WorldWideScience

Sample records for vapor intrusion investigation

  1. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  2. A Numerical Investigation of Vapor Intrusion — the Dynamic Response of Contaminant Vapors to Rainfall Events

    Science.gov (United States)

    Shen, Rui; Pennell, Kelly G.; Suuberg, Eric M.

    2013-01-01

    The U.S. government and various agencies have published guidelines for field investigation of vapor intrusion, most of which suggest soil gas sampling as an integral part of the investigation. Contaminant soil gas data are often relatively more stable than indoor air vapor concentration measurements, but meteorological conditions might influence soil gas values. Although a few field and numerical studies have considered some temporal effects on soil gas vapor transport, a full explanation of the contaminant vapor concentration response to rainfall events is not available. This manuscript seeks to demonstrate the effects on soil vapor transport during and after different rainfall events, by applying a coupled numerical model of fluid flow and vapor transport. Both a single rainfall event and seasonal rainfall events were modeled. For the single rainfall event models, the vapor response process could be divided into three steps: namely, infiltration, water redistribution, and establishment of a water lens atop the groundwater source. In the infiltration step, rainfall intensity was found to determine the speed of the wetting front and wash-out effect on the vapor. The passage of the wetting front led to an increase of the vapor concentration in both the infiltration and water redistribution steps and this effect is noted at soil probes located 1 m below the ground surface. When the mixing of groundwater with infiltrated water was not allowed, a clean water lens accumulated above the groundwater source and led to a capping effect which can reduce diffusion rates of contaminant from the source. Seasonal rainfall with short time intervals involved superposition of the individual rainfall events. This modeling results indicated that for relatively deeper soil that the infiltration wetting front could not flood, the effects were damped out in less than a month after rain; while in the long term (years), possible formation of a water lens played a larger role in

  3. A numerical investigation of vapor intrusion--the dynamic response of contaminant vapors to rainfall events.

    Science.gov (United States)

    Shen, Rui; Pennell, Kelly G; Suuberg, Eric M

    2012-10-15

    The U.S. government and various agencies have published guidelines for field investigation of vapor intrusion, most of which suggest soil gas sampling as an integral part of the investigation. Contaminant soil gas data are often relatively more stable than indoor air vapor concentration measurements, but meteorological conditions might influence soil gas values. Although a few field and numerical studies have considered some temporal effects on soil gas vapor transport, a full explanation of the contaminant vapor concentration response to rainfall events is not available. This manuscript seeks to demonstrate the effects on soil vapor transport during and after different rainfall events, by applying a coupled numerical model of fluid flow and vapor transport. Both a single rainfall event and seasonal rainfall events were modeled. For the single rainfall event models, the vapor response process could be divided into three steps: namely, infiltration, water redistribution, and establishment of a water lens atop the groundwater source. In the infiltration step, rainfall intensity was found to determine the speed of the wetting front and wash-out effect on the vapor. The passage of the wetting front led to an increase of the vapor concentration in both the infiltration and water redistribution steps and this effect is noted at soil probes located 1m below the ground surface. When the mixing of groundwater with infiltrated water was not allowed, a clean water lens accumulated above the groundwater source and led to a capping effect which can reduce diffusion rates of contaminant from the source. Seasonal rainfall with short time intervals involved superposition of the individual rainfall events. This modeling results indicated that for relatively deeper soil that the infiltration wetting front could not flood, the effects were damped out in less than a month after rain; while in the long term (years), possible formation of a water lens played a larger role in determining

  4. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  5. Final work plan : supplemental upward vapor intrusion investigation at the former CCC/USDA grain storage facility in Hanover, Kansas.

    Energy Technology Data Exchange (ETDEWEB)

    LaFreniere, L. M.; Environmental Science Division

    2008-12-15

    The Commodity Credit Corporation (CCC), an agency of the U.S. Department of Agriculture (USDA), operated a grain storage facility at the northeastern edge of the city of Hanover, Kansas, from 1950 until the early 1970s. During this time, commercial grain fumigants containing carbon tetrachloride were in common use by the grain storage industry to preserve grain in their facilities. In February 1998, trace to low levels of carbon tetrachloride (below the maximum contaminant level [MCL] of 5.0 {micro}g/L) were detected in two private wells near the former grain storage facility at Hanover, as part of a statewide USDA private well sampling program that was implemented by the Kansas Department of Health and Environment (KDHE) near former CCC/USDA facilities. In 2007, the CCC/USDA conducted near-surface soil sampling at 61 locations and also sampled indoor air at nine residences on or adjacent to its former Hanover facility to address the residents concerns regarding vapor intrusion. Low levels of carbon tetrachloride were detected at four of the nine homes. The results were submitted to the KDHE in October 2007 (Argonne 2007). On the basis of the results, the KDHE requested sub-slab sampling and/or indoor air sampling (KDHE 2007). This Work Plan describes, in detail, the proposed additional scope of work requested by the KDHE and has been developed as a supplement to the comprehensive site investigation work plan that is pending (Argonne 2008). Indoor air samples collected previously from four homes at Hanover were shown to contain the carbon tetrachloride at low concentrations (Table 2.1). It cannot be concluded from these previous data that the source of the detected carbon tetrachloride is vapor intrusion attributable to former grain storage operations of the CCC/USDA at Hanover. The technical objective of the vapor intrusion investigation described here is to assess the risk to human health due to the potential for upward migration of carbon tetrachloride and

  6. Evidence of a sewer vapor transport pathway at the USEPA vapor intrusion research duplex

    Science.gov (United States)

    The role of sewer lines as preferential pathways for vapor intrusion is poorly understood. Although the importance of sewer lines for volatile organic compound (VOC) transport has been documented at a small number of sites with vapor intrusion, sewer lines are not routinely sampl...

  7. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    Science.gov (United States)

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...

  8. Relationship between vapor intrusion and human exposure to trichloroethylene.

    Science.gov (United States)

    Archer, Natalie P; Bradford, Carrie M; Villanacci, John F; Crain, Neil E; Corsi, Richard L; Chambers, David M; Burk, Tonia; Blount, Benjamin C

    2015-01-01

    Trichloroethylene (TCE) in groundwater has the potential to volatilize through soil into indoor air where it can be inhaled. The purpose of this study was to determine whether individuals living above TCE-contaminated groundwater are exposed to TCE through vapor intrusion. We examined associations between TCE concentrations in various environmental media and TCE concentrations in residents. For this assessment, indoor air, outdoor air, soil gas, and tap water samples were collected in and around 36 randomly selected homes; blood samples were collected from 63 residents of these homes. Additionally, a completed exposure survey was collected from each participant. Environmental and blood samples were analyzed for TCE. Mixed model multiple linear regression analyses were performed to determine associations between TCE in residents' blood and TCE in indoor air, outdoor air, and soil gas. Blood TCE concentrations were above the limit of quantitation (LOQ; ≥ 0.012 µg L(-1)) in 17.5% of the blood samples. Of the 36 homes, 54.3%, 47.2%, and >84% had detectable concentrations of TCE in indoor air, outdoor air, and soil gas, respectively. Both indoor air and soil gas concentrations were statistically significantly positively associated with participants' blood concentrations (P = 0.0002 and P = 0.04, respectively). Geometric mean blood concentrations of residents from homes with indoor air concentrations of >1.6 µg m(-3) were approximately 50 times higher than geometric mean blood TCE concentrations in participants from homes with no detectable TCE in indoor air (P < .0001; 95% CI 10.4-236.4). This study confirms the occurrence of vapor intrusion and demonstrates the magnitude of exposure from vapor intrusion of TCE in a residential setting.

  9. Sensitivity analysis on parameters and processes affecting vapor intrusion risk

    KAUST Repository

    Picone, Sara

    2012-03-30

    A one-dimensional numerical model was developed and used to identify the key processes controlling vapor intrusion risks by means of a sensitivity analysis. The model simulates the fate of a dissolved volatile organic compound present below the ventilated crawl space of a house. In contrast to the vast majority of previous studies, this model accounts for vertical variation of soil water saturation and includes aerobic biodegradation. The attenuation factor (ratio between concentration in the crawl space and source concentration) and the characteristic time to approach maximum concentrations were calculated and compared for a variety of scenarios. These concepts allow an understanding of controlling mechanisms and aid in the identification of critical parameters to be collected for field situations. The relative distance of the source to the nearest gas-filled pores of the unsaturated zone is the most critical parameter because diffusive contaminant transport is significantly slower in water-filled pores than in gas-filled pores. Therefore, attenuation factors decrease and characteristic times increase with increasing relative distance of the contaminant dissolved source to the nearest gas diffusion front. Aerobic biodegradation may decrease the attenuation factor by up to three orders of magnitude. Moreover, the occurrence of water table oscillations is of importance. Dynamic processes leading to a retreating water table increase the attenuation factor by two orders of magnitude because of the enhanced gas phase diffusion. © 2012 SETAC.

  10. Detailed Field Investigation of Vapor Intrusion Processes

    Science.gov (United States)

    2008-09-01

    drinks are preferable to caffeinated beverages or soft drinks. Refrain from alcohol the night before field work. • While in the field drink...crude drug made from the plant Cannabis sativa. The main mind-altering (psychoactive) ingredient in marijuana is THC (delta-9-tetrahydrocannobinol... caffeinated beverages or soft drinks. Refrain from alcohol the night before field work. • In the field drink frequently. Numerous small drinks at a tepid

  11. VOC SAMPLING IN THE WATER TABLE/CAPILLARY FRINGE AREA FOR ASSESSING IMPACT ON VAPOR INTRUSION AND INDOOR AIR QUALITY

    Science.gov (United States)

    Vapor intrusion has been determined to be a major pathway for increased indoor air contamination from volatile organic contaminants (VOCs) at certain contaminated sites. In order to properly assess vapor intrusion, it is important to adequately evaluate VOC concentrations in the...

  12. Protocol for Tier 2 Evaluation of Vapor Intrusion at Corrective Action Sites

    Science.gov (United States)

    2012-07-01

    and Evaluation o condition the evalu Contro negati buildi pressu Vapo intrusio “on” Contro positiv buildi pressu Vapo intrusio “off” Figure 2...of Vapor Intrusion 11 Table 3.1: Performance Objectives Performance Objective Data Requirements Success Criteria Results Quantitative ...defined in Appendix D of the demonstration plan. Quantitative objectives for Precision, Accuracy, Completeness, Representativeness, and Comparability

  13. 76 FR 5370 - Potential Addition of Vapor Intrusion Component to the Hazard Ranking System

    Science.gov (United States)

    2011-01-31

    ... Estimated Costs to Remediate Existing Sites Exceed Current Funding Levels, and More Sites are Expected to Be.... Methods for incorporating vapor intrusion into the HRS while, to the extent possible, maintaining the... will also be able to sign up for a mailing list that will be used to distribute logistical information...

  14. Impacts of Changes of Indoor Air Pressure and Air Exchange Rate in Vapor Intrusion Scenarios.

    Science.gov (United States)

    Shen, Rui; Suuberg, Eric M

    2016-02-01

    There has, in recent years, been increasing interest in understanding the transport processes of relevance in vapor intrusion of volatile organic compounds (VOCs) into buildings on contaminated sites. These studies have included fate and transport modeling. Most such models have simplified the prediction of indoor air contaminant vapor concentrations by employing a steady state assumption, which often results in difficulties in reconciling these results with field measurements. This paper focuses on two major factors that may be subject to significant transients in vapor intrusion situations, including the indoor air pressure and the air exchange rate in the subject building. A three-dimensional finite element model was employed with consideration of daily and seasonal variations in these factors. From the results, the variations of indoor air pressure and air exchange rate are seen to contribute to significant variations in indoor air contaminant vapor concentrations. Depending upon the assumptions regarding the variations in these parameters, the results are only sometimes consistent with the reports of several orders of magnitude in indoor air concentration variations from field studies. The results point to the need to examine more carefully the interplay of these factors in order to quantitatively understand the variations in potential indoor air exposures.

  15. Phytoforensics: Trees as bioindicators of potential indoor exposure via vapor intrusion.

    Directory of Open Access Journals (Sweden)

    Jordan L Wilson

    Full Text Available Human exposure to volatile organic compounds (VOCs via vapor intrusion (VI is an emerging public health concern with notable detrimental impacts on public health. Phytoforensics, plant sampling to semi-quantitatively delineate subsurface contamination, provides a potential non-invasive screening approach to detect VI potential, and plant sampling is effective and also time- and cost-efficient. Existing VI assessment methods are time- and resource-intensive, invasive, and require access into residential and commercial buildings to drill holes through basement slabs to install sampling ports or require substantial equipment to install groundwater or soil vapor sampling outside the home. Tree-core samples collected in 2 days at the PCE Southeast Contamination Site in York, Nebraska were analyzed for tetrachloroethene (PCE and results demonstrated positive correlations with groundwater, soil, soil-gas, sub-slab, and indoor-air samples collected over a 2-year period. Because tree-core samples were not collocated with other samples, interpolated surfaces of PCE concentrations were estimated so that comparisons could be made between pairs of data. Results indicate moderate to high correlation with average indoor-air and sub-slab PCE concentrations over long periods of time (months to years to an interpolated tree-core PCE concentration surface, with Spearman's correlation coefficients (ρ ranging from 0.31 to 0.53 that are comparable to the pairwise correlation between sub-slab and indoor-air PCE concentrations (ρ = 0.55, n = 89. Strong correlations between soil-gas, sub-slab, and indoor-air PCE concentrations and an interpolated tree-core PCE concentration surface indicate that trees are valid indicators of potential VI and human exposure to subsurface environment pollutants. The rapid and non-invasive nature of tree sampling are notable advantages: even with less than 60 trees in the vicinity of the source area, roughly 12 hours of tree

  16. Phytoforensics: Trees as bioindicators of potential indoor exposure via vapor intrusion.

    Science.gov (United States)

    Wilson, Jordan L; Samaranayake, V A; Limmer, Matt A; Burken, Joel G

    2018-01-01

    Human exposure to volatile organic compounds (VOCs) via vapor intrusion (VI) is an emerging public health concern with notable detrimental impacts on public health. Phytoforensics, plant sampling to semi-quantitatively delineate subsurface contamination, provides a potential non-invasive screening approach to detect VI potential, and plant sampling is effective and also time- and cost-efficient. Existing VI assessment methods are time- and resource-intensive, invasive, and require access into residential and commercial buildings to drill holes through basement slabs to install sampling ports or require substantial equipment to install groundwater or soil vapor sampling outside the home. Tree-core samples collected in 2 days at the PCE Southeast Contamination Site in York, Nebraska were analyzed for tetrachloroethene (PCE) and results demonstrated positive correlations with groundwater, soil, soil-gas, sub-slab, and indoor-air samples collected over a 2-year period. Because tree-core samples were not collocated with other samples, interpolated surfaces of PCE concentrations were estimated so that comparisons could be made between pairs of data. Results indicate moderate to high correlation with average indoor-air and sub-slab PCE concentrations over long periods of time (months to years) to an interpolated tree-core PCE concentration surface, with Spearman's correlation coefficients (ρ) ranging from 0.31 to 0.53 that are comparable to the pairwise correlation between sub-slab and indoor-air PCE concentrations (ρ = 0.55, n = 89). Strong correlations between soil-gas, sub-slab, and indoor-air PCE concentrations and an interpolated tree-core PCE concentration surface indicate that trees are valid indicators of potential VI and human exposure to subsurface environment pollutants. The rapid and non-invasive nature of tree sampling are notable advantages: even with less than 60 trees in the vicinity of the source area, roughly 12 hours of tree-core sampling with minimal

  17. Phytoforensics: Trees as bioindicators of potential indoor exposure via vapor intrusion

    Science.gov (United States)

    Wilson, Jordan L.; Samaranayake, V.A.; Limmer, Matthew A.; Burken, Joel G.

    2018-01-01

    Human exposure to volatile organic compounds (VOCs) via vapor intrusion (VI) is an emerging public health concern with notable detrimental impacts on public health. Phytoforensics, plant sampling to semi-quantitatively delineate subsurface contamination, provides a potential non-invasive screening approach to detect VI potential, and plant sampling is effective and also time- and cost-efficient. Existing VI assessment methods are time- and resource-intensive, invasive, and require access into residential and commercial buildings to drill holes through basement slabs to install sampling ports or require substantial equipment to install groundwater or soil vapor sampling outside the home. Tree-core samples collected in 2 days at the PCE Southeast Contamination Site in York, Nebraska were analyzed for tetrachloroethene (PCE) and results demonstrated positive correlations with groundwater, soil, soil-gas, sub-slab, and indoor-air samples collected over a 2-year period. Because tree-core samples were not collocated with other samples, interpolated surfaces of PCE concentrations were estimated so that comparisons could be made between pairs of data. Results indicate moderate to high correlation with average indoor-air and sub-slab PCE concentrations over long periods of time (months to years) to an interpolated tree-core PCE concentration surface, with Spearman’s correlation coefficients (ρ) ranging from 0.31 to 0.53 that are comparable to the pairwise correlation between sub-slab and indoor-air PCE concentrations (ρ = 0.55, n = 89). Strong correlations between soil-gas, sub-slab, and indoor-air PCE concentrations and an interpolated tree-core PCE concentration surface indicate that trees are valid indicators of potential VI and human exposure to subsurface environment pollutants. The rapid and non-invasive nature of tree sampling are notable advantages: even with less than 60 trees in the vicinity of the source area, roughly 12 hours of tree-core sampling with

  18. An Excel®-based visualization tool of 2-D soil gas concentration profiles in petroleum vapor intrusion.

    Science.gov (United States)

    Verginelli, Iason; Yao, Yijun; Suuberg, Eric M

    2016-01-01

    In this study we present a petroleum vapor intrusion tool implemented in Microsoft ® Excel ® using Visual Basic for Applications (VBA) and integrated within a graphical interface. The latter helps users easily visualize two-dimensional soil gas concentration profiles and indoor concentrations as a function of site-specific conditions such as source strength and depth, biodegradation reaction rate constant, soil characteristics and building features. This tool is based on a two-dimensional explicit analytical model that combines steady-state diffusion-dominated vapor transport in a homogeneous soil with a piecewise first-order aerobic biodegradation model, in which rate is limited by oxygen availability. As recommended in the recently released United States Environmental Protection Agency's final Petroleum Vapor Intrusion guidance, a sensitivity analysis and a simplified Monte Carlo uncertainty analysis are also included in the spreadsheet.

  19. Vapor intrusion risk of lead scavengers 1,2-dibromoethane (EDB) and 1,2-dichloroethane (DCA).

    Science.gov (United States)

    Ma, Jie; Li, Haiyan; Spiese, Richard; Wilson, John; Yan, Guangxu; Guo, Shaohui

    2016-06-01

    Vapor intrusion of synthetic fuel additives represented a critical yet still neglected problem at sites impacted by petroleum fuel releases. This study used an advanced numerical model to simulate the vapor intrusion risk of lead scavengers 1,2-dibromoethane (ethylene dibromide, EDB) and 1,2-dichloroethane (DCA) under different site conditions. We found that simulated EDB and DCA indoor air concentrations can exceed USEPA screening level (4.7 × 10(-3) μg/m(3) for EDB and 1.1 × 10(-1) μg/m(3) for DCA) if the source concentration is high enough (is still within the concentration range found at leaking UST site). To evaluate the chance that vapor intrusion of EDB might exceed the USEPA screening levels for indoor air, the simulation results were compared to the distribution of EDB at leaking UST sites in the US. If there is no degradation of EDB or only abiotic degradation of EDB, from 15% to 37% of leaking UST sites might exceed the USEPA screening level. This study supports the statements made by USEPA in the Petroleum Vapor Intrusion (PVI) Guidance that the screening criteria for petroleum hydrocarbon may not provide sufficient protectiveness for fuel releases containing EDB and DCA. Based on a thorough literature review, we also compiled previous published data on the EDB and DCA groundwater source concentrations and their degradation rates. These data are valuable in evaluating EDB and DCA vapor intrusion risk. In addition, a set of refined attenuation factors based on site-specific information (e.g., soil types, source depths, and degradation rates) were provided for establishing site-specific screening criteria for EDB and DCA. Overall, this study points out that lead scavengers EDB and DCA may cause vapor intrusion problems. As more field data of EDB and DCA become available, we recommend that USEPA consider including these data in the existing PVI database and possibly revising the PVI Guidance as necessary. Copyright © 2016 Elsevier Ltd. All

  20. Assessment of indoor air quality related to potential vapor intrusion: Issues for former manufactured gas plants

    International Nuclear Information System (INIS)

    Rames, Antoine; Guillossou, Gaelle; Ronga-Pezeret, Sylvaine; Hulot, Corinne

    2012-01-01

    The indoor air quality of buildings on sites with soil or groundwater contaminated with volatile or semi-volatile compounds can be degraded by potential vapor intrusion (VI) from these environmental media. For sites of former manufactured gas plants (MGP), the compounds that must be considered are BTEX (benzene, toluene, ethylbenzene, and xylenes), 8 of the 16 polycyclic aromatic hydrocarbons (PAHs) generally studied, and, to a lesser degree, phenol and hydrogen cyanide. Given the plausibility of VI and in accordance with current recommendations of the French Ministry of the Environment, measurements of indoor air quality (and outdoor air, for additional analyses) were conducted on two occasions during the winter and summer of 2010. These measurements simultaneously used multiple air sampling devices (Summa canisters, Gore modules, air pumps coupled to various matrices; such as XAD2, silica gel, etc.). Phenol and hydrogen cyanide have not previously been quantified (limit of quantification between 0.12 and 2.00 μg/m 3 ). BTEX and PAHs were found ubiquitously at concentrations on the order of 1 to 10 μg/m 3 for BTEX and naphthalene and one to ten ng/m 3 for PAHs other than naphthalene) at all 14 MGP and both control sites, regardless of where onsite the air was sampled (office, basement or crawl space, or outdoors). These levels (the maximum considered) do not allow us to conclude that the indoor air is degraded according to the official French guidelines for managing potentially contaminated sites and soils. Thus, no excess health risk is expected for residents of these sites because of exposure to possible VI, which cannot be ruled out in view of the ubiquity of some compounds. (authors)

  1. Three-dimensional vapor intrusion modeling approach that combines wind and stack effects on indoor, atmospheric, and subsurface domains.

    Science.gov (United States)

    Shirazi, Elham; Pennell, Kelly G

    2017-12-13

    Vapor intrusion (IV) exposure risks are difficult to characterize due to the role of atmospheric, building and subsurface processes. This study presents a three-dimensional VI model that extends the common subsurface fate and transport equations to incorporate wind and stack effects on indoor air pressure, building air exchange rate (AER) and indoor contaminant concentration to improve VI exposure risk estimates. The model incorporates three modeling programs: (1) COMSOL Multiphysics to model subsurface fate and transport processes, (2) CFD0 to model atmospheric air flow around the building, and (3) CONTAM to model indoor air quality. The combined VI model predicts AER values, zonal indoor air pressures and zonal indoor air contaminant concentrations as a function of wind speed, wind direction and outdoor and indoor temperature. Steady state modeling results for a single-story building with a basement demonstrate that wind speed, wind direction and opening locations in a building play important roles in changing the AER, indoor air pressure, and indoor air contaminant concentration. Calculated indoor air pressures ranged from approximately -10 Pa to +4 Pa depending on weather conditions and building characteristics. AER values, mass entry rates and indoor air concentrations vary depending on weather conditions and building characteristics. The presented modeling approach can be used to investigate the relationship between building features, AER, building pressures, soil gas concentrations, indoor air concentrations and VI exposure risks.

