward horizontal motion at several stations surrounding the volcano. The objective of this research was to better understand the magmatic plumbing system and sources of this deformation. Because this down-and-out displacement is difficult to explain with a single source, we chose a model that includes a combination of a dike and spherical source. Our modelling suggests that deformation is dominated the inflation of a shallow dike seated high within the volcanic edifice and deflation of a deeper, spherical source below the SW flank of the volcano. The source parameters for the dike feature are in good agreement with the observed orientation of recent vent emplacements on the edifice as well the horizontal displacement, while the parameters for a deeper spherical source accommodate the downward vertical motion. This study presents GPS observations at Pacaya dating back to 2009 and provides a glimpse of simple models of possible deformation sources.

  7. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  8. Pukala intrusion, its age and connection to hydrothermal alteration in Orivesi, southwestern Finland

    Directory of Open Access Journals (Sweden)

    Matti Talikka

    2005-01-01

    Full Text Available The Pukala intrusion is situated in the Paleoproterozoic Svecofennian domain of the Fennoscandian Shield in the contact region between the Central Finland Granitoid Complex and the Tampere Belt. The acid subvolcanic intrusion, which is in contact or close to severalaltered domains, mainly consists of porphyritic granodiorite and trondhjemite. The Pukala intrusion was emplaced into volcanic sequence in an island-arc or fore-arc setting before or during the early stages of the main regional deformation phase of the Svecofennian orogeny. On the basis of the geochemical data, the Pukala intrusion is a peraluminous volcanic-arc granitoid. After crystallisation at 1896±3 Ma, multiphase deformation and metamorphismcaused alteration, recrystallisation, and orientation of the minerals, and tilted the intrusion steeply towards south. The 1851±5 Ma U-Pb age for titanite is connected to the late stages of the Svecofennian tectonometamorphic evolution of the region. Several hydrothermally altered domains are located in the felsic and intermediate metavolcanic rocks of the Tampere Belt within less than one kilometre south of the Pukala intrusion. Alteration is divided into three basic types: partial silica alteration, chlorite-sericite±silica alteration, and sericite alteration in shear zones. The first two types probably formed during the emplacement and crystallisation of the Pukala intrusion, and the third is linked to late shearing. Intense sericitisation and comb quartz bands in the contact of theintrusion and the altered domain at Kutemajärvi suggest that the hydrothermal system was driven by the Pukala intrusion.

  9. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  10. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  11. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  12. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  13. Segmental lichen aureus: a report of two cases treated with methylprednisolone aceponate.

    Science.gov (United States)

    Moche, John; Glassman, Steven; Modi, Deepak; Grayson, Wayne

    2011-05-01

    Two cases of segmental lichen aureus with a response to topical 0.1% methylprednisolone aceponate ointment are reported. A 9-year-old child and a 23-year-old man showed complete resolution of their lesions following treatment with the latter after 7 months and 4 months, respectively. Lichen aureus is a rare form of the pigmented purpuric dermatoses characterized by golden-brown and lichenoid macules and papules, most often on the lower extremities. Segmental presentations have seldom been described. Histology showed a lichenoid infiltrate with extravasation of red blood cells and haemosiderin deposition. The aetiology is unclear and treatment is disappointing. We report an uncommon segmental presentation of lichen aureus with resolution of the lesions after treatment with a topical corticosteroid. © 2010 The Authors. Australasian Journal of Dermatology © 2010 The Australasian College of Dermatologists.

  14. The temporal and spatial distribution of upper crustal faulting and magmatism in the south Lake Turkana rift, East Africa

    Science.gov (United States)

    Muirhead, J.; Scholz, C. A.

    2017-12-01

    During continental breakup extension is accommodated in the upper crust largely through dike intrusion and normal faulting. The Eastern branch of the East African Rift arguably represents the premier example of active continental breakup in the presence magma. Constraining how faulting is distributed in both time and space in these regions is challenging, yet can elucidate how extensional strain localizes within basins as rifting progresses to sea-floor spreading. Studies of active rifts, such as the Turkana Rift, reveal important links between faulting and active magmatic processes. We utilized over 1100 km of high-resolution Compressed High Intensity Radar Pulse (CHIRP) 2D seismic reflection data, integrated with a suite of radiocarbon-dated sediment cores (3 in total), to constrain a 17,000 year history of fault activity in south Lake Turkana. Here, a set of N-S-striking intra-rift faults exhibit time-averaged slip-rates as high as 1.6 mm/yr, with the highest slip-rates occurring along faults within 3 km of the rift axis. Results show that strain has localized into a zone of intra-rift faults along the rift axis, forming an approximately 20 km-wide graben in central parts of the basin. Subsurface structural mapping and fault throw profile analyses reveal increasing basin subsidence and fault-related strain as this faulted graben approaches a volcanic island in the center of the basin (South Island). The long-axis of this island trends north-south, and it contains a number of elongate cones that support recent emplacement of N-S-striking dike intrusions, which parallel recently active intra-rift faults. Overall, these observations suggest strain localization into intra-rift faults in the rift center is likely a product of both volcanic loading and the mechanical and thermal effects of diking along the rift axis. These results support the establishment of magmatic segmentation in southern Lake Turkana, and highlight the importance of magmatism for focusing upper

  15. Multi-Use Non-Intrusive Flow Characterization System (FCS), Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The innovation is a Multi-Use Non-Intrusive Flow Characterization System (FCS) for densified, normal boiling point, and two-phase cryogenic flows, capable of...

  16. Nation-building Behind the Dike: Dutch Nationalism and the Visual Culture of Hydraulic Engineering

    NARCIS (Netherlands)

    Ensel, R.

    2017-01-01

    This article charts a crucial chapter in the history of Dutch nationalism, i. e. the topic of ‘water management’, by delving into the debate on the construction of the Afsluitdijk. The closure of the Zuiderzee by the construction of a dike is one of the most significant infrastructural projects of

  17. Oman Drilling Project GT3 site survey: dynamics at the roof of an oceanic magma chamber

    Science.gov (United States)

    France, L.; Nicollet, C.; Debret, B.; Lombard, M.; Berthod, C.; Ildefonse, B.; Koepke, J.

    2017-12-01

    Oman Drilling Project (OmanDP) aims at bringing new constraints on oceanic crust accretion and evolution by drilling Holes in the whole ophiolite section (mantle and crust). Among those, operations at GT3 in the Sumail massif drilled 400 m to sample the dike - gabbro transition that corresponds to the top (gabbros) and roof (dikes) of the axial magma chamber, an interface where hydrothermal and magmatic system interacts. Previous studies based on oceanic crust formed at present day fast-spreading ridges and preserved in ophiolites have highlighted that this interface is a dynamic horizon where the axial melt lens that top the main magma chamber can intrude, reheat, and partially assimilate previously hydrothermally altered roof rocks. Here we present the preliminary results obtained in GT3 area that have allowed the community to choose the drilling site. We provide a geological and structural map of the area, together with new petrographic and chemical constraints on the dynamics of the dike - gabbro transition. Our new results allow us to quantify the dynamic processes, and to propose that 1/ the intrusive contact of the varitextured gabbro within the dikes highlights the intrusion of the melt lens top in the dike rooting zone, 2/ both dikes and previously crystallized gabbros are reheated, and recrystallized by underlying melt lens dynamics (up to 1050°C, largely above the hydrous solidus temperature of altered dikes and gabbros), 3/ the reheating range can be > 200°C, 4/ the melt lens depth variations for a given ridge position is > 200m, 5/ the reheating stage and associated recrystallization within the dikes occurred under hydrous conditions, 6/ the reheating stage is recorded at the root zone of the sheeted dike complex by one of the highest stable conductive thermal gradient ever recorded on Earth ( 3°C/m), 7/ local chemical variations in recrystallized dikes and gabbros are highlighted and used to quantify crystallization and anatectic processes, and the

  18. Data mining approach to web application intrusions detection

    Science.gov (United States)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  19. AdaBoost-based algorithm for network intrusion detection.

    Science.gov (United States)

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  20. Research on trust calculation of wireless sensor networks based on time segmentation

    Science.gov (United States)

    Su, Yaoxin; Gao, Xiufeng; Qiao, Wenxin

    2017-05-01

    Because the wireless sensor network is different from the traditional network characteristics, it is easy to accept the intrusion from the compromise node. The trust mechanism is the most effective way to defend against internal attacks. Aiming at the shortcomings of the existing trust mechanism, a method of calculating the trust of wireless sensor networks based on time segmentation is proposed. It improves the security of the network and extends the life of the network

  1. Status of the segment interconnect, cable segment ancillary logic, and the cable segment hybrid driver projects

    International Nuclear Information System (INIS)

    Swoboda, C.; Barsotti, E.; Chappa, S.; Downing, R.; Goeransson, G.; Lensy, D.; Moore, G.; Rotolo, C.; Urish, J.

    1985-01-01

    The FASTBUS Segment Interconnect (SI) provides a communication path between two otherwise independent, asynchronous bus segments. In particular, the Segment Interconnect links a backplane crate segment to a cable segment. All standard FASTBUS address and data transactions can be passed through the SI or any number of SIs and segments in a path. Thus systems of arbitrary connection complexity can be formed, allowing simultaneous independent processing, yet still permitting devices associated with one segment to be accessed from others. The model S1 Segment Interconnect and the Cable Segment Ancillary Logic covered in this report comply with all the mandatory features stated in the FASTBUS specification document DOE/ER-0189. A block diagram of the SI is shown

  2. Capability for intrusion detection at nuclear fuel sites

    International Nuclear Information System (INIS)

    1978-03-01

    A safeguards vulnerability assessment was conducted at three separate licensed nuclear processing facilities. Emphasis was placed on: (1) performance of the total intrusion detection system, and (2) vulnerability of the system to compromise by insiders. The security guards were interviewed to evaluate their effectiveness in executing their duties in accordance with the plant's security plan and to assess their knowledge regarding the operation of the security equipment. A review of the training schedule showed that the guards, along with the other plant employees, are required to periodically attend in-plant training sessions. The vulnerability assessments continued with interviews of the personnel responsible for maintaining the security equipment, with discussions of detector false alarm and maintenance problems. The second part of the vulnerability assessments was to evaluate the effectiveness of the intrusion detection systems including the interior and the perimeter sensors, CCTV surveillance devices and the exterior lighting. Two types of perimeter detectors are used at the sites, a fence disturbance sensor and an infrared barrier type detector. Infrared barrier type detectors have a higher probability of detection, especially in conjunction with dedicated CCTV cameras. The exterior lights satisfy the 0.2 footcandle illumination requirement. The interior intrusion detection systems included ultrasonic motion detectors, microwave motion detectors,balanced magnetic switches, and CCTV cameras. Entrance doors to the materials access areas and vital areas are protected with balanced magnetic switches. The interior intrusion detection systems at the three nuclear processing sites are considered satisfactory with the exception of the areas protected with ultrasonic motion detectors

  3. Floor-fractured craters on the Moon: an evidence of past intrusive magmatic activity

    Science.gov (United States)

    Thorey, C.; Michaut, C.

    2012-12-01

    Floor-fractured lunar craters (FFC's) are a class of craters modified by post impact mechanisms. They are defined by distinctive shallow, often plate-like or convex floors, wide floor moats and radial, concentric and polygonal floor-fractures, suggesting an endogenous process of modification. Two main mechanisms have been proposed to account for such observations : 1) viscous relaxation and 2) spreading of magmatic intrusions at depth below the crater. Here, we propose to test the case of magmatic intrusions. We develop a model for the dynamics of magma spreading below an elastic crust with a crater-like topography and above a rigid horizontal surface. Results show first that the lithostatic pressure increase at the crater rim prevents the intrusion from spreading horizontally giving rise to intrusion thickening and to an uplift of the crater floor. Second, the deformation of the overlying crust exerts a strong control on the intrusion shape, and hence, on the nature of the crater floor uplift. As the deformation can only occur over a minimum flexural wavelength noted Λ, the intrusion shape shows a bell-shaped geometry for crater radius smaller than 3Λ, or a flat top with smooth edges for crater radius larger than 3Λ. For given crustal elastic properties, the crust flexural wavelength increases with the intrusion depth. Therefore, for a large intrusion depth or small crater size, we observe a convex uplift of the crater floor. On the contrary, for a small intrusion depth or large crater size, the crater floor undergoes a piston-like uplift and a circular moat forms just before the rim. The depth of the moat is controlled by the thickening of the crust at the crater rim. On the contrary to viscous relaxation models, our model is thus able to reproduce most of the features of FFC's, including small-scale features. Spreading of a magmatic intrusion at depth can thus be considered as the main endogenous mechanism at the origin of the deformations observed at FFC

  4. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  5. PROBABILISTIC ANALYSES OF WASTE PACKAGE QUANTITIES IMPACTED BY POTENTIAL IGNEOUS DISRUPTION AT YUCCA MOUNTAIN

    International Nuclear Information System (INIS)

    M.G. Wallace

    2005-01-01

    A probabilistic analysis was conducted to estimate ranges for the numbers of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application for the Yucca Mountain Project (YMP). The first scenario, igneous intrusion, investigated the case where one or more igneous dikes intersect the repository. A swarm of dikes was characterized by distributions of length, width, azimuth, and number of dikes and the spacings between them. Through the use in part of a latin hypercube simulator and a modified video game engine, mathematical relationships were built between those parameters and the number of waste packages hit. Corresponding cumulative distribution function curves (CDFs) for the number of waste packages hit under several different scenarios were calculated. Variations in dike thickness ranges, as well as in repository magma bulkhead positions were examined through sensitivity studies. It was assumed that all waste packages in an emplacement drift would be impacted if that drift were intersected by a dike. Over 10,000 individual simulations were performed. Based on these calculations, out of a total of over 11,000 planned waste packages distributed over an area of approximately 5.5 km 2 , the median number of waste packages impacted was roughly 1/10 of the total. Individual cases ranged from 0 waste packages to the entire inventory being impacted. The igneous intrusion analysis involved an explicit characterization of dike-drift intersections, built upon various distributions that reflect the uncertainties associated with the inputs. The second igneous scenario, volcanic eruption (eruptive conduits), considered the effects of conduits formed in

  6. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  7. Human intrusion: issues concerning its assessment

    International Nuclear Information System (INIS)

    Grimwood, P.D.; Smith, G.M.

    1989-01-01

    The potential significance of human intrusion in the performance assessment of radioactive waste repositories has been increasingly recognized in recent years. It is however an area of assessment in which subjective judgments dominate. This paper identifies some of the issues involved. These include regulatory criteria, scenario development, probability assignment, consequence assessment and measures to mitigate human intrusion

  8. Brookhaven segment interconnect

    International Nuclear Information System (INIS)

    Morse, W.M.; Benenson, G.; Leipuner, L.B.

    1983-01-01

    We have performed a high energy physics experiment using a multisegment Brookhaven FASTBUS system. The system was composed of three crate segments and two cable segments. We discuss the segment interconnect module which permits communication between the various segments

  9. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    Science.gov (United States)

    Ganapathy, S.; Yogesh, P.; Kannan, A.

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. PMID:23056036

  10. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  11. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  12. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  13. Magmatic controls on axial relief and faulting at mid-ocean ridges

    Science.gov (United States)

    Liu, Zhonglan; Buck, W. Roger

    2018-06-01

    Previous models do not simultaneously reproduce the observed range of axial relief and fault patterns at plate spreading centers. We suggest that this failure is due to the approximation that magmatic dikes open continuously rather than in discrete events. During short - lived events, dikes open not only in the strong axial lithosphere but also some distance into the underlying weaker asthenosphere. Axial valley relief affects the partitioning of magma between the lithosphere and asthenosphere during diking events. The deeper the valley, the more magma goes into lithospheric dikes in each event and so the greater the average opening rate of those dikes. The long-term rate of lithospheric dike opening controls faulting rate and axial depth. The feedback between axial valley depth D and lithospheric dike opening rate allows us to analytically relate steady-state values of D to lithospheric thickness HL and crustal thickness HC. A two-dimensional model numerical model with a fixed axial lithospheric structure illustrates the analytic model implications for axial faulting. The predictions of this new model are broadly consistent with global and segment-scale trends of axial depth and fault patterns with HL and HC.

  14. Analysis of crustal thickness and off-axis low-velocity zones at the Endeavour segment of the Juan de Fuca Ridge

    Science.gov (United States)

    Wells, A. E.; Hooft, E. E.; Toomey, D. R.; Wilcock, W. S.; Weekly, R. T.

    2010-12-01

    Construction of the oceanic crust is often thought to occur by delivery of melt from the mantle to the ridge axis that is both segment-centered and rise-centered. However, recent seismic studies at the fast-spreading East Pacific Rise show that mantle melt delivery can be skewed relative to the rise leading to off-axis delivery of melt. Furthermore foci of mantle melt delivery occur on a length-scale shorter than that of a ridge segment and the region of greater melt supply, as measured by crustal thickness, does not correspond to the segment center. We use seismic data from the intermediate-spreading Endeavour segment of the Juan de Fuca Ridge to investigate the spatial and temporal pattern of melt supply in this setting and whether off-axis delivery and transport of melt is a common occurrence. The Juan de Fuca Ridge has a transitional morphology characterized by fault-bounded ridges that parallel the spreading center. Previous models of the Endeavour segment inferred that the off-axis ridges are constructed during periods of enhanced magmatism and that these are separated by the remains of rift valleys generated during periods of reduced magmatism. This model may imply that crustal thickness should vary rapidly, with thicker crust beneath the off-axis ridges and thinner crust in between. Alternatively, on the basis of recent seismic reflection images of crustal magma bodies along the Juan de Fuca ridge this topography is thought to reflect magma-induced deformation resulting from feedbacks between the rheology of the crust above the magma sill and dike intrusion. In this case, short wavelength crustal thickness variations may not be present. The melting anomalies associated with various nearby seamount chains also influence processes along the Juan de Fuca Ridge. The seismic reflection work indicates that there is a ~40-km-wide plateau of greater crustal thickness (~0.5-1.0 km) at the center of the Endeavour segment that began forming about 0.7 Ma. The plateau

  15. Final hazard classification and auditable safety analysis for the N basin segment

    International Nuclear Information System (INIS)

    Kloster, G.; Smith, R.I.; Larson, A.R.; Duncan, G.M.

    1996-12-01

    The purpose of this report is to provide the following: To serve as the auditable safety analysis (ASA) for the N Basin Segment, including both the quiescent state and planned intrusive activities. The ASA is developed through the realistic evaluation of potential hazards that envelope the threat to personnel. The ASA also includes the specification of the programmatic, baseline, and activity- specific controls that are necessary for the protection of workers. To determine and document the final hazard classification (FHC) for the N Basin Segment. The FHC is developed through the use of bounding accident analyses that envelope the potential exposures to personnel. The FHC also includes the specification of the special controls that are necessary to remain within the envelope of those accident analyses

  16. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  17. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  18. Geophysics and geochemistry techniques in seawater intrusion monitoring and mapping at Kerpan, Kedah

    International Nuclear Information System (INIS)

    Bashillah Baharuddin; Nazrul Hizam Yusoff; Abdul Rahim Samsudin

    2002-01-01

    Lately, groundwater contamination has become a public concern. Seawater intrusion is not a new issue, and only it started to magnetize attention from lots of parties since at also a contributor to groundwater contamination. Therefore a study about seawater intrusion is carried out and the selected area is Kerpan, Kedah. This information is useful particularly in agriculture because any contamination that cause by chlorine (seawater) intrusion can affect crops production. For Kerpan Project, two modernized electric resistivity survey instruments, the Terrameter SAS 4000 and SAS 300C are used which provide image profiles. This profiles have the capability to access a comprehensive geological interpretation by examine subsurface electric characteristics such as resistivity, permittivity and chargeability (John, 1997). At Kerpan, Kedah a study about salinity in canals was also carried out to monitor if there is any seawater intrusion that can get through the canals. The study was done since that the canals are directly to the sea. Instrument for this study is STD 12-plus. (Author)

  19. Animal intrusion status report for fiscal year 1990

    International Nuclear Information System (INIS)

    Landeen, D.S.

    1991-03-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion work conducted by Westinghouse Hanford Company in fiscal year 1990 regarding small mammals and water infiltration. An animal intrusion lysimeter facility was constructed and installed in fiscal year 1988. The facility consists of two outer boxes buried at grade that serve as receptacles for six animal intrusion lysimeters. Small burrowing mammals common to the Hanford Site environs are introduced over a 3- to 4-month period. Supplemental precipitation is added to three of the lysimeters with a rainulator at a rate equivalent to a 100-year storm. Soil moisture samples are taken before and after each test, and soil moisture measurements are also taken with a hydroprobe during the test period. During fiscal year 1990, tests three and four were completed and test five was initiated. Results of test three (summer treatment), which used Townsend ground squirrels and pocket gophers, indicated that the additional 1.5 inches of precipitation that was added with the rainulator was lost during this test. The plots that did not receive any additional precipitation all lost water (5 to 6 percent). Results from test four (winter treatment), which used pocket gophers and pocket mice, indicated that all of the lysimeters except one gained water. The two control lysimeters (rainulator plots and nonrainulator lysimeters with no animals) gained more water than their corresponding animal burrow lysimeters. 4 refs., 9 figs., 3 tabs

  20. Medication Adherence using Non-intrusive Wearable Sensors

    Directory of Open Access Journals (Sweden)

    T. H. Lim

    2017-12-01

    Full Text Available Activity recognition approaches have been applied in home ambient systems to monitor the status and well- being of occupant especially for home care systems. With the advancement of embedded wireless sensing devices, various applications have been proposed to monitor user´s activities and maintain a healthy lifestyle. In this paper, we propose and evaluate a Smart Medication Alert and Treatment Electronic Systems (SmartMATES using a non-intrusive wearable activity recognition sensing system to monitor and alert an user for missing medication prescription. Two sensors are used to collect data from the accelerometer and radio transceiver. Based on the data collected, SmartMATES processes the data and generate a model for the various actions including taking medication. We have evaluated the SmartMATES on 9 participants. The results show that the SmartMATES can identify and prevent missing dosage in a less intrusive way than existing mobile application and traditional approaches.

  1. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  2. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    2008-01-01

    We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying a new method for anomaly detection on the

  3. A new intrusion prevention model using planning knowledge graph

    Science.gov (United States)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  4. Single-segment and double-segment INTACS for post-LASIK ectasia.

    Directory of Open Access Journals (Sweden)

    Hassan Hashemi

    2014-09-01

    Full Text Available The objective of the present study was to compare single segment and double segment INTACS rings in the treatment of post-LASIK ectasia. In this interventional study, 26 eyes with post-LASIK ectasia were assessed. Ectasia was defined as progressive myopia regardless of astigmatism, along with topographic evidence of inferior steepening of the cornea after LASIK. We excluded those with a history of intraocular surgery, certain eye conditions, and immune disorders, as well as monocular, pregnant and lactating patients. A total of 11 eyes had double ring and 15 eyes had single ring implantation. Visual and refractive outcomes were compared with preoperative values based on the number of implanted INTACS rings. Pre and postoperative spherical equivalent were -3.92 and -2.29 diopter (P=0.007. The spherical equivalent decreased by 1 ± 3.2 diopter in the single-segment group and 2.56 ± 1.58 diopter in the double-segment group (P=0.165. Mean preoperative astigmatism was 2.38 ± 1.93 diopter which decreased to 2.14 ± 1.1 diopter after surgery (P=0.508; 0.87 ± 1.98 diopter decrease in the single-segment group and 0.67 ± 1.2 diopter increase in the double-segment group (P=0.025. Nineteen patients (75% gained one or two lines, and only three, who were all in the double-segment group, lost one or two lines of best corrected visual acuity. The spherical equivalent and vision significantly decreased in all patients. In these post-LASIK ectasia patients, the spherical equivalent was corrected better with two segments compared to single segment implantation; nonetheless, the level of astigmatism in the single-segment group was significantly better than that in the double-segment group.