  2. Vapor Intrusion Facility Points, South Bay CA, 2014, US EPA Region 9

    Data.gov (United States)

    U.S. Environmental Protection Agency — POINT locations for the South Bay Vapor Instrusion Sites were derived from the NPL data for Region 9. One site, Philips Semiconductor, was extracted from the...

  3. UNCERTAINTY AND THE JOHNSON-ETTINGER MODEL FOR VAPOR INTRUSION CALCULATIONS

    Science.gov (United States)

    The Johnson-Ettinger Model is widely used for assessing the impacts of contaminated vapors on residential air quality. Typical use of this model relies on a suite of estimated data, with few site-specific measurements. Software was developed to provide the public with automate...

  4. Identification of Alternative Vapor Intrusion Pathways Using Controlled Pressure Testing, Soil Gas Monitoring, and Screening Model Calculations.

    Science.gov (United States)

    Guo, Yuanming; Holton, Chase; Luo, Hong; Dahlen, Paul; Gorder, Kyle; Dettenmaier, Erik; Johnson, Paul C

    2015-11-17

    Vapor intrusion (VI) pathway assessment and data interpretation have been guided by an historical conceptual model in which vapors originating from contaminated soil or groundwater diffuse upward through soil and are swept into a building by soil gas flow induced by building underpressurization. Recent studies reveal that alternative VI pathways involving neighborhood sewers, land drains, and other major underground piping can also be significant VI contributors, even to buildings beyond the delineated footprint of soil and groundwater contamination. This work illustrates how controlled-pressure-method testing (CPM), soil gas sampling, and screening-level emissions calculations can be used to identify significant alternative VI pathways that might go undetected by conventional sampling under natural conditions at some sites. The combined utility of these tools is shown through data collected at a long-term study house, where a significant alternative VI pathway was discovered and altered so that it could be manipulated to be on or off. Data collected during periods of natural and CPM conditions show that the alternative pathway was significant, but its presence was not identifiable under natural conditions; it was identified under CPM conditions when measured emission rates were 2 orders of magnitude greater than screening-model estimates and subfoundation vertical soil gas profiles changed and were no longer consistent with the conventional VI conceptual model.

  5. Vapor Intrusion Estimation Tool for Unsaturated Zone Contaminant Sources. User’s Guide

    Science.gov (United States)

    2016-08-30

    estimation process when applying the tool. The tool described here is focused on vapor-phase diffusion from the current vadose zone source , and is not...from the current defined vadose zone source ). The estimated soil gas contaminant concentration obtained from the pre-modeled scenarios for a building...need a full site-specific numerical model to assess the impacts beyond the current vadose zone source . 35 5.0 References Brennan, R.A., N

  6. Association between intrusive negative autobiographical memories and depression: A meta-analytic investigation.

    Science.gov (United States)

    Mihailova, Stella; Jobson, Laura

    2018-02-23

    The study investigated several associations between depression and intrusive negative autobiographical memories. A systematic literature search identified 23 eligible studies (N = 2,582), which provided 59 effect sizes. Separate meta-analyses indicated that depression was moderately, positively associated with intrusive memory frequency, memory distress, maladaptive memory appraisals, memory avoidance, and memory rumination. Intrusive memory vividness was not significantly associated with depression. There were insufficient data to examine the relationship between depression and memory vantage perspective. Between-study heterogeneity was high for intrusive memory frequency and memory avoidance, and the percentage of females in studies significantly moderated the relationship between these variables and depression. An additional exploratory meta-analysis (3 studies; N = 257) indicated that intrusive memories were experienced more frequently by those with posttraumatic stress disorder than those with depression. Overall, the findings suggest that intrusive memories warrant clinical attention as they may contribute to the maintenance of depressive symptomatology. Copyright © 2018 John Wiley & Sons, Ltd.

  7. A reactive transport investigation of a seawater intrusion experiment in a shallow aquifer, Skansehage Denmark

    DEFF Research Database (Denmark)

    Christensen, Flemming Damgaard; Engesgaard, Peter Knudegaard; Kipp, K.L.

    2001-01-01

    Previous investigations on seawater intrusion have mainly focused on either the physical density flow system with transport of a single non-reactive species or focused on the geochemical aspects neglecting density effects. This study focuses on both the geochemical and physical aspects of seawate...

  8. Microfabricated gas chromatograph for on-site determinations of TCE in indoor air arising from vapor intrusion. 2. Spatial/temporal monitoring.

    Science.gov (United States)

    Kim, Sun Kyu; Burris, David R; Bryant-Genevier, Jonathan; Gorder, Kyle A; Dettenmaier, Erik M; Zellers, Edward T

    2012-06-05

    We demonstrate the use of two prototype Si-microfabricated gas chromatographs (μGC) for continuous, short-term measurements of indoor trichloroethylene (TCE) vapor concentrations related to the investigation of TCE vapor intrusion (VI) in two houses. In the first house, with documented TCE VI, temporal variations in TCE air concentrations were monitored continuously for up to 48 h near the primary VI entry location under different levels of induced differential pressure (relative to the subslab). Concentrations ranged from 0.23 to 27 ppb by volume (1.2-150 μg/m(3)), and concentration trends agreed closely with those determined from concurrent reference samples. The sensitivity and temporal resolution of the measurements were sufficiently high to detect transient fluctuations in concentration resulting from short-term changes in variables affecting the extent of VI. Spatial monitoring showed a decreasing TCE concentration gradient with increasing distance from the primary VI entry location. In the second house, with no TCE VI, spatial profiles derived from the μGC prototype data revealed an intentionally hidden source of TCE within a closet, demonstrating the capability for locating non-VI sources. Concentrations measured in this house ranged from 0.51 to 56 ppb (2.7-300 μg/m(3)), in good agreement with reference method values. This first field demonstration of μGC technology for automated, near-real-time, selective VOC monitoring at low- or subppb levels augurs well for its use in short- and long-term on-site analysis of indoor air in support of VI assessments.

  9. An Approach for Developing Site-Specific Lateral and Vertical Inclusion Zones within which Structures Should be Evaluated for Petroleum Vapor Intrusion due to Releases of Motor Fuel from Underground Storage Tanks

    Science.gov (United States)

    Buildings may be at risk from Petroleum Vapor Intrusion (PVI) when they overlie petroleum hydrocarbon contamination in the unsaturated zone or dissolved in groundwater. The U.S. EPA Office of Underground Storage Tanks (OUST) is preparing Guidance for Addressing Petroleum Vapor I...

  10. Contaminant Gradients in Trees: Directional Tree Coring Reveals Boundaries of Soil and Soil-Gas Contamination with Potential Applications in Vapor Intrusion Assessment.

    Science.gov (United States)

    Wilson, Jordan L; Samaranayake, V A; Limmer, Matthew A; Schumacher, John G; Burken, Joel G

    2017-12-19

    Contaminated sites pose ecological and human-health risks through exposure to contaminated soil and groundwater. Whereas we can readily locate, monitor, and track contaminants in groundwater, it is harder to perform these tasks in the vadose zone. In this study, tree-core samples were collected at a Superfund site to determine if the sample-collection location around a particular tree could reveal the subsurface location, or direction, of soil and soil-gas contaminant plumes. Contaminant-centroid vectors were calculated from tree-core data to reveal contaminant distributions in directional tree samples at a higher resolution, and vectors were correlated with soil-gas characterization collected using conventional methods. Results clearly demonstrated that directional tree coring around tree trunks can indicate gradients in soil and soil-gas contaminant plumes, and the strength of the correlations were directly proportionate to the magnitude of tree-core concentration gradients (spearman's coefficient of -0.61 and -0.55 in soil and tree-core gradients, respectively). Linear regression indicates agreement between the concentration-centroid vectors is significantly affected by in planta and soil concentration gradients and when concentration centroids in soil are closer to trees. Given the existing link between soil-gas and vapor intrusion, this study also indicates that directional tree coring might be applicable in vapor intrusion assessment.

  11. 76 FR 14660 - Public Comment on the Development of Final Guidance for Evaluating the Vapor Intrusion to Indoor...

    Science.gov (United States)

    2011-03-17

    ... the RCRA Docket is (202) 566-0270. FOR FURTHER INFORMATION CONTACT: Stiven Foster, Policy Analysis... petroleum hydrocarbons should be addressed; How the guidance applies to Superfund Five-Year reviews; When or... intrusion can occur when there is migration of volatile chemicals from contaminated groundwater or soil into...

  12. Vapor Intrusion from Entrapped NAPL Sources and Groundwater Plumes: Process Understanding and Improved Modeling Tools for Pathway Assessment

    Science.gov (United States)

    2014-07-01

    into a building ....149 Figure 5.52: Effect of infiltration at 1 mm/hr for 24 hours on vapor signals in sandy clay loam scenario...shown above, there will also likely be large diameter sanitary sewers running the length of each street. Each house on the street will have a sewer...permeability, a discontinuous clay layer system, and a system with scattered obstacles (e.g. utilities). The layered systems indicated that the sequence of

  13. GRAND PLAZA SITE INVESTIGATION USING THE TRIAD APPROACH AND EVALUATION OF VAPOR INTRUSION - (ITER)

    Science.gov (United States)

    This document provides a detailed report about a field study conducted by EQM/URS on behalf of EPA/NRMRL to characterize the subsurface contamination of volatile organic compounds (VOCs) at a Brownfield commercial site. The TRIAD approach was implemented to characterize the exten...

  14. Investigating the effects of water vaporization on the production of ...

    African Journals Online (AJOL)

    The simulations show that water vaporization increases productivity of well by increasing gas saturation and relative permeability near the well walls and improving the mobility of gas; and this effect is stronger in rich gas condensate reservoir than the lean ones. Keywords: Well, Gas, Pressure Drop, Vapor pressure of water ...

  15. Tree Sampling as a Method to Assess Vapor Intrusion Potential at a Site Characterized by VOC-Contaminated Groundwater and Soil.

    Science.gov (United States)

    Wilson, Jordan L; Limmer, Matthew A; Samaranayake, V A; Schumacher, John G; Burken, Joel G

    2017-09-19

    Vapor intrusion (VI) by volatile organic compounds (VOCs) in the built environment presents a threat to human health. Traditional VI assessments are often time-, cost-, and labor-intensive; whereas traditional subsurface methods sample a relatively small volume in the subsurface and are difficult to collect within and near structures. Trees could provide a similar subsurface sample where roots act as the "sampler' and are already onsite. Regression models were developed to assess the relation between PCE concentrations in over 500 tree-core samples with PCE concentrations in over 50 groundwater and 1000 soil samples collected from a tetrachloroethylene- (PCE-) contaminated Superfund site and analyzed using gas chromatography. Results indicate that in planta concentrations are significantly and positively related to PCE concentrations in groundwater samples collected at depths less than 20 m (adjusted R 2 values greater than 0.80) and in soil samples (adjusted R 2 values greater than 0.90). Results indicate that a 30 cm diameter tree characterizes soil concentrations at depths less than 6 m over an area of 700-1600 m 2 , the volume of a typical basement. These findings indicate that tree sampling may be an appropriate method to detect contamination at shallow depths at sites with VI.

  16. Tree sampling as a method to assess vapor intrusion potential at a site characterized by VOC-contaminated groundwater and soil

    Science.gov (United States)

    Wilson, Jordan L.; Limmer, Matthew A.; Samaranayake, V. A.; Schumacher, John G.; Burken, Joel G.

    2017-01-01

    Vapor intrusion (VI) by volatile organic compounds (VOCs) in the built environment presents a threat to human health. Traditional VI assessments are often time-, cost-, and labor-intensive; whereas traditional subsurface methods sample a relatively small volume in the subsurface and are difficult to collect within and near structures. Trees could provide a similar subsurface sample where roots act as the “sampler’ and are already onsite. Regression models were developed to assess the relation between PCE concentrations in over 500 tree-core samples with PCE concentrations in over 50 groundwater and 1000 soil samples collected from a tetrachloroethylene- (PCE-) contaminated Superfund site and analyzed using gas chromatography. Results indicate that in planta concentrations are significantly and positively related to PCE concentrations in groundwater samples collected at depths less than 20 m (adjusted R2 values greater than 0.80) and in soil samples (adjusted R2 values greater than 0.90). Results indicate that a 30 cm diameter tree characterizes soil concentrations at depths less than 6 m over an area of 700–1600 m2, the volume of a typical basement. These findings indicate that tree sampling may be an appropriate method to detect contamination at shallow depths at sites with VI.

  17. Non-Intrusive Magneto-Optic Detecting System for Investigations of Air Switching Arcs

    International Nuclear Information System (INIS)

    Zhang Pengfei; Zhang Guogang; Dong Jinlong; Liu Wanying; Geng Yingsan

    2014-01-01

    In current investigations of electric arc plasmas, experiments based on modern testing technology play an important role. To enrich the testing methods and contribute to the understanding and grasping of the inherent mechanism of air switching arcs, in this paper, a non-intrusive detecting system is described that combines the magneto-optic imaging (MOI) technique with the solution to inverse electromagnetic problems. The detecting system works in a sequence of main steps as follows: MOI of the variation of the arc flux density over a plane, magnetic field information extracted from the magneto-optic (MO) images, arc current density distribution and spatial pattern reconstruction by inverting the resulting field data. Correspondingly, in the system, an MOI set-up is designed based on the Faraday effect and the polarization properties of light, and an intelligent inversion algorithm is proposed that involves simulated annealing (SA). Experiments were carried out for high current (2 kA RMS) discharge cases in a typical low-voltage switchgear. The results show that the MO detection system possesses the advantages of visualization, high resolution and response, and electrical insulation, which provides a novel diagnostics tool for further studies of the arc. (low temperature plasma)

  18. Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks

    Directory of Open Access Journals (Sweden)

    Wenjuan Li

    2018-01-01

    Full Text Available Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN has thus been developed by allowing intrusion detection system (IDS nodes to exchange data with each other. Insider attacks are a great threat for such types of collaborative networks, where an attacker has the authorized access within the network. In literature, a challenge-based trust mechanism is effective at identifying malicious nodes by sending challenges. However, such mechanisms are heavily dependent on two assumptions, which would cause CIDNs to be vulnerable to advanced insider attacks in practice. In this work, we investigate the influence of advanced on–off attacks on challenge-based CIDNs, which can respond truthfully to one IDS node but behave maliciously to another IDS node. To evaluate the attack performance, we have conducted two experiments under a simulated and a real CIDN environment. The obtained results demonstrate that our designed attack is able to compromise the robustness of challenge-based CIDNs in practice; that is, some malicious nodes can behave untruthfully without a timely detection.

  19. Investigation of odd-order nonlinear susceptibilities in atomic vapors

    Energy Technology Data Exchange (ETDEWEB)

    Yan, Yaqi [Key Laboratory for Physical Electronics and Devices of the Ministry of Education, Xi’an Jiaotong University, Xi’an 710049 (China); Shaanxi Key Laboratory of Information Photonic Technique, Xi’an Jiaotong University, Xi’an 710049 (China); Teaching and Research Section of Maths and Physics, Guangzhou Commanding Academy of Chinese People’s Armed Police Force, Guangzhou, 510440 (China); Wu, Zhenkun; Si, Jinhai; Yan, Lihe; Zhang, Yiqi; Yuan, Chenzhi; Sun, Jia [Key Laboratory for Physical Electronics and Devices of the Ministry of Education, Xi’an Jiaotong University, Xi’an 710049 (China); Shaanxi Key Laboratory of Information Photonic Technique, Xi’an Jiaotong University, Xi’an 710049 (China); Zhang, Yanpeng, E-mail: ypzhang@mail.xjtu.edu.cn [Key Laboratory for Physical Electronics and Devices of the Ministry of Education, Xi’an Jiaotong University, Xi’an 710049 (China); Shaanxi Key Laboratory of Information Photonic Technique, Xi’an Jiaotong University, Xi’an 710049 (China)

    2013-06-15

    We theoretically deduce the macroscopic symmetry constraints for arbitrary odd-order nonlinear susceptibilities in homogeneous media including atomic vapors for the first time. After theoretically calculating the expressions using a semiclassical method, we demonstrate that the expressions for third- and fifth-order nonlinear susceptibilities for undressed and dressed four- and six-wave mixing (FWM and SWM) in atomic vapors satisfy the macroscopic symmetry constraints. We experimentally demonstrate consistence between the macroscopic symmetry constraints and the semiclassical expressions for atomic vapors by observing polarization control of FWM and SWM processes. The experimental results are in reasonable agreement with our theoretical calculations. -- Highlights: •The macroscopic symmetry constraints are deduced for homogeneous media including atomic vapors. •We demonstrate that odd-order nonlinear susceptibilities satisfy the constraints. •We experimentally demonstrate the deduction in part.

  20. Airborne differential absorption lidar system for water vapor investigations

    Science.gov (United States)

    Browell, E. V.; Carter, A. F.; Wilkerson, T. D.

    1981-01-01

    Range-resolved water vapor measurements using the differential-absorption lidar (DIAL) technique is described in detail. The system uses two independently tunable optically pumped lasers operating in the near infrared with laser pulses of less than 100 microseconds separation, to minimize concentration errors caused by atmospheric scattering. Water vapor concentration profiles are calculated for each measurement by a minicomputer, in real time. The work is needed in the study of atmospheric motion and thermodynamics as well as in forestry and agriculture problems.

  1. STEFLUX, a tool for investigating stratospheric intrusions: application to two WMO/GAW global stations

    Directory of Open Access Journals (Sweden)

    D. Putero

    2016-11-01

    Full Text Available Stratospheric intrusion (SI events are a topic of ongoing research, especially because of their ability to change the oxidation capacity of the troposphere and their contribution to tropospheric ozone levels. In this work, a novel tool called STEFLUX (Stratosphere-to-Troposphere Exchange Flux is presented, discussed, and used to provide a first long-term investigation of SI over two global hot-spot regions for climate change and air pollution: the southern Himalayas and the central Mediterranean Basin. The main purpose of STEFLUX is to obtain a fast-computing and reliable identification of the SI events occurring at a specific location and during a specified time window. It relies on a compiled stratosphere-to-troposphere exchange (STE climatology, which makes use of the ERA-Interim reanalysis dataset from the ECMWF, as well as a refined version of a well-established Lagrangian methodology. STEFLUX results are compared to the SI observations (SIO at two high-mountain WMO/GAW global stations in these climate hot spots, i.e., the Nepal Climate Observatory-Pyramid (NCO-P, 5079 m a.s.l. and Mt. Cimone (2165 m a.s.l., which are often affected by SI events. Compared to the observational datasets at the two specific measurement sites, STEFLUX is able to detect SI events on a regional scale. Furthermore, it has the advantage of retaining additional information concerning the pathway of stratospheric-affected air masses, such as the location of tropopause crossing and other meteorological parameters along the trajectories. However, STEFLUX neglects mixing and dilution that air masses undergo along their transport within the troposphere. Therefore, the regional-scale STEFLUX events cannot be expected to perfectly reproduce the point measurements at NCO-P and Mt. Cimone, which are also affected by small-scale (orographic circulations. Still, the seasonal variability in SI events according to SIO and STEFLUX agrees fairly well. By exploiting the

  2. Investigating the Impact of Acetone Vapor Smoothing on the Strength and Elongation of Printed ABS Parts

    Science.gov (United States)

    Gao, Harry; Kaweesa, Dorcas V.; Moore, Jacob; Meisel, Nicholas A.

    2017-03-01

    Acetone vapor smoothing is a chemical treatment that "melts" the surface of additively manufactured acrylonitrile butadiene styrene parts. The process fuses layers together and allows them to reform when vapor is removed, resulting in a smooth surface finish. Although commonly used to improve aesthetics, recent work has begun to investigate the effects of vapor smoothing on part strength. Nevertheless, most of this work has failed to take into account the anisotropic nature of printed parts. Prior research has shown that vapor smoothing reduces strength under best-case loading conditions, when the tensile load is parallel with the direction of the layers. In this article, the authors hypothesize that vapor smoothing may increase strength under nonoptimal loading conditions as a result of increased cohesion between layers and a reduction in stress concentrations. They use a design of experiments approach to identify the combined impact of printing and vapor smoothing parameters on part material properties.

  3. Petroleum Vapor - Field Technical

    Science.gov (United States)

    The screening approach being developed by EPA OUST to evaluate petroleum vapor intrusion (PVI) requires information that has not be routinely collected in the past at vapor intrusion sites. What is the best way to collect this data? What are the relevant data quality issues and ...

  4. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  5. Consideration of impact of atmospheric intrusion in subsurface sampling for investigation of suspected underground nuclear explosions

    International Nuclear Information System (INIS)

    Lowrey, J.D.; Bowyer, T.W.; Haas, D.A.; Hayes, J.C.; Biegalski, S.R.

    2016-01-01

    Radioactive noble gases radioxenon and radioargon constitute the primary smoking gun of an underground nuclear explosion. The aim of subsurface sampling of soil gas as part of an on-site inspection (OSI) is to search for evidence of a suspected underground nuclear event. It has been hypothesized that atmospheric gas can disturb soil gas concentrations and therefore potentially add to problems in civilian source discrimination verifying treaty compliance under the comprehensive nuclear-test ban treaty. This work describes a study of intrusion of atmospheric air into the subsurface and its potential impact on an OSI using results of simulations from the underground transport of environmental xenon (UTEX) model. (author)

  6. Investigation of the condensing vapor bubble behavior through CFD simulation

    International Nuclear Information System (INIS)

    Sablania, Sidharth; Verma, Akash; Goyal, P.; Dutta, Anu; Singh, R.K.

    2013-09-01

    In nuclear systems the sub-cooled boiling flow is an important problem due to the behavior of condensing vapor bubble which has a large effect on the heat transfer characteristics as well as pressure drops and flow instability. The sub-cooled boiling flows become very complex and dynamic phenomena by the vapor bubble-water interaction. This happens due to the boiling/condensation, break-up, and coalescence of the bubble and needs to be addressed for characterizing the above mentioned flow parameters. There have been many researches to analyze the behavior of bubble experimentally and analytically. However, it is very difficult to get complete information about the behavior of bubble because of ever changing interface between vapor and water phase due to bubble condensation/evaporation Therefore, it is necessary to carry out a CFD simulation for better understanding the complex phenomenon of the bubble behavior. The present work focuses on the simulation of condensing bubble in subcooled boiling flow using (Volume of Fluid) VOF method in the CFD code CFD-ACE+. In order to simulate the heat and mass transfer through the bubble interface, CFD modeling for the bubble condensation was developed by modeling the source terms in the governing equations of VOF model using the User-Defined Function (UDF) in CFD-ACE+ code. The effect of condensation on bubble behavior was analyzed by comparing the behavior of condensing bubble with that of adiabatic bubble. It was observed that the behavior of condensing bubble was different from that of non condensing bubble in respect of bubble shape, diameter, velocity etc. The results obtained from the present simulation in terms of various parameters such as bubble velocity, interfacial area and bubble volume agreed well with the reported experimental results verified with FLUENT code in available literature. Hence, this CFD-ACE+ simulation of single bubble condensation will be a useful computational fluid dynamics tool for analyzing the

  7. Application of Time-Domain Electromagnetic Method in Investigating Saltwater Intrusion of Santiago Island (Cape Verde)

    Science.gov (United States)

    Gonçalves, Rui; Farzamian, Mohammad; Monteiro Santos, Fernando A.; Represas, Patrícia; Mota Gomes, A.; Lobo de Pina, A. F.; Almeida, Eugénio P.

    2017-11-01

    Santiago Island, the biggest and most populated island of the Cape Verde Republic, is characterised by limited surface waters and strong dependence on groundwater sources as the primary source of natural water supply for extensive agricultural activity and human use. However, as a consequence of the scarce precipitation and high evaporation as well as the intense overexploitation of the groundwater resources, the freshwater management is also in a delicate balance with saltwater at coastal areas. The time-domain electromagnetic (TDEM) method is used to locate the extent of saltwater intrusion in four important agricultural regions in Santiago Island; São Domingos, Santa Cruz, São Miguel, and Tarrafal. The application of this method in Santiago Island proves it to be a successful tool in imaging the fresh/saltwater interface location. Depths to the saline zones and extensions of saline water are mapped along eight TDEM profiles.

  8. A non-intrusive and continuous-in-space technique to investigate the wave transformation and breaking over a breakwater

    Directory of Open Access Journals (Sweden)

    Ferrari Simone

    2016-01-01

    Full Text Available To design longshore breakwaters, the evaluation of the wave motion transformations over the structures and of the energy they are able to absorb, dissipate and reflect is necessary. To characterize features and transformations of monochromatic wave trains above a breakwater, both submerged and emerged, we have designed and developed a non-intrusive and continuous-in-space technique, based on Image Analysis, and carried out an experimental campaign, in a laboratory flume equipped with a wave-maker, in order to test it. The investigation area was lighted with a light sheet and images were recorded by a video-camera. The working fluid was seeded with non buoyant particles to make it bright and clearly distinct from dark background and breakwater. The technique, that is based on a robust algorithm to identify the free surface, has showed to properly work also in prohibitive situations for traditional resistive probes (e.g., very shallow waters and/or breaking waves and to be able to measure the free surface all over the investigation field in a non-intrusive way. Two kind of analysis were mainly performed, a statistical and a spectral one. The peculiarities of the measurement technique allowed to describe the whole wave transformation and to supply useful information for design purposes.

  9. Investigation of tungsten mass transfer in rarefied air oxygen and water vapors

    International Nuclear Information System (INIS)

    Evsikov, A.S.; Makeev, A.A.; Lyubimova, L.L.; Sinyavskij, V.V.

    1989-01-01

    The results of experimental investigations of oxygen and water vapor effect on the rate of tungsten evaporation are presented. Methods for carrying out an experiment are presented. The experiments are carried out at the 2600 degC tungsten wire temperature and the pressure of oxygen and water vapors (2x10 -3 -5) Pa. Registration of final products of mass transfer is carried out by the DRON-2.0 diffractometer using a detachable substrate. Empirical dependence taking into account oxygen and water vapor effect on the rate of tungsten evaporation is suggested. It is marked that air oxygen and water vapor increase evaporation rate uniformly the difference is observed only in final products of interaction

  10. Investigation on energetics of ex-vessel vapor explosion based on spontaneous nucleation fragmentation

    International Nuclear Information System (INIS)

    Liu, Jie; Koshizuka, Seiichi; Oka, Yoshiaki

    2002-01-01

    A computer code PROVER-I is developed for propagation phase of vapor explosion. A new thermal fragmentation model is proposed with three kinds of time scale for modeling instant fragmentation, spontaneous nucleation fragmentation and normal boiling fragmentation. The energetics of ex-vessel vapor explosion is investigated based on different fragmentation models. A higher pressure peak and a larger mechanical energy conversion ratio are obtained by spontaneous nucleation fragmentation. A smaller energy conversion ratio results from normal boiling fragmentation. When the delay time in thermal fragmentation model is near 0.0 ms, the pressure propagation behavior tends to be analogous with that in hydrodynamic fragmentation. If the delay time is longer, pressure attenuation occurs at the shock front. The high energy conversion ratio (>4%) is obtained in a small vapor volume fraction together with spontaneous nucleation fragmentation. These results are consistent with fuel-coolant interaction experiments with alumina melt. However, in larger vapor volume fraction conditions (α υ >0.3), the vapor explosion is weak. For corium melt, a coarse mixture with void fraction of more than 30% can be generated in the pre-mixing process because of its physical properties. In the mixture with such a high void fraction the energetic vapor explosion hardly takes place. (author)

  11. Investigations of Human and Organizational Factors in hazardous vapor accidents

    International Nuclear Information System (INIS)

    Wang Yanfu; Faghih Roohi, Shahrzad; Hu Xiuming; Xie Min

    2011-01-01

    Highlights: → HFACS provides a systematic guideline in accident investigations. The hierarchal structure of HFACS forces investigators to seek out latent HOFs. → Bayesian Network enhances the ability of the HFACS by allowing experts to quantify the degree of relationships among the HOFs. → The fuzzy AHP helps to reduce the subjective biases by avoiding the need to give explicit probability values for the variables' states. - Abstract: This paper presents a model to assess the contribution of Human and Organizational Factor (HOF) to accidents. The proposed model is made up of two phases. The first phase is the qualitative analysis of HOF responsible for accidents, which utilizes Human Factors Analysis and Classification System (HFACS) to seek out latent HOFs. The hierarchy of HOFs identified in the first phase provides inputs for the analysis in the second phase, which is a quantitative analysis using Bayesian Network (BN). BN enhances the ability of HFACS by allowing investigators or domain experts to measure the degree of relationships among the HOFs. In order to estimate the conditional probabilities of BN, fuzzy analytical hierarchy process and decomposition method are applied in the model. Case studies show that the model is capable of seeking out critical latent human and organizational errors and carrying out quantitative analysis of accidents. Thereafter, corresponding safety prevention measures are derived.

  12. Investigating Ozone Sources in California Using AJAX Airborne Measurements and Models: Implications for Stratospheric Intrusion and Long Range Transport

    Science.gov (United States)

    Ryoo, Ju-Mee; Johnson, Matthew S.; Iraci, Laura T.; Yates, Emma L.; Pierce, R. Bradley; Tanaka, Tomoaki; Gore, Warren

    2016-01-01

    High ozone concentrations at low altitudes near the surface were detected from airborne Alpha Jet Atmospheric eXperiment (AJAX) measurements on May 30, 2012. We investigate the causes of the elevated ozone concentrations using the airborne measurements and various models. GEOSchem and WRF-STILT model simulations show that the contribution from local sources is small. From MERRA reanalysis, it is found that high potential vorticity (PV) is observed at low altitudes. This high PV appears to be only partially coming through the stratospheric intrusions because the air inside the high PV region is moist, which shows that mixing appears to be enhanced in the low altitudes. Considering that diabatic heating can also produce high PV in the lower troposphere, high ozone is partially coming through stratospheric intrusion, but this cannot explain the whole ozone concentration in the target areas of the western U.S. A back-trajectory model is utilized to see where the air masses originated. The air masses of the target areas came from the lower stratosphere (LS), upper (UT), mid- (MT), and lower troposphere (LT). The relative number of trajectories coming from LS and UT is low (7.7% and 7.6%, respectively) compared to that from LT (64.1%), but the relative ozone concentration coming from LS and UT is high (38.4% and 20.95%, respectively) compared to that from LT (17.7%). The air mass coming from LT appears to be mostly coming from Asia. Q diagnostics show that there is sufficient mixing along the trajectory to indicate that ozone from the different origins is mixed and transported to the western U.S. This study shows that high ozone concentrations can be detected by airborne measurements, which can be analyzed by integrated platforms such as models, reanalysis, and satellite data.

  13. Investigation of Ozone Sources in California Using AJAX Airborne Measurements and Models: Implications for Stratospheric Intrusion and Long Range Transport

    Science.gov (United States)

    Ryoo, Ju-Mee; Johnson, Matthew S.; Iraci, Laura T.; Yates, Emma L.; Pierce, R. Bradley; Tanaka, Tomoaki; Gore, Warren

    2015-01-01

    High ozone concentrations at low altitudes near the surface were detected from airborne Alpha Jet Atmospheric eXperiment (AJAX) measurements on May 30, 2012. We investigate the causes of the elevated ozone concentrations using the airborne measurements and various models. GEOS-chem and WRF-STILT model simulations show that the contribution from local sources is small. From MERRA reanalysis, it is found that high potential vorticity (PV) is observed at low altitudes. This high PV appears to be only partially coming through the stratospheric intrusions because the air inside the high PV region is moist, which shows that mixing appears to be enhanced in the low altitudes. Considering that diabatic heating can also produce high PV in the lower troposphere, high ozone is partially coming through stratospheric intrusion, but this cannot explain the whole ozone concentration in the target areas of the western U.S. A back-trajectory model is utilized to see where the air masses originated. The air masses of the target areas came from the lower stratosphere (LS), upper (UT), mid- (MT), and lower troposphere (LT). The relative number of trajectories coming from LS and UT is low (7.7 and 7.6, respectively) compared to that from LT (64.1), but the relative ozone concentration coming from LS and UT is high (38.4 and 20.95, respectively) compared to that from LT (17.7). The air mass coming from LT appears to be mostly coming from Asia. Q diagnostics show that there is sufficient mixing along the trajectory to indicate that ozone from the different origins is mixed and transported to the western U.S. This study shows that high ozone concentrations can be detected by airborne measurements, which can be analyzed by integrated platforms such as models, reanalysis, and satellite data.

  14. Development of More Cost-Effective Methods for Long-Term Monitoring of Soil Vapor Intrusion to Indoor Air Using Quantitative Passive Diffusive-Adsorptive Sampling Techniques

    Science.gov (United States)

    2015-05-01

    ASTM ASTM International ASU Arizona State University ATD automated thermal desorption BENZ Benzene C/Co passive sampler concentration...Protection Agency [USEPA], 1998a, b; California Department of Toxic Substance Control, 2011; ASTM International [ASTM] D7758, 2011). This demonstration... microporous sintered polyethylene, through which the vapors diffuse. Figure 1b. Radiello sampler with regular (white) and low-uptake rate

  15. Investigating Wind-Driven Rain Intrusion in Walls with the CARWASh

    Science.gov (United States)

    C.R. Boardman; Samuel V. Glass

    2013-01-01

    Wind-driven rain provides the primary external moisture load for exterior walls.Water absorption by the cladding, runoff, and penetration through the cladding or at details determine how a wall system performs. In this paper we describe a new laboratory facility that can create controlled outdoor and indoor conditions and use it to investigate the water...

  16. Investigation of electrochemical intrusion of cations by the method of contact electric resistance

    International Nuclear Information System (INIS)

    Marichev, V.A.

    1997-01-01

    Paper shows the possibility and prospects of application of contact electric resistance technique (CER) to study in-situ the initial stages of electrochemical admission of cations (ECA). ECA is shown to increase CER of metals. It enables to determine ECA potential and to investigate kinetics of this process. Using ECA in copper, silver and zinc from alkali solutions as an example one has shown that CER technique enables to obtain results that do not contradict well-known published data. Potentials of ECA cations from acid and neutral solutions in copper, platinum, iron, titanium and tungsten are determined

  17. Investigation of the lasing of dyes under copper vapor laser irradiation

    Energy Technology Data Exchange (ETDEWEB)

    Danilova, V I; Kopylova, T N; Maier, G V; Masarnovskii, L V; Soldatov, A N; Sukhanov, V B

    1980-10-01

    The lasing characteristics of dyes pumped by copper vapor laser radiation are investigated in order to determine the optimal energetic parameters of the dye-laser system. Expressions are derived for the yields of stimulated emission from dye molecules, and it is shown that the most effective means of improving the lasing characteristics of rhodamine dye solutions is by the modification of intermolecular interactions, in part by the use of multicomponent solutions. Results are then presented of experimental measurements of the emission intensities of combinations of rhodamine dyes irradiated by the 5106-A line of a copper vapor laser. An increase in the lasing efficiency of the acceptor molecule is found for all the dye pairs investigated, with even greater emission intensities observed for multicomponent dye mixtures when the mixtures were pumped transversely. Under longitudinal pumping, improvements in lasing efficiency were obtained only for mixtures of rhodamine 6 Zh with cresil violet.

  18. Using Satellites to Investigate the Sensitivity of Longwave Downward Radiation to Water Vapor at High Elevations

    Science.gov (United States)

    Naud, Catherine M.; Miller, James R.; Landry, Chris

    2012-01-01

    Many studies suggest that high-elevation regions may be among the most sensitive to future climate change. However, in situ observations in these often remote locations are too sparse to determine the feedbacks responsible for enhanced warming rates. One of these feedbacks is associated with the sensitivity of longwave downward radiation (LDR) to changes in water vapor, with the sensitivity being particularly large in many high-elevation regions where the average water vapor is often low. We show that satellite retrievals from the Moderate Resolution Imaging Spectroradiometer (MODIS) and Clouds and the Earth's Radiant Energy System (CERES) can be used to expand the current ground-based observational database and that the monthly averaged clear-sky satellite estimates of humidity and LDR are in good agreement with the well-instrumented Center for Snow and Avalanche Studies ground-based site in the southwestern Colorado Rocky Mountains. The relationship between MODIS-retrieved precipitable water vapor and surface specific humidity across the contiguous United States was found to be similar to that previously found for the Alps. More important, we show that satellites capture the nonlinear relationship between LDR and water vapor and confirm that LDR is especially sensitive to changes in water vapor at high elevations in several midlatitude mountain ranges. Because the global population depends on adequate fresh water, much of which has its source in high mountains, it is critically important to understand how climate will change there. We demonstrate that satellites can be used to investigate these feedbacks in high-elevation regions where the coverage of surface-based observations is insufficient to do so.

  19. Non-intrusive investigation of flow and heat transfer characteristics of a channel with a built-in circular cylinder

    Science.gov (United States)

    Vyas, Apoorv; Mishra, Biswajit; Agrawal, Atul; Srivastava, Atul

    2018-03-01

    Interferometry-based experimental investigation of heat transfer phenomena associated with a channel fitted with a circular cylinder has been reported. Experiments have been performed with water as the working fluid, and the range of Reynolds number considered is 75 ≤ Re ≤ 165. The circular cylinder, placed at the inlet section of the channel, provides a blockage ratio of 0.5. The experimental methodology has been benchmarked against the results of transient numerical simulations. In order to assess the performance of the channel fitted with a circular cylinder for possible heat transfer enhancement from the channel wall(s), experiments have also been performed on a plane channel (without a cylinder). The interferometry-based experiments clearly highlighted the influence of the built-in cylinder in generating the flow instabilities and alterations in the thermal boundary layer profile along the heated wall of the channel. The phenomenon of vortex shedding behind the cylinder was successfully captured. A gradual increase in the vortex shedding frequency was observed with increasing Reynolds number. Quantitative data in the form of two-dimensional temperature distributions revealed an increase in the strength of wall thermal gradients in the wake region of the cylinder due to the periodic shedding of the vortices. In turn, a clear enhancement in the wall heat transfer rates was observed for the case of the channel fitted with a cylinder vis-à-vis the plane channel. To the best of the knowledge of the authors, the work reported is one of the first attempts to provide the planar field experimental data for a channel configuration with a built-in circular cylinder using non-intrusive imaging techniques and has the potential to serve as one of the benchmark studies for validating the existing as well as future numerical studies in the related area.

  20. Theoretical investigation of output features of a diode-pumped rubidium vapor laser

    Science.gov (United States)

    Wang, You; Cai, He; Zhang, Wei; Xue, Liangping; Wang, Hongyuan; Han, Juhong

    2014-02-01

    In the recent years, diode-pumped alkali lasers (DPALs) have been paid many attentions because of their excellent performances. In fact, the characteristics of a DPAL strongly depend on the physical features of buffer gases. In this report, we selected a diode-pumped rubidium vapor laser (DPRVL), which is an important type among three common DPALs, to investigate how the characteristics of a DPRVL are affected by different conditions. The results signify that the population ratio of two excitation energy-levels are close to that corresponding to thermal equilibrium as the pressure of buffer gases and the temperature of a vapor cell become higher. It has been found that quenching of the upper levels cannot be simply ignored especially for the case of weak pump. The conclusions are thought to be helpful for the configuration design of an end-pumped DPAL.

  1. Investigation of a dynamic seawater intrusion event using strontium isotopes (87Sr/86Sr)

    DEFF Research Database (Denmark)

    Jørgensen, Niels Oluf; Andersen, Martin S.; Engesgaard, Peter Knudegaard

    2008-01-01

    groundwater and deep groundwater from the underlying limestone aquifer as end-members. A mixing analysis is performed using the Cl contents and the 87Sr/86Sr ratios. The mixing analysis indicates a zone with leakage of deep groundwater from the limestone aquifer into the lower part of the shallow sandy...... and lower part of the water body in the shallow sandy aquifer. The leakage of deep groundwater increased during the intrusion experiment as a result of the large abstraction of groundwater. Following the ceasing of the groundwater pumping, the interface went from being vertical to being predominantly......A seawater intrusion experiment was carried out in a shallow coastal unconfined aquifer at Skansehage, Denmark. The aquifer consists of 6-10 m of postglacial (Holocene) eolian and marine sands and gravels resting on Pleistocene glacial sequence of tills and glacio-fluviatile sediments on a basement...

  2. An Investigation on the Formation of Carbon Nanotubes by Two-Stage Chemical Vapor Deposition

    Directory of Open Access Journals (Sweden)

    M. S. Shamsudin

    2012-01-01

    Full Text Available High density of carbon nanotubes (CNTs has been synthesized from agricultural hydrocarbon: camphor oil using a one-hour synthesis time and a titanium dioxide sol gel catalyst. The pyrolysis temperature is studied in the range of 700–900°C at increments of 50°C. The synthesis process is done using a custom-made two-stage catalytic chemical vapor deposition apparatus. The CNT characteristics are investigated by field emission scanning electron microscopy and micro-Raman spectroscopy. The experimental results showed that structural properties of CNT are highly dependent on pyrolysis temperature changes.

  3. Investigating the effects of methanol-water vapor mixture on a PBI-based high temperature PEM fuel cell

    DEFF Research Database (Denmark)

    Araya, Samuel Simon; Andreasen, Søren Juhl; Nielsen, Heidi Venstrup

    2012-01-01

    This paper investigates the effects of methanol and water vapor on the performance of a high temperature proton exchange membrane fuel cell (HT-PEMFC). A H3PO4-doped polybenzimidazole (PBI) membrane electrode assembly (MEA), Celtec P2100 of 45 cm2 of active surface area from BASF was employed....... A long-term durability test of around 1250 h was performed, in which the concentrations of methanol-water vapor mixture in the anode feed gas were varied. The fuel cell showed a continuous performance decay in the presence of vapor mixtures of methanol and water of 5% and 8% by volume in anode feed...

  4. Investigation of Real-Time Two-Dimensional Visualization of Fuel Spray Liquid/Vapor Distribution via Exciplex Fluorescence.

    Science.gov (United States)

    1987-08-30

    EXCIPLEX FLUORESCENCE ~N 0FINAL REPORT 00 JAMES F. VERDIECK AND ARTHUR A. ROTUNNO UNITED TECHNOLOGIES RESEARCH CENTER 0 AND LYNN A. MELTON D I UNIVERSITY...DOCUMENTATION. "NWA 0. INVESTIGATION OF REAL-TINE TWO-DIMENSIONAL VISUALIZATION OF FUEL SPRAY LIQUID/VAPOR DISTRIBUTION VIA EXCIPLEX FLUORESCENCE FINAL...Spray Liquid/Vapor Distribution Via Exciplex Fluorescen , - 12. PERSONAL AUTHOR(S) J. F. Yeardierk. A- A. Rnriiunn-l L_ A. Millo - 13a TYPE OF REPORT

  5. Network Intrusion Forensic Analysis Using Intrusion Detection System

    OpenAIRE

    Manish Kumar; Dr. M. Hanumanthappa; Dr. T.V. Suresh Kumar

    2011-01-01

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investi...

  6. Seawater intrusion in the gravelly confined aquifer of the coastal Pisan Plain (Tuscany): hydrogeological and geochemical investigation to assess causes and consequences

    Science.gov (United States)

    Doveri, M.; Giannecchini, R.; Butteri, M.

    2012-12-01

    The gravelly horizon of the Pisa plain multilayered system is a confined aquifer tapped by a large number of wells. It hosts a very important water resource for drinking, industrial and irrigable uses, but may be affected by seawater intrusion coming from the coastal area; most wells is distributed inland, anyway a significant exploitation along the coastal area is also present to supply farms and tourist services. Previous hydrogeological and geochemical investigations carried out in coastal area stated maximum percentage of seawater in gravelly aquifer of about 7-9% and suggested the presence of two different mechanisms (Doveri et alii, 2010): i) a direct seawater intrusion from the zone where the gravelly aquifer is in contact with the sea floor; ii) a mixing process between freshwater and seawater, the latter deriving from the Arno river-shallow sandy aquifer system. Basing on these results, since January 2012 a new two-year project was financed by the MSRM Regional Park. Major aims are a better definition of such phenomena and their distribution on the territory, and an assessing of the seawater intrusion trend in relation to groundwater exploitation. Eleven piezometers were realised during first semester of 2012, thus improving the measurement network, which is now made up by 40 wells/piezometers distributed on about 60 km^2. Comparing new and previous borehole data a general confinement of the gravelly aquifer is confirmed, excepting in the northern part where the aquifer is in contact with the superficial sandy one. Preliminary field measurement was performed in June 2012, during which water level (WL) and electrical conductivity (EC) data were collected. WLs below the sea-level were observed on most of the studied area, with a minimum value of about -5 m a.s.l. in the inner part of the northern zone, where major exploitation is present. Moreover, a relative minimum of WL (about -2 m a.s.l.) is present near the shoreline in the southern zone. In the latter

  7. Theoretical investigation of lead vapor adsorption on kaolinite surfaces with DFT calculations

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Xinye [Key Laboratory of Energy Thermal Conversion and Control of Ministry of Education, School of Energy and Environment, Southeast University, Nanjing 210096 (China); Huang, Yaji, E-mail: heyyj@seu.edu.cn [Key Laboratory of Energy Thermal Conversion and Control of Ministry of Education, School of Energy and Environment, Southeast University, Nanjing 210096 (China); Pan, Zhigang [College of Materials Science and Engineering, Nanjing Tech University, Nanjing 210009 (China); Wang, Yongxing; Liu, Changqi [Key Laboratory of Energy Thermal Conversion and Control of Ministry of Education, School of Energy and Environment, Southeast University, Nanjing 210096 (China)

    2015-09-15

    Highlights: • Al surface after dehydroxylation is active while Si surface is inert. • The active sites are the unsaturated Al atoms and O atoms losing H atom. • PbO is the most suitable species for adsorption. • Increasing the activities of Al atoms can enhance the performance of kaolinite. • Produce of amorphous silica is a potential path to enhance the performance of kaolinite. - Abstract: Kaolinite can be used as the in-furnace sorbent/additive to adsorb lead (Pb) vapor at high temperature. In this paper, the adsorptions of Pb atom, PbO molecule and PbCl{sub 2} molecule on kaolinie surfaces were investigated by density functional theory (DFT) calculation. Si surface is inert to Pb vapor adsorption while Al surfaces with dehydroxylation are active for the unsaturated Al atoms and the O atoms losing H atoms. The adsorption energy of PbO is much higher than that of Pb atom and PbCl{sub 2}. Considering the energy barriers, it is easy for PbO and PbCl{sub 2} to adsorb on Al surfaces but difficult to escape. The high energy barriers of de–HCl process cause the difficulties of PbCl{sub 2} to form PbO·Al{sub 2}O{sub 3}·2SiO{sub 2} with kaolinite. Considering the inertia of Si atoms and the activity of Al atoms after dehydroxylation, calcination, acid/alkali treatment and some other treatment aiming at amorphous silica producing and Al activity enhancement can be used as the modification measures to improve the performance of kaolinite as the in-furnace metal capture sorbent.