  5. A genetic link between magnetite mineralization and diorite intrusion at the El Romeral iron oxide-apatite deposit, northern Chile

    Science.gov (United States)

    Rojas, Paula A.; Barra, Fernando; Reich, Martin; Deditius, Artur; Simon, Adam; Uribe, Francisco; Romero, Rurik; Rojo, Mario

    2018-01-01

    El Romeral is one of the largest iron oxide-apatite (IOA) deposits in the Coastal Cordillera of northern Chile. The Cerro Principal magnetite ore body at El Romeral comprises massive magnetite intergrown with actinolite, with minor apatite, scapolite, and sulfides (pyrite ± chalcopyrite). Several generations of magnetite were identified by using a combination of optical and electron microscopy techniques. The main mineralization event is represented by zoned magnetite grains with inclusion-rich cores and inclusion-poor rims, which form the massive magnetite ore body. This main magnetite stage was followed by two late hydrothermal events that are represented by magnetite veinlets that crosscut the massive ore body and by disseminated magnetite in the andesite host rock and in the Romeral diorite. The sulfur stable isotope signature of the late hydrothermal sulfides indicates a magmatic origin for sulfur (δ34S between - 0.8 and 2.9‰), in agreement with previous δ34S data reported for other Chilean IOA and iron oxide-copper-gold deposits. New 40Ar/39Ar dating of actinolite associated with the main magnetite ore stage yielded ages of ca. 128 Ma, concordant within error with a U-Pb zircon age for the Romeral diorite (129.0 ± 0.9 Ma; mean square weighted deviation = 1.9, n = 28). The late hydrothermal magnetite-biotite mineralization is constrained at ca. 118 Ma by 40Ar/39Ar dating of secondary biotite. This potassic alteration is about 10 Ma younger than the main mineralization episode, and it may be related to post-mineralization dikes that crosscut and remobilize Fe from the main magnetite ore body. These data reveal a clear genetic association between magnetite ore formation, sulfide mineralization, and the diorite intrusion at El Romeral (at 129 Ma), followed by a late and more restricted stage of hydrothermal alteration associated with the emplacement of post-ore dikes at ca. 118 Ma. Therefore, this new evidence supports a magmatic-hydrothermal model for the

  6. Graben formation during the Bárðarbunga rifting event in central Iceland

    KAUST Repository

    Ruch, Joel

    2015-04-01

    On the 16th of August 2014, an intense seismic swarm was detected at the Bárðarbunga caldera (central Iceland), which migrated to the east and then to the northeast during the following days. The swarm, highlighting magma propagation pathway from the caldera, migrated laterally during the following two weeks over 40 km. By the end of August, a volcanic eruption had started along a north-south oriented fissure located ~45 km from the caldera. Here we focus on the near-field deformation related to the dike emplacement in the shallow crust, which generated in few days an 8 km long by 0.8 km wide graben (depression) structure. The new graben extends from the northern edge of the Vatnajökull glacier and to the north to the eruptive fissure. We analyze the temporal evolution of the graben by integrating structural mapping using multiple acquisitions of TerraSAR-X amplitude radar images, InSAR and ground-truth data with GPS and structural measurements. Pixel-offset tracking of radar amplitude images shows clearly the graben subsidence, directly above the intrusion pathway, of up to 6 meters in the satellite line-of-sight direction. We installed a GPS profile of 15 points across the graben in October 2014 and measured its depth up to 8 meters, relative to the flanks of the graben. Field structural observations show graben collapse structures that typically accompany dike intrusions, with two tilted blocks dipping toward the graben axis, bordered by two normal faults. Extensive fractures at the center of the graben and at the graben edges show a cumulative extension of ~8 meters. The formation of the graben was also accompanied by strong seismic activity locally, constraining the time frame period of the main graben formation subsidence. Our results show a rare case of a graben formation captured from space and from ground observations. Such structures are the dominant features along rift zones, however, their formation remain poorly understood. The results also provide

  7. SU-E-J-252: Reproducibility of Radiogenomic Image Features: Comparison of Two Semi-Automated Segmentation Methods

    Energy Technology Data Exchange (ETDEWEB)

    Lee, M; Woo, B; Kim, J [Seoul National University, Seoul (Korea, Republic of); Jamshidi, N; Kuo, M [UCLA School of Medicine, Los Angeles, CA (United States)

    2015-06-15

    Purpose: Objective and reliable quantification of imaging phenotype is an essential part of radiogenomic studies. We compared the reproducibility of two semi-automatic segmentation methods for quantitative image phenotyping in magnetic resonance imaging (MRI) of glioblastoma multiforme (GBM). Methods: MRI examinations with T1 post-gadolinium and FLAIR sequences of 10 GBM patients were downloaded from the Cancer Image Archive site. Two semi-automatic segmentation tools with different algorithms (deformable model and grow cut method) were used to segment contrast enhancement, necrosis and edema regions by two independent observers. A total of 21 imaging features consisting of area and edge groups were extracted automatically from the segmented tumor. The inter-observer variability and coefficient of variation (COV) were calculated to evaluate the reproducibility. Results: Inter-observer correlations and coefficient of variation of imaging features with the deformable model ranged from 0.953 to 0.999 and 2.1% to 9.2%, respectively, and the grow cut method ranged from 0.799 to 0.976 and 3.5% to 26.6%, respectively. Coefficient of variation for especially important features which were previously reported as predictive of patient survival were: 3.4% with deformable model and 7.4% with grow cut method for the proportion of contrast enhanced tumor region; 5.5% with deformable model and 25.7% with grow cut method for the proportion of necrosis; and 2.1% with deformable model and 4.4% with grow cut method for edge sharpness of tumor on CE-T1W1. Conclusion: Comparison of two semi-automated tumor segmentation techniques shows reliable image feature extraction for radiogenomic analysis of GBM patients with multiparametric Brain MRI.

  8. SU-E-J-252: Reproducibility of Radiogenomic Image Features: Comparison of Two Semi-Automated Segmentation Methods

    International Nuclear Information System (INIS)

    Lee, M; Woo, B; Kim, J; Jamshidi, N; Kuo, M

    2015-01-01

    Purpose: Objective and reliable quantification of imaging phenotype is an essential part of radiogenomic studies. We compared the reproducibility of two semi-automatic segmentation methods for quantitative image phenotyping in magnetic resonance imaging (MRI) of glioblastoma multiforme (GBM). Methods: MRI examinations with T1 post-gadolinium and FLAIR sequences of 10 GBM patients were downloaded from the Cancer Image Archive site. Two semi-automatic segmentation tools with different algorithms (deformable model and grow cut method) were used to segment contrast enhancement, necrosis and edema regions by two independent observers. A total of 21 imaging features consisting of area and edge groups were extracted automatically from the segmented tumor. The inter-observer variability and coefficient of variation (COV) were calculated to evaluate the reproducibility. Results: Inter-observer correlations and coefficient of variation of imaging features with the deformable model ranged from 0.953 to 0.999 and 2.1% to 9.2%, respectively, and the grow cut method ranged from 0.799 to 0.976 and 3.5% to 26.6%, respectively. Coefficient of variation for especially important features which were previously reported as predictive of patient survival were: 3.4% with deformable model and 7.4% with grow cut method for the proportion of contrast enhanced tumor region; 5.5% with deformable model and 25.7% with grow cut method for the proportion of necrosis; and 2.1% with deformable model and 4.4% with grow cut method for edge sharpness of tumor on CE-T1W1. Conclusion: Comparison of two semi-automated tumor segmentation techniques shows reliable image feature extraction for radiogenomic analysis of GBM patients with multiparametric Brain MRI

  9. Biological intrusion barriers for large-volume waste-disposal sites

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Cline, J.F.; Rickard, W.H.

    1982-01-01

    intrusion of plants and animals into shallow land burial sites with subsequent mobilization of toxic and radiotoxic materials has occured. Based on recent pathway modeling studies, such intrusions can contribute to the dose received by man. This paper describes past work on developing biological intrusion barrier systems for application to large volume waste site stabilization. State-of-the-art concepts employing rock and chemical barriers are discussed relative to long term serviceability and cost of application. The interaction of bio-intrusion barrier systems with other processes affecting trench cover stability are discussed to ensure that trench cover designs minimize the potential dose to man. 3 figures, 6 tables

  10. Innovative methods to reduce salt water intrusion in harbours

    Science.gov (United States)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  11. The Importance of Hydraulic Structures for Society: Quay Walls and Dikes in the Netherlands

    Directory of Open Access Journals (Sweden)

    de Gijt J.G.

    2015-12-01

    Full Text Available Since mankind exists, men have undertaken engineering activities to make their life more pleasant and secure. However this has not been an easy task, especially in the past. The knowledge of mathematics and physics to describe engineering problems became available only since 1400-1500. Nevertheless, great achievements have been made by man before that time, e.g. the pyramids in Egypt, the first sluice in China, the Borobudur temple in Indonesia, and the design and building activities of the Inca’s in South America. To illustrate this development, also the world economy, world ecology will be shortly mentioned. The structures that are briefly discussed in this paper are: soil and concrete dams for generating electricity, reservoirs for irrigation and drinking water, dikes, sluices, inland and sea, tunnels, and quay walls. This paper presents an overview of hydraulic structures in general with the emphasis on quay walls and dikes in the Netherlands. Examples of these structures will be discussed illustrating present state of the art and also with a view to the future. Conclusions and recommendations are given to enhance the knowledge of hydraulic structures.

  12. Working memory and inhibitory control across the life span: Intrusion errors in the Reading Span Test.

    Science.gov (United States)

    Robert, Christelle; Borella, Erika; Fagot, Delphine; Lecerf, Thierry; de Ribaupierre, Anik

    2009-04-01

    The aim of this study was to examine to what extent inhibitory control and working memory capacity are related across the life span. Intrusion errors committed by children and younger and older adults were investigated in two versions of the Reading Span Test. In Experiment 1, a mixed Reading Span Test with items of various list lengths was administered. Older adults and children recalled fewer correct words and produced more intrusions than did young adults. Also, age-related differences were found in the type of intrusions committed. In Experiment 2, an adaptive Reading Span Test was administered, in which the list length of items was adapted to each individual's working memory capacity. Age groups differed neither on correct recall nor on the rate of intrusions, but they differed on the type of intrusions. Altogether, these findings indicate that the availability of attentional resources influences the efficiency of inhibition across the life span.

  13. Reinforcement of Soft Foundation with Geotextile and Observation for Sea Dike Project of Zhapu Port

    Institute of Scientific and Technical Information of China (English)

    章香雅; 郑祖祯

    2003-01-01

    The design method of reinforcement of soft foundation with geotextile for the sea dike of the Zhapu Port is discussed in this paper. The prototype behaviours such as pore water pressure, settlement and so on were observed. The degree of consolidation is found out from observed pore water pressure and observed settlement respectively, then the strength increment of soil is calculated and compared with that obtained from vane shear tests. For the use of observed pore water pressure, the consolidation coefficient of soil is deduced approximately with a method named experimental exponential interpolation. The degree of consolidation of the ground is deduced theoretically from the dissipation of pore water pressure. Besides, the logarithmic curve and hyperbola are used to fit the observed time-settlement curve, and the degree of consolidation of soil is obtained according to the definition of the consolidation degree. After preliminary verification with observed prototype data, the method to reinforce the low dike with geotextile is considered to be simple and rational, and it can also reduce the construction cost.

  14. Water Resources Research Program. Abatement of malodors at diked, dredged-material disposal sites. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Harrison, W.; Dravnieks, A.; Zussman, R.; Goltz, R.

    1976-06-01

    Samples of malodorous air and dredged material were collected at diked disposal sites at the following locations: Buffalo, NY; Milwaukee, WI; Mobile, AL; York Harbor, ME; Houston, TX; Detroit, MI; and Anacortes, WA; during the period July--October, 1975. Odorous compounds in the air samples were identified by gas chromatography/mass spectrometry, while the detection threshold, intensity, and character of the various odors were determined by experienced panelists using a dynamic, forced-choice-triangle olfactometer. Although significant problems with malodors were not observed beyond the disposal-area dikes during site visits, noteworthy odor episodes had occurred at some sites. An odor-abatement strategy is presented for handling the expected range of odor conditions at dredged-material disposal sites. Its aim is to reduce to an acceptable level the intensity of malodors in an affected community. The main steps in the strategy cover selection of the disposal site, site preparation, odor characterization of sediments to be dredged, malodor abatement during dredging and disposal operations, malodor abatement after filling of the disposal site, and the handling of malodor complaints.

  15. Magmatic Diversity of the Wehrlitic Intrusions in the Oceanic Lower Crust of the Northern Oman Ophiolite

    Science.gov (United States)

    Kaneko, R.; Adachi, Y.; Miyashita, S.

    2014-12-01

    The Oman ophiolite extends along the east coast of Oman, and is the world's largest and best-preserved slice of obducted oceanic lithosphere. The magmatic history of this ophiolite is complex and is generally regarded as having occurred in three stages (MOR magmatism, subduction magmatism and intraplate magmatism). Wehrlitic intrusions constitute an important element of oceanic lower crust of the ophiolite, and numerous intrusions cut gabbro units in the northern Salahi block of this ophiolite. In this study area, we identified two different types of wehrlitic intrusions. One type of the intrusions mainly consists of dunite, plagioclase (Pl) wehrlite and mela-olivine (Ol) gabbro, in which the crystallization sequence is Ol followed by the contemporaneous crystallization of Pl and clinopyroxene (Cpx). This type is called "ordinary" wehrlitic intrusions and has similar mineral compositions to host gabbros (Adachi and Miyashita 2003; Kaneko et al. 2014). Another type of the intrusions is a single intrusion that crops out in an area 250 m × 150 m along Wadi Salahi. This intrusion consists of Pl-free "true" wehrlite, in which the crystallization sequence is Ol and then Cpx. The forsterite contents (Fo%) of Ol from the "ordinary" wehrlitic intrusions and "true" wehrlitic intrusions have ranges of 90.8-87.0 (NiO = 0.36-0.13 wt%) and 84.7 (NiO = 0.31 wt%), respectively. Cr numbers (Cr#) of Cr-spinel from the "true" wehrlitic intrusions show higher Cr# value of 0.85 than those of the "ordinary" wehrlitic intrusions (0.48-0.64). But the former is characterized by very high Fe3+ values (YFe3+ = 0.49-0.68). Kaneko et al. (2014) showed that the "ordinary" ubiquitous type has similar features to MOR magmatism and the depleted type in the Fizh block (Adachi and Miyashita 2003) links to subduction magmatism. These types are distinguished by their mineral chemistries (TiO2 and Na2O contents of Cpx). The TiO2 and Na2O contents of Cpx from the "true" wehrlitic intrusions have 0

  16. Free to love? The role of intrusive parenting for young adult children's romantic relationship quality.

    Science.gov (United States)

    Parise, Miriam; Manzi, Claudia; Donato, Silvia; Iafrate, Raffaella

    2017-01-01

    Intrusive parenting is a form of boundary disturbance in the parent-child relationship which has been consistently associated with children's maladjustment. The present study examines the role of intrusive parenting for young adult children's romantic relationship quality. Relying on data from a two-wave longitudinal study among young couples in transition to marriage in Italy, we investigated the link between young adults' perceived intrusive parenting and change in their romantic relationship quality from 6 months before marriage to 18 months after marriage, as well as the mediating role of change in the capacity to include the partner in the self. Data were analyzed using actor-partner interdependence modeling. Perceived intrusive parenting negatively predicted change in inclusion of the other in the self and change in romantic relationship quality for both partners. For females, change in their capacity of inclusion of the other in the self fully mediated the association between their perceived intrusive parenting and change in their own and partner's relationship quality. Limitations and implications for practice are discussed.

  17. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    OpenAIRE

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumben...

  18. Identification of Human Intrusion Types into Radwaste Disposal Facility

    International Nuclear Information System (INIS)

    Budi Setiawan

    2007-01-01

    Human intrusion has long been recognized as a potentially important post-closure safety issue for rad waste disposal facility. It is due to the difficulties in predicting future human activities. For the preliminary study of human intrusion, identification of human intrusion types need to be recognized and investigated also the approaching of problem solving must be known to predict the prevention act and accepted risk. (author)

  19. Operational wave now- and forecast in the German Bight as a basis for the assessment of wave-induced hydrodynamic loads on coastal dikes

    Science.gov (United States)

    Dreier, Norman; Fröhle, Peter

    2017-12-01

    The knowledge of the wave-induced hydrodynamic loads on coastal dikes including their temporal and spatial resolution on the dike in combination with actual water levels is of crucial importance of any risk-based early warning system. As a basis for the assessment of the wave-induced hydrodynamic loads, an operational wave now- and forecast system is set up that consists of i) available field measurements from the federal and local authorities and ii) data from numerical simulation of waves in the German Bight using the SWAN wave model. In this study, results of the hindcast of deep water wave conditions during the winter storm on 5-6 December, 2013 (German name `Xaver') are shown and compared with available measurements. Moreover field measurements of wave run-up from the local authorities at a sea dike on the German North Sea Island of Pellworm are presented and compared against calculated wave run-up using the EurOtop (2016) approach.

  20. Assessment of chevron dikes for the enhancement of physical-aquatic habitat within the Middle Mississippi River, USA

    Science.gov (United States)

    Remo, Jonathan W. F.; Khanal, Anish; Pinter, Nicholas

    2013-09-01

    Blunt-nosed chevron dikes, a new invention now being widely constructed on the Middle Mississippi River (MMR), have been justified as a tool for enhancing physical-aquatic habitat. Chevron dikes were initially designed to concentrate flow, induce channel scour, and thus facilitate river navigation. More recently, these structures have been justified, in part, for promoting habitat heterogeneity. The ability of chevrons to create and diversify physical-aquatic habitat, however, has not been empirically evaluated. To assess the ability of chevrons to create and diversify physical-aquatic habitat, we compiled hydrologic and geospatial data for three channel reference conditions along a 2.0 km (∼140 ha) reach of the MMR where three chevrons were constructed in late 2007. We used the hydrologic and hydraulic data to construct detailed 2-D hydrodynamic models for three reference condition: historic (circa 1890), pre-chevron, and post-chevron channel conditions. These models documented changes in depths and flow dynamics for a wide range of in-channel discharges. Depth-velocity habitat classes were used to assess change in physical-aquatic habitat patches and spatial statistical tools in order to evaluate the reach-scale habitat patch diversity. Comparisons of pre- and post-chevron conditions revealed increases in deep to very deep (>3.0 m) areas of slow moving (3.0 m], low velocity [<0.6 m/s]). Chevron construction also created some (0.8-3.8 ha) shallow-water habitat (0-1.5 m depth with a 0-0.6 m/s velocity) for flows ⩽2.0 × MAF and contributed to an 8-35% increase in physical-aquatic-habitat diversity compared to pre-chevron channel conditions. However, modeling of the historic reference condition (less engineered channel, circa 1890) revealed that the historical physical-aquatic-habitat mosaic consisted of a wider and shallower channel with: 45-390% more shallow-water habitat (2.4-11.0 ha) and 22-83% more physical-aquatic-habitat diversity, but little over

  1. Acute effects of alcohol on intrusive memory development and viewpoint dependence in spatial memory support a dual representation model.

    Science.gov (United States)

    Bisby, James A; King, John A; Brewin, Chris R; Burgess, Neil; Curran, H Valerie

    2010-08-01

    A dual representation model of intrusive memory proposes that personally experienced events give rise to two types of representation: an image-based, egocentric representation based on sensory-perceptual features; and a more abstract, allocentric representation that incorporates spatiotemporal context. The model proposes that intrusions reflect involuntary reactivation of egocentric representations in the absence of a corresponding allocentric representation. We tested the model by investigating the effect of alcohol on intrusive memories and, concurrently, on egocentric and allocentric spatial memory. With a double-blind independent group design participants were administered alcohol (.4 or .8 g/kg) or placebo. A virtual environment was used to present objects and test recognition memory from the same viewpoint as presentation (tapping egocentric memory) or a shifted viewpoint (tapping allocentric memory). Participants were also exposed to a trauma video and required to detail intrusive memories for 7 days, after which explicit memory was assessed. There was a selective impairment of shifted-view recognition after the low dose of alcohol, whereas the high dose induced a global impairment in same-view and shifted-view conditions. Alcohol showed a dose-dependent inverted "U"-shaped effect on intrusions, with only the low dose increasing the number of intrusions, replicating previous work. When same-view recognition was intact, decrements in shifted-view recognition were associated with increases in intrusions. The differential effect of alcohol on intrusive memories and on same/shifted-view recognition support a dual representation model in which intrusions might reflect an imbalance between two types of memory representation. These findings highlight important clinical implications, given alcohol's involvement in real-life trauma. Copyright 2010 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.

  2. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  3. Preliminary Geophysical Investigations of the Ship Rock Diatreme, Navajo Nation, New Mexico

    Science.gov (United States)

    Gruen, E. M.; McCarthy, L.; Namingha, G.; Bank, C.; Noblett, J.; Semken, S.

    2003-12-01

    Magnetic and gravity data were collected at the Ship Rock minette neck and dikes, part of the Navajo volcanic field in the central Colorado Plateau, to investigate their subsurface structure. The deep root system of Ship Rock, an exhumed Oligocene maar-diatreme complex, has not been resolved. The diatreme is largely composed of minette tuff-breccia with a large wallrock fraction, whereas the dikes are composed of hypabyssal minette. The country rock is the Upper Cretaceous Mancos Shale. Density and magnetic contrasts between the igneous rock and surrounding shale suggest that the buried structure of Ship Rock can be imaged. Preliminary geophysical investigations were carried out in order to test this hypothesis. We collected magnetic and gravitational data along four lines selected to transect the major south and northeast dikes and to partly encircle the diatreme. Modeling differently sized, oriented and shaped intrusions, we created theoretical Free Air anomaly curves to try to match the two clearest anomalies. Modeling necessitates (i) that the major north-south dike dips west and (ii) the presence of a high-density, deep body near the diatreme. The Free Air anomaly curves show that smaller dikes might not be detected from gravity data; however, they are necessary to determine the presence of large, dense bodies. Although not modeled, the magnetics curves show that smaller dikes can easily be detected. Our study results are promising, and we plan a more thorough investigation in the future which will produce a magnetic map to determine if further buried dikes exist in the vicinity, and measure gravity along additional profiles to better constrain the location of the dense body at depth.

  4. Heart rate, startle response, and intrusive trauma memories

    Science.gov (United States)

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  5. Uncertainty quantification for criticality problems using non-intrusive and adaptive Polynomial Chaos techniques

    International Nuclear Information System (INIS)

    Gilli, L.; Lathouwers, D.; Kloosterman, J.L.; Hagen, T.H.J.J. van der; Koning, A.J.; Rochman, D.

    2013-01-01

    Highlights: ► Non-intrusive spectral techniques are applied to perform UQ of criticality problems. ► A new adaptive algorithm based on the definition of sparse grid is derived. ► The method is applied to two reference criticality problems. - Abstract: In this paper we present the implementation and the application of non-intrusive spectral techniques for uncertainty analysis of criticality problems. Spectral techniques can be used to reconstruct stochastic quantities of interest by means of a Fourier-like expansion. Their application to uncertainty propagation problems can be performed in a non-intrusive fashion by evaluating a set of projection integrals that are used to reconstruct the spectral expansion. This can be done either by using standard Monte Carlo integration approaches or by adopting numerical quadrature rules. We present the derivation of a new adaptive quadrature algorithm, based on the definition of a sparse grid, which can be used to reduce the computational cost associated with non-intrusive spectral techniques. This new adaptive algorithm and the Monte Carlo integration alternative are then applied to two reference problems. First, a stochastic multigroup diffusion problem is introduced by considering the microscopic cross-sections of the system to be random quantities. Then a criticality benchmark is defined for which a set of resonance parameters in the resolved region are assumed to be stochastic

  6. A Simulation-Optimization Model for Seawater Intrusion Management at Pingtung Coastal Area, Taiwan

    Directory of Open Access Journals (Sweden)

    Po-Syun Huang

    2018-02-01

    Full Text Available The coastal regions of Pingtung Plain in southern Taiwan rely on groundwater as their main source of fresh water for aquaculture, agriculture, domestic, and industrial sectors. The availability of fresh groundwater is threatened by unsustainable groundwater extraction and the over-pumpage leads to the serious problem of seawater intrusion. It is desired to find appropriate management strategies to control groundwater salinity and mitigate seawater intrusion. In this study, a simulation–optimization model has been presented to solve the problem of seawater intrusion along the coastal aquifers in Pingtung Plain and the objective is using injection well barriers and minimizing the total injection rate based on the pre-determined locations of injection barriers. The SEAWAT code is used to simulate the process of seawater intrusion and the surrogate model of artificial neural networks (ANNs is used to approximate the seawater intrusion (SWI numerical model to increase the computational efficiency during the optimization process. The heuristic optimization scheme of differential evolution (DE algorithm is selected to identify the global optimal management solution. Two different management scenarios, one is the injection barriers located along the coast and the other is the injection barrier located at the inland, are considered and the optimized results show that the deployment of injection barriers at the inland is more effective to reduce total dissolved solids (TDS concentrations and mitigate seawater intrusion than that along the coast. The computational time can be reduced by more than 98% when using ANNs to replace the numerical model and the DE algorithm has been confirmed as a robust optimization scheme to solve groundwater management problems. The proposed framework can identify the most reliable management strategies and provide a reference tool for decision making with regard to seawater intrusion remediation.

  7. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  8. Multi-User Low Intrusive Occupancy Detection

    Directory of Open Access Journals (Sweden)

    Azkario Rizky Pratama

    2018-03-01

    Full Text Available Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS of BLE (Bluetooth Low Energy nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach.

  9. Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks

    Directory of Open Access Journals (Sweden)

    Wenjuan Li

    2018-01-01

    Full Text Available Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN has thus been developed by allowing intrusion detection system (IDS nodes to exchange data with each other. Insider attacks are a great threat for such types of collaborative networks, where an attacker has the authorized access within the network. In literature, a challenge-based trust mechanism is effective at identifying malicious nodes by sending challenges. However, such mechanisms are heavily dependent on two assumptions, which would cause CIDNs to be vulnerable to advanced insider attacks in practice. In this work, we investigate the influence of advanced on–off attacks on challenge-based CIDNs, which can respond truthfully to one IDS node but behave maliciously to another IDS node. To evaluate the attack performance, we have conducted two experiments under a simulated and a real CIDN environment. The obtained results demonstrate that our designed attack is able to compromise the robustness of challenge-based CIDNs in practice; that is, some malicious nodes can behave untruthfully without a timely detection.

  10. Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid.

    Science.gov (United States)

    Li, Yuancheng; Qiu, Rixuan; Jing, Sitong

    2018-01-01

    Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can't satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy.

  11. The appraisal of intrusive thoughts in relation to obsessional-compulsive symptoms.

    Science.gov (United States)

    Barrera, Terri L; Norton, Peter J

    2011-01-01

    Research has shown that although intrusive thoughts occur universally, the majority of individuals do not view intrusive thoughts as being problematic (Freeston, Ladouceur, Thibodeau, & Gagnon, 1991; Rachman & de Silva, 1978; Salkovskis & Harrison, 1984). Thus, it is not the presence of intrusive thoughts that leads to obsessional problems but rather some other factor that plays a role in the development of abnormal obsessions. According to the cognitive model of obsessive-compulsive disorder (OCD) put forth by Salkovskis (1985), the crucial factor that differentiates between individuals with OCD and those without is the individual's appraisal of the naturally occurring intrusive thoughts. This study aimed to test Salkovskis's model by examining the role of cognitive biases (responsibility, thought-action fusion, and thought control) as well as distress in the relationship between intrusive thoughts and obsessive-compulsive symptoms in an undergraduate sample of 326 students. An existing measure of intrusive thoughts (the Revised Obsessional Intrusions Inventory) was modified for this study to include a scale of distress associated with each intrusive thought in addition to the current frequency scale. When the Yale-Brown Obsessive-Compulsive Scale was used as the measure of OCD symptoms, a significant interaction effect of frequency and distress of intrusive thoughts resulted. Additionally, a significant three-way interaction of Frequency × Distress × Responsibility was found when the Obsessive Compulsive Inventory-Revised was used as the measure of OCD symptoms. These results indicate that the appraisal of intrusive thoughts is important in predicting OCD symptoms, thus providing support for Salkovskis's model of OCD.

  12. Mafic inclusions in Yosemite granites and Lassen Pk lavas: records of complex crust-mantle interactions

    Energy Technology Data Exchange (ETDEWEB)

    Reid, J.B. Jr.; Flinn, J.E.

    1985-01-01

    This study compares three small-scale magmatic systems dominated by mafic/felsic interaction that appear to be analogs to the evolution of their larger host systems: mafic inclusions from modern Lassen Pk lavas along with inclusions and related synplutonic dike materials from granitoids in the Tuolumne Intrusive Series. Each system represents quickly chilled mafic melt previously contaminated by digestion of rewarmed, super-solidus felsic hosts. Contaminants occur in part as megacrysts of reworked oligoclase with lesser hb and biot. Within each group MgO-variation diagrams for Fe, Ca, Ti, Si are strikingly linear (r>.96); alkalis are decidedly less regular, and many hybrid rocks show a curious, pronounced Na enrichment. Field data, petrography, and best fit modeling suggests this may result from flow concentration of oligoclase xenocrysts within contaminated synplutonic dikes, and is preserved in the inclusions when dike cores chill as pillows in their felsic host. Dissolution of mafic inclusions erases these anomalies and creates a more regular series of two-component mafic-felsic mixtures in the large host system. The inclusions and dikes thus appear to record a variety of late-stage mafic-felsic interactive processes that earlier and on a larger scale created much of the compositional variety of their intermediate host rocks.

  13. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  14. Segmented Spiral Waves and Anti-phase Synchronization in a Model System with Two Identical Time-Delayed Coupled Layers

    International Nuclear Information System (INIS)

    Yuan Guoyong; Yang Shiping; Wang Guangrui; Chen Shigang

    2008-01-01

    In this paper, we consider a model system with two identical time-delayed coupled layers. Synchronization and anti-phase synchronization are exhibited in the reactive system without diffusion term. New segmented spiral waves, which are constituted by many thin trips, are found in each layer of two identical time-delayed coupled layers, and are different from the segmented spiral waves in a water-in-oil aerosol sodium bis(2-ethylhexyl) sulfosuccinate (AOT) micro-emulsion (ME) (BZ-AOT system), which consists of many small segments. 'Anti-phase spiral wave synchronization' can be realized between the first layer and the second one. For different excitable parameters, we also give the minimum values of the coupling strength to generate segmented spiral waves and the tip orbits of spiral waves in the whole bilayer.

  15. Saharan dust intrusions in Spain: Health impacts and associated synoptic conditions.

    Science.gov (United States)

    Díaz, Julio; Linares, Cristina; Carmona, Rocío; Russo, Ana; Ortiz, Cristina; Salvador, Pedro; Trigo, Ricardo Machado

    2017-07-01

    A lot of papers have been published about the impact on mortality of Sahara dust intrusions in individual cities. However, there is a lack of studies that analyse the impact on a country and scarcer if in addition the analysis takes into account the meteorological conditions that favour these intrusions. The main aim is to examine the effect of Saharan dust intrusions on daily mortality in different Spanish regions and to characterize the large-scale atmospheric circulation anomalies associated with such dust intrusions. For determination of days with Saharan dust intrusions, we used information supplied by the Ministry of Agriculture, Food & Environment, it divides Spain into 9 main areas. In each of these regions, a representative province was selected. A time series analysis has been performed to analyse the relationship between daily mortality and PM 10 levels in the period from 01.01.04 to 31.12.09, using Poisson regression and stratifying the analysis by the presence or absence of Saharan dust advections. The proportion of days on which there are Saharan dust intrusions rises to 30% of days. The synoptic pattern is characterised by an anticyclonic ridge extending from northern Africa to the Iberian Peninsula. Particulate matter (PM) on days with intrusions are associated with daily mortality, something that does not occur on days without intrusions, indicating that Saharan dust may be a risk factor for daily mortality. In other cases, what Saharan dust intrusions do is to change the PM-related mortality behaviour pattern, going from PM 2.5 . A study such as the one conducted here, in which meteorological analysis of synoptic situations which favour Saharan dust intrusions, is combined with the effect on health at a city level, would seem to be crucial when it comes to analysing the differentiated mortality pattern in situations of Saharan dust intrusions. Copyright © 2017 Elsevier Inc. All rights reserved.

  16. An evaluation of classification algorithms for intrusion detection ...

    African Journals Online (AJOL)

    An evaluation of classification algorithms for intrusion detection. ... Log in or Register to get access to full text downloads. ... Most of the available IDSs use all the 41 features in the network to evaluate and search for intrusive pattern in which ...

  17. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  18. A two-stage rule-constrained seedless region growing approach for mandibular body segmentation in MRI.

    Science.gov (United States)

    Ji, Dong Xu; Foong, Kelvin Weng Chiong; Ong, Sim Heng

    2013-09-01

    Extraction of the mandible from 3D volumetric images is frequently required for surgical planning and evaluation. Image segmentation from MRI is more complex than CT due to lower bony signal-to-noise. An automated method to extract the human mandible body shape from magnetic resonance (MR) images of the head was developed and tested. Anonymous MR images data sets of the head from 12 subjects were subjected to a two-stage rule-constrained region growing approach to derive the shape of the body of the human mandible. An initial thresholding technique was applied followed by a 3D seedless region growing algorithm to detect a large portion of the trabecular bone (TB) regions of the mandible. This stage is followed with a rule-constrained 2D segmentation of each MR axial slice to merge the remaining portions of the TB regions with lower intensity levels. The two-stage approach was replicated to detect the cortical bone (CB) regions of the mandibular body. The TB and CB regions detected from the preceding steps were merged and subjected to a series of morphological processes for completion of the mandibular body region definition. Comparisons of the accuracy of segmentation between the two-stage approach, conventional region growing method, 3D level set method, and manual segmentation were made with Jaccard index, Dice index, and mean surface distance (MSD). The mean accuracy of the proposed method is [Formula: see text] for Jaccard index, [Formula: see text] for Dice index, and [Formula: see text] mm for MSD. The mean accuracy of CRG is [Formula: see text] for Jaccard index, [Formula: see text] for Dice index, and [Formula: see text] mm for MSD. The mean accuracy of the 3D level set method is [Formula: see text] for Jaccard index, [Formula: see text] for Dice index, and [Formula: see text] mm for MSD. The proposed method shows improvement in accuracy over CRG and 3D level set. Accurate segmentation of the body of the human mandible from MR images is achieved with the

  19. Rb-Sr and Nd-Sr isotope geochemistry and petrogenesis of the Misho Mountains mafic dikes (NW Iran

    Directory of Open Access Journals (Sweden)

    Maryam Ahankoub

    2017-02-01

    Full Text Available Introduction There are some theories about the Paleotethys event during the Paleozoic that have been proposed by geologists (Metcalfe, 2006. Some scientist offered some pieces of evidence about the northern margin of Gondwana (Zhu et al., 2010. The Paleotethys Ocean and Hercynian orogenic report first in Iran, have been Offered from the Morrow and Misho Mountain (Eftekharnejad, 1981. Misho Mountains is located between the north and south Misho faults and cause the formation of a positive flower structure (Moayyed and Hossainzade, 2011. There is theory about Misho southern fault as the best candidate of the Paleotethys suture zone (Moayyed and Hossainzade, 2011. Geochemistry and Sr –Nd isotopic data of the A2 granitic and Synite rocks of the East Misho, indicate that the magmatism post collision has occurred in the active continental margin by extensional zones of the following the closure of the Paleotethys (Ahankoub, 2012. Granite and syenite rocks have been cut by mafic dikes. Mafic dikes are often formed in extensional tectonic settings related to mantle plume or continental break –up (Zhu et al., 2009. In this paper, we use the geochemistry and Nd-Sr isotope data to determined petrogenesis, tectono-magmatic setting and age of Misho mafic dikes. Materials and methods After petrography study of 30 thin sections of mafic dike rocks, 8 samples were selected for whole-rock chemical analyses using ICP-MS and ICP-AES instruments by ACME Company in Vancouver, Canada. We prepared 6 sample For Sm-Nd and Rb-Sr analysis. Sr and Nd isotope ratios were measured with a thermal ionization mass spectrometer, VG Sector 54–30 at the Nagoya University. The isotope abundances of Rb, Sr, Nd, and Sm were measured by the ID method with a Finnigan MAT Thermoquad THQ thermal ionization quadrupole mass spectrometer at the Nagoya University. NBS987 and JNdi-1 were measured as natural Sr and Nd isotope ratio standards (Tanaka et al., 2000. Averages and 2σ errors

  20. Non-Intrusive Intelligibility Prediction Using a Codebook-Based Approach

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Kavalekalam, Mathew Shaji; Xenaki, Angeliki

    2017-01-01

    It could be beneficial for users of hearing aids if these were able to automatically adjust the processing according to the speech intelligibility in the specific acoustic environment. Most speech intelligibility metrics are intrusive, i.e., they require a clean reference signal, which is rarely...... a high correlation between the proposed non-intrusive codebookbased STOI (NIC-STOI) and the intrusive STOI indicating that NIC-STOI is a suitable metric for automatic classification of speech signals...

  1. Quantification of intrusive/retraction force and moment generated during en-masse retraction of maxillary anterior teeth using mini-implants: A conceptual approach

    Directory of Open Access Journals (Sweden)

    A. Sumathi Felicita

    Full Text Available ABSTRACT Objective: The aim of the present study was to clarify the biomechanics of en-masse retraction of the upper anterior teeth and attempt to quantify the different forces and moments generated using mini-implants and to calculate the amount of applied force optimal for en-masse intrusion and retraction using mini-implants. Methods: The optimum force required for en-masse intrusion and retraction can be calculated by using simple mathematical formulae. Depending on the position of the mini-implant and the relationship of the attachment to the center of resistance of the anterior segment, different clinical outcomes are encountered. Using certain mathematical formulae, accurate measurements of the magnitude of force and moment generated on the teeth can be calculated for each clinical outcome. Results: Optimum force for en-masse intrusion and retraction of maxillary anterior teeth is 212 grams per side. Force applied at an angle of 5o to 16o from the occlusal plane produce intrusive and retraction force components that are within the physiologic limit. Conclusion: Different clinical outcomes are encountered depending on the position of the mini-implant and the length of the attachment. It is possible to calculate the forces and moments generated for any given magnitude of applied force. The orthodontist can apply the basic biomechanical principles mentioned in this study to calculate the forces and moments for different hypothetical clinical scenarios.

  2. Petrology, geochemistry and tectonic settings of the mafic dikes and ...

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    margins of the basin, whereas, others are aligned .... areas of mantle upwelling, igneous intrusions, deep ... to and during the sedimentary accumulation, and ...... The development of continental margins in plate tectonic theory; J. Aust. Petrol.

  3. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D. L.; Michlich, B. J.

    2000-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute nuclear technology and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested

  4. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D.L.; Micklich, B.J.

    2001-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute 'nuclear technology' and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested. (author)

  5. State-of-stress in magmatic rift zones: Predicting the role of surface and subsurface topography

    Science.gov (United States)

    Oliva, S. J. C.; Ebinger, C.; Rivalta, E.; Williams, C. A.

    2017-12-01

    Continental rift zones are segmented along their length by large fault systems that form in response to extensional stresses. Volcanoes and crustal magma chambers cause fundamental changes to the density structure, load the plates, and alter the state-of-stress within the crust, which then dictates fracture orientation. In this study, we develop geodynamic models scaled to a structure, petrologic and thermodynamic studies constrain material densities, and seismicity and structural analyses constrain active and time-averaged kinematics. This area is an ideal test area because a 60º stress rotation is observed in time-averaged fault and magma intrusion, and in local seismicity, and because this was the site of a large volume dike intrusion and seismic sequence in 2007. We use physics-based 2D and 3D models (analytical and finite elements) constrained by data from active rift zones to quantify the effects of loading on state-of-stress. By modeling varying geometric arrangements, and density contrasts of topographic and subsurface loads, and with reasonable regional extensional forces, the resulting state-of-stress reveals the favored orientation for new intrusions. Although our models are generalized, they allow us to evaluate whether a magmatic system (surface and subsurface) can explain the observed stress rotation, and enable new intrusions, new faults, or fault reactivation with orientations oblique to the main border faults. Our results will improve our understanding of the different factors at play in these extensional regimes, as well as contribute to a better assessment of the hazards in the area.

  6. Resolving the architecture of monogenetic feeder systems from exposures of extinct volcanic fields

    Science.gov (United States)

    Muirhead, J.; Van Eaton, A. R.; Re, G.; White, J. D. L.; Ort, M. H.

    2016-12-01

    Monogenetic volcanic fields pose hazards to a number of major cities worldwide. During an eruption, the evolution of the intrusive feeder network modulates eruption behavior and location, as well as the warning signs of impending activity. However, historical examples of monogenetic eruptions are rare, particularly those monitored with the modern tools required to constrain the geometry and interconnectivity of subsurface intrusive feeders (e.g., InSAR, GPS). Geologic exposures in extinct fields around the Colorado Plateau provide clues to the geometry of shallow intrusions (<1000 m depth) that feed monogenetic volcanoes. We present field- and satellite-based observations of exposed intrusions in the Hopi Buttes volcanic field (Arizona), which reveal that many eruptions were fed by interconnected dike-sill systems. Results from the Hopi Buttes show that volcanic cone alignment studies are biased to the identification of dike intrusions, and thereby neglect the important contributions of sills to shallow feeder systems. For example, estimates of intruded volumes in fields exhumed by uplift and erosion in Utah and Arizona show that sills make up 30 - 92% of the shallow intruded volume within 1000 m of the paleosurface. By transporting magma toward and away from eruptive conduits, these sills likely played a role in modulating eruption styles (e.g., explosive vs effusive) and controlling lateral vent migrations. Sill transitions at Hopi Buttes would have produced detectable surface uplifts, and illustrate the importance of geological studies for informing interpretations of geodetic and seismological data during volcanic crises.

  7. A model for the dynamics of crater-centered intrusion: Application to lunar floor-fractured craters

    Science.gov (United States)

    Thorey, Clément; Michaut, Chloé

    2014-01-01

    Lunar floor-fractured craters are a class of craters modified by post-impact mechanisms. They are defined by distinctive shallow floors that are convex or plate-like, sometimes with a wide floor moat bordering the wall region. Radial, concentric, and polygonal floor fractures suggest an endogenous process of modification. Two mechanisms have been proposed to account for such deformations: viscous relaxation and spreading of a magma intrusion at depth below the crater. To test the second assumption and bring more constraints on the intrusion process, we develop a model for the dynamics of magma spreading below an elastic overlying layer with a crater-like topography. As predicted in earlier more qualitative studies, the increase in lithostatic pressure at the crater wall zone prevents the intrusion from spreading laterally, leading to the thickening of the intrusion. Additionally, our model shows that the final crater floor appearance after the uplift, which can be convex or flat, with or without a circular moat bordering the wall zone, depends on the elastic thickness of the layer overlying the intrusion and on the crater size. Our model provides a simple formula to derive the elastic thickness of the overlying layer hence a minimum estimate for the intrusion depth. Finally, our model suggests that crust redistribution by cratering must have controlled magma ascent below most of these craters.

  8. Salt Intrusion in the Tweed Estuary

    Science.gov (United States)

    Uncles, R. J.; Stephens, J. A.

    1996-09-01

    Results are presented from a 2-week field programme in the Tweed Estuary, U.K. Maximum values of the empirically based Estuarine Richardson Number, Ri E, occurred during neap tides, and minimum values occurred during spring tides. Estimated values of Ri Evaried between 0·3 and 2·3, suggesting the occurrence of partially mixed to stratified conditions, depending on tidal state and freshwater inflow. These relatively large values of Ri Ewere consistent with both observed strong salinity stratification and large salt fluxes due to vertical shear transport. Low values (0·5) values in the halocline. A velocity maximum occurred within the halocline during the early flood. Wave-like spatial oscillations of the halocline occurred on the ebb. The oscillation troughs were situated above deep holes located just down-estuary of the rail and old road bridges. There was an indication that the constricted flow between the bridges' arches resulted in enhanced mixing of near-surface waters and a thickening of the halocline. It is also possible that these wave-like structures were stationary, near-critical internal lee waves, triggered by the deep holes. Trapping of high-salinity waters occurred on the ebb. Saline pools were isolated within a deep hole or deeper section of bed by the falling halocline. When the salt wedge moved further down-estuary, the ' trapped ' waters were subjected to strongly ebbing, overlying freshwater, and were subsequently entrained and flushed. The salinity intrusion was a strong function of spring-neap tidal state and a weaker function of freshwater inflow. The estimated salinity intrusion varied from about 4·7 to 7·6 km during the fieldwork period. The strong dependence on tidal range followed from the comparable lengths of the tidal excursion and salinity intrusion. Long excursion lengths were also partly responsible for the short residence (or flushing) times and their strong dependence on spring-neap tidal state. For typical summer freshwater

  9. Nuisance alarm suppression techniques for fibre-optic intrusion detection systems

    Science.gov (United States)

    Mahmoud, Seedahmed S.; Visagathilagar, Yuvaraja; Katsifolis, Jim

    2012-02-01

    The suppression of nuisance alarms without degrading sensitivity in fibre-optic intrusion detection systems is important for maintaining acceptable performance. Signal processing algorithms that maintain the POD and minimize nuisance alarms are crucial for achieving this. A level crossings algorithm is presented for suppressing torrential rain-induced nuisance alarms in a fibre-optic fence-based perimeter intrusion detection system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr, and intrusion events can be detected simultaneously during rain periods. The use of a level crossing based detection and novel classification algorithm is also presented demonstrating the suppression of nuisance events and discrimination of nuisance and intrusion events in a buried pipeline fibre-optic intrusion detection system. The sensor employed for both types of systems is a distributed bidirectional fibre-optic Mach Zehnder interferometer.

  10. Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM in advanced metering infrastructure of smart grid.

    Directory of Open Access Journals (Sweden)

    Yuancheng Li

    Full Text Available Advanced Metering Infrastructure (AMI realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can't satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy.

  11. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  12. The Sonju Lake layered intrusion, northeast Minnesota: Internal structure and emplacement history inferred from magnetic fabrics

    Science.gov (United States)

    Maes, S.M.; Tikoff, B.; Ferre, E.C.; Brown, P.E.; Miller, J.D.

    2007-01-01

    The Sonju Lake intrusion (SLI), in northeastern Minnesota, is a layered mafic complex of Keweenawan age (1096.1 ?? 0.8 Ma) related to the Midcontinent rift. The cumulate paragenesis of the intrusion is recognized as broadly similar to the Skaergaard intrusion, a classic example of closed-system differentiation of a tholeiitic mafic magma. The SLI represents nearly closed-system differentiation through bottom-up fractional crystallization. Geochemical studies have identified the presence of a stratabound, 50-100 m thick zone anomalously enriched in Au + PGE. Similar to the PGE reefs of the Skaergaard intrusion, this PGE-enriched zone is hosted within oxide gabbro cumulates, about two-third of the way up from the base of the intrusion. We present a petrofabric study using the anisotropy of magnetic susceptibility (AMS) to investigate the emplacement and flow patterns within the Sonju Lake intrusion. Petrographic and electron microprobe studies, combined with AMS and hysteresis measurements indicate the primary source of the magnetic signal is pseudo-single domain (PSD) magnetite or titanomagnetite. Low field AMS was measured at 32 sites within the Sonju Lake intrusion, which provided information about primary igneous fabrics. The magnetic fabrics in the layered series of the Sonju Lake intrusion are consistent with sub-horizontal to inclined emplacement of the intrusion and show evidence that the cumulate layers were deposited in a dynamic environment. Well-aligned magnetic lineations, consistently plunging shallowly toward the southwest, indicate the source of the magma is a vertical sill-like feeder, presumably located beneath the Finland granite. The Finland granite acted as a density trap for the Sonju Lake magmas, forcing lateral flow of magma to the northeast. The strongly oblate magnetic shape fabrics indicate the shallowly dipping planar fabrics were enhanced by compaction of the crystal mush. ?? 2007 Elsevier B.V. All rights reserved.

  13. Notes on saltwater intrusion and trace element distribution in Metro Manila groundwaters

    International Nuclear Information System (INIS)

    Santos, G. Jr.; Ramos, A.F.; Fernandez, L.G.; Almoneda, R.V.; Garcia, T.Y.; Cruz, C.C.; Petrache, C.A.; Andal, T.T.; Alcantara, E.

    1989-01-01

    Preliminary analyses of waters for uranium and other trace elements from deepwells operated by the Metropolitan Waterworks and Sewerage System (MWSS) in Metro Manila were performed. Uranium, which ranged from 0.2 ppb to 6 ppb, was correlated with saltwater intrusion. Values >=0.8 ppb for uranium were considered indicative of saline water intrusion in the aquifers. Saline water intrusions in Malabon, Navotas, Paranaque, Las Pinas, Bacoor, Imus, Kawit, Pasig, Antipolo, San Mateo, Taguig, Cainta, Taytay, Alabang and Muntinlupa were noted. Most of these areas were also identified by MWSS as being affected by saltwater intrusion. Tritium values ranged from 0 (below detection limits) to 44 tritium units. Except for one well in Muntinlupa, all the values obtained were below the lower limit of detection of 30.83 T.U. Mercury contents in six well locations had values above the maximum limit set by the National Standards for Drinking Water. Four wells exceeded the permissible level for manganese while two wells had iron concentrations greater than the National Standards. Other trace element concentrations such as Cr, Pb, Zn, Co and Ni either did not exceed their permissible levels or were not included in the National Standards. (Auth.). 6 refs.; 1 tab.; 3 figs

  14. SU-E-J-128: Two-Stage Atlas Selection in Multi-Atlas-Based Image Segmentation

    International Nuclear Information System (INIS)

    Zhao, T; Ruan, D

    2015-01-01

    Purpose: In the new era of big data, multi-atlas-based image segmentation is challenged by heterogeneous atlas quality and high computation burden from extensive atlas collection, demanding efficient identification of the most relevant atlases. This study aims to develop a two-stage atlas selection scheme to achieve computational economy with performance guarantee. Methods: We develop a low-cost fusion set selection scheme by introducing a preliminary selection to trim full atlas collection into an augmented subset, alleviating the need for extensive full-fledged registrations. More specifically, fusion set selection is performed in two successive steps: preliminary selection and refinement. An augmented subset is first roughly selected from the whole atlas collection with a simple registration scheme and the corresponding preliminary relevance metric; the augmented subset is further refined into the desired fusion set size, using full-fledged registration and the associated relevance metric. The main novelty of this work is the introduction of an inference model to relate the preliminary and refined relevance metrics, based on which the augmented subset size is rigorously derived to ensure the desired atlases survive the preliminary selection with high probability. Results: The performance and complexity of the proposed two-stage atlas selection method were assessed using a collection of 30 prostate MR images. It achieved comparable segmentation accuracy as the conventional one-stage method with full-fledged registration, but significantly reduced computation time to 1/3 (from 30.82 to 11.04 min per segmentation). Compared with alternative one-stage cost-saving approach, the proposed scheme yielded superior performance with mean and medium DSC of (0.83, 0.85) compared to (0.74, 0.78). Conclusion: This work has developed a model-guided two-stage atlas selection scheme to achieve significant cost reduction while guaranteeing high segmentation accuracy. The benefit

  15. Eating-related Intrusive Thoughts Inventory: exploring the dimensionality of eating disorder symptoms.

    Science.gov (United States)

    Perpiñá, Conxa; Roncero, María; Belloch, Amparo; Sánchez-Reales, Sergio

    2011-08-01

    The aims of this study were, first, to examine the structure and validity of the Eating-related Intrusive Thoughts Inventory (INPIAS), a self-report questionnaire designed to assess eating disorders related to intrusive thoughts (EDITs), and second, to explore the existence of a continuum ranging from normal to abnormal thought intrusions related to eating, weight, and shape. Participants were 574 (408 women) nonclinical community individuals. Analyses revealed that EDITs can be clustered into three sets: appearance-dieting, need to exercise, and thoughts-impulses related to eating disorders. EDITs' consequences showed a two-factor structure: emotional consequences/personal meaning and thought-action fusion responsibility; and four factors of strategies: "anxiety," suppression, obsessive-compulsive rituals, and distraction. The sample was then divided according to reported restrained eating. The High dietary restraint group reported a higher frequency of EDITs, whereas differences in the other factors were mediated by depression, anxiety, and obsessionality. The results suggest that eating disorder-related cognitions are experienced by nonclinical individuals, and distributed on a continuum.