  8. Wellbore enlargement investigation: Potential analogs to the Waste Isolation Pilot Plant during inadvertent intrusion of the repository

    International Nuclear Information System (INIS)

    Boak, D.M.; Dotson, L.; Aguilar, R.

    1997-01-01

    This study involved the evaluation and documentation of cases in which petroleum wellbores were enlarged beyond the nominal hole diameter as a consequence of erosion during exploratory drilling, particularly as a function of gas flow into the wellbore during blowout conditions. A primary objective was to identify analogs to potential wellbore enlargement at the Waste Isolation Pilot Plant (WIPP) during inadvertent human intrusion. Secondary objectives were to identify drilling scenarios associated with enlargement, determine the physical extent of enlargement, and establish the physical properties of the formation in which the enlargement occurred. No analogs of sufficient quality to establish quantitative limits on wellbore enlargement at the WIPP disposal system were identified. However, some information was obtained regarding the frequency of petroleum well blowouts and the likelihood that such blowouts would bridge downhole, self-limiting the surface release of disposal-system material. Further work would be necessary, however, to determine the conditions under which bridging could occur and the extent to which the bridging might be applicable to WIPP. In addition, data on casing sizes of petroleum boreholes in the WIPP vicinity support the use of a 12-1/4 inch borehole size in WIPP performance assessment calculations. Finally, although data are limited, there was no evidence of significant wellbore enlargement in any of three blowouts that occur-red in wellbores in the Delaware Basin (South Culebra Bluff Unit No. 1, Energy Research and Development Administration (ERDA) 6, and WIPP 12)

  9. Mass-spectral investigations of vaporization process of the condensed zinc phosphates

    International Nuclear Information System (INIS)

    Lopatin, S.L; Sinyayev, V.A.; Shugurov, S.M.

    2005-01-01

    There are the data of high temperature mass-spectrum experiment concerning of thermal decomposition of zinc cyclotriphosphate and zinc diphosphate presented in the given article. It is shown the both salts dissociate into phosphorus oxides, oxygen, and atomic zinc. Correlation between partial pressure of vapor components and composition of condensed phase are described. Effects of temperature and duration of the vaporization process on vapor composition are presented as well. Standard enthalpy of ZnPO 3 molecule decomposition into atoms is calculated. [author

  10. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  11. Investigation of ceramic materials using ICP-AES with external electrothermal vaporization

    International Nuclear Information System (INIS)

    Reisch, M.; Gartz, R.; Mazurkiewicz, M.; Nickel, H.

    1989-01-01

    The evaporation and excitation processes for several trace elements in ceramic powders are studied. The advantages of an electrothermal vaporization are the easier preparation, no dilution and a shorter experiment duration. The investigated ceramic powders consist of synthetic mixtures including the systems Al 2 O 3 -SiO 2 and Al 2 O 3 -MgO. The trace elements are bound as oxides. The evaporation is monitored by 59 Fe and 115 Cd. Since the evaporation rates are measured in addition to line intensities, the influence of various parameters on evaporation as well as on excitation processes can be individually examined. The influence of matrix composition is determined. It is found that melting and sintering processes of the matrix are of great importance for the evaporation of trace elements. Thus the best results are obtained when trace elements evaporate below the melting temperature of the matrix. Therefore the addition of thermochemical substances is necessary for several elements of low volatility. In the case of highly volatile elements, for example Cd, additives seemed to have only a small influence on the volatilization rate. Accordingly, only the excitation is affected. For example, the evaporation rate of Cd is constant through the whole Al 2 O 3 -MgO system. The measured line intensity of Cd is also constant within a large range of MgO content. The evaporation rate and line intensity of Fe decrease linearly with MgO concentration. (author)

  12. Comparative investigation of smooth polycrystalline diamond films on dental burs by chemical vapor deposition

    Science.gov (United States)

    Sein, Htet; Ahmed, Waqar; Rego, Christopher; Jackson, Mark; Polini, Riccardo

    2006-04-01

    Depositions of hot filament chemical vapor-deposited diamond on cobalt-cemented tungsten carbide (WC-Co) rotary cutting dental burs are presented. Conventional dental tools made of sintered polycrystalline diamond have a number of problems associated with the heterogeneity of the crystallite, decreased cutting efficiency, and short life. A preferential (111) faceted diamond was obtained after 15 h of deposition at a growth rate of 1.1 µm/h. Diamond-coated WC-Co dental burs and conventional sintered burs are mainly used in turning, milling, and drilling operations for machining metal ceramic hard alloys such as CoCr, composite teeth, and aluminum alloy in the dental laboratory. The influence of structure, the mechanical characteristics of both diamond grains and hard alloys on the wear behavior, as well as the regimen of grinding on diamond wear are considered. Erosion wear properties are also investigated under air-sand erosion testing. After machining with excessive cutting performance, calculations can be made on flank and crater wear areas. Diamond-coated WC-Co dental burs offered significantly better erosion and wear resistance compared with uncoated WC-Co tools and sintered burs.

  13. Influence of soil properties on vapor-phase sorption of trichloroethylene

    International Nuclear Information System (INIS)

    Bekele, Dawit N.; Naidu, Ravi; Chadalavada, Sreenivasulu

    2016-01-01

    Highlights: • Vapor intrusion is a major exposure pathway for volatile hydrocarbons. • Certainty in transport processes enhances vapor intrusion model precision. • Detailed understanding of vadose zone vapor transport processes save resources. • Vapor sorption near-steady-state conditions at sites may take months or years. • Type of clay fractions equitably affects sorption of trichloroethylene vapor. - Abstract: Current practices in health risk assessment from vapor intrusion (VI) using mathematical models are based on assumptions that the subsurface sorption equilibrium is attained. The time required for sorption to reach near-steady-state conditions at sites may take months or years to achieve. This study investigated the vapor phase attenuation of trichloroethylene (TCE) in five soils varying widely in clay and organic matter content using repacked columns. The primary indicators of TCE sorption were vapor retardation rate (R_t), the time required for the TCE vapor to pass through the soil column, and specific volume of retention (V_R), and total volume of TCE retained in soil. Results show TCE vapor retardation is mainly due to the rapid partitioning of the compound to SOM. However, the specific volume of retention of clayey soils with secondary mineral particles was higher. Linear regression analyses of the SOM and clay fraction with V_R show that a unit increase in clay fraction results in higher sorption of TCE (V_R) than the SOM. However, partitioning of TCE vapor was not consistent with the samples' surface areas but was mainly a function of the type of secondary minerals present in soils.

  14. Influence of soil properties on vapor-phase sorption of trichloroethylene

    Energy Technology Data Exchange (ETDEWEB)

    Bekele, Dawit N. [Global Center for Environmental Remediation, University of Newcastle, Callaghan, NSW 2308 (Australia); CRC for Contamination Assessment & Remediation of the Environment, Building X (Environmental Sciences Building), University of South Australia, Mawson Lakes, SA 5095 (Australia); Naidu, Ravi, E-mail: Ravi.Naidu@newcastle.edu.au [Global Center for Environmental Remediation, University of Newcastle, Callaghan, NSW 2308 (Australia); CRC for Contamination Assessment & Remediation of the Environment, Building X (Environmental Sciences Building), University of South Australia, Mawson Lakes, SA 5095 (Australia); Chadalavada, Sreenivasulu [Global Center for Environmental Remediation, University of Newcastle, Callaghan, NSW 2308 (Australia); CRC for Contamination Assessment & Remediation of the Environment, Building X (Environmental Sciences Building), University of South Australia, Mawson Lakes, SA 5095 (Australia)

    2016-04-05

    Highlights: • Vapor intrusion is a major exposure pathway for volatile hydrocarbons. • Certainty in transport processes enhances vapor intrusion model precision. • Detailed understanding of vadose zone vapor transport processes save resources. • Vapor sorption near-steady-state conditions at sites may take months or years. • Type of clay fractions equitably affects sorption of trichloroethylene vapor. - Abstract: Current practices in health risk assessment from vapor intrusion (VI) using mathematical models are based on assumptions that the subsurface sorption equilibrium is attained. The time required for sorption to reach near-steady-state conditions at sites may take months or years to achieve. This study investigated the vapor phase attenuation of trichloroethylene (TCE) in five soils varying widely in clay and organic matter content using repacked columns. The primary indicators of TCE sorption were vapor retardation rate (R{sub t}), the time required for the TCE vapor to pass through the soil column, and specific volume of retention (V{sub R}), and total volume of TCE retained in soil. Results show TCE vapor retardation is mainly due to the rapid partitioning of the compound to SOM. However, the specific volume of retention of clayey soils with secondary mineral particles was higher. Linear regression analyses of the SOM and clay fraction with V{sub R} show that a unit increase in clay fraction results in higher sorption of TCE (V{sub R}) than the SOM. However, partitioning of TCE vapor was not consistent with the samples' surface areas but was mainly a function of the type of secondary minerals present in soils.

  15. Human intrusion: New ideas?

    International Nuclear Information System (INIS)

    Cooper, J.R.

    2002-01-01

    Inadvertent human intrusion has been an issue for the disposal of solid radioactive waste for many years. This paper discusses proposals for an approach for evaluating the radiological significance of human intrusion as put forward by ICRP with contribution from work at IAEA. The approach focuses on the consequences of the intrusion. Protective actions could, however, include steps to reduce the probability of human intrusion as well as the consequences. (author)

  16. METEOROLOGICAL INFLUENCES ON VAPOR INCIDENTS IN THE 200 EAST and 200 WEST TANK FARMS FROM CY1995 TO CY2004

    International Nuclear Information System (INIS)

    HOCKING, M.J.

    2005-01-01

    Revised for a more comprehensive overview of vapor incidents reported at the Hanford Tank Farms. Investigation into the meteorological influences on vapor incidents in the tank farm to determine what, if any, meteorological influences contribute to the reporting of odors, smells, vapors, and other gases. Weather phenomena, specifically barometric pressure, and wind velocity and direction can potentially cause or exacerbate a vapor release within the farm systems. The purpose of this document is to gather and evaluate the meteorological and weather information for the Tank Farms Shift Log Vapor Incident entries and determine what, if any, meteorological influences contribute to the reporting of odors, smells, vapors, and other gases such as propane. A part of the evaluation will be determining which of the incidents are related to actual ''intrusive'' work, and which are ''transient.'' Transient vapor incidents are herein defined as those vapors encountered during walkdowns, surveys, or other activities that did not require working directly with the tanks, pits, transfer lines, etc. Another part of the investigation will involve determining if there are barometric pressures or other weather related phenomena that might cause or contribute vapors being released when there are no ''intrusive'' activities. A final purpose is to evaluate whether there is any correlation between the 242-A Evaporator operations and Vapor Incidents entered on the Shift Log

  17. METEOROLOGICAL INFLUENCES ON VAPOR INCIDENTS IN THE 200 EAST & 200 WEST TANK FARMS FROM CY1995 TO CY2004

    Energy Technology Data Exchange (ETDEWEB)

    HOCKING, M.J.

    2005-01-31

    Revised for a more comprehensive overview of vapor incidents reported at the Hanford Tank Farms. Investigation into the meteorological influences on vapor incidents in the tank farm to determine what, if any, meteorological influences contribute to the reporting of odors, smells, vapors, and other gases. Weather phenomena, specifically barometric pressure, and wind velocity and direction can potentially cause or exacerbate a vapor release within the farm systems. The purpose of this document is to gather and evaluate the meteorological and weather information for the Tank Farms Shift Log Vapor Incident entries and determine what, if any, meteorological influences contribute to the reporting of odors, smells, vapors, and other gases such as propane. A part of the evaluation will be determining which of the incidents are related to actual ''intrusive'' work, and which are ''transient.'' Transient vapor incidents are herein defined as those vapors encountered during walkdowns, surveys, or other activities that did not require working directly with the tanks, pits, transfer lines, etc. Another part of the investigation will involve determining if there are barometric pressures or other weather related phenomena that might cause or contribute vapors being released when there are no ''intrusive'' activities. A final purpose is to evaluate whether there is any correlation between the 242-A Evaporator operations and Vapor Incidents entered on the Shift Log.

  18. Investigation of the vaporization of boric acid by transpiration thermogravimetry and knudsen effusion mass spectrometry.

    Science.gov (United States)

    Balasubramanian, R; Lakshmi Narasimhan, T S; Viswanathan, R; Nalini, S

    2008-11-06

    The vaporization of H3BO3(s) was studied by using a commercial thermogravimetric apparatus and a Knudsen effusion mass spectrometer. The thermogravimetric measurements involved use of argon as the carrier gas for vapor transport and derivation of vapor pressures of H3BO3(g) in the temperature range 315-352 K through many flow dependence and temperature dependence runs. The vapor pressures as well as the enthalpy of sublimation obtained in this study represent the first results from measurements at low temperatures that are in accord with the previously reported near-classical transpiration measurements (by Stackelberg et al. 70 years ago) at higher temperatures (382-413 K with steam as the carrier gas). The KEMS measurements performed for the first time on boric acid showed H3BO3(g) as the principal vapor species with no meaningful information discernible on H2O(g) though. The thermodynamic parameters, both p(H3BO3) and Delta sub H degrees m(H3BO3,g), deduced from KEMS results in the temperature range 295-342 K are in excellent agreement with the transpiration results lending further credibility to the latter. All this information points toward congruent vaporization at the H3BO3 composition in the H2O-B2O3 binary system. The vapor pressures obtained from transpiration (this study and that of Stackelberg et al.) as well as from KEMS measurements are combined to recommend the following: log [p(H3BO3)/Pa]=-(5199+/-74)/(T/K)+(15.65+/-0.23), valid for T=295-413 K; and Delta sub H degrees m=98.3+/-9.5 kJ mol (-1) at T=298 K for H3BO3(s)=H3BO3(g).

  19. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  20. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  1. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  2. Options for human intrusion

    International Nuclear Information System (INIS)

    Bauser, M.; Williams, R.

    1993-01-01

    This paper addresses options for dealing with human intrusion in terms of performance requirements and repository siting and design requirements. Options are presented, along with the advantages and disadvantages of certain approaches. At the conclusion, a conceptual approach is offered emphasizing both the minimization of subjective judgements concerning future human activity, and specification of repository requirements to minimize the likelihood of human intrusion and any resulting, harmful effects should intrusion occur

  3. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  4. Investigation of contact line dynamics under a vapor bubble at boiling on the transparent heater

    Science.gov (United States)

    Surtaev, A. S.; Serdyukov, V. S.

    2018-01-01

    The paper presents the results of an experimental study of dynamics of vapor bubble growth and departure at pool boiling, obtained with the use of high-speed video recording and IR thermography. The study was carried out at saturated water boiling under the atmospheric pressure in the range of heat fluxes of 30-150 kW/m2. To visualize the process and determine the growth rates of the outer bubble diameter, microlayer region and dry spot area, transpa-rent thin film heater with the thickness of 1 μm deposited on sapphire substrate was used in the experiments, and video recording was performed from the bottom side of the heating surface. To study integral heat transfer as well as local non-stationary thermal characteristics, high-speed infrared thermography with a frequency of up to 1000 FPS was used. High-speed video recording showed that after formation of vapor bubble and microlayer region, dry spot appears in a short time (up to 1 ms) under the vapor bubble. Various stages of contact line boundary propagation were ob-served. It was shown that at the initial stage before the development of small-scale perturbations, the dry spot propaga-tion rate is constant. It was also showed that the bubble departure stage begins after complete evaporation of liquid in the microlayer region.

  5. Investigation of the adsorption of water vapor and carbon dioxide by KA zeolite

    International Nuclear Information System (INIS)

    Khanitonov, V.P.; Shtein, A.S.

    1984-01-01

    According to the present data, KA zeolite, which can adsorb only water vapor, helium, and hydrogen, has the greatest selectivity in drying. The feasibility of using this zeolite in devices for selective drying of gases used in gas-analysis systems was studied. The results of the experiments were approximated by the thermal equation of the theory of bulk filling of micropores. The limiting value of the adsorption depends on the temperature, and it can be calculated according to the density of the adsorbed phase and the adsorption volume. The critical diameters of the water and carbon dioxide molecules are close to the dimensions of the KA-zeolite pores, something that determines the activated nature of the adsorption of these substances. Experiments on coadsorption of water vapor and carbon dioxide by a fixed bed of KA-zeolite under dynamic conditions showed that the adsorption of these substances has a frontal nature. The time of the protective action of the layer of zeolite during adsorption af water vapor exceeded by more than an order the time of the protective action during adsorption of carbon dioxide. The results showed that this adsorbent can be used for selective drying of gas mixtures containing carbon dioxide in batch-operation devices. Beforehand, the adsorbent should be regenerated with respect to moisture, and then it should be saturated with carbon dioxide by blowing the adsorbent with a gas mixture of the working composition until the equilibrium state is reached

  6. Mass spectrometric investigation of neutral and charged constituents in saturated vapor over PrI3

    International Nuclear Information System (INIS)

    Motalov, V.B.; Vorobiev, D.E.; Kudin, L.S.; Markus, T.

    2009-01-01

    The Knudsen effusion mass spectrometric technique was used to study vapor species over praseodymium triiodide. The monomer, PrI 3 , and dimer, Pr 2 I 6 , molecules and the negative ions, PrI 4 - and Pr 2 I 7 - , were observed in saturated vapor in the temperature range from 856 K to 1048 K. The partial vapor pressures of neutral constituents were determined and the enthalpies of sublimation obtained using the second and the third laws of thermodynamics (Δ s H deg. (298.15 K) = 291 ± 4 kJ mol -1 for PrI 3 , and Δ s H deg. (298.15 K) = 400 ± 30 kJ mol -1 for Pr 2 I 6 ). The equilibrium constants for various ion molecular reactions were measured and the enthalpies of reactions obtained. The enthalpies of formation, Δ f H deg. (298.15 K) kJ mol -1 , of gaseous molecules and ions were calculated and are as follows: -374 ± 6 (PrI 3 ), -929 ± 30 (Pr 2 I 6 ), -867 ± 30 (PrI 4 - ), -1432 ± 50 (Pr 2 I 7 - )

  7. Investigating the Effect of Pyridine Vapor Treatment on Perovskite Solar Cells - Oral Presentation

    Energy Technology Data Exchange (ETDEWEB)

    Ong, Alison J. [SLAC National Accelerator Lab., Menlo Park, CA (United States)

    2015-08-25

    Perovskite photovoltaics have recently come to prominence as a viable alternative to crystalline silicon based solar cells. In an effort to create consistent and high-quality films, we studied the effect of various annealing conditions as well as the effect of pyridine vapor treatment on mixed halide methylammonium lead perovskite films. Of six conditions tested, we found that annealing at 100 degree Celsius for 90 minutes followed by 120 degree Celsius for 15 minutes resulted in the purest perovskite. Perovskite films made using that condition were treated with pyridine for various amounts of time, and the effects on perovskite microstructure were studied using x-ray diffraction, UV-Vis spectroscopy, and time-resolved photoluminescence lifetime analysis (TRPL). A previous study found that pyridine vapor caused perovskite films to have higher photoluminescence intensity and become more homogenous. In this study we found that the effects of pyridine are more complex: while films appeared to become more homogenous, a decrease in bulkphotoluminescence lifetime was observed. In addition, the perovskite bandgap appeared to decrease with increased pyridine treatment time. Finally, X-ray diffraction showed that pyridine vapor treatment increased the perovskite (110) peak intensity but also often gave rise to new unidentified peaks, suggesting the formation of a foreign species. It was observed that the intensity of this unknown species had an inverse correlation with the increase in perovskite peak intensity, and also seemed to be correlated with the decrease in TRPL lifetime.

  8. Investigating the Effect of Pyridine Vapor Treatment on Perovskite Solar Cells

    Energy Technology Data Exchange (ETDEWEB)

    Ong, Alison [SLAC National Accelerator Lab., Menlo Park, CA (United States)

    2015-08-20

    Perovskite photovoltaics have recently come to prominence as a viable alternative to crystalline silicon based solar cells. In an effort to create consistent and high-quality films, we studied the effect of various annealing conditions as well as the effect of pyridine vapor treatment on mixed halide methylammonium lead perovskite films. Of six conditions tested, we found that annealing at 100°C for 90 minutes followed by 120°C for 15 minutes resulted in the purest perovskite. Perovskite films made using that condition were treated with pyridine for various amounts of time, and the effects on perovskite microstructure were studied using x-ray diffraction, UV-Vis spectroscopy, and time-resolved photoluminescence lifetime analysis (TRPL). A previous study found that pyridine vapor caused perovskite films to have higher photoluminescence intensity and become more homogenous. In this study we found that the effects of pyridine are more complex: while films appeared to become more homogenous, a decrease in bulk photoluminescence lifetime was observed. In addition, the perovskite bandgap appeared to decrease with increased pyridine treatment time. Finally, X-ray diffraction showed that pyridine vapor treatment increased the perovskite (110) peak intensity but also often gave rise to new unidentified peaks, suggesting the formation of a foreign species. It was observed that the intensity of this unknown species had an inverse correlation with the increase in perovskite peak intensity, and also seemed to be correlated with the decrease in TRPL lifetime.