  16. Paleomagnetism of Early Cambrian Itabaiana mafic dikes (NE Brazil) and the final assembly of Gondwana

    Science.gov (United States)

    Trindade, Ricardo I. F.; D'Agrella-Filho, Manoel S.; Epof, Igor; Brito Neves, Benjamim B.

    2006-04-01

    Paleomagnetic analysis on 15 early Cambrian mafic dikes from Itabaiana (Paraíba State) yielded a southern (northwestern) direction with steep upward (downward) inclination ( Dm = 167.5°, Im = - 63.7°, α95 = 7.3°). AF and Thermal demagnetization, thermomagnetic curves, and hysteresis results suggest that this component is dominantly carried by fine-grained SD magnetite. The high stability of this component and positive baked contact tests on three dikes indicate it represents a primary thermoremanent magnetization. Ar-Ar analysis on whole-rock samples from two sites provides a strong constraint on the age of the Itabaiana paleomagnetic pole (134.6° E, 34.9° S; A95 = 7.3, K = 28) defined by plateau ages of 525 ± 5 and 526 ± 4 Ma. This pole completely satisfies six out of the seven quality criteria proposed by Van der Voo [R. Van der Voo, The reliability of paleomagnetic data, Tectonophysics 184 (1990) 1-9.] and permits a tight constraint on the Early Cambrian sector of the Gondwana apparent polar wander path. Paleogeographic reconstructions consistent with the available paleomagnetic and geological record show that Gondwana was sutured along three major orogenies, the Mozambique (Brasilano/Pan-African) Orogeny (800-650 Ma), the Kuunga Orogeny (570-530 Ma) and the Pampean-Araguaia Orogeny (540-520 Ma). We suggest that after rifting away from Laurentia at the end of the Neoproterozoic, opening the Iapetus ocean, the Amazonian craton and minor adjoining blocks, such as Rio Apa and Pampia, collided with the proto-Gondwana by Cambrian times at ca. 530-520 Ma. Unless for small adjustments, Gondwana was completely formed by 525 Ma whose paleogeography is defined by the Itabaiana pole.

  17. Spinal segmental dysgenesis

    Directory of Open Access Journals (Sweden)

    N Mahomed

    2009-06-01

    Full Text Available Spinal segmental dysgenesis is a rare congenital spinal abnormality , seen in neonates and infants in which a segment of the spine and spinal cord fails to develop normally . The condition is segmental with normal vertebrae above and below the malformation. This condition is commonly associated with various abnormalities that affect the heart, genitourinary, gastrointestinal tract and skeletal system. We report two cases of spinal segmental dysgenesis and the associated abnormalities.

  18. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  19. An ontology-based intrusion patterns classification system | Shonubi ...

    African Journals Online (AJOL)

    Studies have shown that computer intrusions have been on the increase in recent times. Many techniques and patterns are being used by intruders to gain access to data on host computer networks. In this work, intrusion patterns were identified and classified and inherent knowledge were represented using an ontology of ...

  20. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    Seawater intrusion; coastal aquifers; density-dependent flow and ... The seawater intrusion mechanism in coastal aquifers generally causes the occurrence of ... (4) The dynamic viscosity of the fluid does not change with respect to salinity and.

  1. EroGRASS : Failure of grass cover layers at seaward and shoreward dike slopes. design, construction and performance

    NARCIS (Netherlands)

    Verhagen, H.J.; Verheij, H.J.; Cao, T.M.; Dassanayake, D.; Roelvink, D.; Piontkowitz, T.

    2009-01-01

    A large number of the dikes in the North Sea and Baltic Sea regions are covered with grass that is exposed to hydraulic loading from waves and currents during storm surges. During previous storm surges the grass cover layers often showed large strength and remained undamaged. A clear physical

  2. A Machine Learning Based Intrusion Impact Analysis Scheme for Clouds

    Directory of Open Access Journals (Sweden)

    Junaid Arshad

    2012-01-01

    Full Text Available Clouds represent a major paradigm shift, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of on demand expandable computing infrastructures. However, Clouds introduce novel security challenges which need to be addressed to facilitate widespread adoption. This paper is focused on one such challenge - intrusion impact analysis. In particular, we highlight the significance of intrusion impact analysis for the overall security of Clouds. Additionally, we present a machine learning based scheme to address this challenge in accordance with the specific requirements of Clouds for intrusion impact analysis. We also present rigorous evaluation performed to assess the effectiveness and feasibility of the proposed method to address this challenge for Clouds. The evaluation results demonstrate high degree of effectiveness to correctly determine the impact of an intrusion along with significant reduction with respect to the intrusion response time.

  3. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    -intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results......Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non...

  4. Low Cost Skin Segmentation Scheme in Videos Using Two Alternative Methods for Dynamic Hand Gesture Detection Method

    Directory of Open Access Journals (Sweden)

    Eman Thabet

    2017-01-01

    Full Text Available Recent years have witnessed renewed interest in developing skin segmentation approaches. Skin feature segmentation has been widely employed in different aspects of computer vision applications including face detection and hand gestures recognition systems. This is mostly due to the attractive characteristics of skin colour and its effectiveness to object segmentation. On the contrary, there are certain challenges in using human skin colour as a feature to segment dynamic hand gesture, due to various illumination conditions, complicated environment, and computation time or real-time method. These challenges have led to the insufficiency of many of the skin color segmentation approaches. Therefore, to produce simple, effective, and cost efficient skin segmentation, this paper has proposed a skin segmentation scheme. This scheme includes two procedures for calculating generic threshold ranges in Cb-Cr colour space. The first procedure uses threshold values trained online from nose pixels of the face region. Meanwhile, the second procedure known as the offline training procedure uses thresholds trained out of skin samples and weighted equation. The experimental results showed that the proposed scheme achieved good performance in terms of efficiency and computation time.

  5. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  6. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  7. Magmatic architecture within a rift segment: Articulate axial magma storage at Erta Ale volcano, Ethiopia

    Science.gov (United States)

    Xu, Wenbin; Rivalta, Eleonora; Li, Xing

    2017-10-01

    Understanding the magmatic systems beneath rift volcanoes provides insights into the deeper processes associated with rift architecture and development. At the slow spreading Erta Ale segment (Afar, Ethiopia) transition from continental rifting to seafloor spreading is ongoing on land. A lava lake has been documented since the twentieth century at the summit of the Erta Ale volcano and acts as an indicator of the pressure of its magma reservoir. However, the structure of the plumbing system of the volcano feeding such persistent active lava lake and the mechanisms controlling the architecture of magma storage remain unclear. Here, we combine high-resolution satellite optical imagery and radar interferometry (InSAR) to infer the shape, location and orientation of the conduits feeding the 2017 Erta Ale eruption. We show that the lava lake was rooted in a vertical dike-shaped reservoir that had been inflating prior to the eruption. The magma was subsequently transferred into a shallower feeder dike. We also find a shallow, horizontal magma lens elongated along axis inflating beneath the volcano during the later period of the eruption. Edifice stress modeling suggests the hydraulically connected system of horizontal and vertical thin magmatic bodies able to open and close are arranged spatially according to stresses induced by loading and unloading due to topographic changes. Our combined approach may provide new constraints on the organization of magma plumbing systems beneath volcanoes in continental and marine settings.

  8. Intrusion problematic during water supply systems’ operation

    OpenAIRE

    Jesus Mora-Rodriguez, P. Amparo López-Jimenez, Helena M. Ramos

    2011-01-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuse...

  9. Volcanic and Tectonic Activity in the Red Sea Region (2004-2013): Insights from Satellite Radar Interferometry and Optical Imagery

    KAUST Repository

    Xu, Wenbin

    2015-04-01

    Studying recent volcanic and tectonic events in the Red Sea region is important for improving our knowledge of the Red Sea plate boundary and for regional geohazard assessments. However, limited information has been available about the past activity due to insufficient in-situ data and remoteness of some of the activity. In this dissertation, I have used satellite remote sensing to derive new information about several recent volcanic and tectonic events in the Red Sea region. I first report on three volcanic eruptions in the southern Red Sea, the 2007-8 Jebel at Tair eruption and the 2011-12 & 2013 Zubair eruptions, which resulted in formation of two new islands. Series of high- resolution optical images were used to map the extent of lava flows and to observe and analyze the growth and destructive processes of the new islands. I used Interferometric Synthetic Aperture Radar (InSAR) data to study the evolution of lava flows, to estimate their volumes, as well as to generate ground displacements maps, which were used to model the dikes that fed the eruptions. I then report on my work of the 2009 Harrat Lunayyir dike intrusion and the 2004 Tabuk earthquake sequence in western Saudi Arabia. I used InSAR observations and stress calculations to study the intruding dike at Harrat Lunayyir, while I combined InSAR data and Bayesian estimation to study the Tabuk earthquake activity. The key findings of the thesis are: 1) The recent volcanic eruptions in the southern Red Sea indicate that the area is magmatically more active than previously acknowledged and that a rifting episode has been taken place in the southern Red Sea; 2) Stress interactions between an ascending dike intrusion and normal faulting on graben-bounding faults above the dike can inhibit vertical propagation of magma towards the surface; 3) InSAR observations can improve locations of shallow earthquakes and fault model uncertainties are useful to associate earthquake activity with mapped faults; 4). The

  10. Appraisal and control of sexual and non-sexual intrusive thoughts in university students.

    Science.gov (United States)

    Clark, D A; Purdon, C; Byers, E S

    2000-05-01

    This study examined differences in the appraisal and thought control strategies associated with the perceived control of unwanted sexual and non-sexual intrusive thoughts. Eleven appraisal dimensions, subjective physiological arousal and 10 thought control strategies were measured in 171 university students who were administered the Revised Obsessive Intrusions Inventory-Sex Version, a self-report measure of unwanted intrusive thoughts. Thought-action fusion (TAF) likelihood was a significant unique predictor of the perceived controllability of respondents' most upsetting sexual and non-sexual intrusive thought. Moreover greater subjective physiological arousal was a significant predictor of reduced control over sexual intrusions, whereas worry that one might act on an intrusive thought and greater effort to control the intrusion were significant unique predictors of the control of non-sexual intrusive thoughts. Various thought control strategies were more often used in response to non-sexual than sexual cognitions. The results are discussed in terms of the differential role of various appraisal processes in the control of unwanted sexual and non-sexual thoughts.

  11. Attacks and Intrusion Detection in Cloud Computing Using Neural Networks and Particle Swarm Optimization Algorithms

    Directory of Open Access Journals (Sweden)

    Ahmad Shokuh Saljoughi

    2018-01-01

    Full Text Available Today, cloud computing has become popular among users in organizations and companies. Security and efficiency are the two major issues facing cloud service providers and their customers. Since cloud computing is a virtual pool of resources provided in an open environment (Internet, cloud-based services entail security risks. Detection of intrusions and attacks through unauthorized users is one of the biggest challenges for both cloud service providers and cloud users. In the present study, artificial intelligence techniques, e.g. MLP Neural Network sand particle swarm optimization algorithm, were used to detect intrusion and attacks. The methods were tested for NSL-KDD, KDD-CUP datasets. The results showed improved accuracy in detecting attacks and intrusions by unauthorized users.

  12. The global distribution of giant radiating dike swarms on Venus: Implications for the global stress state

    Science.gov (United States)

    Grosfils, Eric B.; Head, James W.

    1994-01-01

    Magellan radar data of Venus reveal 163 large radial lineament systems composed of graben, fissure, and fracture elements. On the basis of their structure, plan view geometry, and volcanic associations, at least 72% are interpreted to have formed primarily through subsurface dike swarm emplacement, the remainder through uplift or a combination of these two mechanisms. The population of swarms is used to determine regional and global stress orientation. The stress configuration recorded from 330-210 deg E (Aphrodite Terra) is best explained by isostatic compensation of existing long wavelength topography or coupling between mantle flow and the lithosphere. The rest are correlated with concentrations of rifting and volcanism in the Beta-Atla-Themis region. The global stress field on Venus is different than that of Earth, where plate boundary forces dominate.

  13. Using external and internal locking plates in a two-stage protocol for treatment of segmental tibial fractures.

    Science.gov (United States)

    Ma, Ching-Hou; Tu, Yuan-Kun; Yeh, Jih-Hsi; Yang, Shih-Chieh; Wu, Chin-Hsien

    2011-09-01

    The tibial segmental fractures usually follow high-energy trauma and are often associated with many complications. We designed a two-stage protocol for these complex injuries. The aim of this study was to assess the outcome of tibial segmental fractures treated according to this protocol. A prospective series of 25 consecutive segmental tibial fractures were treated using a two-stage procedure. In the first stage, a low-profile locking plate was applied as an external fixator to temporarily immobilize the fractures after anatomic reduction had been achieved followed by soft-tissue reconstruction. The second stage involved definitive internal fixation with a locking plate using a minimally invasive percutaneous plate osteosynthesis technique. The median follow-up was 32 months (range, 20-44 months). All fractures achieved union. The median time for the proximal fracture union was 23 weeks (range, 12-30 weeks) and that for distal fracture union was 27 weeks (range, 12-46 weeks; p = 0.08). Functional results were excellent in 21 patients and good in 4 patients. There were three cases of delayed union of distal fracture. Valgus malunion >5 degrees occurred in two patients, and length discrepancy >1 cm was observed in two patients. Pin tract infection occurred in three patients. Use of the two-stage procedure for treatment of segmental tibial fractures is recommended. Surgeons can achieve good reduction with stable temporary fixation, soft-tissue reconstruction, ease of subsequent definitive fixation, and high union rates. Our patients obtained excellent knee and ankle joint motion, good functional outcomes, and a comfortable clinical course.

  14. Ferroan Dolomitization by Seawater Interaction with Mafic Igneous Dikes and Carbonate Host Rock at the Latemar Platform, Dolomites, Italy: Numerical Modeling of Spatial, Temporal, and Temperature Data

    Directory of Open Access Journals (Sweden)

    K. Blomme

    2017-01-01

    Full Text Available Numerous publications address the petrogenesis of the partially dolomitized Latemar carbonate platform, Italy. A common factor is interpretation of geochemical data in terms of heating via regional igneous activity that provided kinetically favorable conditions for replacement dolomitization. New field, petrographic, XRD, and geochemical data demonstrate a spatial, temporal, and geochemical link between replacement dolomite and local mafic igneous dikes that pervasively intrude the platform. Dikes are dominated by strongly altered plagioclase and clinopyroxene. Significantly, where ferroan dolomite is present, it borders dikes. We hypothesize that seawater interacted with mafic minerals, causing Fe enrichment in the fluid that subsequently participated in dolomitization. This hypothesis was tested numerically through thermodynamic (MELTS, Arxim-GEM and reactive flow (Arxim-LMA simulations. Results confirm that seawater becomes Fe-enriched during interaction with clinopyroxene (diopside-hedenbergite and plagioclase (anorthite-albite-orthoclase solid solutions. Reaction of modified seawater with limestone causes ferroan and nonferroan replacement dolomitization. Dolomite quantities are strongly influenced by temperature. At 40 to 80°C, ferroan dolomite proportions decrease with increasing temperature, indicating that Latemar dolomitization likely occurred at lower temperatures. This relationship between igneous dikes and dolomitization may have general significance due to the widespread association of carbonates with rifting-related igneous environments.

  15. Toddler inhibited temperament, maternal cortisol reactivity and embarrassment, and intrusive parenting.

    Science.gov (United States)

    Kiel, Elizabeth J; Buss, Kristin A

    2013-06-01

    The relevance of parenting behavior to toddlers' development necessitates a better understanding of the influences on parents during parent-child interactions. Toddlers' inhibited temperament may relate to parenting behaviors, such as intrusiveness, that predict outcomes later in childhood. The conditions under which inhibited temperament relates to intrusiveness, however, remain understudied. A multimethod approach would acknowledge that several levels of processes determine mothers' experiences during situations in which they witness their toddlers interacting with novelty. As such, the current study examined maternal cortisol reactivity and embarrassment about shyness as moderators of the relation between toddlers' inhibited temperament and maternal intrusive behavior. Participants included 92 24-month-old toddlers and their mothers. Toddlers' inhibited temperament and maternal intrusiveness were measured observationally in the laboratory. Mothers supplied saliva samples at the beginning of the laboratory visit and 20 minutes after observation. Maternal cortisol reactivity interacted with inhibited temperament in relation to intrusive behavior, such that mothers with higher levels of cortisol reactivity were observed to be more intrusive with more highly inhibited toddlers. Embarrassment related to intrusive behavior as a main effect. These results highlight the importance of considering child characteristics and psychobiological processes in relation to parenting behavior. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  16. Intrusions in story recall: when over-learned information interferes with episodic memory recall. Evidence from Alzheimer's disease.

    Science.gov (United States)

    De Anna, Francesca; Attali, Eve; Freynet, Laurence; Foubert, Lucie; Laurent, Aurore; Dubois, Bruno; Dalla Barba, Gianfranco

    2008-03-01

    Patients with Alzheimer's disease (AD) suffer from distortions of memory. Among such distortions, intrusions in memory tests are frequently observed. In this study we describe the performance of a group of mild AD patients and a group of normal controls on the recall of three different types of stories: a previously unknown story, a well-known fairy-tale (Cinderella), and a modified well-known fairy-tale (Little Red Riding Hood is not eaten by the wolf). The aim of our study was to test the hypothesis that in patients who tend to produce intrusions, over-learned information interferes with episodic recall, i.e., the retrieval of specific, unique past episodes. AD patients produced significantly more intrusions in the recall of the modified fairy-tale compared to the recall of the two other stories. Intrusions in the recall of the modified fairy-tale always consisted of elements of the original version of the story. We suggest that in AD patients intrusions may be traced back to the interference of strongly represented, over-learned information in episodic memory recall.

  17. Source characteristics and tectonic setting of mafic-ultramafic intrusions in North Xinjiang, NW China: Insights from the petrology and geochemistry of the Lubei mafic-ultramafic intrusion

    Science.gov (United States)

    Chen, Bao-Yun; Yu, Jin-Jie; Liu, Shuai-Jie

    2018-05-01

    The newly discovered Lubei sulfide-bearing mafic-ultramafic intrusion forms the western extension of the Huangshan-Jin'erquan mafic-ultramafic intrusion belt in East Tianshan, NW China. The Lubei intrusion comprises hornblende peridotite, lherzolite, and harzburgite in its southern portion, gabbro in its middle portion, and hornblende gabbro in its northern portion. Intrusive relationships indicate that three magma pulses were involved in the formation of the intrusion, and that they were likely evolved from a common primitive magma. Estimated compositions of the Lubei primitive magma are similar to those of island arc calc-alkaline basalt except for the low Na2O and CaO contents of the Lubei primitive magma. This paper reports on the mineral compositions, whole-rock major and trace element contents, and Rb-Sr and Sm-Nd isotopic compositions of the Lubei intrusion, and a zircon LA-MC-ICP-MS U-Pb age for hornblende gabbro. The Lubei intrusion is characterized by enrichment in large-ion lithophile elements, depletion in high-field-strength elements, and marked negative Nb and Ta anomalies, with enrichment in chondrite-normalized light rare earth elements. It exhibits low (87Sr/86Sr)i ratios of 0.70333-0.70636 and low (143Nd/144Nd)i ratios of 0.51214-0.51260, with positive εNd values of +4.01 to +6.33. LA-ICP-MS U-Pb zircon ages yielded a weighted-mean age of 287.9 ± 1.6 Ma for the Lubei intrusion. Contemporaneous mafic-ultramafic intrusions in different tectonic domains in North Xinjiang show similar geological and geochemical signatures to the Lubei intrusion, suggesting a source region of metasomatized mantle previously modified by hydrous fluids from the slab subducted beneath the North Xinjiang region in the early Permian. Metasomatism of the mantle was dominated by hydrous fluids and was related to subduction of the Paleo-Asian oceanic lithosphere during the Paleozoic. Sr-Nd-Pb isotopic compositions suggest that the mantle source was a mixture of depleted mid

  18. Unique Challenges in WiFi Intrusion Detection

    OpenAIRE

    Milliken, Jonny

    2014-01-01

    The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more deta...

  19. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  20. Formation of the Archean crust of the ancient Vodlozero domain (Baltic shield)

    Science.gov (United States)

    Arestova, N. A.; Chekulaev, V. P.; Lobach-Zhuchenko, S. B.; Kucherovskii, G. A.

    2015-03-01

    The available geological, petrological, and isotopic data on Archean rocks of the Baltic shield are used to analyze the formation of the crust of the ancient Vodlozero domain. This made it possible to reveal the succession of endogenic processes in different parts of the domain and correlate them between each other. Several stages of magmatic processes reflecting changes in magma-generation environments are definable in the crust formation. The earliest stages of magmatism (3.24 and 3.13-3.15 Ga) are mostly represented by rocks of the tonalite-trondhjemite-granodiorite association. The next stage of endogenic activity (3020-2900 Ma) was marked by the formation of volcanics of the komatiite-basalt and andesite-dacite associations constituting greenstone belts in marginal parts of the Vodlozero domain and basic dikes accompanied by layered pyroxenite-norite-diorite intrusion in its central part. These basic bodies crossing earlier tonalities were formed in extension settings related to the formation of the mantle plume, which is confirmed by the rock composition. This stage culminated in the formation of trondhjemites at margins of greenstone structure. The next stage of endogenic activity commenced at 2890-2840 Ma by the emplacement of high-magnesian gabbro and diorite dikes in the western margin of the domain, where they cross rocks of the tonalitetrondhjemite association. This stage was marked by the formation of intermediate-acid subvolcanic bodies and dikes as well as basite intrusions including the layered and differentiated Semch intrusion, the largest one in the Vodlozero domain. The stage culminated at approximately 2850 Ma in the emplacement of tonalities of the limited distribution being represented by the Shilos massif in the north of the domain and Shal'skii massif on the eastern shore of Lake Onega. The important stage in the geological history of the Vodlozero domain is the formation of the intracratonic Matkalakhta greenstone belt at approximately 2

  1. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  2. Acceptance- and imagery-based strategies can reduce chocolate cravings: A test of the elaborated-intrusion theory of desire.

    Science.gov (United States)

    Schumacher, Sophie; Kemps, Eva; Tiggemann, Marika

    2017-06-01

    The elaborated-intrusion theory of desire proposes that craving is a two-stage process whereby initial intrusions about a desired target are subsequently elaborated with mental imagery. The present study tested whether the craving reduction strategies of cognitive defusion and guided imagery could differentially target the intrusion and elaboration stages, respectively, and thus differentially impact the craving process. Participants were randomly assigned to a cognitive defusion, a guided imagery or a mind-wandering control condition. Pre- and post-intervention chocolate-related thoughts, intrusiveness of thoughts, vividness of imagery, craving intensity, and chocolate consumption were compared. Experiment 1 recruited a general sample of young women (n = 94), whereas Experiment 2 recruited a sample of chocolate cravers who wanted to reduce their chocolate consumption (n = 97). Across both experiments, cognitive defusion lowered intrusiveness of thoughts, vividness of imagery and craving intensity. Guided imagery reduced chocolate-related thoughts, intrusiveness, vividness and craving intensity for chocolate cravers (Experiment 2), but not for the general sample (Experiment 1). There were no group differences in chocolate consumption in either experiment. Results add to existing evidence supporting the elaborated-intrusion theory of desire in the food domain, and suggest that acceptance- and imagery-based techniques have potential for use in combatting problematic cravings. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. multiUQ: An intrusive uncertainty quantification tool for gas-liquid multiphase flows

    Science.gov (United States)

    Turnquist, Brian; Owkes, Mark

    2017-11-01

    Uncertainty quantification (UQ) can improve our understanding of the sensitivity of gas-liquid multiphase flows to variability about inflow conditions and fluid properties, creating a valuable tool for engineers. While non-intrusive UQ methods (e.g., Monte Carlo) are simple and robust, the cost associated with these techniques can render them unrealistic. In contrast, intrusive UQ techniques modify the governing equations by replacing deterministic variables with stochastic variables, adding complexity, but making UQ cost effective. Our numerical framework, called multiUQ, introduces an intrusive UQ approach for gas-liquid flows, leveraging a polynomial chaos expansion of the stochastic variables: density, momentum, pressure, viscosity, and surface tension. The gas-liquid interface is captured using a conservative level set approach, including a modified reinitialization equation which is robust and quadrature free. A least-squares method is leveraged to compute the stochastic interface normal and curvature needed in the continuum surface force method for surface tension. The solver is tested by applying uncertainty to one or two variables and verifying results against the Monte Carlo approach. NSF Grant #1511325.

  4. Comparison of fish assemblages in two disjoined segments of an oxbow lake in relation to connectivity

    Science.gov (United States)

    Dembkowski, Daniel J.; Miranda, Leandro E.

    2011-01-01

    Disconnection between adjacent habitat patches is one of the most notable factors contributing to the decreased biotic integrity of global ecosystems. Connectivity is especially threatened in river–floodplain ecosystems in which channel modifications have disrupted the lateral links between the main river channel and floodplain lakes. In this study, we examined the interaction between the interconnectedness of floodplain lakes and main river channels and fish assemblage descriptors. Fish assemblages in two segments of an oxbow lake, one connected to and the other isolated from the Yazoo River, Mississippi, were estimated with daytime boat electrofishing during 2007–2010. The frequency of connection for the connected segment ranged from zero to seven individual events per year (mean, ∼2). The timing of most connection events reflected regional precipitation patterns. Greater species richness, diversity, and evenness were observed in the connected segment. Additionally, the connected segment had a greater abundance of piscivores and periodic life history strategists. All fishes collected solely in the connected segment were typically riverine in nature, whereas fishes collected only in the disconnected segment were more lacustrine adapted. These results suggest that periodic connection and the associated habitat heterogeneity that it provides are important for maintaining fish species richness and diversity in large-river floodplain lakes. We suggest that maintenance or restoration of connection be an integral part of fluvial ecosystem management plans.

  5. Multi-modal distribution crossover method based on two crossing segments bounded by selected parents applied to multi-objective design optimization

    Energy Technology Data Exchange (ETDEWEB)

    Ariyarit, Atthaphon; Kanazaki, Masahiro [Tokyo Metropolitan University, Tokyo (Japan)

    2015-04-15

    This paper discusses airfoil design optimization using a genetic algorithm (GA) with multi-modal distribution crossover (MMDX). The proposed crossover method creates four segments from four parents, of which two segments are bounded by selected parents and two segments are bounded by one parent and another segment. After these segments are defined, four offsprings are generated. This study applied the proposed optimization to a real-world, multi-objective airfoil design problem using class-shape function transformation parameterization, which is an airfoil representation that uses polynomial function, to investigate the effectiveness of this algorithm. The results are compared with the results of the blend crossover (BLX) and unimodal normal distribution crossover (UNDX) algorithms. The objective of these airfoil design problems is to successfully find the optimal design. The outcome of using this algorithm is superior to that of the BLX and UNDX crossover methods because the proposed method can maintain higher diversity than the BLX and UNDX methods. This advantage is desirable for real-world problems.

  6. Multi-modal distribution crossover method based on two crossing segments bounded by selected parents applied to multi-objective design optimization

    International Nuclear Information System (INIS)

    Ariyarit, Atthaphon; Kanazaki, Masahiro

    2015-01-01

    This paper discusses airfoil design optimization using a genetic algorithm (GA) with multi-modal distribution crossover (MMDX). The proposed crossover method creates four segments from four parents, of which two segments are bounded by selected parents and two segments are bounded by one parent and another segment. After these segments are defined, four offsprings are generated. This study applied the proposed optimization to a real-world, multi-objective airfoil design problem using class-shape function transformation parameterization, which is an airfoil representation that uses polynomial function, to investigate the effectiveness of this algorithm. The results are compared with the results of the blend crossover (BLX) and unimodal normal distribution crossover (UNDX) algorithms. The objective of these airfoil design problems is to successfully find the optimal design. The outcome of using this algorithm is superior to that of the BLX and UNDX crossover methods because the proposed method can maintain higher diversity than the BLX and UNDX methods. This advantage is desirable for real-world problems.

  7. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor .... and after amplification is finally read by a digital multimeter (Fluke make: 179 true ... To study the response of the present FO refractometer, propylene glycol has been ... values of all the samples were initially measured by Abbe's refractometer.

  8. U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland

    DEFF Research Database (Denmark)

    Þórarinsson, Sigurjón Böðvar; Holm, Paul Martin; Tappe, Sebatstian

    2016-01-01

    Several major tholeiitic (e.g. the Skaergaard intrusion) and alkaline (e.g. the Kangerlussuaq Syenite) intrusive complexes of the North Atlantic Large Igneous Province are exposed along the Kangerlussuaq Fjord in East Greenland. The Kærven Complex forms a satellite intrusion to the Kangerlussuaq ...

  9. A survey of intrusion detection techniques in Cloud

    OpenAIRE

    Modi, C.; Patel, D.; Patel, H.; Borisaniya, B.; Patel, A.; Rajarajan, M.

    2013-01-01

    Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and...

  10. Numerical simulations of hydrothermal circulation resulting from basalt intrusions in a buried spreading center

    Science.gov (United States)

    Fisher, A.T.; Narasimhan, T.N.

    1991-01-01

    A two-dimensional, one by two-kilometer section through the seafloor was simulated with a numerical model to investigate coupled fluid and heat flow resulting from basalt intrusions in a buried spreading center. Boundary and initial conditions and physical properties of both sediments and basalt were constrained by field surveys and drilling in the Guaymas Basin, central Gulf of California. Parametric variations in these studies included sediment and basalt permeability, anisotropy in sediment permeability, and the size of heat sources. Faults were introduced through new intrusions both before and after cooling.Background heat input caused fluid convection at velocities ≤ 3 cm a−1 through shallow sediments. Eighty to ninety percent of the heat introduced at the base of the simulations exited through the upper, horizontal surface, even when the vertical boundaries were made permeable to fluid flow. The simulated injection of a 25–50 m thick basalt intrusion at a depth of 250 m resulted in about 10 yr of pore-fluid expulsion through the sea-floor in all cases, leaving the sediments above the intrusions strongly underpressured. A longer period of fluid recharge followed, sometimes accompanied by reductions in total seafloor heat output of 10% in comparison to pre-intrusion values. Additional discharge-recharge events were dispersed chaotically through the duration of the cooling period. These cycles in heat and fluid flow resulted from the response of the simulated system to a thermodynamic shock, the sudden emplacement of a large heat source, and not from mechanical displacement of sediments and pore fluids, which was not simulated.Water/rock mass ratios calculated from numerical simulations are in good agreement with geochemical estimates from materials recovered from the Guaymas Basin, assuming a bulk basalt permeability value of at least 10−17 m2/(10−2 mD). The addition of faults through intrusions and sediments in these simulations did not facilitate

  11. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  12. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  13. Speaker segmentation and clustering

    OpenAIRE

    Kotti, M; Moschou, V; Kotropoulos, C

    2008-01-01

    07.08.13 KB. Ok to add the accepted version to Spiral, Elsevier says ok whlile mandate not enforced. This survey focuses on two challenging speech processing topics, namely: speaker segmentation and speaker clustering. Speaker segmentation aims at finding speaker change points in an audio stream, whereas speaker clustering aims at grouping speech segments based on speaker characteristics. Model-based, metric-based, and hybrid speaker segmentation algorithms are reviewed. Concerning speaker...

  14. Association between intrusive negative autobiographical memories and depression: A meta-analytic investigation.

    Science.gov (United States)

    Mihailova, Stella; Jobson, Laura

    2018-02-23

    The study investigated several associations between depression and intrusive negative autobiographical memories. A systematic literature search identified 23 eligible studies (N = 2,582), which provided 59 effect sizes. Separate meta-analyses indicated that depression was moderately, positively associated with intrusive memory frequency, memory distress, maladaptive memory appraisals, memory avoidance, and memory rumination. Intrusive memory vividness was not significantly associated with depression. There were insufficient data to examine the relationship between depression and memory vantage perspective. Between-study heterogeneity was high for intrusive memory frequency and memory avoidance, and the percentage of females in studies significantly moderated the relationship between these variables and depression. An additional exploratory meta-analysis (3 studies; N = 257) indicated that intrusive memories were experienced more frequently by those with posttraumatic stress disorder than those with depression. Overall, the findings suggest that intrusive memories warrant clinical attention as they may contribute to the maintenance of depressive symptomatology. Copyright © 2018 John Wiley & Sons, Ltd.

  15. Preliminary Analysis of the Knipovich Ridge Segmentation - Influence of Focused Magmatism and Ridge Obliquity on an Ultraslow Spreading System

    Science.gov (United States)

    Okino, K.; Curewitz, D.; Asada, M.; Tamaki, K.

    2002-12-01

    Bathymetry, gravity and deep-tow sonar image data are used to define the segmentation of a 400 km long portion of the ultraslow-spreading Knipovich Ridge in the Norwegian-Greenland Sea, Northeast Atlantic Ocean. Discrete volcanic centers marked by large volcanic constructions and accompanying short wavelength mantle Bouguer anomaly (MBA) lows generally resemble those of the Gakkel Ridge and the easternmost Southwest Indian Ridge (SWIR). These magmatically robust segment centers are regularly spaced about 85-100 km apart along the ridge, and are characterized by accumulated hummocky terrain, high relief, off-axis seamount chains and significant MBA lows. We suggest that these eruptive centers correspond to areas of enhanced magma flux, and that their spacing reflects the geometry of underlying mantle upwelling cells. The large-scale thermal structure of the mantle primarily controls discrete and focused magmatism, and the relatively wide spacing of these segments may reflect cool mantle beneath the ridge. Segment centers along the southern Knipovich Ridge are characterized by lower relief and smaller MBA anomalies than along the northern section of the ridge. This suggests that ridge obliquity is a secondary control on ridge construction on the Knipovich Ridge, as the obliquity changes from 35° to 49° from north to south, respectively, while spreading rate and axial depth remain approximately constant. The increased obliquity may contribute to decreased effective spreading rates, lower upwelling magma velocity and melt formation, and limited horizontal dike propagation near the surface. We also identify small, magmatically weaker segments with low relief, little or no MBA anomaly, and no off axis expression. We suggest that these segments are either fed by lateral melt migration from adjacent magmatically stronger segments or represent smaller, discrete mantle upwelling centers with short-lived melt supply.

  16. Preliminary analysis of the Knipovich Ridge segmentation: influence of focused magmatism and ridge obliquity on an ultraslow spreading system

    Science.gov (United States)

    Okino, Kyoko; Curewitz, Daniel; Asada, Miho; Tamaki, Kensaku; Vogt, Peter; Crane, Kathleen

    2002-09-01

    Bathymetry, gravity and deep-tow sonar image data are used to define the segmentation of a 400 km long portion of the ultraslow-spreading Knipovich Ridge in the Norwegian-Greenland Sea, Northeast Atlantic Ocean. Discrete volcanic centers marked by large volcanic constructions and accompanying short wavelength mantle Bouguer anomaly (MBA) lows generally resemble those of the Gakkel Ridge and the easternmost Southwest Indian Ridge. These magmatically robust segment centers are regularly spaced about 85-100 km apart along the ridge, and are characterized by accumulated hummocky terrain, high relief, off-axis seamount chains and significant MBA lows. We suggest that these eruptive centers correspond to areas of enhanced magma flux, and that their spacing reflects the geometry of underlying mantle upwelling cells. The large-scale thermal structure of the mantle primarily controls discrete and focused magmatism, and the relatively wide spacing of these segments may reflect cool mantle beneath the ridge. Segment centers along the southern Knipovich Ridge are characterized by lower relief and smaller MBA anomalies than along the northern section of the ridge. This suggests that ridge obliquity is a secondary control on ridge construction on the Knipovich Ridge, as the obliquity changes from 35° to 49° from north to south, respectively, while spreading rate and axial depth remain approximately constant. The increased obliquity may contribute to decreased effective spreading rates, lower upwelling magma velocity and melt formation, and limited horizontal dike propagation near the surface. We also identify small, magmatically weaker segments with low relief, little or no MBA anomaly, and no off-axis expression. We suggest that these segments are either fed by lateral melt migration from adjacent magmatically stronger segments or represent smaller, discrete mantle upwelling centers with short-lived melt supply.

  17. GeoSegmenter: A statistically learned Chinese word segmenter for the geoscience domain

    Science.gov (United States)

    Huang, Lan; Du, Youfu; Chen, Gongyang

    2015-03-01

    Unlike English, the Chinese language has no space between words. Segmenting texts into words, known as the Chinese word segmentation (CWS) problem, thus becomes a fundamental issue for processing Chinese documents and the first step in many text mining applications, including information retrieval, machine translation and knowledge acquisition. However, for the geoscience subject domain, the CWS problem remains unsolved. Although a generic segmenter can be applied to process geoscience documents, they lack the domain specific knowledge and consequently their segmentation accuracy drops dramatically. This motivated us to develop a segmenter specifically for the geoscience subject domain: the GeoSegmenter. We first proposed a generic two-step framework for domain specific CWS. Following this framework, we built GeoSegmenter using conditional random fields, a principled statistical framework for sequence learning. Specifically, GeoSegmenter first identifies general terms by using a generic baseline segmenter. Then it recognises geoscience terms by learning and applying a model that can transform the initial segmentation into the goal segmentation. Empirical experimental results on geoscience documents and benchmark datasets showed that GeoSegmenter could effectively recognise both geoscience terms and general terms.

  18. Pectin methyl esterase inhibits intrusive and symplastic cell growth in developing wood cells of Populus.

    Science.gov (United States)

    Siedlecka, Anna; Wiklund, Susanne; Péronne, Marie-Amélie; Micheli, Fabienne; Lesniewska, Joanna; Sethson, Ingmar; Edlund, Ulf; Richard, Luc; Sundberg, Björn; Mellerowicz, Ewa J

    2008-02-01

    Wood cells, unlike most other cells in plants, grow by a unique combination of intrusive and symplastic growth. Fibers grow in diameter by diffuse symplastic growth, but they elongate solely by intrusive apical growth penetrating the pectin-rich middle lamella that cements neighboring cells together. In contrast, vessel elements grow in diameter by a combination of intrusive and symplastic growth. We demonstrate that an abundant pectin methyl esterase (PME; EC 3.1.1.11) from wood-forming tissues of hybrid aspen (Populus tremula x tremuloides) acts as a negative regulator of both symplastic and intrusive growth of developing wood cells. When PttPME1 expression was up- and down-regulated in transgenic aspen trees, the PME activity in wood-forming tissues was correspondingly altered. PME removes methyl ester groups from homogalacturonan (HG) and transgenic trees had modified HG methylesterification patterns, as demonstrated by two-dimensional nuclear magnetic resonance and immunostaining using PAM1 and LM7 antibodies. In situ distributions of PAM1 and LM7 epitopes revealed changes in pectin methylesterification in transgenic trees that were specifically localized in expanding wood cells. The results show that en block deesterification of HG by PttPME1 inhibits both symplastic growth and intrusive growth. PttPME1 is therefore involved in mechanisms determining fiber width and length in the wood of aspen trees.

  19. Large photonic band gaps and strong attenuations of two-segment-connected Peano derivative networks

    International Nuclear Information System (INIS)

    Lu, Jian; Yang, Xiangbo; Zhang, Guogang; Cai, Lianzhang

    2011-01-01

    In this Letter, based on ancient Peano curves we construct four kinds of interesting Peano derivative networks composed of one-dimensional (1D) waveguides and investigate the optical transmission spectra and photonic attenuation behavior of electromagnetic (EM) waves in one- and two-segment-connected networks. It is found that for some two-segment-connected networks large photonic band gaps (PBGs) can be created and the widths of large PBGs can be controlled by adjusting the matching ratio of waveguide length and are insensitive to generation number. Diamond- and hexagon-Peano networks are good selectable structures for the designing of optical devices with large PBG(s) and strong attenuation(s). -- Highlights: → Peano and Peano derivative networks composed of 1D waveguides are designed. → Large PBGs with strong attenuations have been created by these fractal networks. → New approach for designing optical devices with large PBGs is proposed. → Diamond- and hexagon-Peano networks with d2:d1=2:1 are good selectable structures.

  20. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  1. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  2. Multisensor Fusion for Intrusion Detection and Situational Awareness

    OpenAIRE

    Hallstensen, Christoffer V

    2017-01-01

    Cybercrime damage costs the world several trillion dollars annually. And al-though technical solutions to protect organizations from hackers are being con-tinuously developed, criminals learn fast to circumvent them. The question is,therefore, how to create leverage to protect an organization by improving in-trusion detection and situational awareness? This thesis seeks to contribute tothe prior art in intrusion detection and situational awareness by using a multi-sensor data fusion...

  3. Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    Traditionally, an isolated intrusion detection system (IDS) is vulnerable to various types of attacks. In order to enhance IDS performance, collaborative intrusion detection networks (CIDNs) are developed through enabling a set of IDS nodes to communicate with each other. Due to the distributed...... network architecture, insider attacks are one of the major threats. In the literature, challenge-based trust mechanisms have been built to identify malicious nodes by evaluating the satisfaction levels between challenges and responses. However, such mechanisms rely on two major assumptions, which may...... result in a weak threat model. In this case, CIDNs may be still vulnerable to advanced insider attacks in real-world deployment. In this paper, we propose a novel collusion attack, called passive message fingerprint attack (PMFA), which can collect messages and identify normal requests in a passive way...

  4. Contract mechanisms for coordinating pricing strategies in a supply chain with two consumer segments

    NARCIS (Netherlands)

    Nalla, V.R.; Venugopal, V.; Veen, van der J.A.A.

    2009-01-01

    This paper addresses pricing strategies in a serial supply chain (SC) consisting of a single Buyer, a single Supplier and where the end-consumers are comprised of two segments, each with a different willingness-to-pay. Under the assumption that the final demand and the segments’ willingness-to-pay

  5. Data Fusion for Network Intrusion Detection: A Review

    Directory of Open Access Journals (Sweden)

    Guoquan Li

    2018-01-01

    Full Text Available Rapid progress of networking technologies leads to an exponential growth in the number of unauthorized or malicious network actions. As a component of defense-in-depth, Network Intrusion Detection System (NIDS has been expected to detect malicious behaviors. Currently, NIDSs are implemented by various classification techniques, but these techniques are not advanced enough to accurately detect complex or synthetic attacks, especially in the situation of facing massive high-dimensional data. Besides, the inherent defects of NIDSs, namely, high false alarm rate and low detection rate, have not been effectively solved. In order to solve these problems, data fusion (DF has been applied into network intrusion detection and has achieved good results. However, the literature still lacks thorough analysis and evaluation on data fusion techniques in the field of intrusion detection. Therefore, it is necessary to conduct a comprehensive review on them. In this article, we focus on DF techniques for network intrusion detection and propose a specific definition to describe it. We review the recent advances of DF techniques and propose a series of criteria to compare their performance. Finally, based on the results of the literature review, a number of open issues and future research directions are proposed at the end of this work.

  6. Efficient cooling of rocky planets by intrusive magmatism

    Science.gov (United States)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  7. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  8. Testing alternative conceptual models of seawater intrusion in a coastal aquifer using computer simulation, southern California, USA

    Science.gov (United States)

    Nishikawa, Tracy

    1997-01-01

    Two alternative conceptual models of the physical processes controlling seawater intrusion in a coastal basin in California, USA, were tested to identify a likely principal pathway for seawater intrusion. The conceptual models were tested by using a two-dimensional, finite-element groundwater flow and transport model. This pathway was identified by the conceptual model that best replicated the historical data. The numerical model was applied in cross section to a submarine canyon that is a main avenue for seawater to enter the aquifer system underlying the study area. Both models are characterized by a heterogeneous, layered, water-bearing aquifer. However, the first model is characterized by flat-lying aquifer layers and by a high value of hydraulic conductivity in the basal aquifer layer, which is thought to be a principal conduit for seawater intrusion. The second model is characterized by offshore folding, which was modeled as a very nearshore outcrop, thereby providing a shorter path for seawater to intrude. General conclusions are that: 1) the aquifer system is best modeled as a flat, heterogeneous, layered system; 2) relatively thin basal layers with relatively high values of hydraulic conductivity are the principal pathways for seawater intrusion; and 3) continuous clay layers of low hydraulic conductivity play an important role in controlling the movement of seawater.

  9. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  10. Simultaneous two-view epipolar geometry estimation and motion segmentation by 4D tensor voting.

    Science.gov (United States)

    Tong, Wai-Shun; Tang, Chi-Keung; Medioni, Gérard

    2004-09-01

    We address the problem of simultaneous two-view epipolar geometry estimation and motion segmentation from nonstatic scenes. Given a set of noisy image pairs containing matches of n objects, we propose an unconventional, efficient, and robust method, 4D tensor voting, for estimating the unknown n epipolar geometries, and segmenting the static and motion matching pairs into n independent motions. By considering the 4D isotropic and orthogonal joint image space, only two tensor voting passes are needed, and a very high noise to signal ratio (up to five) can be tolerated. Epipolar geometries corresponding to multiple, rigid motions are extracted in succession. Only two uncalibrated frames are needed, and no simplifying assumption (such as affine camera model or homographic model between images) other than the pin-hole camera model is made. Our novel approach consists of propagating a local geometric smoothness constraint in the 4D joint image space, followed by global consistency enforcement for extracting the fundamental matrices corresponding to independent motions. We have performed extensive experiments to compare our method with some representative algorithms to show that better performance on nonstatic scenes are achieved. Results on challenging data sets are presented.

  11. New Observations of the Gulf of Aden Intermediate Water Intrusion into the Red Sea.

    Science.gov (United States)

    Bower, A.; Abualnaja, Y.

    2012-04-01

    The three-layer exchange flow between the Red Sea and the Indian Ocean during summer is characterized by a thick, northward intrusion of relatively cold, low-salinity and low in dissolved oxygen (Water (GAIW), sandwiched between two thin layers of outflow water. The flux of GAIW into the Red Sea is important in the heat, freshwater and nutrient budgets of the Red Sea, but the structure and pathways of the intrusion are not well-known due to a paucity of hydrographic and direct velocity observations. A research cruise was executed at the eastern side of the Red Sea during September-October 2011 to conduct the first large-scale survey of the intrusion. This mission is part of a series of expeditions in the Red Sea designed to investigate the seasonal Red Sea circulation. Surprisingly, the GAIW intrusion was observed to stretch nearly the entire length of the Red Sea (~1500 km) as a narrow eastern boundary current with subsurface velocity maximum of 0.1-0.3 m/s in the depth range 50-100 m. The intruding layer is weakly stratified compared to the background, possibly an indication of strong vertical mixing as it flows through the strait. Some GAIW was observed to enter deep channels in a coral reef bank (Farasan Banks) located in the southeastern Red Sea, and to enter the Red Sea interior, the latter possibly due to interactions between the boundary current and mesoscale eddies. The pathways and erosion of the GAIW intrusion will likely have major implications for the spatial distribution of biological productivity.

  12. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  13. Conjunctive Management of Multi-Aquifer System for Saltwater Intrusion Mitigation

    Science.gov (United States)

    Tsai, F. T. C.; Pham, H. V.

    2015-12-01

    Due to excessive groundwater withdrawals, many water wells in Baton Rouge, Louisiana experience undesirable chloride concentration because of saltwater intrusion. The study goal is to develop a conjunctive management framework that takes advantage of the Baton Rouge multi-aquifer system to mitigate saltwater intrusion. The conjunctive management framework utilizes several hydraulic control techniques to mitigate saltwater encroachment. These hydraulic control approaches include pumping well relocation, freshwater injection, saltwater scavenging, and their combinations. Specific objectives of the study are: (1) constructing scientific geologic architectures of the "800-foot" sand, the "1,000-foot" sand, the "1,200-foot" sand, the "1,500-foot" sand, the "1,700-foot" sand, and the "2,000-foot" sand, (2) developing scientific saltwater intrusion models for these sands. (3) using connector wells to draw native groundwater from one sand and inject to another sand to create hydraulic barriers to halt saltwater intrusion, (4) using scavenger wells or well couples to impede saltwater intrusion progress and reduce chloride concentration in pumping wells, and (5) reducing cones of depression by relocating and dispersing pumping wells to different sands. The study utilizes optimization techniques and newest LSU high performance computing (HPC) facilities to derive solutions. The conjunctive management framework serves as a scientific tool to assist policy makers to solve the urgent saltwater encroachment issue in the Baton Rouge area. The research results will help water companies as well as industries in East Baton Rouge Parish and neighboring parishes by reducing their saltwater intrusion threats, which in turn would sustain Capital Area economic development.