  9. Experimental investigation and modeling of adsorption of water and ethanol on cornmeal in an ethanol-water binary vapor system

    Energy Technology Data Exchange (ETDEWEB)

    Chang, H.; Yuan, X.G.; Tian, H.; Zeng, A.W. [State Key Laboratory of Chemical Engineering, Tianjin University, Tianjin 300072 (China)

    2006-04-15

    The adsorption capacity of water and ethanol on cornmeal in an ethanol-water binary vapor system was investigated in a fixed-bed apparatus for ethanol dehydration. Experiments were performed at temperatures of 82-100 C for different relative humidities of ethanol-water vapor. Adsorption equilibrium models, including those based on the adsorption potential theory of Polanyi and Sircar's model, have been used to fit the experimental data for water adsorption on cornmeal, and all gave good fits. For ethanol adsorption, pseudo-equilibrium was defined as the mass adsorbed on the cornmeal within the time needed for the equilibrium for water on the same adsorbent. Based on this limiting condition, adsorption behaviors and mechanisms were analyzed. (Abstract Copyright [2006], Wiley Periodicals, Inc.)

  10. Investigating the Water Vapor Component of the Greenhouse Effect from the Atmospheric InfraRed Sounder (AIRS)

    Science.gov (United States)

    Gambacorta, A.; Barnet, C.; Sun, F.; Goldberg, M.

    2009-12-01

    We investigate the water vapor component of the greenhouse effect in the tropical region using data from the Atmospheric InfraRed Sounder (AIRS). Differently from previous studies who have relayed on the assumption of constant lapse rate and performed coarse layer or total column sensitivity analysis, we resort to AIRS high vertical resolution to measure the greenhouse effect sensitivity to water vapor along the vertical column. We employ a "partial radiative perturbation" methodology and discriminate between two different dynamic regimes, convective and non-convective. This analysis provides useful insights on the occurrence and strength of the water vapor greenhouse effect and its sensitivity to spatial variations of surface temperature. By comparison with the clear-sky computation conducted in previous works, we attempt to confine an estimate for the cloud contribution to the greenhouse effect. Our results compare well with the current literature, falling in the upper range of the existing global circulation model estimates. We value the results of this analysis as a useful reference to help discriminate among model simulations and improve our capability to make predictions about the future of our climate.

  11. Experimental investigation on fluid flow and heat transfer characteristics of a submerged combustion vaporizer

    International Nuclear Information System (INIS)

    Han, Chang-Liang; Ren, Jing-Jie; Wang, Yan-Qing; Dong, Wen-Ping; Bi, Ming-Shu

    2017-01-01

    Highlights: • Thermal performance analysis of submerged combustion vaporizer (SCV) was performed experimentally. • Visualization study of shell-side flow field for SCV was carried out. • The effects of various operational parameters on the overall system performance were discussed. • Two new non-dimensional Nusselt correlations were proposed to predict the heat transfer performance of SCV. - Abstract: Submerged combustion vaporizer (SCV) occupies a decisive position in liquefied natural gas (LNG) industrial chain. In this paper, a visual experimental apparatus was established to have a comprehensive knowledge about fluid flow and heat transfer performance of SCV. Trans-critical liquid nitrogen (LN_2) was selected as alternative fluid to substitute LNG because of safety reason. Some unique experimental phenomena inside the SCV (local water bath freezes on the external surface of tube bundle) were revealed. Meanwhile the influences of static water height, superficial flue gas velocity, heat load, tube-side inlet pressure and tube-side mass flux on the system performance were systematically discussed. Finally, based on the obtained experimental results, two new empirical Nusselt number correlations were regressed to predict the shell-side and tube-side heat transfer characteristics of SCV. The maximum errors between predicted results and experimental data were respectively ±25% and ±20%. The outcomes of this paper were critical to the optimum design and economical operation of SCV.

  12. Experimental investigation and exergy analysis of a triple fluid vapor absorption refrigerator

    International Nuclear Information System (INIS)

    Jemaa, Radhouane Ben; Mansouri, Rami; Boukholda, Ismail; Bellagi, Ahmed

    2016-01-01

    Highlights: • Experimental study on a commercial triple fluid vapor absorption refrigerator performed. • An Aspen-hysys model developed and validated with experimental measurements. • Exergy analysis of the unit performed and discussed. • Absorber identified as largest source of irreversibility, followed by solution heat exchanger. - Abstract: This paper presents an energy and exergy analyses of a triple fluid vapor absorption refrigerator working with ammonia as refrigerant, water as absorbent and hydrogen as auxiliary gas. The experimental setup is constituted of a commercial unit equipped with the appropriate metrology. The temperature at the inlet and outlet of every component of the machine, as well as the cabinet and ambient temperature are continuously measured and monitored. A simulation model of the machine is developed using the process simulator Aspen-Hysys. The thermodynamic analysis includes energy and exergy efficiency calculations, destroyed exergy evaluation and degradation of the coefficient of performance (COP) in each component of the refrigerator. The results indicate that the absorber exhibits the largest source of irreversibility followed by the solution heat exchanger. These two components alone are at the origin of 63% of the total degradation of COP.

  13. Theoretical investigation on exciplex pumped alkali vapor lasers with sonic-level gas flow

    Science.gov (United States)

    Xu, Xingqi; Shen, Binglin; Huang, Jinghua; Xia, Chunsheng; Pan, Bailiang

    2017-07-01

    Considering the effects of higher excited and ion energy states and utilizing the methodology in the fluid mechanics, a modified model of exciplex pumped alkali vapor lasers with sonic-level flowing gas is established. A comparison of output characters between subsonic flow and supersonic flow is made. In this model, higher excited and ion energy states are included as well, which modifies the analysis of the kinetic process and introduces larger heat loading in an operating CW exciplex-pumped alkali vapor laser. The results of our calculations predict that subsonic flow has an advantage over supersonic flow under the same fluid parameters, and stimulated emission in the supersonic flow would be quenched while the pump power reaching a threshold value of the fluid choking effect. However, by eliminating the influence of fluid characters, better thermal management and higher optical conversion efficiency can be obtained in supersonic flow. In addition, we make use of the "nozzle-diffuser" to build up the closed-circle flowing experimental device and gather some useful simulated results.

  14. Investigation on the corrosion behavior of physical vapor deposition coated high speed steel

    Directory of Open Access Journals (Sweden)

    R Ravi Raja Malarvannan

    2015-08-01

    Full Text Available This work emphasizes on the influence of the TiN and AlCrN coatings fabricated on high speed steel form tool using physical vapor deposition technique. The surface microstructure of the coatings was studied using scanning electron microscope. Hardness and corrosion studies were also performed using Vickers hardness test and salt spray testing, respectively. The salt spray test results suggested that the bilayer coated (TiN- bottom layer and AlCrN- top layer substrate has undergone less amount of corrosion, and this is attributed to the dense microstructure. In addition to the above, the influence of the above coatings on the machining performance of the high speed steel was also evaluated and compared with that of the uncoated material and the results suggested that the bilayered coating has undergone very low weight loss when compared with that of the uncoated substrate depicting enhanced wear resistance.

  15. Investigation of Pore Scale Processes That Affect Soil Vapor Extraction. Final Technical Report EMSP 70045

    International Nuclear Information System (INIS)

    Valocchi, Albert J.; Werth, Charles W.; Webb, Andrew W.

    2004-01-01

    Dense nonaqueous phase liquid (DNAPL) contamination in the vadose zone is a significant problem at Department of Energy sites. Soil vapor extraction (SVE) is commonly used to remediate DNAPLs from the vadose zone. In most cases, a period of high recovery has been followed by a sustained period of low recovery. This behavior has been attributed to multiple processes including slow interphase mass transfer, retarded vapor phase transport, and diffusion from unswept zones of low permeability. This research project used a combination of laboratory experimentation and mathematical modeling to determine how these various processes interact to limit the removal of DNAPL components in heterogeneous porous media during SVE. Our results were applied to scenarios typical of the carbon tetrachloride spill zone at the Hanford Site. Our results indicate that: (a) the initial distribution of the spilled DNAPL (i.e., the spill-zone architecture) has a major influence upon the performance of any subsequent SVE operations; (b) while the pattern of higher and lower conductivity soil zones has an important impact upon spill zone architecture, soil moisture distribution plays an even larger role when there are large quantities of co-disposed waste-water (as in the Hanford scenario); (c) depending upon soil moisture dynamics, liquid DNAPL that is trapped by surrounding water is extremely difficult to remove by SVE; (d) natural barometric pumping can remove a large amount of the initial DNAPL mass for spills occurring close to the land surface, and hence the initial spilled inventory will be over-estimated if this process is neglected

  16. On the use of GPS tomography to investigate water vapor variability during a Mistral/sea breeze event in southeastern France

    Science.gov (United States)

    Bastin, Sophie; Champollion, Cédric; Bock, Olivier; Drobinski, Philippe; Masson, Frédéric

    2005-03-01

    Global Positioning System (GPS) tomography analyses of water vapor, complemented by high-resolution numerical simulations are used to investigate a Mistral/sea breeze event in the region of Marseille, France, during the ESCOMPTE experiment. This is the first time GPS tomography has been used to validate the three-dimensional water vapor concentration from numerical simulation, and to analyze a small-scale meteorological event. The high spatial and temporal resolution of GPS analyses provides a unique insight into the evolution of the vertical and horizontal distribution of water vapor during the Mistral/sea-breeze transition.

  17. Investigation of OH dynamics in the argon sensitized pulse radiolysis of water vapor

    International Nuclear Information System (INIS)

    Bera, R.K.; Hanrahan, R.J.

    1986-01-01

    Reactions of OH radical were studied in systems containing 650 torr Ar and from 0.5 to 9 torr H 2 O using the method of pulse radiolysis-absorption spectroscopy. It was found that initial concentrations of OH radical increased as a function of water vapor pressure. Although loss of OH with time followed approximate second order kinetics, the raw data were fitted arbitrarily to a first order rate expression, because a second order fit requires knowledge of absolute initial OH concentrations. These can be computed from measured initial OH absorption if the extinction coefficient is known, but an accurate value was not available initially. The half-life for OH loss decreased at higher water pressures. Dependence of OH half-life on OH concentration occurs because homogeneous OH loss processes are second order in reaction intermediates, whose concentration increases with added H 2 O. A contribution by water in chaperoning OH/OH and OH/H combination is also important

  18. Investigation of anti-Relaxation coatings for alkali-metal vapor cells using surface science techniques

    Energy Technology Data Exchange (ETDEWEB)

    Seltzer, S. J.; Michalak, D. J.; Donaldson, M. H.; Balabas, M. V.; Barber, S. K.; Bernasek, S. L.; Bouchiat, M.-A.; Hexemer, A.; Hibberd, A. M.; Jackson Kimball, D. F.; Jaye, C.; Karaulanov, T.; Narducci, F. A.; Rangwala, S. A.; Robinson, H. G.; Shmakov, A. K.; Voronov, D. L.; Yashchuk, V. V.; Pines, A.; Budker, D.

    2010-10-11

    Many technologies based on cells containing alkali-metal atomic vapor benefit from the use of antirelaxation surface coatings in order to preserve atomic spin polarization. In particular, paraffin has been used for this purpose for several decades and has been demonstrated to allow an atom to experience up to 10?000 collisions with the walls of its container without depolarizing, but the details of its operation remain poorly understood. We apply modern surface and bulk techniques to the study of paraffin coatings in order to characterize the properties that enable the effective preservation of alkali spin polarization. These methods include Fourier transform infrared spectroscopy, differential scanning calorimetry, atomic force microscopy, near-edge x-ray absorption fine structure spectroscopy, and x-ray photoelectron spectroscopy. We also compare the light-induced atomic desorption yields of several different paraffin materials. Experimental results include the determination that crystallinity of the coating material is unnecessary, and the detection of C=C double bonds present within a particular class of effective paraffin coatings. Further study should lead to the development of more robust paraffin antirelaxation coatings, as well as the design and synthesis of new classes of coating materials.

  19. Photoluminescence investigation of thick GaN films grown on Si substrates by hydride vapor phase epitaxy

    International Nuclear Information System (INIS)

    Yang, M.; Ahn, H. S.; Chang, J. H.; Yi, S. N.; Kim, K. H.; Kim, H.; Kim, S. W.

    2003-01-01

    The optical properties of thick GaN films grown by hydried vapor phase epitaxy (HVPE) using a low-temperature intermediate GaN buffer layer grown on a (111) Si substrate with a ZnO thin film were investigated by using photoluminescence (PL) measurement at 300 K and 77 K. The strong donor bound exciton (DBE) at 357 nm with a full width at half maximum (FWHM) of 15 meV was observed at 77 K. The value of 15 meV is extremely narrow for GaN grown on Si substrate by HVPE. An impurity-related peak was also observed at 367 nm. The origin of impurity was investigated using Auger spectroscopy.

  20. Experimental investigation on a diode-pumped cesium-vapor laser stably operated at continuous-wave and pulse regime.

    Science.gov (United States)

    Chen, Fei; Xu, Dongdong; Gao, Fei; Zheng, Changbin; Zhang, Kuo; He, Yang; Wang, Chunrui; Guo, Jin

    2015-05-04

    Employing a fiber-coupled diode-laser with a center wavelength of 852.25 nm and a line width of 0.17 nm, experimental investigation on diode-end-pumped cesium (Cs) vapor laser stably operated at continuous-wave (CW) and pulse regime is carried out. A 5 mm long cesium vapor cell filled with 60 kPa helium and 20 kPa ethane is used as laser medium. Using an output coupler with reflectivity of 48.79%, 1.26 W 894.57 nm CW laser is obtained at an incident pump power of 4.76 W, corresponding an optical-optical efficiency of 26.8% and a slope-efficiency of 28.8%, respectively. The threshold temperature is 67.5 °C. Stable pulsed cesium laser with a maximum average output power of 2.6 W is obtained at a repetition rate of 76 Hz, and the pulse repetition rate can be extend to 1 kHz with a pulse width of 18 μs.

  1. Experimental investigations on performance of liquid desiccant-vapor compression hybrid air conditioner

    International Nuclear Information System (INIS)

    Mohan, B. Shaji; Tiwari, Shaligram; Maiya, M.P.

    2015-01-01

    A coupled desiccant column is integrated with a conventional room air conditioner (AC) to enhance dehumidification of the room air. One desiccant column (absorber) is placed after the evaporator the other (regenerator) after the condenser of the AC unit. Such a novel liquid desiccant vapour compression hybrid air conditioning system has been fabricated and tested in a balanced ambient room type calorimeter for very low flow rates of liquid desiccant (lithium bromide solution). The moisture from the cold supply air is transferred to the hot condenser air by the desiccant flowing in the loop, thereby complimenting the dehumidification of the room air at the evaporator. The supply air is also sensibly heated during the dehumidification process by liquid desiccant in the absorber, which together enables the hybrid system to maintain low humidity in the room. Whereas the liquid desiccant is regenerated by the condenser waste heat, the entire cooling is derived only by the AC unit. The experimental results show that an increase of room temperature reduces both dehumidification of process air and regeneration of liquid desiccant, whereas an increase of room specific humidity enhances both these for the flow rate of the liquid desiccant in the range of 0.2–1.6% of the air flow rate through the absorber. - Highlights: • A liquid desiccant vapor compression hybrid system is fabricated and tested. • The liquid desiccant reduces latent load but equally increases sensible load. • Hybrid system performance is studied for varying room temperature and humidity. • Higher room temperature lowers air dehumidification and desiccant regeneration. • Increase of room specific humidity enhances dehumidification and also regeneration

  2. Arsenic removal by solar-driven membrane distillation: modeling and experimental investigation with a new flash vaporization module.

    Science.gov (United States)

    Pa, Parimal; Manna, Ajay Kumar; Linnanen, Lassi

    2013-01-01

    A modeling and simulation study was carried out on a new flux-enhancing and solar-driven membrane distillation module for removal of arsenic from contaminated groundwater. The developed new model was validated with rigorous experimental investigations using arsenic-contaminated groundwater. By incorporating flash vaporization dynamics, the model turned out to be substantially different from the existing direct contact membrane distillation models and could successfully predict (with relative error of only 0.042 and a Willmott d-index of 0.997) the performance of such an arsenic removal unit where the existing models exhibited wide variation with experimental findings in the new design. The module with greater than 99% arsenic removal efficiency and greater than 50 L/m2 x h flux could be implemented in arsenic-affected villages in Southeast Asian countries with abundant solar energy, and thus could give relief to millions of affected people. These encouraging results will raise scale-up confidence.

  3. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  4. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    International Conference on Computational Intelligence and Natural Computing, volume 2, pages 413–416, June 2009. • Rung Ching Chen, Kai -Fan Cheng, and...Chia-Fen Hsieh . “Using rough set and support vector machine for network intrusion detection.” International Journal of Network Security & Its...intrusion detection using FP tree rules.” Journal Of Advanced Networking and Applications, 1(1):30–39, 2009. • Ming-Yang Su, Gwo-Jong Yu , and Chun-Yuen

  5. Investigation of MIS-sensor sensitivity to vapor of unsymmetrical dimethylgydrazine in air

    Science.gov (United States)

    Filipchuk, D. V.; Litvinov, A. V.; Etrekova, M. O.; Nozdrya, D. A.

    2018-01-01

    The sensitivity of MIS-sensor to the products of thermal decomposition of unsymmetrical dimethylhydrazine was investigated. It is shown that MIS sensor is able to detect the concentrations of the test substance by the means of the certain products of its thermal decomposition (ammonia and nitric dioxide).

  6. Identification of Human Intrusion Types into Radwaste Disposal Facility

    International Nuclear Information System (INIS)

    Budi Setiawan

    2007-01-01

    Human intrusion has long been recognized as a potentially important post-closure safety issue for rad waste disposal facility. It is due to the difficulties in predicting future human activities. For the preliminary study of human intrusion, identification of human intrusion types need to be recognized and investigated also the approaching of problem solving must be known to predict the prevention act and accepted risk. (author)

  7. A differential vapor-pressure equipment for investigations of biopolymer interactions

    DEFF Research Database (Denmark)

    Andersen, Kim B; Koga, Y.; Westh, Peter

    2002-01-01

    the use of high-accuracy capacitance manometers and a leak-tight system of stainless steel pipes, below-scaled valves and metal-gasket fittings, DeltaP can be measured with a resolution of about 0.5 mubar (0.05 Pa) in some applications. This sensitivity level, along with other features of the equipment......, particularly a "gas-phase titration" routine for changing the cell composition, makes it effective for the investigations of several types of biopolymer interactions. These include isothermal studies of net affinities such as the adsorption of water to proteins or membranes, the preferential interaction...

  8. Investigation into coadsorption of krypton, xenon and water vapor from nuclear power plant gaseous wastes

    International Nuclear Information System (INIS)

    Nakhutin, I.E.; Ochkin, D.V.; Tret'yak, S.A.

    1980-01-01

    Coadsorption of steam, crypton and xenon out of air by CKT-6A activated carbon under equilibrium conditions at different temperature and out of nitrogen flow by the zeolites of NaA, NaX, CaA, CaX, NaM type, ''Molecular sieves 4A'' polish zeolite, KCM silica gel, A-1 alumina gel, CKT-3 activated carbon under dynamic conditions at room temperature was investigated. A considerable moisture effect during the noble gases adsorption by the activated carbon has been revealed. A relative gas humidity in a radiochromatography system where the activated carbon is used must not exceed a value at which polymolecular adsorption begins. The NaA domestic zeolite and ''Molecular sieves 4A'' polish zeolite can be recommended for drying gas in NPP gas cleaning systems. These zeolites have considerable moisture capacity and good dynamic properties: their moisture capacity has a relatively weak dependence on temperature; adsorbents practically do not adsorb crypton and xenon, which is of great importance when equipping the devices with the biological protection. A linear dependence of noble gas passage time through a layer can be practically used to determine an adsorbent poisoning degree [ru

  9. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  10. Parametric Investigation of the Isothermal Kinetics of Growth of Graphene on a Nickel Catalyst in the Process of Chemical Vapor Deposition of Hydrocarbons

    Science.gov (United States)

    Futko, S. I.; Shulitskii, B. G.; Labunov, V. A.; Ermolaeva, E. M.

    2016-11-01

    A kinetic model of isothermal synthesis of multilayer graphene on the surface of a nickel foil in the process of chemical vapor deposition, on it, of hydrocarbons supplied in the pulsed regime is considered. The dependences of the number of graphene layers formed and the time of their growth on the temperature of the process, the concentration of acetylene, and the thickness of the nickel foil were calculated. The regime parameters of the process of chemical vapor deposition, at which single-layer graphene and bi-layer graphene are formed, were determined. The dynamics of growth of graphene domains at chemical-vapor-deposition parameters changing in wide ranges was investigated. It is shown that the time dependences of the rates of growth of single-layer graphene and bi-layer graphene are nonlinear in character and that they are determined by the kinetics of nucleation and growth of graphene and the diffusion flow of carbon atoms in the nickel foil.