  14. Deformable segmentation via sparse shape representation.

    Science.gov (United States)

    Zhang, Shaoting; Zhan, Yiqiang; Dewan, Maneesh; Huang, Junzhou; Metaxas, Dimitris N; Zhou, Xiang Sean

    2011-01-01

    Appearance and shape are two key elements exploited in medical image segmentation. However, in some medical image analysis tasks, appearance cues are weak/misleading due to disease/artifacts and often lead to erroneous segmentation. In this paper, a novel deformable model is proposed for robust segmentation in the presence of weak/misleading appearance cues. Owing to the less trustable appearance information, this method focuses on the effective shape modeling with two contributions. First, a shape composition method is designed to incorporate shape prior on-the-fly. Based on two sparsity observations, this method is robust to false appearance information and adaptive to statistically insignificant shape modes. Second, shape priors are modeled and used in a hierarchical fashion. More specifically, by using affinity propagation method, our deformable surface is divided into multiple partitions, on which local shape models are built independently. This scheme facilitates a more compact shape prior modeling and hence a more robust and efficient segmentation. Our deformable model is applied on two very diverse segmentation problems, liver segmentation in PET-CT images and rodent brain segmentation in MR images. Compared to state-of-art methods, our method achieves better performance in both studies.

  15. Petrogenesis of Cretaceous volcanic-intrusive complex from the giant Yanbei tin deposit, South China: Implication for multiple magma sources, tin mineralization, and geodynamic setting

    Science.gov (United States)

    Li, Qian; Zhao, Kui-Dong; Lai, Pan-Chen; Jiang, Shao-Yong; Chen, Wei

    2018-01-01

    The giant Yanbei tin ore deposit is the largest porphyry-type tin deposit in South China. The orebodies are hosted by the granite porphyry in the central part of the Yanbei volcanic basin in southern Jiangxi Province. The Yanbei volcanic-intrusive complex mainly consists of dacitic-rhyolitic volcanic rocks, granite, granite porphyry and diabase dikes. In previous papers, the granite porphyry was considered as subvolcanic rocks, which came from the same single magma chamber with the volcanic rocks. In this study, zircon U-Pb ages and Hf isotope data, as well as whole-rock geochemical and Sr-Nd isotopic compositions of different magmatic units in the Yanbei complex are reported. Geochronologic results show that various magmatic units have different formation ages. The dacite yielded a zircon U-Pb age of 143 ± 1 Ma, and the granite porphyry has the emplacement age of 138 ± 1 Ma. Diabase dikes which represented the final stage of magmatism, yielded a zircon U-Pb age of 128 ± 1 Ma. Distinctive whole rock Sr-Nd and zircon Hf isotopic compositions suggest that these magmatic units were derived from different magma sources. The volcanic rocks were mainly derived from the partial melting of Paleoproterozoic metasedimentary rocks without additions of mantle-derived magma. The granite porphyry has an A-type geochemical affinity, and was derived from remelting of Paleo-Mesoproterozoic crustal source with involvement of a subordinate mantle-derived magma. The granite porphyry is also a typical stanniferous granite with high F (4070-6090 ppm) and Sn (7-39 ppm) contents. It underwent strongly crystal fractionation of plagioclase, K-feldspar, and accessory minerals (like apatite, Fe-Ti oxides), which may contribute to the tin mineralization. The diabase was derived by partial melting of enriched lithospheric mantle which had been metasomatised by slab-derived fluids. The change of magmatic sources reflected an increasing extensional tectonic environment, perhaps induced by slab

  16. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  17. On the relation between crustal deformation and seismicity during the 2012-2014 magmatic intrusions in El Hierro island.

    Science.gov (United States)

    Domínguez Cerdeña, Itahiza; García-Cañada, Laura; Ángeles Benito Saz, María; Del Fresno, Carmen

    2017-04-01

    The last volcanic eruption in the Canary Islands took place in 2011 less than 2 km offshore El Hierro island, after 3 months of measuring surface deformation (up to 5 cm) and locating more than 10 000 earthquakes. In the two years following the end of the submarine eruption on 5 March 2012, six deep magmatic intrusions were recorded beneath the island. Despite the short time duration of these intrusions, these events have been more energetic that the 2011 pre-eruptive intrusive event but none of them ended in a new eruption. These post-eruptive reactivations are some of the few examples in the world of well monitored magmatic intrusions related with monogenetic volcanism. In order to understand these processes we have analyzed the geodetic and seismic data with different techniques. First, we did a joint hypocentral relocation of the six seismic swarms, including more than 6 300 events, to analyze the relative distribution of the earthquakes from different intrusions. The uncertainties of the earthquakes relocations was reduced to an average value of 300 m. New earthquakes' distribution shows the alignments of the different intrusions and a temporal migration of the events to larger depths. Moreover, we show the results of the ground deformation using GPS data from the network installed on the island (for each of the six intrusive events) and their inversion considering spherical models. In most of the intrusions the optimal source model was shallower and southern than the corresponding seismicity hypocenters. The intruded magma volume ranges from 0.02 to 0.13 km3. Finally, we also computed the b value from the Gutenberg Richter equation by means of a bootstrap method. The spatial and temporal evolution of the b value for the seismicity show a clear correlation with the temporal evolution of the crustal deformation. The six magma intrusions can be grouped, depending on their location, in three pairs each one associated with each of the three active rifts of El

  18. Magmatism during Gondwana break-up : new geochronological data from Westland, New Zealand

    International Nuclear Information System (INIS)

    Van der Meer, Q.H.A.; Scott, J.M.; Waight, T.E.; Sudo, M.; Schersten, A.; Cooper, A.F.; Spell, T.L.

    2013-01-01

    Newly determined Late Cretaceous 40 Ar/ 39 Ar ages on megacrystic kaersutite from four lamprophyre dikes, and a U-Pb zircon age on a trachyte, from central and north Westland (New Zealand) are presented. These ages suggest that the intrusion of mafic dikes (88-86 and 69 Ma) was not necessarily restricted to the previously established narrow age range of 80-92 Ma. The younger lamprophyre and trachyte dikes (c. 68-70 Ma) imply that tensional stresses in the Western Province were either renewed at this time, or that extension and related magmatism continued during opening of the Tasman Sea. Extension-related magmatism in the region not only preceded Tasman seafloor spreading initiation (starting at c. 83 Ma, lasting to c. 53 Ma), but may have sporadically continued for up to 15 Ma after continental break-up. (author)

  19. Numerical modeling and sensitivity analysis of seawater intrusion in a dual-permeability coastal karst aquifer with conduit networks

    Directory of Open Access Journals (Sweden)

    Z. Xu

    2018-01-01

    Full Text Available Long-distance seawater intrusion has been widely observed through the subsurface conduit system in coastal karst aquifers as a source of groundwater contaminant. In this study, seawater intrusion in a dual-permeability karst aquifer with conduit networks is studied by the two-dimensional density-dependent flow and transport SEAWAT model. Local and global sensitivity analyses are used to evaluate the impacts of boundary conditions and hydrological characteristics on modeling seawater intrusion in a karst aquifer, including hydraulic conductivity, effective porosity, specific storage, and dispersivity of the conduit network and of the porous medium. The local sensitivity analysis evaluates the parameters' sensitivities for modeling seawater intrusion, specifically in the Woodville Karst Plain (WKP. A more comprehensive interpretation of parameter sensitivities, including the nonlinear relationship between simulations and parameters, and/or parameter interactions, is addressed in the global sensitivity analysis. The conduit parameters and boundary conditions are important to the simulations in the porous medium because of the dynamical exchanges between the two systems. The sensitivity study indicates that salinity and head simulations in the karst features, such as the conduit system and submarine springs, are critical for understanding seawater intrusion in a coastal karst aquifer. The evaluation of hydraulic conductivity sensitivity in the continuum SEAWAT model may be biased since the conduit flow velocity is not accurately calculated by Darcy's equation as a function of head difference and hydraulic conductivity. In addition, dispersivity is no longer an important parameter in an advection-dominated karst aquifer with a conduit system, compared to the sensitivity results in a porous medium aquifer. In the end, the extents of seawater intrusion are quantitatively evaluated and measured under different scenarios with the variabilities of

  20. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  1. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  2. Regional groundwater modeling of the saturated zone in the vicinity of Yucca Mountain, Nevada

    International Nuclear Information System (INIS)

    Ahola, M.; Sagar, B.

    1992-10-01

    Results of groundwater modeling of the saturated zone in the vicinity of Yucca Mountain are presented. Both a regional (200 x 200 km) and subregional (50 x 50 km) model were used in the analyses. Simulations were conducted to determine the impact of various disruptive that might take place over the life span of a proposed Yucca Mountain geologic conditions repository on the groundwater flow field, as well as changes in the water-table elevations. These conditions included increases in precipitation and groundwater recharge within the regional model, changes in permeability of existing hydrogeologic barriers, a:nd the vertical intrusion of volcanic dikes at various orientations through the saturated zone. Based on the regional analysis, the rise in the water-table under Yucca Mountain due to various postulated conditions ranged from only a few meters to 275 meters. Results of the subregional model analysis, which was used to simulate intrusive dikes approximately 4 kilometers in length in the vicinity of Yucca Mountain, showed water-table rises ranging from a few meters to as much as 103 meters. Dikes oriented approximately north-south beneath Yucca Mountain produced the highest water-table rises. The conclusions drawn from this analysis are likely to change as more site-specific data become available and as the assumptions in the model are improved

  3. RESTORING A DAMAGED 16-YEAR -OLD INSULATING POLYMER CONCRETE DIKE OVERLAY: REPAIR MATERIALS AND TECHNOLOGIES.

    Energy Technology Data Exchange (ETDEWEB)

    SUGAMA,T.

    2007-01-01

    The objective of this program was to design and formulate organic polymer-based material systems suitable for repairing and restoring the overlay panels of insulating lightweight polymer concrete (ILPC) from the concrete floor and slope wall of a dike at KeySpan liquefied natural gas (LNG) facility in Greenpoint, Brooklyn, NY, just over sixteen years ago. It also included undertaking a small-scale field demonstration to ensure that the commercial repairing technologies were applicable to the designed and formulated materials.

  4. Review on assessment methodology for human intrusion into a repository for radioactive waste

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility

  5. Review on assessment methodology for human intrusion into a repository for radioactive waste

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-09-15

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility.

  6. Hybrid feature selection for supporting lightweight intrusion detection systems

    Science.gov (United States)

    Song, Jianglong; Zhao, Wentao; Liu, Qiang; Wang, Xin

    2017-08-01

    Redundant and irrelevant features not only cause high resource consumption but also degrade the performance of Intrusion Detection Systems (IDS), especially when coping with big data. These features slow down the process of training and testing in network traffic classification. Therefore, a hybrid feature selection approach in combination with wrapper and filter selection is designed in this paper to build a lightweight intrusion detection system. Two main phases are involved in this method. The first phase conducts a preliminary search for an optimal subset of features, in which the chi-square feature selection is utilized. The selected set of features from the previous phase is further refined in the second phase in a wrapper manner, in which the Random Forest(RF) is used to guide the selection process and retain an optimized set of features. After that, we build an RF-based detection model and make a fair comparison with other approaches. The experimental results on NSL-KDD datasets show that our approach results are in higher detection accuracy as well as faster training and testing processes.

  7. Improving Brain Magnetic Resonance Image (MRI Segmentation via a Novel Algorithm based on Genetic and Regional Growth

    Directory of Open Access Journals (Sweden)

    Javadpour A.

    2016-06-01

    Full Text Available Background: Regarding the importance of right diagnosis in medical applications, various methods have been exploited for processing medical images solar. The method of segmentation is used to analyze anal to miscall structures in medical imaging. Objective: This study describes a new method for brain Magnetic Resonance Image (MRI segmentation via a novel algorithm based on genetic and regional growth. Methods: Among medical imaging methods, brains MRI segmentation is important due to high contrast of non-intrusive soft tissue and high spatial resolution. Size variations of brain tissues are often accompanied by various diseases such as Alzheimer’s disease. As our knowledge about the relation between various brain diseases and deviation of brain anatomy increases, MRI segmentation is exploited as the first step in early diagnosis. In this paper, regional growth method and auto-mate selection of initial points by genetic algorithm is used to introduce a new method for MRI segmentation. Primary pixels and similarity criterion are automatically by genetic algorithms to maximize the accuracy and validity in image segmentation. Results: By using genetic algorithms and defining the fixed function of image segmentation, the initial points for the algorithm were found. The proposed algorithms are applied to the images and results are manually selected by regional growth in which the initial points were compared. The results showed that the proposed algorithm could reduce segmentation error effectively. Conclusion: The study concluded that the proposed algorithm could reduce segmentation error effectively and help us to diagnose brain diseases.

  8. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  9. Analogue modelling on the interaction between shallow magma intrusion and a strike-slip fault: Application on the Middle Triassic Monzoni Intrusive Complex (Dolomites, Italy)

    Science.gov (United States)

    Michail, Maria; Coltorti, Massimo; Gianolla, Piero; Riva, Alberto; Rosenau, Matthias; Bonadiman, Costanza; Galland, Olivier; Guldstrand, Frank; Thordén Haug, Øystein; Rudolf, Michael; Schmiedel, Tobias

    2017-04-01

    The southwestern part of the Dolomites in Northern Italy has undergone a short-lived Ladinian (Middle Triassic) tectono-magmatic event, forming a series of significant magmatic features. These intrusive bodies deformed and metamorphosed the Permo-Triassic carbonate sedimentary framework. In this study we focus on the tectono-magmatic evolution of the shallow shoshonitic Monzoni Intrusive Complex of this Ladinian event (ca 237 Ma), covering an area of 20 km^2. This NW-SE elongated intrusive structure (5 km length) shows an orogenic magmatic affinity which is in contrast to the tectonic regime at the time of intrusion. Strain analysis shows anorogenic transtensional displacement in accordance with the ENE-WSW extensional pattern in the central Dolomites during the Ladinian. Field interpretations led to a detailed description of the regional stratigraphic sequence and the structural features of the study area. However, the geodynamic context of this magmatism and the influence of the inherited strike-slip fault on the intrusion, are still in question. To better understand the specific natural prototype and the general mechanisms of magma emplacement in tectonically active areas, we performed analogue experiments defined by, but not limited to, first order field observations. We have conducted a systematic series of experiments in different tectonic regimes (static conditions, strike-slip, transtension). We varied the ratio of viscous to brittle stresses between magma and country rock, by injecting Newtonian fluids both of high and low viscosity (i.e. silicone oil/vegetable oil) into granular materials of varying cohesion (sand, silica flour, glass beads). The evolving surface and side view of the experiments were monitored by photogrammetric techniques for strain analyses and topographic evolution. In our case, the combination of the results from field and analogue experiments brings new insights regarding the tectonic regime, the geometry of the intrusive body, and

  10. Late Neoproterozoic layered mafic intrusion of arc-affinity in the Arabian-Nubian Shield: A case study from the Shahira layered mafic intrusion, southern Sinai, Egypt

    Energy Technology Data Exchange (ETDEWEB)

    Azer, M.K.; Obeid, M.A.; Gahalan, H.A.

    2016-07-01

    The Shahira Layered Mafic Intrusion (SLMI), which belongs to the late Neoproterozoic plutonic rocks of the Arabian-Nubian Shield, is the largest layered mafic intrusion in southern Sinai. Field relations indicate that it is younger than the surrounding metamorphic rocks and older than the post-orogenic granites. Based on variation in mineral paragenesis and chemical composition, the SLMI is distinguished into pyroxene-hornblende gabbro, hornblende gabbro and diorite lithologies. The outer zone of the mafic intrusion is characterized by fine-grained rocks (chilled margin gabbroic facies), with typical subophitic and/or microgranular textures. Different rock units from the mafic intrusion show gradational boundaries in between. They show some indications of low grade metamorphism, where primary minerals are transformed into secondary ones. Geochemically, the Shahira layered mafic intrusion is characterized by enrichment in LILE relative to HFSE (e.g. Nb, P, Zr, Ti, Y), and LREE relative to HREE [(La/Lu)n= 4.75–8.58], with subalkaline characters. It has geochemical characteristics of pre-collisional arc-type environment. The geochemical signature of the investigated gabbros indicates partial melting of mantle wedge in a volcanic-arc setting, being followed by fractional crystallization and crustal contamination. Fractional crystallization processes played a vital role during emplacement of the Shahira intrusion and evolution of its mafic and intermediate rock units. The initial magma was evolved through crystallization of hornblende which was caused by slight increasing of H2O in the magma after crystallization of liquidus olivine, pyroxene and Ca-rich plagioclase. The gabbroic rocks crystallized at pressures between 4.5 and 6.9kbar (~15–20km depth). Whereas, the diorites yielded the lowest crystallization pressure between 1.0 to 4.4Kbar (<10km depth). Temperature was estimated by several geothermometers, which yielded crystallization temperatures ranging from 835

  11. Bucket handle tears of the medial meniscus: meniscal intrusion rather than meniscal extrusion

    International Nuclear Information System (INIS)

    Schlossberg, S.; Umans, H.; Flusser, G.; DiFelice, G.S.; Lerer, D.B.

    2007-01-01

    To determine the frequency of medial meniscal extrusion (MME) versus ''medial meniscal intrusion'' in the setting of bucket handle tears. Images were evaluated for previously reported risk factors for MME, including: medial meniscal root tear, radial tear, degenerative joint disease and joint effusion. Forty-one consecutive cases of bucket handle tear of the medial meniscus were reviewed by consensus by two musculoskeletal radiologists. Imaging was performed using a 1.5 GE Signa MR unit. Patient age, gender, medial meniscal root integrity, MME, medial meniscal intrusion, degenerative joint disease, effusion and anterior cruciate ligament (ACL) tear were recorded. Thirteen females and 27 males (age 12-62 years, median=30 years) were affected; one had bucket handle tear of each knee. Effusion was small in 13, moderate in 9 and large in 18. Degenerative joint disease was mild in three, moderate in two and severe in one. 26 ACL tears included three partial and three chronic. Medial meniscal root tear was complete in one case and partial thickness in two. None of the 40 cases with an intact or partially torn medial meniscal root demonstrated MME. MME of 3.1 mm was seen in the only full-thickness medial meniscal root tear, along with chronic ACL tear, moderate degenerative joint disease and large effusion. Medial meniscal intrusion of the central bucket handle fragment into the intercondylar notch was present in all 41 cases. Given an intact medial meniscal root in the setting of a ''pure'' bucket handle tear, there is no MME. (orig.)

  12. Segmentation-DrivenTomographic Reconstruction

    DEFF Research Database (Denmark)

    Kongskov, Rasmus Dalgas

    such that the segmentation subsequently can be carried out by use of a simple segmentation method, for instance just a thresholding method. We tested the advantages of going from a two-stage reconstruction method to a one stage segmentation-driven reconstruction method for the phase contrast tomography reconstruction......The tomographic reconstruction problem is concerned with creating a model of the interior of an object from some measured data, typically projections of the object. After reconstructing an object it is often desired to segment it, either automatically or manually. For computed tomography (CT...

  13. Granitoids of the Dry Valleys area, southern Victoria Land, Antarctica : plutons, field relationships, and isotopic dating

    International Nuclear Information System (INIS)

    Allibone, A.H.; Cox, S.C.; Johnstone, R.D.

    1993-01-01

    Detailed mapping throughout much of the Dry Valleys area indicates the region is underlain by 15 major granitoid plutons and numerous smaller plugs and dikes. Intrusive relationships of these plutons and dikes indicate repeated intrusion of superficially similar granitoids at different times. Sufficient internal lithologic variation occurs within individual plutons, to allow correlation with several of the previously defined granitoid units based on lithologic character. Consequently, previous subdivision schemes based on lithology are no longer tenable and are here replaced with a subdivision scheme based on the identification of individual plutons. The elongate, concordant Bonney, Denton, Cavendish, and Wheeler Plutons, which range in composition between monzodiorite and granodiorite, are the oldest relatively undeformed plutons in the Dry Valleys area. Each pluton is characterised by flow alignment of K-feldspar megacrysts, hornblende, biotite, and mafic enclaves. Field relationships and radiometric dating indicate these are deep-level plutons, emplaced synchronous with upper amphibolite facies metamorphism of the adjacent Koettlitz Group between 589 and 490 Ma ago. Elongate, discordant plutons of equigranular homogeneous biotite granodiorite and granite (Hedley, Valhalla, St Johns, Suess) were subsequently emplaced by stoping at a relatively high crustal level at 490 Ma. These eight plutons are cut by numerous swarms of Vanda mafic and felsic porphyry dikes. The ovoid, discordant, high level Pearse, Nibelungen, Orestes, Brownworth, Swinford, and Harker Plutons, emplaced between c. 486 and 477 Ma, display mutually crosscutting relationships with the youngest of the Vanda dikes. These younger plutons range in composition between monzonite and granite. Some are characterised by K-feldspar megacrystic textures superficially similar to some of the oldest concordant plutons. (author). 57 refs.; 2 tabs.; 4 figs

  14. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  15. Pre-stressor cognitive control is related to intrusive cognition of a stressful film

    NARCIS (Netherlands)

    Wessel, Ineke; Overwijk, Sippie; Verwoerd, Johan; de Vrieze, Nienke

    It has been suggested that relatively weak cognitive control existing prior to a stressful event may be associated with intrusive memories of that stressor afterwards. We explored this in two analog studies employing unselected participants who saw an emotional film fragment and completed behavioral

  16. Scorpion image segmentation system

    Science.gov (United States)

    Joseph, E.; Aibinu, A. M.; Sadiq, B. A.; Bello Salau, H.; Salami, M. J. E.

    2013-12-01

    Death as a result of scorpion sting has been a major public health problem in developing countries. Despite the high rate of death as a result of scorpion sting, little report exists in literature of intelligent device and system for automatic detection of scorpion. This paper proposed a digital image processing approach based on the floresencing characteristics of Scorpion under Ultra-violet (UV) light for automatic detection and identification of scorpion. The acquired UV-based images undergo pre-processing to equalize uneven illumination and colour space channel separation. The extracted channels are then segmented into two non-overlapping classes. It has been observed that simple thresholding of the green channel of the acquired RGB UV-based image is sufficient for segmenting Scorpion from other background components in the acquired image. Two approaches to image segmentation have also been proposed in this work, namely, the simple average segmentation technique and K-means image segmentation. The proposed algorithm has been tested on over 40 UV scorpion images obtained from different part of the world and results obtained show an average accuracy of 97.7% in correctly classifying the pixel into two non-overlapping clusters. The proposed 1system will eliminate the problem associated with some of the existing manual approaches presently in use for scorpion detection.

  17. Intrusive fathering, children's self-regulation and social skills: a mediation analysis.

    Science.gov (United States)

    Stevenson, M; Crnic, K

    2013-06-01

    Fathers have unique influences on children's development, and particularly in the development of social skills. Although father-child relationship influences on children's social competence have received increased attention in general, research on fathering in families of children with developmental delays (DD) is scant. This study examined the pathway of influence among paternal intrusive behaviour, child social skills and child self-regulatory ability, testing a model whereby child regulatory behaviour mediates relations between fathering and child social skills. Participants were 97 families of children with early identified DD enrolled in an extensive longitudinal study. Father and mother child-directed intrusiveness was coded live in naturalistic home observations at child age 4.5, child behaviour dysregulation was coded from a video-taped laboratory problem-solving task at child age 5, and child social skills were measured using independent teacher reports at child age 6. Analyses tested for mediation of the relationship between fathers' intrusiveness and child social skills by child behaviour dysregulation. Fathers' intrusiveness, controlling for mothers' intrusiveness and child behaviour problems, was related to later child decreased social skills and this relationship was mediated by child behaviour dysregulation. Intrusive fathering appears to carry unique risk for the development of social skills in children with DD. Findings are discussed as they related to theories of fatherhood and parenting in children with DD, as well as implications for intervention and future research. © 2012 The Authors. Journal of Intellectual Disability Research © 2012 John Wiley & Sons Ltd, MENCAP & IASSID.

  18. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    Science.gov (United States)

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  19. The evolution of Interior Intrusion Detection Technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  20. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  1. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  2. Evaluation of of μ-controller PIR Intrusion Detector | Eludire | West ...

    African Journals Online (AJOL)

    When there is intrusion, a piezo speaker beeps and also a visual indicator with light emitting diode blinks to indicate intrusion. For security, cost effectiveness and access control to certain areas of homes, offices and industries this system is a better replacement to human surveillance needed around our valuable goods and ...