  11. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  12. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  13. Theoretical Investigation of the Structural Stabilities of Ceria Surfaces and Supported Metal Nanocluster in Vapor and Aqueous Phases

    Energy Technology Data Exchange (ETDEWEB)

    Ren, Zhibo [State Key Laboratory of Chemical Resource Engineering, Beijing University of Chemical Technology, Beijing 100029, China; Institute for Integrated Catalysis, Pacific Northwest National Laboratory, Richland, Washington 99352, United States; Liu, Ning [State Key Laboratory of Chemical Resource Engineering, Beijing University of Chemical Technology, Beijing 100029, China; Institute for Integrated Catalysis, Pacific Northwest National Laboratory, Richland, Washington 99352, United States; Chen, Biaohua [State Key Laboratory of Chemical Resource Engineering, Beijing University of Chemical Technology, Beijing 100029, China; Li, Jianwei [State Key Laboratory of Chemical Resource Engineering, Beijing University of Chemical Technology, Beijing 100029, China; Mei, Donghai [Institute for Integrated Catalysis, Pacific Northwest National Laboratory, Richland, Washington 99352, United States

    2018-01-25

    Understanding the structural stability and dynamics at the interface between the solid metal oxide and aqueous phase is significant in a variety of industrial applications including heterogeneous catalysis and environmental remediation. In the present work, the stabilities of three low-index ceria (CeO2) surfaces, i.e., (111), (110) and (100) in vapor and aqueous phases were studied using ab initio molecular dynamics simulations and density functional theory (DFT) calculations. Gibbs surface free energies as a function of temperature, water partial pressure, and water coverages were calculated using DFT based atomistic thermodynamic approach. On the basis of surface free energies, the morphology and exposed surface structures of the CeO2 nanoparticle were predicted using Wulff construction principle. It is found that the partially hydroxylated (111) and (100) are two major surface structures of CeO2 nanoparticles in vapor phase at ambient temperature (300 K). As the temperature increases, the fully dehydrated (111) surface gradually becomes the most dominant surface structure. While in aqueous phase, the exposed surface of the CeO2 nanoparticle is dominated by the hydroxylated (110) structure at 393 K. Finally, the morphology and stability of a cuboctahedron Pt13 nanocluster supported on CeO2 surfaces in both gas and aqueous phases were investigated. In gas phase, the supported Pt13 nanocluster has the tendency to wetting the CeO2 surface due to the strong metal-support interaction. The calculated interaction energies suggest the CeO2(110) surface provides the best stability for the Pt13 nanocluster. The CeO2 supported Pt13 nanoclusters are oxidized. Compared to the gas phase, the morphology of the CeO2 supported Pt13 nanocluster is less distorted due to the solvation effect provided by surrounding water molecules in aqueous phase. More electrons are transferred from the Pt13 nanocluster to the CeO2 support, implying the supported Pt13 nanocluster is further

  14. Petrochemical and Sr-Nd isotope investigations of Cretaceous intrusive rocks and their enclaves in the Togouchi-Yoshiwa district, northwest Hiroshima prefecture, SW Japan

    International Nuclear Information System (INIS)

    Ishioka, Jun; Iizumi, Shigeru

    2003-01-01

    Petrographic, petrochemical and Sr-Nd isotopic data are presented for granitoids and microdioritic enclaves from two Cretaceous stocks (Togouchi granodiorite and Tateiwayama granite porphyry) from the Togouchi-Yoshiwa district, northwest Hiroshima prefecture, SW Japan. The data are used to examine the genetic relationships between the microdioritic enclaves and their granitoid hosts. The granodiorite, granite porphyry and the microdioritic enclaves are all calc-alkaline in nature, and belong to the I-type ilmenite series. The Togouchi graniodiorite has a Rb-Sr whole rock isochron age of 85.6±4.7 Ma with an initial Sr isotope ratio (SrI) of 0.70634±0.00012 (2σ). The Tateiwayama granite porphyry has a slightly younger Rb-Sr whole isochron age (77.4±3.1 Ma) but similar SrI of 0.70653±0.00015, suggesting that both stocks may have been derived from the same source. Despite diverse whole rock chemistry, the microdioritic enclaves in the respective intrusives have quite similar initial Sr and Nd isotope ratios, suggesting that they formed by fractional crystallization of a single magma, and also that the source of the enclaves in both intrusives had similar geochemical characteristics. In both stocks, however, the enclaves have distinctly lower initial Sr isotope ratios than their respective host rocks, indicating that they were derived from a different source than their hosts. In view of the geochemical and Sr-Nd isotope data, we infer that the enclave magmas were derived from a similar LILE- and LREE-enriched source to that of the Cretaceous basalts and gabbroic-dioritic rocks that are sporadically distributed in SW Japan. Such mafic to intermediate magmas were probably derived from the upper mantle, and transferred both heat and material to the lower crust, thus producing granitic magmas by partial melting. Successive mafic magmas or their differentiates could then have been injected into the granitic magma chamber, trapped and quenched, resulting in the formation

  15. Investigation of non-premixed flame combustion characters in GO2/GH2 shear coaxial injectors using non-intrusive optical diagnostics

    Science.gov (United States)

    Dai, Jian; Yu, NanJia; Cai, GuoBiao

    2015-12-01

    Single-element combustor experiments are conducted for three shear coaxial geometry configuration injectors by using gaseous oxygen and gaseous hydrogen (GO2/GH2) as propellants. During the combustion process, several spatially and timeresolved non-intrusive optical techniques, such as OH planar laser induced fluorescence (PLIF), high speed imaging, and infrared imaging, are simultaneously employed to observe the OH radical concentration distribution, flame fluctuations, and temperature fields. The results demonstrate that the turbulent flow phenomenon of non-premixed flame exhibits a remarkable periodicity, and the mixing ratio becomes a crucial factor to influence the combustion flame length. The high speed and infrared images have a consistent temperature field trend. As for the OH-PLIF images, an intuitionistic local flame structure is revealed by single-shot instantaneous images. Furthermore, the means and standard deviations of OH radical intensity are acquired to provide statistical information regarding the flame, which may be helpful for validation of numerical simulations in future. Parameters of structure configurations, such as impinging angle and oxygen post thickness, play an important role in the reaction zone distribution. Based on a successful flame contour extraction method assembled with non-linear anisotropic diffusive filtering and variational level-set, it is possible to implement a fractal analysis to describe the fractal characteristics of the non-premixed flame contour. As a result, the flame front cannot be regarded as a fractal object. However, this turbulent process presents a self-similarity characteristic.

  16. Root resorption after orthodontic intrusion and extrusion:.

    NARCIS (Netherlands)

    Han, G.; Huang, S.; Hoff, J.W. Von den; Zeng, X.; Kuijpers-Jagtman, A.M.

    2005-01-01

    The aim of this investigation was to compare root resorption in the same individual after application of continuous intrusive and extrusive forces. In nine patients (mean age 15.3 years), the maxillary first premolars were randomly intruded or extruded with a continuous force of 100 cN for eight

  17. Petrology of the Sutherland commanage melilite intrusives

    International Nuclear Information System (INIS)

    Viljoen, K.S.

    1990-01-01

    The petrology of the Sutherland Commonage olivine melilitite intrusives have been investigated using petrographic and chemical methods. The results of the geochemical study suggest that the Commonage melilites were derived by the melting of a recently metasomatised region of the asthenosphere, probably under the influence of an ocean-island-type hotspot situated in the lower mantle

  18. Investigation of pump-to-seed beam matching on output features of Rb and Cs vapor laser amplifiers

    Science.gov (United States)

    Shen, Binglin; Huang, Jinghua; Xu, Xingqi; Xia, Chunsheng; Pan, Bailiang

    2018-05-01

    Taking into account the beam radii of pump light and seed laser along the entire length of the cell and their intensities in the cross section, a physical model with ordinary differential equation methods for alkali vapor amplifiers is established. Applied to the reported optically pumped Rb and diode-pumped Cs vapor amplifiers, the model shows good agreement between the calculated and measured dependence of amplified power on the seed power. A larger width of the spontaneous emission region as compared to the widths of pump absorption and laser emission regions, which will result in very high energy losses, is observed in the cell. Influence of pump and seed beam waists on output performance is calculated, showing that the pump and seed beam should match each other not only in shape but also in size, thus an optimal combination of beam radii is very important for efficient operation of alkali vapor amplifiers.

  19. Acoustic emission intrusion detector

    International Nuclear Information System (INIS)

    Carver, D.W.; Whittaker, J.W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal

  20. Development of a double plasma gun device for investigation of effects of vapor shielding on erosion of PFC materials under ELM-like pulsed plasma bombardment

    Science.gov (United States)

    Sakuma, I.; Iwamoto, D.; Kitagawa, Y.; Kikuchi, Y.; Fukumoto, N.; Nagata, M.

    2012-10-01

    It is considered that thermal transient events such as type I edge localized modes (ELMs) could limit the lifetime of plasma-facing components (PFCs) in ITER. We have investigated surface damage of tungsten (W) materials under transient heat and particle loads by using a magnetized coaxial plasma gun (MCPG) device at University of Hyogo. The capacitor bank energy for the plasma discharge is 144 kJ (2.88 mF, 10 kVmax). Surface melting of a W material was clearly observed at the energy density of ˜2 MJ/m2. It is known that surface melting and evaporation during a transient heat load could generate a vapor cloud layer in front of the target material [1]. Then, the subsequent erosion could be reduced by the vapor shielding effect. In this study, we introduce a new experiment using two MCPG devices (MCPG-1, 2) to understand vapor shielding effects of a W surface under ELM-like pulsed plasma bombardment. The capacitor bank energy of MCPG-2 is almost same as that of MCPG-1. The second plasmoid is applied with a variable delay time after the plasmoid produced by MCPG-1. Then, a vapor cloud layer could shield the second plasma load. To verify the vapor shielding effects, surface damage of a W material is investigated by changing the delay time. In the conference, the preliminary experimental results will be shown.[4pt] [1] A. Hassanein et al., J. Nucl. Mater. 390-391, pp. 777-780 (2009).

  1. Numerical investigation of vessel heating using a copper vapor laser and a pulsed dye laser in treating vascular skin lesions

    Science.gov (United States)

    Pushkareva, A. E.; Ponomarev, I. V.; Isaev, A. A.; Klyuchareva, S. V.

    2018-02-01

    A computer simulation technique was employed to study the selective heating of a tissue vessel using emission from a pulsed copper vapor laser and a pulsed dye laser. The depth and size of vessels that could be selectively and safely removed were determined for the lasers under examination.

  2. Homogeneous and Light-Induced Nucleation of Sulfur Vapor-Diffusion Cloud Chamber Investigation of Constant Rate Supersaturation

    Czech Academy of Sciences Publication Activity Database

    Uchtmann, H.; Kazitsyna, S. Yu.; Hensel, F.; Ždímal, Vladimír; Tříska, B.; Smolík, Jiří

    2001-01-01

    Roč. 105, č. 47 (2001), s. 11754-11762 ISSN 1089-5647 R&D Projects: GA ČR GA104/97/1198 Institutional research plan: CEZ:AV0Z4072921 Keywords : Cesium vapor * growth Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 3.379, year: 2001

  3. Investigation of catalytic oxidation of diamond by water vapor and carbon dioxide in the presence of alkali melts of some rare earth oxides

    International Nuclear Information System (INIS)

    Kulakova, I.I.; Rudenko, A.P.; Sulejmenova, A.S.; Tolstopyatova, A.A.

    1978-01-01

    The results of an investigation of the catalytic oxydation of diamond by carbon dioxide and water vapors at 906 deg C in the presence of melts of some rare earth oxides in potassium hydroxide are given. The ion La 3+ was shown to possess the most catalytic activity. The earlier proposed mechanisms of the diamond oxidation by CO 2 and H 2 O were corroborated. The ions of rare earth elements were found to accelerate the different stages of the process

  4. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  5. Investigation on a system to collect water vapor from the air, for the analysis of natural isotopic variation

    International Nuclear Information System (INIS)

    Foloni, L.L.

    1975-01-01

    The development of a system to collect water vapor from air for isotopic composition analysis and its natural variation is studied. The system consists of a molecular sieve type 4A, without cooling agent and permits the choice of a sampling time varying from a few minutes to many hours through the control of the admission vapor flux. The system has been compared with other existing systems, having shown excellent performance for the collection of samples for D/H ratio analysis, with errors of the order of +- -+ 3.0 0 /oo and +- -+ 0.6 0 /oo in the delta sub(D) 0 /oo and delta 18 0 0 /oo ratios, respectively [pt

  6. Experimental investigation of vapor shielding effects induced by ELM-like pulsed plasma loads using the double plasma gun device

    Science.gov (United States)

    Sakuma, I.; Kikuchi, Y.; Kitagawa, Y.; Asai, Y.; Onishi, K.; Fukumoto, N.; Nagata, M.

    2015-08-01

    We have developed a unique experimental device of so-called double plasma gun, which consists of two magnetized coaxial plasma gun (MCPG) devices, in order to clarify effects of vapor shielding on material erosion due to transient events in magnetically confined fusion devices. Two ELM-like pulsed plasmas produced by the two MCPG devices were injected into a target chamber with a variable time difference. For generating ablated plasmas in front of a target material, an aluminum foil sample in the target chamber was exposed to a pulsed plasma produced by the 1st MCPG device. The 2nd pulsed plasma was produced with a time delay of 70 μs. It was found that a surface absorbed energy measured by a calorimeter was reduced to ∼66% of that without the Al foil sample. Thus, the reduction of the incoming plasma energy by the vapor shielding effect was successfully demonstrated in the present experiment.

  7. Experimental investigation of vapor shielding effects induced by ELM-like pulsed plasma loads using the double plasma gun device

    Energy Technology Data Exchange (ETDEWEB)

    Sakuma, I., E-mail: eu13z002@steng.u-hyogo.ac.jp; Kikuchi, Y.; Kitagawa, Y.; Asai, Y.; Onishi, K.; Fukumoto, N.; Nagata, M.

    2015-08-15

    We have developed a unique experimental device of so-called double plasma gun, which consists of two magnetized coaxial plasma gun (MCPG) devices, in order to clarify effects of vapor shielding on material erosion due to transient events in magnetically confined fusion devices. Two ELM-like pulsed plasmas produced by the two MCPG devices were injected into a target chamber with a variable time difference. For generating ablated plasmas in front of a target material, an aluminum foil sample in the target chamber was exposed to a pulsed plasma produced by the 1st MCPG device. The 2nd pulsed plasma was produced with a time delay of 70 μs. It was found that a surface absorbed energy measured by a calorimeter was reduced to ∼66% of that without the Al foil sample. Thus, the reduction of the incoming plasma energy by the vapor shielding effect was successfully demonstrated in the present experiment.

  8. Investigation of the vapor pressure p of zinc bromide or zinc chloride solutions with methanol by static method

    International Nuclear Information System (INIS)

    Safarov, Javid T.

    2006-01-01

    Vapor pressures p of ZnBr 2 + CH 3 OH and ZnCl 2 + CH 3 OH solutions at T (298.15 to 323.15) K were measured, activity of solvent a s and osmotic φ coefficients have been evaluated. The experiments were carried out for the ZnBr 2 + CH 3 OH solutions in the molality range m = (0.19972 to 11.05142) mol . kg -1 and for the ZnCl 2 + CH 3 OH solutions in the molality range m (0.42094 to 8.25534) mol . kg -1 . The Antoine equation for the empirical description of the experimental vapor pressure results and the Pitzer-Mayorga model with inclusion of ionic strength dependence of the third virial coefficient for the description of calculated osmotic coefficients were used. The parameters of Pitzer-Mayorga model were used for evaluation of activity coefficients

  9. Retrieval Assimilation and Modeling of Atmospheric Water Vapor from Ground- and Space-Based GPS Networks: Investigation of the Global and Regional Hydrological Cycles

    Science.gov (United States)

    Dickey, Jean O.

    1999-01-01

    Uncertainty over the response of the atmospheric hydrological cycle (particularly the distribution of water vapor and cloudiness) to anthropogenic forcing is a primary source of doubt in current estimates of global climate sensitivity, which raises severe difficulties in evaluating its likely societal impact. Fortunately, a variety of advanced techniques and sensors are beginning to shed new light on the atmospheric hydrological cycle. One of the most promising makes use of the sensitivity of the Global Positioning System (GPS) to the thermodynamic state, and in particular the water vapor content, of the atmosphere through which the radio signals propagate. Our strategy to derive the maximum benefit for hydrological studies from the rapidly increasing GPS data stream will proceed in three stages: (1) systematically analyze and archive quality-controlled retrievals using state-of-the-art techniques; (2) employ both currently available and innovative assimilation procedures to incorporate these determinations into advanced regional and global atmospheric models and assess their effects; and (3) apply the results to investigate selected scientific issues of relevance to regional and global hydrological studies. An archive of GPS-based estimation of total zenith delay (TZD) data and water vapor where applicable has been established with expanded automated quality control. The accuracy of the GPS estimates is being monitored; the investigation of systematic errors is ongoing using comparisons with water vapor radiometers. Meteorological packages have been implemented. The accuracy and utilization of the TZD estimates has been improved by implementing a troposphere gradient model. GPS-based gradients have been validated as real atmospheric moisture gradients, establishing a link between the estimated gradients and the passage of weather fronts. We have developed a generalized ray tracing inversion scheme that can be used to analyze occultation data acquired from space

  10. Sensitivity analysis on parameters and processes affecting vapor intrusion risk

    KAUST Repository

    Picone, Sara; Valstar, Johan; van Gaans, Pauline; Grotenhuis, Tim; Rijnaarts, Huub

    2012-01-01

    the ventilated crawl space of a house. In contrast to the vast majority of previous studies, this model accounts for vertical variation of soil water saturation and includes aerobic biodegradation. The attenuation factor (ratio between concentration in the crawl

  11. Guide for the Assessment of the Vapor Intrusion Pathway

    National Research Council Canada - National Science Library

    Cox, Douglas N; Howard, W. B; Smith, Melanie A

    2006-01-01

    .... Exposures related to this pathway can result from the volatilization and migration of chemicals from contaminated groundwater and subsurface soil that can leak through cracks and holes in buildings...

  12. Determination of Chlorinated Solvent Sorption by Porous Material-Application to Trichloroethene Vapor on Cement Mortar.

    Science.gov (United States)

    Musielak, Marion; Brusseau, Mark L; Marcoux, Manuel; Morrison, Candice; Quintard, Michel

    2014-08-01

    Experiments have been performed to investigate the sorption of trichloroethene (TCE) vapor by concrete material or, more specifically, the cement mortar component. Gas-flow experiments were conducted using columns packed with small pieces of cement mortar obtained from the grinding of typical concrete material. Transport and retardation of TCE at high vapor concentrations (500 mg L -1 ) was compared to that of a non-reactive gas tracer (Sulfur Hexafluoride, SF6). The results show a large magnitude of retardation (retardation factor = 23) and sorption (sorption coefficient = 10.6 cm 3 g -1 ) for TCE, compared to negligible sorption for SF6. This magnitude of sorption obtained with pollutant vapor is much bigger than the one obtained for aqueous-flow experiments conducted for water-saturated systems. The considerable sorption exhibited for TCE under vapor-flow conditions is attributed to some combination of accumulation at the air-water interface and vapor-phase adsorption, both of which are anticipated to be significant for this system given the large surface area associated with the cement mortar. Transport of both SF6 and TCE was simulated successfully with a two-region physical non-equilibrium model, consistent with the dual-medium structure of the crushed cement mortar. This work emphasizes the importance of taking into account sorption phenomena when modeling transport of volatile organic compounds through concrete material, especially in regard to assessing vapor intrusion.

  13. Investigation of the vapor pressure p of zinc bromide or zinc chloride solutions with methanol by static method

    Energy Technology Data Exchange (ETDEWEB)

    Safarov, Javid T. [Heat and Refrigeration Techniques, Azerbaijan Technical University, H. Javid Avn. 25, AZ1073 Baku (Azerbaijan)]. E-mail: javids@azdata.net

    2006-03-15

    Vapor pressures p of ZnBr{sub 2} + CH{sub 3}OH and ZnCl{sub 2} + CH{sub 3}OH solutions at T (298.15 to 323.15) K were measured, activity of solvent a {sub s} and osmotic {phi} coefficients have been evaluated. The experiments were carried out for the ZnBr{sub 2} + CH{sub 3}OH solutions in the molality range m = (0.19972 to 11.05142) mol . kg{sup -1} and for the ZnCl{sub 2} + CH{sub 3}OH solutions in the molality range m (0.42094 to 8.25534) mol . kg{sup -1}. The Antoine equation for the empirical description of the experimental vapor pressure results and the Pitzer-Mayorga model with inclusion of ionic strength dependence of the third virial coefficient for the description of calculated osmotic coefficients were used. The parameters of Pitzer-Mayorga model were used for evaluation of activity coefficients.

  14. Structural and photoluminescence investigation on the hot-wire assisted plasma enhanced chemical vapor deposition growth silicon nanowires

    International Nuclear Information System (INIS)

    Chong, Su Kong; Goh, Boon Tong; Wong, Yuen-Yee; Nguyen, Hong-Quan; Do, Hien; Ahmad, Ishaq; Aspanut, Zarina; Muhamad, Muhamad Rasat; Dee, Chang Fu; Rahman, Saadah Abdul

    2012-01-01

    High density of silicon nanowires (SiNWs) were synthesized by a hot-wire assisted plasma enhanced chemical vapor deposition technique. The structural and optical properties of the as-grown SiNWs prepared at different rf power of 40 and 80 W were analyzed in this study. The SiNWs prepared at rf power of 40 W exhibited highly crystalline structure with a high crystal volume fraction, X C of ∼82% and are surrounded by a thin layer of SiO x . The NWs show high absorption in the high energy region (E>1.8 eV) and strong photoluminescence at 1.73 to 2.05 eV (red–orange region) with a weak shoulder at 1.65 to 1.73 eV (near IR region). An increase in rf power to 80 W reduced the X C to ∼65% and led to the formation of nanocrystalline Si structures with a crystallite size of <4 nm within the SiNWs. These NWs are covered by a mixture of uncatalyzed amorphous Si layer. The SiNWs prepared at 80 W exhibited a high optical absorption ability above 99% in the broadband range between 220 and ∼1500 nm and red emission between 1.65 and 1.95 eV. The interesting light absorption and photoluminescence properties from both SiNWs are discussed in the text. - Highlights: ► Growth of random oriented silicon nanowires using hot-wire assisted plasma enhanced chemical vapor deposition. ► Increase in rf power reduces the crystallinity of silicon nanowires. ► High density and nanocrystalline structure in silicon nanowires significant enhance the near IR light absorption. ► Oxide defects and silicon nanocrystallites in silicon nanowires reveal photoluminescence in red–orange and red regions.

  15. Molecular Gut Content Profiling to Investigate the In Situ Grazing and Selectivity of Dolioletta gegenbauri in Summer Continental Shelf Intrusion Waters of the South Atlantic Bight, USA

    Science.gov (United States)

    Walters, T. L.; Frazier, L.; Gibson, D. M.; Paffenhofer, G. A.; Frischer, M. E.

    2016-02-01

    Gelatinous metazooplankton play a crucial role in marine planktonic food webs and it has been suggested that they may become increasingly important in the Future Ocean. However, largely due to methodological challenges and reliance on laboratory cultivation approaches, the in situ diet of zooplankton with complex life histories and diverse prey choices remains poorly investigated. This is particularly true for the gelatinous zooplankton including the pelagic tunicate, Dolioletta gegenbauri that form large blooms in productive subtropical continental shelf environments. To investigate the diet of D. gegenbauri we developed a molecular gut profiling approach based on the use of a Peptide Nucleic Acid (PNA) PCR blocker. Using a doliolid-specific PNA blocker, it was possible to enrich the amplification of prey and parasite DNA from whole animal DNA extracts of doliolids. Gut contents from the water column, wild and captive-fed doliolids were profiled after PNA-PCR by denaturing HPLC (dHPLC), clone library and next generation sequencing (NGS) approaches. Studies were conducted during 5 summer cruises in the mid-shelf of the South Atlantic Bight. Comparison of gut profiles to available prey in the water column revealed evidence of prey selection towards larger prey species, including diatoms, dinoflagelletes and also metazoan prey that were likely captured as larvae and eggs. Wild-caught doliolids contained significantly more metazoan sequences than did the captive-fed doliolids. Ingestion of metazoan prey suggests that metazoans may contribute both the nutrition of doliolids and the potential role of doliolids as trophic cascade agents in continental shelf pelagic food webs.

  16. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  17. R-22 vapor explosions

    International Nuclear Information System (INIS)

    Anderson, R.P.; Armstrong, D.R.

    1977-01-01

    Previous experimental and theoretical studies of R-22 vapor explosions are reviewed. Results from two experimental investigations of vapor explosions in a medium scale R-22/water system are reported. Measurements following the drop of an unrestrained mass of R-22 into a water tank demonstrated the existence of two types of interaction behavior. Release of a constrained mass of R-22 beneath the surface of a water tank improved the visual resolution of the system thus allowing identification of two interaction mechansims: at low water temperatures, R-22/water contact would produce immediate violent boiling; at high water temperatures a vapor film formed around its R-22 as it was released, explosions were generated by a surface wave which initiated at a single location and propagated along the vapor film as a shock wave. A new vapor explosion model is proposed, it suggests explosions are the result of a sequence of three independent steps: an initial mixing phase, a trigger and growth phase, and a mature phase where a propagating shock wave accelerates the two liquids into a collapsing vapor layer causing a high velocity impact which finely fragments and intermixes the two liquids

  18. Corrosion inhibitor development for slightly sour environments with oxygen intrusion

    Energy Technology Data Exchange (ETDEWEB)

    Wylde, J.; Wang, H.; Li, J. [Clariant Oil Services North America, Calgary, AB (Canada)

    2009-07-01

    This presentation reported on a study that examined the effect of oxygen on the inhibition of carbon steel in slightly sour corrosion, and the initiation and propagation of localized attack. Oxygen can enter sour water injection systems through the vapor space in storage tanks and process system. Oxygen aggravates the corrosion attack by participating in the cathodic reaction under full or partial diffusion control. Laboratory testing results were reported in this presentation along with the development of corrosion inhibitors for such a slightly sour system. Bubble testing cells were used with continuous H{sub 2}/CO{sub 2} mixture gas sparging and occasional oxygen intrusion of 2 to 4 hours during a week long test. Linear polarization resistance (LPR) measurements and weight loss corrosion coupons were used to quantify the corrosion attack. The findings were presented in terms of the magnitude of localized attacks at different oxygen concentrations and intrusion periods, with and without the presence of corrosion inhibitors. tabs., figs.

  19. From intrusive to oscillating thoughts.

    Science.gov (United States)

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  20. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  1. Investigation of nucleation kinetics in H2SO4 vapor through modeling of gas phase kinetics coupled with particle dynamics

    Science.gov (United States)

    Carlsson, Philip T. M.; Zeuch, Thomas

    2018-03-01

    We have developed a new model utilizing our existing kinetic gas phase models to simulate experimental particle size distributions emerging in dry supersaturated H2SO4 vapor homogeneously produced by rapid oxidation of SO2 through stabilized Criegee-Intermediates from 2-butene ozonolysis. We use a sectional method for simulating the particle dynamics. The particle treatment in the model is based on first principles and takes into account the transition from the kinetic to the diffusion-limited regime. It captures the temporal evolution of size distributions at the end of the ozonolysis experiment well, noting a slight underrepresentation of coagulation effects for larger particle sizes. The model correctly predicts the shape and the modes of the experimentally observed particle size distributions. The predicted modes show an extremely high sensitivity to the H2SO4 evaporation rates of the initially formed H2SO4 clusters (dimer to pentamer), which were arbitrarily restricted to decrease exponentially with increasing cluster size. In future, the analysis presented in this work can be extended to allow a direct validation of quantum chemically predicted stabilities of small H2SO4 clusters, which are believed to initiate a significant fraction of atmospheric new particle formation events. We discuss the prospects and possible limitations of the here presented approach.

  2. A study on vapor explosions

    International Nuclear Information System (INIS)

    Takagi, N.; Shoji, M.

    1979-01-01

    An experimental study was carried out for vapor explosions of molten tin falling in water. For various initial metal temperatures and subcooling of water, transient pressure of the explosions, relative frequency of the explosions and the position where the explosions occur were measured in detail. The influence of ambient pressure was also investigated. From the results, it was concluded that the vapor explosion is closely related to the collapse of a vapor film around the molten metal. (author)

  3. Investigation of Seawater Intrusion into Coastal Groundwater ...

    African Journals Online (AJOL)

    ADOWIE PERE

    Malaysia (Baharuddin et al. 2009). ... internationally as result of activities of oil and gas exploration and ... freshwater swamps vegetation, such as palm tree and shrubs. ... environment, the sands are the aquifers, while the clays are the ...

  4. Numerical and experimental investigation of DNAPL removal mechanisms in a layered porous medium by means of soil vapor extraction.

    Science.gov (United States)

    Yoon, Hongkyu; Oostrom, Mart; Wietsma, Thomas W; Werth, Charles J; Valocchi, Albert J

    2009-10-13

    The purpose of this work is to identify the mechanisms that govern the removal of carbon tetrachloride (CT) during soil vapor extraction (SVE) by comparing numerical and analytical model simulations with a detailed data set from a well-defined intermediate-scale flow cell experiment. The flow cell was packed with a fine-grained sand layer embedded in a coarse-grained sand matrix. A total of 499 mL CT was injected at the top of the flow cell and allowed to redistribute in the variably saturated system. A dual-energy gamma radiation system was used to determine the initial NAPL saturation profile in the fine-grained sand layer. Gas concentrations at the outlet of the flow cell and 15 sampling ports inside the flow cell were measured during subsequent CT removal using SVE. Results show that CT mass was removed quickly in coarse-grained sand, followed by a slow removal from the fine-grained sand layer. Consequently, effluent gas concentrations decreased quickly at first, and then started to decrease gradually, resulting in long-term tailing. The long-term tailing was mainly due to diffusion from the fine-grained sand layer to the coarse-grained sand zone. An analytical solution for a one-dimensional advection and a first-order mass transfer model matched the tailing well with two fitting parameters. Given detailed knowledge of the permeability field and initial CT distribution, we were also able to predict the effluent concentration tailing and gas concentration profiles at sampling ports using a numerical simulator assuming equilibrium CT evaporation. The numerical model predictions were accurate within the uncertainty of independently measured or literature derived parameters. This study demonstrates that proper numerical modeling of CT removal through SVE can be achieved using equilibrium evaporation of NAPL if detailed fine-scale knowledge of the CT distribution and physical heterogeneity is incorporated into the model. However, CT removal could also be fit by a

  5. Data Mining for Intrusion Detection

    Science.gov (United States)

    Singhal, Anoop; Jajodia, Sushil

    Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This chapter discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested.

  6. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor .... and after amplification is finally read by a digital multimeter (Fluke make: 179 true ... To study the response of the present FO refractometer, propylene glycol has been ... values of all the samples were initially measured by Abbe's refractometer.

  7. Optical investigation of atomic steps in ultra-thin InGaAs/InP quantum wells grown by vapor levitation epitaxy

    International Nuclear Information System (INIS)

    Morais, P.C.

    1988-09-01

    Ultra-thin InGaAs/InP single-quantum-well structures, grown by chloride transport vapor levitation epitaxy, have been investigated by low temperature photoluminescence (PL). Well resolved peaks are observed in the PL spectra which we attribute to monolayer (a/2=2.93 A) variations in quantum well (QW) thickness. Separate peak positions for QW thicknesses corresponding to 2-6 monolayers have been determined, providing an unambiguous thickness calibration for spectral shifts due to quantum confinement. The PL peak corresponding to two monolayers occurs at 1.314 eV corresponding to an energy shift of 524 meV. Experimental data agree very well with a simple effective-mass theory. (author) [pt

  8. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  9. Unconventional applications of conventional intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.; Matter, J.C.

    1983-01-01

    A number of conventional intrusion detection sensors exists for the detection of persons entering buildings, moving within a given volume, and crossing a perimeter isolation zone. Unconventional applications of some of these sensors have recently been investigated. Some of the applications which are discussed include detection on the edges and tops of buildings, detection in storm sewers, detection on steam and other types of large pipes, and detection of unauthorized movement within secure enclosures. The enclosures can be used around complicated control valves, electrical control panels, emergency generators, etc

  10. High temperature measurement of water vapor absorption

    Science.gov (United States)

    Keefer, Dennis; Lewis, J. W. L.; Eskridge, Richard

    1985-01-01

    An investigation was undertaken to measure the absorption coefficient, at a wavelength of 10.6 microns, for mixtures of water vapor and a diluent gas at high temperature and pressure. The experimental concept was to create the desired conditions of temperature and pressure in a laser absorption wave, similar to that which would be created in a laser propulsion system. A simplified numerical model was developed to predict the characteristics of the absorption wave and to estimate the laser intensity threshold for initiation. A non-intrusive method for temperature measurement utilizing optical laser-beam deflection (OLD) and optical spark breakdown produced by an excimer laser, was thoroughly investigated and found suitable for the non-equilibrium conditions expected in the wave. Experiments were performed to verify the temperature measurement technique, to screen possible materials for surface initiation of the laser absorption wave and to attempt to initiate an absorption wave using the 1.5 kW carbon dioxide laser. The OLD technique was proven for air and for argon, but spark breakdown could not be produced in helium. It was not possible to initiate a laser absorption wave in mixtures of water and helium or water and argon using the 1.5 kW laser, a result which was consistent with the model prediction.

  11. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  12. Mobile vapor recovery and vapor scavenging unit

    International Nuclear Information System (INIS)

    Stokes, C.A.; Steppe, D.E.

    1991-01-01

    This patent describes a mobile anti- pollution apparatus, for the recovery of hydrocarbon emissions. It comprises a mobile platform upon which is mounted a vapor recovery unit for recovering vapors including light hydrocarbons, the vapor recovery unit having an inlet and an outlet end, the inlet end adapted for coupling to an external source of hydrocarbon vapor emissions to recover a portion of the vapors including light hydrocarbons emitted therefrom, and the outlet end adapted for connection to a means for conveying unrecovered vapors to a vapor scavenging unit, the vapor scavenging unit comprising an internal combustion engine adapted for utilizing light hydrocarbon in the unrecovered vapors exiting from the vapor recovery unit as supplemental fuel

  13. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  14. Intrusive Images in Psychological Disorders

    OpenAIRE

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in th...

  15. USBcat - Towards an Intrusion Surveillance Toolset

    Directory of Open Access Journals (Sweden)

    Chris Chapman

    2014-10-01

    Full Text Available This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by observing the behaviour and communications of the intruder. Subsequently a more complete picture of the attacker's identity, objectives, capabilities, and infiltration could be formulated than is possible with present technologies. This research focused on developing an extensible framework to permit the covert investigation of malware. Additionally, a Universal Serial Bus (USB Mass Storage Device (MSD based covert channel was designed to enable remote command and control of the framework. The work was validated through the design, implementation and testing of a toolset.

  16. COMBINED THEORETICAL AND EXPERIMENTAL INVESTIGATION OF MECHANISMS AND KINETICS OF VAPOR-PHASE MERCURY UPTAKE BY CARBONACOUES SURFACES

    Energy Technology Data Exchange (ETDEWEB)

    Radisav D. Vidic

    2002-05-01

    The first part of this study evaluated the application of a versatile optical technique to study the adsorption and desorption of model adsorbates representative of volatile polar (acetone) and non-polar (propane) organic compounds on a model carbonaceous surface under ultra high vacuum (UHV) conditions. The results showed the strong correlation between optical differential reflectance (ODR) and adsorbate coverage determined by temperature programmed desorption (TPD). ODR technique was proved to be a powerful tool to investigate surface adsorption and desorption from UHV to high pressure conditions. The effects of chemical functionality and surface morphology on the adsorption/desorption behavior of acetone, propane and mercury were investigated for two model carbonaceous surfaces, namely air-cleaved highly oriented pyrolytic graphite (HOPG) and plasma-oxidized HOPG. They can be removed by thermal treatment (> 500 K). The presence of these groups almost completely suppresses propane adsorption at 90K and removal of these groups leads to dramatic increase in adsorption capacity. The amount of acetone adsorbed is independent of surface heat treatment and depends only on total exposure. The effects of morphological heterogeneity is evident for plasma-oxidized HOPG as this substrate provides greater surface area, as well as higher energy binding sites. Mercury adsorption at 100 K on HOPG surfaces with and without chemical functionalities and topological heterogeneity created by plasma oxidation occurs through physisorption. The removal of chemical functionalities from HOPG surface enhances mercury physisorption. Plasma oxidation of HOPG provides additional surface area for mercury adsorption. Mercury adsorption by activated carbon at atmospheric pressure occurs through two distinct mechanisms, physisorption below 348 K and chemisorption above 348 K. No significant impact of oxygen functionalities was observed in the chemisorption region. The key findings of this study

  17. Experimental and theoretical investigations of Cs-Ba vapor tacitron inverter for power conditioning in space power systems

    International Nuclear Information System (INIS)

    El-Genk, M.; Murray, C.; Wernsman, B.

    1993-01-01

    The operation characteristics of the Cs-Ba tacitron as a switch are investigated experimentally in three modes: (a) breakdown mode, (b) I-V mode, and (c) current modulation mode. The switching frequency, grid potentials for ignition and extinguishing of discharge, and the Cs pressure and emission conditions (Ba pressure and emitter temperature) for stable current modulation are determined. The experimental data is also used to determine the off-time required for successful ignition, and the effects of the aforementioned operation parameters on the ignition duty cycle threshold for stable modulation. Operation parameters measured include switching frequency up to 20 kHz, hold-off voltage up to 180 V, current densities in excess of 15 A/cm 2 , switch power density of 1 kW/cm 2 . and a switching efficiency in excess of 90% at collector C: realer than 30 V. The voltage drop strongly depends on the Cs pressure and to a lesser extent on the emission conditions. Increasing the Cs pressure and/or the emission current lowers the voltage drop, however, for the same initial Cs pressure and emission conditions, the voltage drop in the I-V mode is usually lower than that during current modulation. As long as the discharge current is kept lower that the.emission current, the voltage drop during stable current modulation could be as low as 3 V

  18. Preliminary investigation of the potential for transient vapor release events during in situ vitrification based on thermal- hydraulic modeling

    International Nuclear Information System (INIS)

    Roberts, J.S.; Woosley, S.L.; Lessor, D.L.; Strachan, C.

    1992-07-01

    This study investigates a possible cause of molten glass displacements that occurred during two recent in situ vitrification (ISV) tests. The study was conducted for the US Department of Energy by Pacific Northwest Laboratory. It is hypothesized that these glass displacements are caused by large gas bubbles rising up through the ISV melt and bursting at its surface. These bubbles cause the molten surface to upwell and possibly overflow. When the bubbles burst, molten glass is thrown from the melt surface and the volume of gas contained in the bubble is released into the hood. Both of these phenomena are undesirable because the molten soil ejected from the melt is dangerous to operating personnel and can damage equipment. The sudden gas release can cause a temporary pressurization of the hood, allowing potentially contaminated gas to escape to the atmosphere. This study attempts to explain the conditions necessary for formation of large gas bubbles in the melt so that future glass displacements can be avoided

  19. Preliminary investigation of the potential for transient vapor release events during in situ vitrification based on thermal- hydraulic modeling

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, J.S.; Woosley, S.L.; Lessor, D.L.; Strachan, C.

    1992-07-01

    This study investigates a possible cause of molten glass displacements that occurred during two recent in situ vitrification (ISV) tests. The study was conducted for the US Department of Energy by Pacific Northwest Laboratory. It is hypothesized that these glass displacements are caused by large gas bubbles rising up through the ISV melt and bursting at its surface. These bubbles cause the molten surface to upwell and possibly overflow. When the bubbles burst, molten glass is thrown from the melt surface and the volume of gas contained in the bubble is released into the hood. Both of these phenomena are undesirable because the molten soil ejected from the melt is dangerous to operating personnel and can damage equipment. The sudden gas release can cause a temporary pressurization of the hood, allowing potentially contaminated gas to escape to the atmosphere. This study attempts to explain the conditions necessary for formation of large gas bubbles in the melt so that future glass displacements can be avoided.

  20. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    Science.gov (United States)

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. Vaporization of irradiated droplets

    International Nuclear Information System (INIS)

    Armstrong, R.L.; O'Rourke, P.J.; Zardecki, A.

    1986-01-01

    The vaporization of a spherically symmetric liquid droplet subject to a high-intensity laser flux is investigated on the basis of a hydrodynamic description of the system composed of the vapor and ambient gas. In the limit of the convective vaporization, the boundary conditions at the fluid--gas interface are formulated by using the notion of a Knudsen layer in which translational equilibrium is established. This leads to approximate jump conditions at the interface. For homogeneous energy deposition, the hydrodynamic equations are solved numerically with the aid of the CON1D computer code (''CON1D: A computer program for calculating spherically symmetric droplet combustion,'' Los Alamos National Laboratory Report No. LA-10269-MS, December, 1984), based on the implict continuous--fluid Eulerian (ICE) [J. Comput. Phys. 8, 197 (1971)] and arbitrary Lagrangian--Eulerian (ALE) [J. Comput. Phys. 14, 1227 (1974)] numerical mehtods. The solutions exhibit the existence of two shock waves propagating in opposite directions with respect to the contact discontinuity surface that separates the ambient gas and vapor

  2. Climate Change and Saltwater Intrusion along the Eastern ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Eastern Mediterranean is highly vulnerable to saltwater intrusion into the freshwater aquifers along its coasts. The degradation of these aquifers would result in serious socioeconomic consequence to people living there. This project will investigate how climate change is affecting the salinity of coastal aquifers at several ...

  3. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  4. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  5. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  6. The use of protective barriers to deter inadvertent human intrusion into a mined geologic facility for the disposal of radioactive waste: A review of previous investigations and potential concepts

    International Nuclear Information System (INIS)

    Tolan, T.L.

    1993-06-01

    Sandia National Laboratories is evaluating the feasibility of developing protective barrier system for the Waste Isolation Pilot Plant (WIPP) to thwart inadvertent human intrusion into this radioactive-waste disposal system for a period of 9,900 years after assumed loss of active institutional controls. The protective barrier system would be part of a series of enduring passive institutional controls whose long-term function will be to reduce the likelihood of inadvertent human activities (e.g., exploratory drilling for resources) that could disrupt the WIPP disposal system

  7. An international perspective on Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  8. Intrusive Images in Psychological Disorders

    Science.gov (United States)

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  9. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  10. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M.; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N.; Mazzoni, Elvis; Pappas, Ilias O.; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M. S.; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS. PMID:27994566

  11. Working memory and inhibitory control across the life span: Intrusion errors in the Reading Span Test.

    Science.gov (United States)

    Robert, Christelle; Borella, Erika; Fagot, Delphine; Lecerf, Thierry; de Ribaupierre, Anik

    2009-04-01

    The aim of this study was to examine to what extent inhibitory control and working memory capacity are related across the life span. Intrusion errors committed by children and younger and older adults were investigated in two versions of the Reading Span Test. In Experiment 1, a mixed Reading Span Test with items of various list lengths was administered. Older adults and children recalled fewer correct words and produced more intrusions than did young adults. Also, age-related differences were found in the type of intrusions committed. In Experiment 2, an adaptive Reading Span Test was administered, in which the list length of items was adapted to each individual's working memory capacity. Age groups differed neither on correct recall nor on the rate of intrusions, but they differed on the type of intrusions. Altogether, these findings indicate that the availability of attentional resources influences the efficiency of inhibition across the life span.

  12. Time to face it! Facebook intrusion and the implications for romantic jealousy and relationship satisfaction.

    Science.gov (United States)

    Elphinston, Rachel A; Noller, Patricia

    2011-11-01

    Young people's exposure to social network sites such as Facebook is increasing, along with the potential for such use to complicate romantic relationships. Yet, little is known about the overlaps between the online and offline worlds. We extended previous research by investigating the links between Facebook intrusion, jealousy in romantic relationships, and relationship outcomes in a sample of undergraduates currently in a romantic relationship. A Facebook Intrusion Questionnaire was developed based on key features of technological (behavioral) addictions. An eight-item Facebook Intrusion Questionnaire with a single-factor structure was supported; internal consistency was high. Facebook intrusion was linked to relationship dissatisfaction, via jealous cognitions and surveillance behaviors. The results highlight the possibility of high levels of Facebook intrusion spilling over into romantic relationships, resulting in problems such as jealousy and dissatisfaction. The results have implications for romantic relationships and for Facebook users in general.

  13. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS.

  14. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Directory of Open Access Journals (Sweden)

    Agata Błachnio

    2016-12-01

    Full Text Available The increase in the number of users of social networking sites has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2,628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Measure, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively and low context (positively; of the personality variables, conscientiousness and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of social networking sites (SNS.

  15. Intensively exploited Mediterranean aquifers: resilience and proximity to critical points of seawater intrusion

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2013-11-01

    We investigate here seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta Aquifer, the Israel Coastal Aquifer and the Cyprus Akrotiri Aquifer. Using a generalized analytical sharp-interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future sea intrusion forcings. We identify two different critical limits of sea intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete sea intrusion upto the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that sea intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that the advance of seawater currently seriously threatens the Nile Delta Aquifer and the Israel Coastal Aquifer. The Cyprus Akrotiri Aquifer is currently somewhat less threatened by increased seawater intrusion.

  16. Intensively exploited Mediterranean aquifers: resilience to seawater intrusion and proximity to critical thresholds

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2014-05-01

    We investigate seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta, Israel Coastal and Cyprus Akrotiri aquifers. Using a generalized analytical sharp interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future seawater intrusion forcings. We identify two different critical limits of seawater intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete seawater intrusion up to the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that seawater intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that (a) the intruding seawater currently seriously threatens the Nile Delta aquifer, (b) in the Israel Coastal aquifer the sharp interface toe approaches the well location and (c) the Cyprus Akrotiri aquifer is currently somewhat less threatened by increased seawater intrusion.

  17. Human intrusion: issues concerning its assessment

    International Nuclear Information System (INIS)

    Grimwood, P.D.; Smith, G.M.

    1989-01-01

    The potential significance of human intrusion in the performance assessment of radioactive waste repositories has been increasingly recognized in recent years. It is however an area of assessment in which subjective judgments dominate. This paper identifies some of the issues involved. These include regulatory criteria, scenario development, probability assignment, consequence assessment and measures to mitigate human intrusion

  18. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  19. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  20. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  1. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.