  3. Effect of winds and waves on salt intrusion in the Pearl River estuary

    Science.gov (United States)

    Gong, Wenping; Lin, Zhongyuan; Chen, Yunzhen; Chen, Zhaoyun; Zhang, Heng

    2018-02-01

    Salt intrusion in the Pearl River estuary (PRE) is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST) modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  4. Effects of heat-flow and hydrothermal fluids from volcanic intrusions on authigenic mineralization in sandstone formations

    Directory of Open Access Journals (Sweden)

    Wolela Ahmed

    2002-06-01

    Full Text Available Volcanic intrusions and hydrothermal activity have modified the diagenetic minerals. In the Ulster Basin, UK, most of the authigenic mineralization in the Permo-Triassic sandstones pre-dated tertiary volcanic intrusions. The hydrothermal fluids and heat-flow from the volcanic intrusions did not affect quartz and feldspar overgrowths. However, clay mineral-transformation, illite-smectite to illite and chlorite was documented near the volcanic intrusions. Abundant actinolite, illite, chlorite, albite and laumontite cementation of the sand grains were also documented near the volcanic intrusions. The abundance of these cementing minerals decreases away from the volcanic intrusions.In the Hartford Basin, USA, the emplacement of the volcanic intrusions took place simultaneous with sedimentation. The heat-flow from the volcanic intrusions and hydrothermal activity related to the volcanics modified the texture of authigenic minerals. Microcrystalline mosaic albite and quartz developed rather than overgrowths and crystals near the intrusions. Chlorite clumps and masses were also documented with microcrystalline mosaic albite and quartz. These features are localized near the basaltic intrusions. Laumontite is also documented near the volcanic intrusions. The reservoir characteristics of the studied sandstone formations are highly affected by the volcanic and hydrothermal fluids in the Hartford and the Ulster Basin. The porosity dropped from 27.4 to zero percent and permeability from 1350 mD to 1 mD.

  5. Shallow Miocene basaltic magma reservoirs in the Bahia de Los Angeles basin, Baja California, Mexico

    Science.gov (United States)

    Delgado-Argote, Luis A.; García-Abdeslem, Juan

    1999-01-01

    The basement in the Bahía de Los Angeles basin consists of Paleozoic metamorphic rocks and Cretaceous granitoids. The Neogene stratigraphy overlying the basement is formed, from the base to the top, by andesitic lava flows and plugs, sandstone and conglomeratic horizons, and Miocene pyroclastic flow units and basaltic flows. Basaltic dikes also intrude the whole section. To further define its structure, a detailed gravimetric survey was conducted across the basin about 1 km north of the Sierra Las Flores. In spite of the rough and lineal topography along the foothills of the Sierra La Libertad, we found no evidence for large-scale faulting. Gravity data indicates that the basin has a maximum depth of 120 m in the Valle Las Tinajas and averages 75 m along the gravimetric profile. High density bodies below the northern part of the Sierra Las Flores and Valle Las Tinajas are interpreted to be part of basaltic dikes. The intrusive body located north of the Sierra Las Flores is 2.5 km wide and its top is about 500 m deep. The lava flows of the top of the Sierra Las Flores, together with the distribution of basaltic activity north of this sierra, suggests that this intrusive body continues for 20 km along a NNW-trending strike. Between the sierras Las Flores and Las Animas, a 0.5-km-wide, 300-m-thick intrusive body is interpreted at a depth of about 100 m. This dike could be part of the basaltic activity of the Cerro Las Tinajas and the small mounds along the foothills of western Sierra Las Animas. The observed local normal faulting in the basin is inferred to be mostly associated with the emplacement of the shallow magma reservoirs below Las Flores and Las Tinajas.

  6. A Natural Analogue for Thermal-Hydrological-Chemical Coupled Processes at the Proposed Nuclear Waste Repository at Yucca Mountain, Nevada

    International Nuclear Information System (INIS)

    Bill Carey; Gordon Keating; Peter C. Lichtner

    1999-01-01

    Dike and sill complexes that intruded tuffaceous host rocks above the water table are suggested as natural analogues for thermal-hydrologic-chemical (THC) processes at the proposed nuclear waste repository at Yucca Mountain, Nevada. Scoping thermal-hydrologic calculations of temperature and saturation profiles surrounding a 30-50 m wide intrusion suggest that boiling conditions could be sustained at distances of tens of meters from the intrusion for several thousand years. This time scale for persistence of boiling is similar to that expected for the Yucca Mountain repository with moderate heat loading. By studying the hydrothermal alteration of the tuff host rocks surrounding the intrusions, insight and relevant data can be obtained that apply directly to the Yucca Mountain repository and can shed light on the extent and type of alteration that should be expected. Such data are needed to bound and constrain model parameters used in THC simulations of the effect of heat produced by the waste on the host rock and to provide a firm foundation for assessing overall repository performance. One example of a possible natural analogue for the repository is the Paiute Ridge intrusive complex located on the northeastern boundary of the Nevada Test Site, Nye County, Nevada. The complex consists of dikes and sills intruded into a partially saturated tuffaceous host rock that has stratigraphic sequences that correlate with those found at Yucca Mountain. The intrusions were emplaced at a depth of several hundred meters below the surface, similar to the depth of the proposed repository. The tuffaceous host rock surrounding the intrusions is hydrothermally altered to varying extents depending on the distance from the intrusions. The Paiute Ridge intrusive complex thus appears to be an ideal natural analogue of THC coupled processes associated with the Yucca Mountain repository. It could provide much needed physical and chemical data for understanding the influence of heat

  7. Engineering evaluation of intrusion prevention strategies for single-shell tanks

    International Nuclear Information System (INIS)

    Jenkins, C.E.

    1994-01-01

    In this study, previously implemented actions to prevent liquid intrusion into out-of-service single-shell tanks (SSTs), i.e., interim isolation or partial interim isolation, are investigated and expanded to identify additional cost-effective intrusion prevention techniques that could be reasonably taken until SSTs are ready for waste retrieval. Possible precipitation, groundwater, and condensation pathways and internal tank connections that could provide possible pathways for liquids are examined. Techniques to block identified potential pathways are developed and costed to determine the potential benefit to costed trade-offs for implementing the techniques. (Note: Surveillance data show increased waste surface levels for several SSTs that indicate possible liquid intrusion despite interim isolation activities.)

  8. Cellular Neural Network-Based Methods for Distributed Network Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Kang Xie

    2015-01-01

    Full Text Available According to the problems of current distributed architecture intrusion detection systems (DIDS, a new online distributed intrusion detection model based on cellular neural network (CNN was proposed, in which discrete-time CNN (DTCNN was used as weak classifier in each local node and state-controlled CNN (SCCNN was used as global detection method, respectively. We further proposed a new method for design template parameters of SCCNN via solving Linear Matrix Inequality. Experimental results based on KDD CUP 99 dataset show its feasibility and effectiveness. Emerging evidence has indicated that this new approach is affordable to parallelism and analog very large scale integration (VLSI implementation which allows the distributed intrusion detection to be performed better.

  9. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  10. Sexually intrusive behaviour following brain injury: approaches to assessment and rehabilitation.

    Science.gov (United States)

    Bezeau, Scott C; Bogod, Nicholas M; Mateer, Catherine A

    2004-03-01

    Sexually intrusive behaviour, which may range from inappropriate commentary to rape, is often observed following a traumatic brain injury. It may represent novel behaviour patterns or an exacerbation of pre-injury personality traits, attitudes, and tendencies. Sexually intrusive behaviour poses a risk to staff and residents of residential facilities and to the community at large, and the development of a sound assessment and treatment plan for sexually intrusive behaviour is therefore very important. A comprehensive evaluation is best served by drawing on the fields of neuropsychology, forensic psychology, and cognitive rehabilitation. The paper discusses the types of brain damage that commonly lead to sexually intrusive behaviour, provides guidance for its assessment, and presents a three-stage treatment model. The importance of a multidisciplinary approach to both assessment and treatment is emphasized. Finally, a case example is provided to illustrate the problem and the possibilities for successful management.

  11. The evolution of interior intrusion detection technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combination developed when commercial sensors were unavailable and the future application of expert systems. 5 refs

  12. The evolution of interior intrusion detection technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-01-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the U.S. Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). The authors also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  13. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  14. Simulation Of Seawater Intrusion With 2D And 3D Models: Nauru Island Case Study

    Science.gov (United States)

    Ghassemi, F.; Jakeman, A. J.; Jacobson, G.; Howard, K. W. F.

    1996-03-01

    With the advent of large computing capacities during the past few decades, sophisticated models have been developed for the simulation of seawater intrusion in coastal and island aquifers. Currently, several models are commercially available for the simulation of this problem. This paper describes the mathematical basis and application of the SUTRA and HST3D models to simulate seawater intrusion in Nauru Island, in the central Pacific Ocean. A comparison of the performance and limitations of these two models in simulating a real problem indicates that three-dimensional simulation of seawater intrusion with the HST3D model has the major advantage of being able to specify natural boundary conditions as well as pumping stresses. However, HST3D requires a small grid size and short time steps in order to maintain numerical stability and accuracy. These requirements lead to solution of a large set of linear equations that requires the availability of powerful computing facilities in terms of memory and computing speed. Combined results of the two simulation models indicate a safe pumping rate of 400 m3/d for the aquifer on Nauru Island, where additional fresh water is presently needed for the rehabilitation of mined-out land.

  15. Numerical modeling of seawater intrusion in Zhoushuizi district of Dalian City, China

    Science.gov (United States)

    Zhao, J.; Lin, J.; Wu, J.

    2013-12-01

    A three-dimensional heterogeneous density-dependent numerical model was constructed to simulate the seawater intrusion process in coastal aquifers in Zhoushuizi Region, Dalian City. Model calibration was achieved through a prediction-correction method by adjusting the zonation and values of hydrogeologic parameters until the calculated heads and concentrations matched the observed values. Model validation results also showed that it was reasonable under current data conditions. Then the calibrated and validated model was applied to predict the dynamics and trend of seawater intrusion according to the current groundwater abstraction conditions in this study area 30 years after 2010. Prediction results showed that overall seawater intrusion in the future would be even more severe. Actually, with the growing of the population and development of the economy, the demand for ground water will be increasing continuously so that the problem of seawater intrusion may be more serious than that predicted by the modelin this study. Better strategies for reasonably governing exploitation of groundwater in the study area can be further developed by using this three-dimensional seawater intrusion model.

  16. Microstructure in hardened cement pastes measured by mercury intrusion porosimetry and low temperature microcalorimetry

    DEFF Research Database (Denmark)

    Hansen, Kurt Kielsgaard; Baroghel, V.B.; Künzel, H.M.

    1996-01-01

    The present paper is presenting some of the results on microstructure from the CEC-Science Project CT91-0737 "Characterization of microstructure as a tool for prediction of moisture transfer in porous media". In the Project the microstructure for the porous media is studied by absorption isotherms......, image analysis, mercury intrusion porosimetry and low temperature microcalorimetry.The present paper is dealing with cumulated pore size distributions measured by mercury intrusion porosimetry (MIP) from two laboratories (LCPC, IBP) and low temperature microcalorimetry (CAL) from one laboratory (BKM......). The materials are five different hardened cement pastes. The materials, the preparation procedure for the samples, the experiments and the experimental results are described. Finally, the results are compared and discussed....

  17. The assessment of human intrusion into underground repositories for radioactive waste Volume 2: Appendices

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Ashton, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  18. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungwon Lee

    2009-05-01

    Full Text Available TheIP-based Ubiquitous Sensor Network (IP-USN is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System called RIDES (Robust Intrusion DEtection System for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  19. Effect of winds and waves on salt intrusion in the Pearl River estuary

    Directory of Open Access Journals (Sweden)

    W. Gong

    2018-02-01

    Full Text Available Salt intrusion in the Pearl River estuary (PRE is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  20. Treatment of Intrusive Suicidal Imagery Using Eye Movements

    Directory of Open Access Journals (Sweden)

    Jaël S. van Bentum

    2017-06-01

    Full Text Available Suicide and suicidal behavior are major public health concerns, and affect 3–9% of the population worldwide. Despite increased efforts for national suicide prevention strategies, there are still few effective interventions available for reducing suicide risk. In this article, we describe various theoretical approaches for suicide ideation and behavior, and propose to examine the possible effectiveness of a new and innovative preventive strategy. A model of suicidal intrusion (mental imagery related to suicide, also referred to as suicidal flash-forwards is presented describing one of the assumed mechanisms in the etiology of suicide and the mechanism of therapeutic change. We provide a brief rationale for an Eye Movement Dual Task (EMDT treatment for suicidal intrusions, describing techniques that can be used to target these suicidal mental images and thoughts to reduce overall behavior. Based on the available empirical evidence for the mechanisms of suicidal intrusions, this approach appears to be a promising new treatment to prevent suicidal behavior as it potentially targets one of the linking pins between suicidal ideation and suicidal actions.

  1. Numerical Continuation Methods for Intrusive Uncertainty Quantification Studies

    Energy Technology Data Exchange (ETDEWEB)

    Safta, Cosmin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Najm, Habib N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Phipps, Eric Todd [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-09-01

    Rigorous modeling of engineering systems relies on efficient propagation of uncertainty from input parameters to model outputs. In recent years, there has been substantial development of probabilistic polynomial chaos (PC) Uncertainty Quantification (UQ) methods, enabling studies in expensive computational models. One approach, termed ”intrusive”, involving reformulation of the governing equations, has been found to have superior computational performance compared to non-intrusive sampling-based methods in relevant large-scale problems, particularly in the context of emerging architectures. However, the utility of intrusive methods has been severely limited due to detrimental numerical instabilities associated with strong nonlinear physics. Previous methods for stabilizing these constructions tend to add unacceptably high computational costs, particularly in problems with many uncertain parameters. In order to address these challenges, we propose to adapt and improve numerical continuation methods for the robust time integration of intrusive PC system dynamics. We propose adaptive methods, starting with a small uncertainty for which the model has stable behavior and gradually moving to larger uncertainty where the instabilities are rampant, in a manner that provides a suitable solution.

  2. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  3. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  4. Prevention and analysis of hacker's intrusion

    International Nuclear Information System (INIS)

    Liu Baoxu; An Dehai; Xu Rongsheng

    2000-01-01

    The author analyzes the behavior characteristics and relevant technologies about the hacker's intrusion, and gives some corresponding solutions pertinently. To the recent events about hackers, the author gives detailed introduction and puts forward the relevant advice and valuable consideration

  5. Segmentation, advertising and prices

    NARCIS (Netherlands)

    Galeotti, Andrea; Moraga González, José

    This paper explores the implications of market segmentation on firm competitiveness. In contrast to earlier work, here market segmentation is minimal in the sense that it is based on consumer attributes that are completely unrelated to tastes. We show that when the market is comprised by two

  6. Unsupervised Retinal Vessel Segmentation Using Combined Filters.

    Directory of Open Access Journals (Sweden)

    Wendeson S Oliveira

    Full Text Available Image segmentation of retinal blood vessels is a process that can help to predict and diagnose cardiovascular related diseases, such as hypertension and diabetes, which are known to affect the retinal blood vessels' appearance. This work proposes an unsupervised method for the segmentation of retinal vessels images using a combined matched filter, Frangi's filter and Gabor Wavelet filter to enhance the images. The combination of these three filters in order to improve the segmentation is the main motivation of this work. We investigate two approaches to perform the filter combination: weighted mean and median ranking. Segmentation methods are tested after the vessel enhancement. Enhanced images with median ranking are segmented using a simple threshold criterion. Two segmentation procedures are applied when considering enhanced retinal images using the weighted mean approach. The first method is based on deformable models and the second uses fuzzy C-means for the image segmentation. The procedure is evaluated using two public image databases, Drive and Stare. The experimental results demonstrate that the proposed methods perform well for vessel segmentation in comparison with state-of-the-art methods.

  7. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  8. The intrusive growth of initial cells in re-arangement of cells in cambium of Tilia cordata Mill.

    Directory of Open Access Journals (Sweden)

    Wiesław Włoch

    2014-01-01

    Full Text Available In the cambium of linden producing wood with short period of grain inclination change (2-4 years, the intensive reorientation of cells takes place. This is possible mainly through an intrusive growth of cell ends from one radial file entering space between tangential walls of neighboring file and through unequal periclinal divisions that occur in the "initial surface". The intrusive growth is located on the longitudinal edge of a fusiform cell close to the end, and causes deviation of cell ends in a neighbouring file from the initial surface. Unequal periclinal division divides a cell with a deviated end into two derivatives, unequal in size. The one of them, which inherits the deviated end, leaves the initial surface becoming a xylem or phloem mother cell. This means that the old end is eliminated. The intensity of intrusive growth and unequal periclinal divisions is decisive for the velocity of cambial cell reorientation. The oriented intrusive growth occurs only in the initial cells. For that reason, changes in cell-ends position do not occur within one packet of cells but are distinct between neighbouring packets.

  9. Identifying seawater intrusion in coastal areas by means of 1D and quasi-2D joint inversion of TDEM and VES data

    Science.gov (United States)

    Martínez-Moreno, F. J.; Monteiro-Santos, F. A.; Bernardo, I.; Farzamian, M.; Nascimento, C.; Fernandes, J.; Casal, B.; Ribeiro, J. A.

    2017-09-01

    Seawater intrusion is an increasingly widespread problem in coastal aquifers caused by climate changes -sea-level rise, extreme phenomena like flooding and droughts- and groundwater depletion near to the coastline. To evaluate and mitigate the environmental risks of this phenomenon it is necessary to characterize the coastal aquifer and the salt intrusion. Geophysical methods are the most appropriate tool to address these researches. Among all geophysical techniques, electrical methods are able to detect seawater intrusions due to the high resistivity contrast between saltwater, freshwater and geological layers. The combination of two or more geophysical methods is recommended and they are more efficient when both data are inverted jointly because the final model encompasses the physical properties measured for each methods. In this investigation, joint inversion of vertical electric and time domain soundings has been performed to examine seawater intrusion in an area within the Ferragudo-Albufeira aquifer system (Algarve, South of Portugal). For this purpose two profiles combining electrical resistivity tomography (ERT) and time domain electromagnetic (TDEM) methods were measured and the results were compared with the information obtained from exploration drilling. Three different inversions have been carried out: single inversion of the ERT and TDEM data, 1D joint inversion and quasi-2D joint inversion. Single inversion results identify seawater intrusion, although the sedimentary layers detected in exploration drilling were not well differentiated. The models obtained with 1D joint inversion improve the previous inversion due to better detection of sedimentary layer and the seawater intrusion appear to be better defined. Finally, the quasi-2D joint inversion reveals a more realistic shape of the seawater intrusion and it is able to distinguish more sedimentary layers recognised in the exploration drilling. This study demonstrates that the quasi-2D joint

  10. Resonance oscillations of the Soufrière Hills Volcano (Montserrat, W.I.) magmatic system induced by forced magma flow from the reservoir into the upper plumbing dike

    Science.gov (United States)

    Chen, Chin-Wu; Huang, Hsin-Fu; Hautmann, Stefanie; Sacks, I. Selwyn; Linde, Alan T.; Taira, Taka'aki

    2018-01-01

    Short-period deformation cycles are a common phenomenon at active volcanoes and are often attributed to the instability of magma flow in the upper plumbing system caused by fluctuations in magma viscosity related to cooling, degassing, and crystallization. Here we present 20-min periodic oscillations in ground deformation based on high-precision continuous borehole strain data that were associated with the 2003 massive dome-collapse at the Soufrière Hills Volcano, Montserrat (West Indies). These high-frequency oscillations lasted 80 min and were preceded by a 4-hour episode of rapid expansion of the shallow magma reservoir. Strain amplitude ratios indicate that the deformational changes were generated by pressure variations in the shallow magma reservoir and - with reversed polarity - the adjacent plumbing dike. The unusually short period of the oscillations cannot be explained with thermally induced variations in magma properties. We investigate the underlying mechanism of the oscillations via a numerical model of forced magma flow through a reservoir-dike system accounting for time-dependent dilation/contraction of the dike due to a viscous response in the surrounding host rock. Our results suggest that the cyclic pressure variations are modulated by the dynamical interplay between rapid expansion of the magma chamber and the incapacity of the narrow dike to take up fast enough the magma volumes supplied by the reservoir. Our results allow us to place first order constraints on the viscosity of crustal host rocks and consequently its fractional melt content. Hence, we present for the first time crustal-scale in situ measurements of rheological properties of mush zones surrounding magmatic systems.

  11. The role of human intrusion in the dutch safety study

    International Nuclear Information System (INIS)

    Prij, J.; Weers, A.W.v.; Glasbergen, P.; Slot, A.F.M.

    1989-01-01

    In the Netherlands the OPLA research program in which a large number of possible disposal concepts for radioactive waste is investigated has been carried out recently. The disposal concepts concern three different waste strategies, two disposal techiques and three different types of salt formations. In the OPLA program the post-closure safety of the disposal concepts has been investigated. The paper reviews the role of the human intrusion in this safety study. The hydrological consequences of human activities in the underground are discussed and it has been demonstrated that these effects could be taken into account during the groundwater transport calculations. Four different scenario's for human intrusion in the repository have been studied to obtain an indication of the radiological effects. The results show that extremely high doses may result if, after several hundred years, human beings come into direct contact with highly active waste. For the final assessment the probability that the doses will be received should be calculated. This should be done in a subsequent research

  12. Magmatic sill intrusions beneath El Hierro Island following the 2011-2012 submarine eruption

    Science.gov (United States)

    Benito-Saz, María Á.; Sigmundsson, Freysteinn; Parks, Michelle M.; García-Cañada, Laura; Domínguez Cerdeña, Itahiza

    2016-04-01

    El Hierro, the most southwestern island of Canary Islands, Spain, is a volcano rising from around 3600 m above the ocean floor and up to of 1500 m above sea level. A submarine eruption occurred off the coast of El Hierro in 2011-2012, which was the only confirmed eruption in the last ~ 600 years. Activity continued after the end of the eruption with six magmatic intrusions occurring between 2012-2014. Each of these intrusions was characterized by hundreds of earthquakes and 3-19 centimeters of observed ground deformation. Ground displacements at ten continuous GPS sites were initially inverted to determine the optimal source parameters (location, geometry, volume/pressure change) that best define these intrusions from a geodetic point of view. Each intrusive period appears to be associated with the formation of a separate sill, with inferred volumes between 0.02 - 0.3 km3. SAR images from the Canadian RADARSAT-2 satellite and the Italian Space Agency COSMO-SkyMed constellation have been used to produce high-resolution detailed maps of line-of-sight displacements for each of these intrusions. These data have been combined with the continuous GPS observations and a joint inversion undertaken to gain further constraints on the optimal source parameters for each of these separate intrusive events. The recorded activity helps to understand how an oceanic intraplate volcanic island grows through repeated sill intrusions; well documented by seismic, GPS and InSAR observations in the case of the El Hierro activity.

  13. Work Zone Intrusion Report Interface Design

    Science.gov (United States)

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  14. Effect of intrusive and retraction forces in labial and lingual orthodontics: A finite element study

    Directory of Open Access Journals (Sweden)

    Rohan Mascarenhas

    2014-01-01

    Full Text Available Objectives: Lingual orthodontics differs in biomechanics as compared to labial system and has biomechanical advantages. Although theoretical approaches have explained the differences between labial and lingual orthodontics, the finite element method (FEM may be better suited to analyze these differences. This study analyzes the effect of vertical and horizontal forces together on the tooth using FEM. Materials and Methods: An extracted right maxillary central incisor was radiographed and was used to create a solid model using ANSYS. The geometric model was converted into a finite element model with the help of ANSYS software. The model consists of 27,000 elements and 30,000 nodes. Two force vectors (vertical and horizontal were applied labially and lingually at 3 different heights- 4 mm, 5 mm and 6 mm from the incisal edge. Results: In the labial system, the net force vector passes through the center of resistance (CR and brings about intrusion. The net force vector in lingual orthodontics does not pass through the center of resistance and produces lingual tipping of the incisors. Conclusion: Intrusion and retraction forces bring about tipping of incisors in lingual orthodontics. The same amount of intrusion and retraction forces brings about intrusion of incisors in labial orthodontics. Therefore, direction and amount of forces should be carefully and judiciously applied after taking into consideration the resultant biomechanical differences.

  15. A methodological framework to assess the environmental and economic effects of injection barriers against seawater intrusion.

    Science.gov (United States)

    Siarkos, Ilias; Latinopoulos, Dionysis; Mallios, Zisis; Latinopoulos, Pericles

    2017-05-15

    Seawater intrusion is responsible for the progressive deterioration of groundwater quality in numerous coastal aquifers worldwide. As a consequence, seawater intrusion may constitute a serious threat to local groundwater resources, as well as to the regional economy of coastal areas. To alleviate these negative effects, a number of well-designed protective measures could be implemented. The implementation of these measures is usually associated with significant benefits for the environment and the local economy. In this perspective, the present study investigates the particular case of constructing injection barriers for controlling seawater intrusion by developing a methodological framework that combines numerical modeling with spatial and cost-benefit analyses. To this task, we introduce a novel approach, which considers the socio-economic aspects of seawater intrusion in the modeling procedure, and at the same time focuses on the spatial and temporal relationships between water salinity and farmers' income. To test the proposed methodology two alternative artificial recharge scenarios - with different volumes of water used for injection - are assessed. According to the results of this analysis, both scenarios are likely to have a positive impact on groundwater quality, as well as, a net economic benefit to local society. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. Thermal History and Crystallinity of Sheet Intrusions

    Science.gov (United States)

    Whittington, A. G.; Nabelek, P. I.; Hofmeister, A.

    2011-12-01

    Magma emplaced in a sheet intrusion has two potential fates: to crystallize, or quench to glass. Rapidly chilled sheet margins are typically glassy or microcrystalline, while interiors are coarser-grained. The actual textures result from a combination of thermal history and crystallization kinetics, which are related by various feedback mechanisms. The thermal history of cooling sheet intrusions is often approximated using the analytical solution for a semi-infinite half-space, which uses constant thermal properties such as heat capacity (CP), thermal diffusivity (D) and thermal conductivity (k = DρCP), where ρ is density. In reality, both CP and D are strongly T-dependent for glasses and crystals, and melts have higher CP and lower D than crystals or glasses. Another first-order feature ignored in the analytical solution is latent heat of crystallization (ΔHxt), which can be implemented numerically as extra heat capacity over the crystallization interval. For rhyolite melts, D is ~0.5 mm2s-1 and k is ~1.5 Wm-1K-1, which are similar to those of major crustal rock types and granitic protoliths at magmatic temperatures, suggesting that changes in thermal properties accompanying partial melting of the crust should be relatively minor. Numerical models of hot (~920°C liquidus for 0.5 wt.% H2O) shallow rhyolite intrusions indicate that the key difference in thermal history between bodies that quench to obsidian, and those that crystallize, results from the release of latent heat of crystallization, which enables bodies that crystallize to remain at high temperatures for much longer times. The time to solidification is similar in both cases, however, because solidification requires cooling through the glass transition (Tg ~620°C) in the first case, and cooling only to the solidus (~770°C) in the second. For basaltic melts, D is ~0.3 mm2s-1 and k is ~1.0 Wm-1K-1, compared to ~0.6 mm2s-1 and 2.5 Wm-1K-1 for crystalline basalt or peridotite at magmatic temperatures

  17. Segmental and global lordosis changes with two-level axial lumbar interbody fusion and posterior instrumentation

    Science.gov (United States)

    Melgar, Miguel A; Tobler, William D; Ernst, Robert J; Raley, Thomas J; Anand, Neel; Miller, Larry E; Nasca, Richard J

    2014-01-01

    Background Loss of lumbar lordosis has been reported after lumbar interbody fusion surgery and may portend poor clinical and radiographic outcome. The objective of this research was to measure changes in segmental and global lumbar lordosis in patients treated with presacral axial L4-S1 interbody fusion and posterior instrumentation and to determine if these changes influenced patient outcomes. Methods We performed a retrospective, multi-center review of prospectively collected data in 58 consecutive patients with disabling lumbar pain and radiculopathy unresponsive to nonsurgical treatment who underwent L4-S1 interbody fusion with the AxiaLIF two-level system (Baxano Surgical, Raleigh NC). Main outcomes included back pain severity, Oswestry Disability Index (ODI), Odom's outcome criteria, and fusion status using flexion and extension radiographs and computed tomography scans. Segmental (L4-S1) and global (L1-S1) lumbar lordosis measurements were made using standing lateral radiographs. All patients were followed for at least 24 months (mean: 29 months, range 24-56 months). Results There was no bowel injury, vascular injury, deep infection, neurologic complication or implant failure. Mean back pain severity improved from 7.8±1.7 at baseline to 3.3±2.6 at 2 years (p lordosis, defined as a change in Cobb angle ≤ 5°, was identified in 84% of patients at L4-S1 and 81% of patients at L1-S1. Patients with loss or gain in segmental or global lordosis experienced similar 2-year outcomes versus those with less than a 5° change. Conclusions/Clinical Relevance Two-level axial interbody fusion supplemented with posterior fixation does not alter segmental or global lordosis in most patients. Patients with postoperative change in lordosis greater than 5° have similarly favorable long-term clinical outcomes and fusion rates compared to patients with less than 5° lordosis change. PMID:25694920

  18. Preliminary evaluation of solution-mining intrusion into a salt-dome repository

    International Nuclear Information System (INIS)

    1981-06-01

    This report is the product of the work of an ONWI task force to evaluate inadvertant human intrusion into a salt dome repository by solution mining. It summarizes the work in the following areas: a general review of the levels of defense that could reduce both the likelihood and potential consequences of human intrusion into a salt dome repository; evaluation of a hypothetical intrusion scenario and its consequences; recommendation for further studies. The conclusions of this task force report can be summarized as follows: (1) it is not possible at present to establish with certainty that solution mining is credible as a human-intrusion event. The likelihood of such an intrusion will depend on the effectiveness of the preventive measures; (2) an example analysis based on the realistic approach is presented in this report; it concluded that the radiological consequences are strongly dependent upon the mode of radionuclide release from the waste form, time after emplacement, package design, impurities in the host salt, the amount of a repository intercepted, the solution mining cavity form, the length of time over which solution mining occurs, the proportion of contaminated salt source for human consumption compared to other sources, and the method of salt purification for culinary purposes; (3) worst case scenarios done by other studies suggest considerable potential for exposures to man while preliminary evaluations of more realistic cases suggest significantly reduced potential consequences. Mathematical model applications to process systems, guided by more advanced assumptions about human intrusion into geomedia, will shed more light on the potential for concerns and the degree to which mitigative measures will be required

  19. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei

    2010-01-01

    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  20. Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection

    Science.gov (United States)

    Elfers, Carsten; Horstmann, Mirko; Sohr, Karsten; Herzog, Otthein

    Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine learning techniques have been proposed. However, one critical issue is that the amount of reference data that contains serious intrusions is very sparse. In this paper we present an inference process with linear chain conditional random fields that aims to solve this problem by using domain knowledge about the alerts of different intrusion sensors represented in an ontology.

  1. Computer Game Play Reduces Intrusive Memories of Experimental Trauma via Reconsolidation-Update Mechanisms.

    Science.gov (United States)

    James, Ella L; Bonsall, Michael B; Hoppitt, Laura; Tunbridge, Elizabeth M; Geddes, John R; Milton, Amy L; Holmes, Emily A

    2015-08-01

    Memory of a traumatic event becomes consolidated within hours. Intrusive memories can then flash back repeatedly into the mind's eye and cause distress. We investigated whether reconsolidation-the process during which memories become malleable when recalled-can be blocked using a cognitive task and whether such an approach can reduce these unbidden intrusions. We predicted that reconsolidation of a reactivated visual memory of experimental trauma could be disrupted by engaging in a visuospatial task that would compete for visual working memory resources. We showed that intrusive memories were virtually abolished by playing the computer game Tetris following a memory-reactivation task 24 hr after initial exposure to experimental trauma. Furthermore, both memory reactivation and playing Tetris were required to reduce subsequent intrusions (Experiment 2), consistent with reconsolidation-update mechanisms. A simple, noninvasive cognitive-task procedure administered after emotional memory has already consolidated (i.e., > 24 hours after exposure to experimental trauma) may prevent the recurrence of intrusive memories of those emotional events. © The Author(s) 2015.

  2. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  3. Two-Phase and Graph-Based Clustering Methods for Accurate and Efficient Segmentation of Large Mass Spectrometry Images.

    Science.gov (United States)

    Dexter, Alex; Race, Alan M; Steven, Rory T; Barnes, Jennifer R; Hulme, Heather; Goodwin, Richard J A; Styles, Iain B; Bunch, Josephine

    2017-11-07

    Clustering is widely used in MSI to segment anatomical features and differentiate tissue types, but existing approaches are both CPU and memory-intensive, limiting their application to small, single data sets. We propose a new approach that uses a graph-based algorithm with a two-phase sampling method that overcomes this limitation. We demonstrate the algorithm on a range of sample types and show that it can segment anatomical features that are not identified using commonly employed algorithms in MSI, and we validate our results on synthetic MSI data. We show that the algorithm is robust to fluctuations in data quality by successfully clustering data with a designed-in variance using data acquired with varying laser fluence. Finally, we show that this method is capable of generating accurate segmentations of large MSI data sets acquired on the newest generation of MSI instruments and evaluate these results by comparison with histopathology.

  4. Monitoring fish distributions along electrofishing segments

    Science.gov (United States)

    Miranda, Leandro E.

    2014-01-01

    Electrofishing is widely used to monitor fish species composition and relative abundance in streams and lakes. According to standard protocols, multiple segments are selected in a body of water to monitor population relative abundance as the ratio of total catch to total sampling effort. The standard protocol provides an assessment of fish distribution at a macrohabitat scale among segments, but not within segments. An ancillary protocol was developed for assessing fish distribution at a finer scale within electrofishing segments. The ancillary protocol was used to estimate spacing, dispersion, and association of two species along shore segments in two local reservoirs. The added information provided by the ancillary protocol may be useful for assessing fish distribution relative to fish of the same species, to fish of different species, and to environmental or habitat characteristics.

  5. Environmental data processor of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Rogers, M.S.

    1977-06-01

    A data acquisition system oriented specifically toward collection and processing of various meteorological and environmental parameters has been designed around a National Semiconductor IMP-16 microprocessor, This system, called the Environmental Data Processor (EDP), was developed specifically for use with the Adaptive Intrusion Data System (AIDS) in a perimeter intrusion alarm evaluation, although its design is sufficiently general to permit use elsewhere. This report describes in general detail the design of the EDP and its interaction with other AIDS components

  6. Cultural syndromes and age moderate the emotional impact of illness intrusiveness in rheumatoid arthritis.

    Science.gov (United States)

    Devins, Gerald M; Gupta, Anita; Cameron, Jill; Woodend, Kirsten; Mah, Kenneth; Gladman, Dafna

    2009-02-01

    The authors investigated cultural syndromes (multidimensional vectors comprising culturally based attitudes, values, and beliefs) and age as moderators of the emotional impact of illness intrusiveness--illness-induced lifestyle disruptions--in rheumatoid arthritis (RA) and examined illness intrusiveness effects in total and separately for three life domains (relationships and personal development, intimacy, and instrumental). People with RA (n = 105) completed the Illness Intrusiveness Ratings, Individualism-Collectivism, and Center for Epidemiologic Studies--Depression scales in a one-on-one interview. Controlling for disease and background characteristics, the association between illness intrusiveness (total score and the Relationships and Personal Development subscale) and distress was inverse when young adults with RA endorsed high horizontal individualism. Illness intrusiveness into intimacy was associated with increased distress, and this intensified when respondents endorsed high vertical individualism, horizontal collectivism, vertical collectivism, or low horizontal individualism. The negative emotional impact of illness intrusiveness into intimacy diminished with increasing age. Given an aging and increasingly pluralistic society, diversity can no longer be ignored in addressing the psychosocial impact of chronic, disabling disease.

  7. Expert judgement on inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Hora, S.C.; von Winterfeldt, D.; Trauth, K.M.

    1991-12-01

    Four expert-judgment teams have developed analyses delineating possible future societies in the next 10,000 years in the vicinity of the Waste Isolation Pilot Plant (WIPP). Expert-judgment analysis was used to address the question of future societies because neither experimentation, observation, nor modeling can resolve such uncertainties. Each of the four, four-member teams, comprised of individuals with expertise in the physical, social, or political sciences, developed detailed qualitative assessments of possible future societies. These assessments include detailed discussions of the underlying physical and societal factors that would influence society and the likely modes of human-intrusion at the WIPP, as well as the probabilities of intrusion. Technological development, population growth, economic development, conservation of information, persistence of government control, and mitigation of danger from nuclear waste were the factors the teams believed to be most important. Likely modes of human-intrusion were categorized as excavation, disposal/storage, tunneling, drilling, and offsite activities. Each team also developed quantitative assessments by providing probabilities of various alternative futures, of inadvertent human intrusion, and in some cases, of particular modes of intrusion. The information created throughout this study will be used in conjunction with other types of information, including experimental data, calculations from physical principles and computer models, and perhaps other judgments, as input to ''performance assessment.'' The more qualitative results of this study will be used as input to another expert panel considering markers to deter inadvertent human intrusion at the WIPP

  8. MOVING WINDOW SEGMENTATION FRAMEWORK FOR POINT CLOUDS

    Directory of Open Access Journals (Sweden)

    G. Sithole

    2012-07-01

    Full Text Available As lidar point clouds become larger streamed processing becomes more attractive. This paper presents a framework for the streamed segmentation of point clouds with the intention of segmenting unstructured point clouds in real-time. The framework is composed of two main components. The first component segments points within a window shifting over the point cloud. The second component stitches the segments within the windows together. In this fashion a point cloud can be streamed through these two components in sequence, thus producing a segmentation. The algorithm has been tested on airborne lidar point cloud and some results of the performance of the framework are presented.

  9. Intrusion detection techniques for plant-wide network in a nuclear power plant

    International Nuclear Information System (INIS)

    Rajasekhar, P.; Shrikhande, S.V.; Biswas, B.B.; Patil, R.K.

    2012-01-01

    Nuclear power plants have a lot of critical data to be sent to the operator workstations. A plant wide integrated communication network, with high throughput, determinism and redundancy, is required between the workstations and the field. Switched Ethernet network is a promising prospect for such an integrated communication network. But for such an integrated system, intrusion is a major issue. Hence the network should have an intrusion detection system to make the network data secure and enhance the network availability. Intrusion detection is the process of monitoring the events occurring in a network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of network security policies, acceptable user policies, or standard security practices. This paper states the various intrusion detection techniques and approaches which are applicable for analysis of a plant wide network. (author)

  10. Seawater intrusion mapping using electrical resistivity tomography and hydrochemical data. An application in the coastal area of eastern Thermaikos Gulf, Greece

    Energy Technology Data Exchange (ETDEWEB)

    Kazakis, N., E-mail: kazanera@yahoo.com [Aristotle University of Thessaloniki, Department of Geology, Lab. of Engineering Geology & Hydrogeology, 54124 Thessaloniki (Greece); Pavlou, A. [Aristotle University of Thessaloniki, Department of Geology, Lab. of Engineering Geology & Hydrogeology, 54124 Thessaloniki (Greece); Vargemezis, G. [Aristotle University of Thessaloniki, Department of Geology, Lab. of Applied Geophysics, 54124 Thessaloniki (Greece); Voudouris, K.S.; Soulios, G. [Aristotle University of Thessaloniki, Department of Geology, Lab. of Engineering Geology & Hydrogeology, 54124 Thessaloniki (Greece); Pliakas, F. [Democritus University of Thrace, Department of Civil Engineering, Xanthi 67100 (Greece); Tsokas, G. [Aristotle University of Thessaloniki, Department of Geology, Lab. of Applied Geophysics, 54124 Thessaloniki (Greece)

    2016-02-01

    The aim of this study was to determine the extent and geometrical characteristics of seawater intrusion in the coastal aquifer of the eastern Thermaikos Gulf, Greece. Hydrochemical data and geoelectrical measurements were combined and supplemented to determine the hydrochemical regime of the study site in regard to seawater phenomena. Chemical analysis of groundwater was performed in 126 boreholes and fifteen electrical resistivity tomographies (ERT) were measured, whereas in two sites the ERT measurements were repeated following the wet season. The Cl{sup −} concentrations recorded reached 2240 mg/L indicating seawater intrusion which was also verified by ionic ratios. The ionic ratios were overlapped and a seawater intrusion map (SWIM) was produced. A significant part of the coastal aquifer (up to 150 km{sup 2}) is influenced by seawater intrusion. The areas with the most intensive salinization are located between Nea Kallikratia–Epanomi and Aggelochori–Peraia. According to the ERTs, in the influenced areas the salinization of the aquifer exceeds 1 km toward the mainland and its depth reaches 200 m. In the area surrounding Thessaloniki airport, the ERTs revealed salinization of the upper aquifer to depths of up to 40 m, whereas the lower aquifer is uninfluenced. This abnormal distribution of seawater intrusion demonstrates the value of geoelectrical methods in the study of seawater intrusion especially in areas with limited available hydrochemical data. - Highlights: • ERTs determined the geometrical characteristics of the saline aquifer. • An abnormal distribution of seawater intrusion was recorded. • Four ionic ratios overlapped and a seawater intrusion map was produced. • Cl{sup −} concentrations increased significantly from 2005 to 2010 by up to 1800 mg/L.

  11. Seawater intrusion mapping using electrical resistivity tomography and hydrochemical data. An application in the coastal area of eastern Thermaikos Gulf, Greece

    International Nuclear Information System (INIS)

    Kazakis, N.; Pavlou, A.; Vargemezis, G.; Voudouris, K.S.; Soulios, G.; Pliakas, F.; Tsokas, G.

    2016-01-01

    The aim of this study was to determine the extent and geometrical characteristics of seawater intrusion in the coastal aquifer of the eastern Thermaikos Gulf, Greece. Hydrochemical data and geoelectrical measurements were combined and supplemented to determine the hydrochemical regime of the study site in regard to seawater phenomena. Chemical analysis of groundwater was performed in 126 boreholes and fifteen electrical resistivity tomographies (ERT) were measured, whereas in two sites the ERT measurements were repeated following the wet season. The Cl"− concentrations recorded reached 2240 mg/L indicating seawater intrusion which was also verified by ionic ratios. The ionic ratios were overlapped and a seawater intrusion map (SWIM) was produced. A significant part of the coastal aquifer (up to 150 km"2) is influenced by seawater intrusion. The areas with the most intensive salinization are located between Nea Kallikratia–Epanomi and Aggelochori–Peraia. According to the ERTs, in the influenced areas the salinization of the aquifer exceeds 1 km toward the mainland and its depth reaches 200 m. In the area surrounding Thessaloniki airport, the ERTs revealed salinization of the upper aquifer to depths of up to 40 m, whereas the lower aquifer is uninfluenced. This abnormal distribution of seawater intrusion demonstrates the value of geoelectrical methods in the study of seawater intrusion especially in areas with limited available hydrochemical data. - Highlights: • ERTs determined the geometrical characteristics of the saline aquifer. • An abnormal distribution of seawater intrusion was recorded. • Four ionic ratios overlapped and a seawater intrusion map was produced. • Cl"− concentrations increased significantly from 2005 to 2010 by up to 1800 mg/L.

  12. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    Sulfide intrusion in seagrasses represents a global threat to seagrasses and thereby an important parameter in resilience of seagrass ecosystems. In contrast seegrasses colonize and grow in hostile sediments, where they are constantly exposed to invasion of toxic gaseous sulfide. Remarkably little...... strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis, tracing sulfur compounds combined with ecosystem parameters we found different spatial, intraspecific and interspecific strategies to cope with sulfidic sediments. 1...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  13. Radiological risks due to intrusion into a deep bedrock repository

    International Nuclear Information System (INIS)

    Nordlinder, S.; Bergstroem, U.; Edlund, O.

    1999-01-01

    The Swedish concept for disposal of high-level waste is a deep (500 m) bedrock repository (SFL) protected by multiple barriers that isolate the waste from the environment for such a long time that the physical decay will cause a substantial reduction of the radioactivity. The aim of concentration and isolation of high-level waste is to reduce the radiation risk. Intrusion in the repository may introduce a small residual risk to individuals. A risk analysis was performed comprising dose assessment and probabilities of occurrence. Intrusions may be considered to take place either due to conscious actions or by actions without any knowledge about the repository. For conscious intrusion it may be assumed that there will be enough knowledge to manage the radiation situation in a professional manner. Several reasons for making inadvertent intrusion are possible. Independently of the purpose, the most probable initial way of coming into contact with the radioactive material is by deep drilling. Examples of causes for drilling could be general scientific purposes or exploitation of geothermal energy. Dose assessments were made for intrusion due to inclined drilling directly into a canister, and drilling near an initially malfunctioning canister from which radionuclides have leaked into the groundwater. For the former case, external pathways were considered due to exposure from a core of the canister with fuel and contaminated bore dust. The most common drilling method is with water flushing for removal of bore dust, which will not cause any substantial transfer of radionuclides to air. For the second case, it was assumed that there was a well in the vicinity. The only pathway considered was therefore consumption of water because it dominates the exposure. The highest dose rates to man were, as expected, obtained by drilling into the canister. Dose rates decrease with time after closure. During the first time the relatively short-lived radionuclides Cs-137 and Sr-90 give

  14. An Introduction to camptonite lamprophyric dikes at Misho Mountains (Almas area - East Azarbaijan Province

    Directory of Open Access Journals (Sweden)

    Mohsen moayyed

    2017-07-01

    Full Text Available The Almas area in NW of the East Azarbaijan Province, is a part of the Soltaniye-Misho zone. The lamprophyric dikes crosscut the Kahar Formation. The principal minerals of these rocks are amphibole (amphibole phenocrysts are longer than 3 cm, biotite, pyroxene, olivine, plagioclase, apatite, calcite and chlorite with porphyritic texture. According to mineralogical and geochemical evidences, the studied lamprophyres are camptonite with alkaline nature. The plotted spider diagrams indicate that the studied lamprophyres are enriched in light rare earth elements (LREE and incompatible elements in comparison to heavy rare earth elements (HREE. The parent magma is probably generated from spinel lherzolite mantle with low rate partial melting.

  15. Sill intrusion in volcanic calderas: implications for vent opening probability

    Science.gov (United States)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    Calderas show peculiar behaviors with remarkable dynamic processes, which do not often culminate in eruptions. Observations and studies conducted in recent decades have shown that the most common cause of unrest in the calderas is due to magma intrusion; in particular, the intrusion of sills at shallow depths. Monogenic cones, with large areal dispersion, are quite common in the calderas, suggesting that the susceptibility analysis based on geological features, is not strictly suitable for estimating the vent opening probability in calderas. In general, the opening of a new eruptive vent can be regarded as a rock failure process. The stress field in the rocks that surrounds and tops the magmatic reservoirs plays an important role in causing the rock failure and creating the path that magma can follow towards the surface. In this conceptual framework, we approach the problem of getting clues about the probability of vent opening in volcanic calderas through the study of the stress field produced by the intrusion of magma, in particular, by the intrusion of a sill. We simulate the intrusion of a sill free to expand radially, with shape and dimensions which vary with time. The intrusion process is controlled by the elastic response of the rock plate above the sill, which bends because of the intrusion, and by gravity, that drives the magma towards the zones where the thickness of the sill is smaller. We calculated the stress field in the plate rock above the sill. We found that at the bottom of the rock plate above the sill the maximum intensity of tensile stress is concentrated at the front of the sill and spreads radially with it, over time. For this reason, we think that the front of the spreading sill is prone to open for eruptive vents. Even in the central area of the sill the intensity of stress is relatively high, but at the base of the rock plate stress is compressive. Under isothermal conditions, the stress soon reaches its maximum value (time interval

  16. Effect of electrode intrusion on pressure drop and electrochemical performance of an all-vanadium redox flow battery

    Science.gov (United States)

    Kumar, S.; Jayanti, S.

    2017-08-01

    In this paper, we present a study of the effect of electrode intrusion into the flow channel in an all-vanadium redox flow battery. Permeability, pressure drop and electrochemical performance have been measured in a cell with active area 100 cm2and 414 cm2 fitted with a carbon felt electrode of thickness of 3, 6 or 9 mm compressed to 1.5, 2.5 or 4 mm, respectively, during assembly. Results show that the pressure drop is significantly higher than what can be expected in the thick electrode case while its electrochemical performance is lower. Detailed flow analysis using computational fluid dynamics simulations in two different flow fields shows that both these results can be attributed to electrode intrusion into the flow channel leading to increased resistance to electrolyte flow through the electrode. A correlation is proposed to evaluate electrode intrusion depth as a function of compression.

  17. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  18. Facebook intrusion, fear of missing out, narcissism, and life satisfaction: A cross-sectional study.

    Science.gov (United States)

    Błachnio, Agata; Przepiórka, Aneta

    2018-01-01

    Facebook is one of the most popular social networking sites. The present paper examines the relations between fear of missing out, narcissism, Facebook intrusion, and life satisfaction. We hypothesized that the fear of missing out and narcissism would play a significant role in Facebook intrusion. The participants in the study were 360 Polish users of Facebook. We administered the Facebook Intrusion Scale, the Fear of Missing Out Scale, the Narcissistic Personality Inventory, and the Satisfaction with Life Scale. The results showed that a high level of fear of missing out and high narcissism are predictors of Facebook intrusion, while a low level of fear of missing out and high narcissism are related to satisfaction with life. Our findings provide a more comprehensive picture of the predictors of Facebook intrusion and reveal interesting patterns. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  20. An armored-cable-based fiber Bragg grating sensor array for perimeter fence intrusion detection

    Science.gov (United States)

    Hao, Jianzhong; Dong, Bo; Varghese, Paulose; Phua, Jiliang; Foo, Siang Fook

    2012-01-01

    In this paper, an armored-cable-based optical fiber Bragg grating (FBG) sensor array, for perimeter fence intrusion detection, is demonstrated and some of the field trial results are reported. The field trial was conducted at a critical local installation in Singapore in December 2010. The sensor array was put through a series of both simulated and live intrusion scenarios to test the stability and suitability of operation in the local environmental conditions and to determine its capabilities in detecting and reporting these intrusions accurately to the control station. Such a sensor array can provide perimeter intrusion detection with fine granularity and preset pin-pointing accuracy. The various types of intrusions included aided or unaided climbs, tampering and cutting of the fence, etc. The unique sensor packaging structure provides high sensitivity, crush resistance and protection against rodents. It is also capable of resolving nuisance events such as rain, birds sitting on the fence or seismic vibrations. These sensors are extremely sensitive with a response time of a few seconds. They can be customized for a desired spatial resolution and pre-determined sensitivity. Furthermore, it is easy to cascade a series of such sensors to monitor and detect intrusion events over a long stretch of fence line. Such sensors can be applied to real-time intrusion detection for perimeter security, pipeline security and communications link security.