    Science.gov (United States)

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  2. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  3. Investigation of ultraviolet photolysis vapor generation with in-atomizer trapping graphite furnace atomic absorption spectrometry for the determination of mercury

    Energy Technology Data Exchange (ETDEWEB)

    Madden, Jeremy T. [Department of Chemistry, Biochemistry, and Physics, Marist College, 3399 North Road, Poughkeepsie, NY 12601 (United States); Fitzgerald, Neil [Department of Chemistry, Biochemistry, and Physics, Marist College, 3399 North Road, Poughkeepsie, NY 12601 (United States)], E-mail: neil.fitzgerald@marist.edu

    2009-09-15

    Generation of mercury vapor by ultraviolet irradiation of mercury solutions in low molecular weight organic acid solutions prior to measurement by Atomic Absorption Spectrometry is a cheap, simple and green method for determination of trace concentrations of mercury. In this work mercury vapor generated by ultraviolet photolysis was trapped onto a palladium coated graphite furnace significantly improving the detection limit of the method. The system was optimized and a detection limit of 0.12 {mu}g L{sup - 1} (compared to 2.1 {mu}g L{sup - 1} for a previously reported system in the absence of trapping) with a precision of 11% for a 10 {mu}g L{sup - 1} mercury standard (RSD, N = 5)

  4. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  5. Alpha intrusion on ovenight polysomnogram

    Directory of Open Access Journals (Sweden)

    Nahapetian R

    2014-06-01

    Full Text Available No abstract available. Article truncated after 150 words. A 30 year-old Army veteran with a past medical history significant for chronic lumbar back pain stemming from a fall-from-height injury sustained in 2006 was referred to the sleep laboratory for evaluation of chronic fatigue and excessive daytime hypersomnolence. His Epworth sleepiness scale score was 16. He denied a history of snoring and witnessed apnea. Body Mass Index (BMI was 25.7 kg/m2. His main sleep related complaints were frequent nocturnal arousals, poor sleep quality, un-refreshing sleep, prolonged latency to sleep onset, and nightmares. An In-lab attended diagnostic polysomnogram was performed. Sleep efficiency was reduced (73% and overall arousal index was not significantly elevated (3.2 events/hour. The sleep study showed rapid eye movement (REM related sleep disordered breathing that did not meet diagnostic criteria for sleep apnea. There was no evidence for period limb movement disorder. However, the study was significant for alpha wave intrusion in stage N2 non-REM and stage ...

  6. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  7. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  8. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    Part of the stakeholder consultation addressed strategies that media audiences are developing to cope with pressures and intrusions in a changing media environment, characterised by digitalisation and interactive possibilities. We interviewed ten stakeholders representing interests such as content...... production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...... no consensual motivation, nor any clear avenue for action. Therefore, we have analysed different discursive positions that prevent acknowledging or taking action upon the pressures and intrusions that we presented to these stakeholders. The discursive positions are outlined below....

  9. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  10. Prevention and analysis of hacker's intrusion

    International Nuclear Information System (INIS)

    Liu Baoxu; An Dehai; Xu Rongsheng

    2000-01-01

    The author analyzes the behavior characteristics and relevant technologies about the hacker's intrusion, and gives some corresponding solutions pertinently. To the recent events about hackers, the author gives detailed introduction and puts forward the relevant advice and valuable consideration

  11. A Lithium Vapor Box Divertor Similarity Experiment

    Science.gov (United States)

    Cohen, Robert A.; Emdee, Eric D.; Goldston, Robert J.; Jaworski, Michael A.; Schwartz, Jacob A.

    2017-10-01

    A lithium vapor box divertor offers an alternate means of managing the extreme power density of divertor plasmas by leveraging gaseous lithium to volumetrically extract power. The vapor box divertor is a baffled slot with liquid lithium coated walls held at temperatures which increase toward the divertor floor. The resulting vapor pressure differential drives gaseous lithium from hotter chambers into cooler ones, where the lithium condenses and returns. A similarity experiment was devised to investigate the advantages offered by a vapor box divertor design. We discuss the design, construction, and early findings of the vapor box divertor experiment including vapor can construction, power transfer calculations, joint integrity tests, and thermocouple data logging. Heat redistribution of an incident plasma-based heat flux from a typical linear plasma device is also presented. This work supported by DOE Contract No. DE-AC02-09CH11466 and The Princeton Environmental Institute.

  12. Intrusion problematic during water supply systems’ operation

    OpenAIRE

    Jesus Mora-Rodriguez, P. Amparo López-Jimenez, Helena M. Ramos

    2011-01-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuse...

  13. Mental Imagery and Posttraumatic Stress Disorder: a neuroimaging and experimental psychopathology approach to intrusive memories of trauma

    Directory of Open Access Journals (Sweden)

    Ian A Clark

    2015-07-01

    Full Text Available This hypothesis and theory paper presents a pragmatic framework to help bridge the clinical presentation and neuroscience of intrusive memories following psychological trauma. Intrusive memories are a hallmark symptom of Posttraumatic Stress Disorder. However, key questions, including those involving aetiology remain. In particular, we know little about the brain mechanisms involved in why only some moments of the trauma return as intrusive memories while others do not. We first present an overview of the patient experience of intrusive memories and the neuroimaging studies that have investigated intrusive memories in PTSD patients. Next, one mechanism of how to model intrusive memories in the laboratory, the trauma film paradigm, is examined. In particular, we focus on studies combining the trauma film paradigm with neuroimaging. Stemming from the clinical presentation and our current understanding of the processes involved in intrusive memories, we propose a framework in which an intrusive memory comprises five component parts; autobiographical (trauma memory, involuntary recall, negative emotions, attention hijacking and mental imagery. Each component part is considered in turn, both behaviourally and from a brain imaging perspective. A mapping of these five components onto our understanding of the brain is described. Unanswered questions that exist in our understanding of intrusive memories are considered using the proposed framework. Overall, we suggest that mental imagery is key to bridging the experience, memory and intrusive recollection of the traumatic event. Further, we suggest that by considering the brain mechanisms involved in the component parts of an intrusive memory, in particular mental imagery, we may be able to aid the development of a firmer bridge between patients’ experiences of intrusive memories and the clinical neuroscience behind them.

  14. Disclosure of negative intrusions : the relationship with thought-action fusion, shame, guilt and fear.

    OpenAIRE

    Wells-Britton, Kaighley; Simonds, Laura

    2017-01-01

    Background: Given their highly unacceptable nature, negative intrusions are likely to promote the experience of negative affect such as fear, shame and guilt. Moreover, moral thought-action fusion (believing that negative thinking is the equivalent of acting immorally) is likely to inflate the occurrence of negative affect when intrusions are experienced. In turn, negative affect is likely related to disclosure. The current study investigated whether thought-action fusion beliefs predict anti...

  15. The Sonju Lake layered intrusion, northeast Minnesota: Internal structure and emplacement history inferred from magnetic fabrics

    Science.gov (United States)

    Maes, S.M.; Tikoff, B.; Ferre, E.C.; Brown, P.E.; Miller, J.D.

    2007-01-01

    The Sonju Lake intrusion (SLI), in northeastern Minnesota, is a layered mafic complex of Keweenawan age (1096.1 ?? 0.8 Ma) related to the Midcontinent rift. The cumulate paragenesis of the intrusion is recognized as broadly similar to the Skaergaard intrusion, a classic example of closed-system differentiation of a tholeiitic mafic magma. The SLI represents nearly closed-system differentiation through bottom-up fractional crystallization. Geochemical studies have identified the presence of a stratabound, 50-100 m thick zone anomalously enriched in Au + PGE. Similar to the PGE reefs of the Skaergaard intrusion, this PGE-enriched zone is hosted within oxide gabbro cumulates, about two-third of the way up from the base of the intrusion. We present a petrofabric study using the anisotropy of magnetic susceptibility (AMS) to investigate the emplacement and flow patterns within the Sonju Lake intrusion. Petrographic and electron microprobe studies, combined with AMS and hysteresis measurements indicate the primary source of the magnetic signal is pseudo-single domain (PSD) magnetite or titanomagnetite. Low field AMS was measured at 32 sites within the Sonju Lake intrusion, which provided information about primary igneous fabrics. The magnetic fabrics in the layered series of the Sonju Lake intrusion are consistent with sub-horizontal to inclined emplacement of the intrusion and show evidence that the cumulate layers were deposited in a dynamic environment. Well-aligned magnetic lineations, consistently plunging shallowly toward the southwest, indicate the source of the magma is a vertical sill-like feeder, presumably located beneath the Finland granite. The Finland granite acted as a density trap for the Sonju Lake magmas, forcing lateral flow of magma to the northeast. The strongly oblate magnetic shape fabrics indicate the shallowly dipping planar fabrics were enhanced by compaction of the crystal mush. ?? 2007 Elsevier B.V. All rights reserved.

  16. Misuse and intrusion detection at Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1995-04-01

    An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in system audit records, in system vulnerability postures, and in other evidence found through active system testing. Since 1989 we have implemented a misuse and intrusion detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter, or NADIR. NADIR currently audits a Kerberos distributed authentication system, file activity on a mass, storage system, and four Cray supercomputers that run the UNICOS operating system. NADIR summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations, As NADIR is constantly evolving, this paper reports its development to date.

  17. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  18. Salinity intrusion modeling for Sungai Selangor

    International Nuclear Information System (INIS)

    Mohamed Roseli Zainal Abidin; Abd Jalil Hassan; Suriyani Awang; Liew Yuk San; Norbaya Hashim

    2006-01-01

    Salinity intrusion into estuary of the Sungai Selangor has been carried out on a hydrodynamic numerical modeling to access the parameter that governed the amount of salt in the river. Issues such as water pollution and extraction of water from Sungai Selangor system has been said to be the cause of fading fireflies. The berembang trees on the river bank that become the fireflies habitat need some amount of salt for proper growth. Living at the lower reaches of Sungai Selangor, the fireflies are affected not only by the activities in their vicinity, but by activities in the entire river basin. Rapid economic development in the basin and the strong demand for the water resources puts pressure on the ecosystem. This research has been carried out to investigate the effect of water extraction along Sungai Selangor towards altering the amount of salt content in the river. The hydrodynamic modeling with regards to the salt content is expected to support long term assessment that may affect the berembang trees as a result of changes in the flow from upstream because of the water abstraction activity for domestic water supply. (Author)

  19. Intrusion recognition for optic fiber vibration sensor based on the selective attention mechanism

    Science.gov (United States)

    Xu, Haiyan; Xie, Yingjuan; Li, Min; Zhang, Zhuo; Zhang, Xuewu

    2017-11-01

    Distributed fiber-optic vibration sensors receive extensive investigation and play a significant role in the sensor panorama. A fiber optic perimeter detection system based on all-fiber interferometric sensor is proposed, through the back-end analysis, processing and intelligent identification, which can distinguish effects of different intrusion activities. In this paper, an intrusion recognition based on the auditory selective attention mechanism is proposed. Firstly, considering the time-frequency of vibration, the spectrogram is calculated. Secondly, imitating the selective attention mechanism, the color, direction and brightness map of the spectrogram is computed. Based on these maps, the feature matrix is formed after normalization. The system could recognize the intrusion activities occurred along the perimeter sensors. Experiment results show that the proposed method for the perimeter is able to differentiate intrusion signals from ambient noises. What's more, the recognition rate of the system is improved while deduced the false alarm rate, the approach is proved by large practical experiment and project.

  20. Count out your intrusions: Effects of verbal encoding on intrusive memories

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.

    2009-01-01

    Peri-traumatic information processing is thought to affect the development of intrusive trauma memories. This study aimed to replicate and improve the study by Holmes, Brewin, and Hennessy (2004, Exp. 3) on the role of peri-traumatic verbal processing in analogue traumatic intrusion development.

  1. Respon Konsumen pada Mobile Advergames: Intrusiveness dan Irritation

    Directory of Open Access Journals (Sweden)

    Sony Kusumasondjaja

    2016-12-01

    Full Text Available Abstract. Increasing adoption of mobile advergames to deliver marketing messages has not been followed by empirical findings to support its effectiveness. This research attempts to examine the effect of mobile advergames intrusiveness on consumer irritation, attitudes, and purchase intention. This investigation on mobile advergame effectiveness was based on the increasing use of mobile media to deliver marketing messages to consumers from different demographic background. Conceptual framework was developed based on Advertising Avoidance Theory. For data collection, self-administered survey was conducted by adopting purposive sampling involving 213 respondents residing in Surabaya who have had experience in playing mobile game as respondents. Results indicate that intrusiveness positively affects consumer irritation. Consumer irritation negatively affects attitude towards the mobile advergames and attitude towards the advertised product. The better the consumer attitude towards the mobile advergames, the more positive the attitude towards the advertised product. Moreover, the more positive the attitude towards the advertised product, the greater the consumer intention to purchase. Interestingly, consumer attitude toward the mobile advergames has insignificant influence on purchase intention. Findings of the study offer significant contribution to marketing practices using mobile advergames as media placement in their advertising strategy. Keywords: intrusiveness, irritation, mobile advergames, attitude, advertising

  2. Kissing Bug ( spp. Intrusion into Homes: Troublesome Bites and Domiciliation

    Directory of Open Access Journals (Sweden)

    Stephen A. Klotz

    2016-01-01

    Full Text Available Kissing bugs ( Triatoma spp. frequently enter homes and bite human and pet occupants. Bites may lead to severe allergic reactions and, in some cases, death. Kissing bugs are also vectors of Trypanosoma cruzi , the cause of Chagas disease. In general, modern houses in the United States are not conducive to domiciliation of kissing bugs (bugs living out their entire life within the home with the presence of eggs, nymphs, adults, and exuviae. Construction features such as concrete foundations, solid walls and ceilings, window screens, tight thresholds for doors and windows, and other measures impede bug entry into homes, and air conditioning reduces the need for open doors and windows. Where Chagas disease is endemic in Mexico and Central and South America, homes often have thatch roofs, adobe walls, and open doors and windows. We investigated numerous instances of kissing bug intrusions into homes in Southern Arizona, California, and Louisiana and documented the reactions to kissing bug bites. Our work confirms the importance of modern home construction in limiting kissing bug intrusions. Older homes, especially those lacking modern screening, caulking, and weather stripping to reduce air leakage, may be subject to kissing bug intrusions and domiciliation. We describe a community in Southern Arizona where domiciliation of homes by Triatoma recurva is common. We also provide recent data regarding kissing bug bites and allergic reactions to the bites.

  3. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  4. Secondary Electrons from Water Vapor with the Impact of 6.0 MeV/u He2+ Ions: Atomic Data and their Application to Biomedical Investigations

    International Nuclear Information System (INIS)

    Sato, Y.; Soga, F.; Ohsawa, D.; Higashi, A.; Kawauchi, H.; Hirabayashi, M.; Okada, Y.; Uehara, S.; Nikjoo, H.

    2005-01-01

    We measured the energy and angular distributions (7 eV-10 keV and 20 degree sign -160 degree sign ) of secondary electrons produced in collisions of 6.0 MeV/u He2+ ions with water vapor. Binary-encounter collision peaks were clearly observed at the calculated energies at angles of 3keV. To assess the new cross sections, these values were incorporated in the kurbuc Monte-Carlo track structure code system for a simulation of secondary electrons. Radial dose distributions for 6.0 MeV/u He2+ ions were obtained by analyzing the tracks generated by the code kurbuc using the new DDCS values. In the core with a radius (r) of less than 1 nm, the dose is very high due mainly to excitation events, induced by low-energy electrons. The penumbra shows a well-known r-2 dependence

  5. Sill intrusion in volcanic calderas: implications for vent opening probability

    Science.gov (United States)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    depending on the model parameters) and then decreases over time during the intrusion. However, if we consider the effect of the cooling of magma, with the temperature which decreases with time and the viscosity that increases, we'll find that the stress in the rock above the sill gradually increases with time and becomes higher than in isothermal case. In order to investigate the role of the physical properties of magma and rock above the sill in the generation of the stress field we have carried out different simulations by varying the viscosity of magma and the rigidity of the rock and found that high viscosity magma produces a relatively high stress intensity, as well as a high rock rigidity does.

  6. Theoretical investigations on the fragmentation of drops of melt with respect to the description of thermal detonations (vapor explosions) and their application in the code Frademo

    International Nuclear Information System (INIS)

    Burger, M.; Carachalios, C.; Kim, D.S.; Unger, H.

    1986-01-01

    Vapor explosions caused by the contact of molten core material with coolant are an important issue within reactor safety analysis, because they could produce an early threat to the containment during a core melt accident. The case of steady-state propagation of a detonation wave through a coarse premixture of melt and coolant represents the most severe case of a large scale vapor explosion under reactor conditions with the highest rate and largest heat release and therefore also the highest yield of mechanical energy. The present contribution starts with the description of the integral model of the detonation wave. The fragmentation processes, which are decisive for these exchange terms and the detonation process as a whole, are dealt with also. Hydrodynamic fragmentation processes as well as a thermally induced one are considered. The processes which take place inside a detonation wave, especially the fragmentation of the drops of melt and the velocity equilibration between the melt and the coolant, determine the behavior of the wave. In the present model these processes are described within a three-phase approach, considering the drops of melt, the fragments and the coolant as separate flow phases. In the frame of this work, the computer code FRADEMO has been developed. It consists of an overall description of the processes inside a steady-state detonation wave in combination with a full description of the detailed models on hydrodynamic and thermal fragmentation presented in this report. Some useful information for the potential code user is given in the appendix of the detailed report also

  7. Use of GC/MS Analysis to Distinguish Between Vapor Intrusion and Indoor Sources of VOCs - Standardized Protocol for On-Site Evaluation of Vapor Intrusion

    Science.gov (United States)

    2014-07-01

    Testing a Sealed Crack in a Concrete Floor .................................................................. 14 Figure 5: VOC Responses to...Engineered Fluid Toluene Some paints and adhesives SprayPAK Enamel , Minwax Wood Finish Xylenes Adhesives, paints, gasoline Bonide Tree Sprays and...expansion joints, plumbing penetrations, or cracks . 3 Note that if indoor air concentrations are

  8. Evidential reasoning research on intrusion detection

    Science.gov (United States)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  9. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  10. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  11. Effect of winds and waves on salt intrusion in the Pearl River estuary

    Directory of Open Access Journals (Sweden)

    W. Gong

    2018-02-01

    Full Text Available Salt intrusion in the Pearl River estuary (PRE is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  12. Effect of winds and waves on salt intrusion in the Pearl River estuary

    Science.gov (United States)

    Gong, Wenping; Lin, Zhongyuan; Chen, Yunzhen; Chen, Zhaoyun; Zhang, Heng

    2018-02-01

    Salt intrusion in the Pearl River estuary (PRE) is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST) modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  13. Intrusive thoughts in obsessive-compulsive disorder and eating disorder patients: a differential analysis.

    Science.gov (United States)

    García-Soriano, Gemma; Roncero, Maria; Perpiñá, Conxa; Belloch, Amparo

    2014-05-01

    The present study aims to compare the unwanted intrusions experienced by obsessive-compulsive (OCD) and eating disorder (ED) patients, their appraisals, and their control strategies and analyse which variables predict the intrusions' disruption and emotional disturbance in each group. Seventy-nine OCD and 177 ED patients completed two equivalent self-reports designed to assess OCD-related and ED-related intrusions, their dysfunctional appraisals, and associated control strategies. OCD and ED patients experienced intrusions with comparable frequency and emotional disturbance, but OCD patients experienced greater disruption. Differences appeared between groups on some appraisals and control strategies. Intolerance to uncertainty (OCD group) and thought importance (ED group) predicted their respective emotional disturbance and disruption. Additionally, control importance (OCD group) and thought-action fusion moral (OCD and ED groups) predicted their emotional disturbance. OCD and ED share the presence of intrusions; however, different variables explain why they are disruptive and emotionally disturbing. Cognitive intrusions require further investigation as a transdiagnostic variable. Copyright © 2014 John Wiley & Sons, Ltd and Eating Disorders Association.

  14. Cultural syndromes and age moderate the emotional impact of illness intrusiveness in rheumatoid arthritis.

    Science.gov (United States)

    Devins, Gerald M; Gupta, Anita; Cameron, Jill; Woodend, Kirsten; Mah, Kenneth; Gladman, Dafna

    2009-02-01

    The authors investigated cultural syndromes (multidimensional vectors comprising culturally based attitudes, values, and beliefs) and age as moderators of the emotional impact of illness intrusiveness--illness-induced lifestyle disruptions--in rheumatoid arthritis (RA) and examined illness intrusiveness effects in total and separately for three life domains (relationships and personal development, intimacy, and instrumental). People with RA (n = 105) completed the Illness Intrusiveness Ratings, Individualism-Collectivism, and Center for Epidemiologic Studies--Depression scales in a one-on-one interview. Controlling for disease and background characteristics, the association between illness intrusiveness (total score and the Relationships and Personal Development subscale) and distress was inverse when young adults with RA endorsed high horizontal individualism. Illness intrusiveness into intimacy was associated with increased distress, and this intensified when respondents endorsed high vertical individualism, horizontal collectivism, vertical collectivism, or low horizontal individualism. The negative emotional impact of illness intrusiveness into intimacy diminished with increasing age. Given an aging and increasingly pluralistic society, diversity can no longer be ignored in addressing the psychosocial impact of chronic, disabling disease.

  15. Magmatic intrusions in the lunar crust

    Science.gov (United States)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  16. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  17. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  18. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  19. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  20. Fuel vapor pressure (FVAPRS)

    International Nuclear Information System (INIS)

    Mason, R.E.

    1979-04-01

    A subcode (FVAPRS) is described which calculates fuel vapor pressure. This subcode was developed as part of the fuel rod behavior modeling task performed at EG and G Idaho, Inc. The fuel vapor pressure subcode (FVAPRS), is presented and a discussion of literature data, steady state and transient fuel vapor pressure equations and estimates of the standard error of estimate to be expected with the FVAPRS subcode are included

  1. Investigation of the Behavioral Characteristics of Dogs Purpose-Bred and Prepared to Perform Vapor Wake® Detection of Person-Borne Explosives

    Directory of Open Access Journals (Sweden)

    Lucia Lazarowski

    2018-03-01

    Full Text Available Specialized detector dogs are increasingly being utilized for the detection of modern threats. The Vapor Wake® (VW dog was developed to create a dog phenotype ideally suited for detecting hand-carried and body-worn explosives. VW dogs (VWDs are trained to sample and alert to target odors in the aerodynamic wakes of moving persons, which entrains vapor and small particles from the person. The behavioral characteristics necessary for dogs to be successfully trained and employed for the application of VW are a distinct subset of the desired general characteristics of dogs used for detection tasks due to the dynamic nature of moving targets. The purpose of this study was to examine the behavioral characteristics of candidate detector dogs to determine the particular qualities that set apart VW-capable dogs from others. We assessed 146 candidate detector dogs from a VW breeding and training program. Dogs received identical puppy development and foundational odor training and underwent performance evaluations at 3, 6, 10, and 12 months old, after which they were sold for service. Dogs were categorized based on their final outcome of the training program, independently determined by private vendors, corresponding to three groups: dogs successfully sold for VW, dogs sold for standard explosives detection, and dogs that failed to be placed in any type of detector dog service (Washouts. Comparisons of behavioral evaluations between the groups were made across domains pertaining to search-related behaviors (Performance, reactions to novel stimuli (Environmental, and overall ease of learning new tasks (Trainability. Comparisons were also made at each evaluation to determine any early emergence of differences. VWDs scored significantly higher on Performance characteristics compared to standard explosives detection dogs (EDDs and Washouts. However, Environmental characteristics did not differentiate VWDs from EDDs, though scores on these measures were

  2. Investigation of the Behavioral Characteristics of Dogs Purpose-Bred and Prepared to Perform Vapor Wake® Detection of Person-Borne Explosives.

    Science.gov (United States)

    Lazarowski, Lucia; Haney, Pamela Sue; Brock, Jeanne; Fischer, Terry; Rogers, Bart; Angle, Craig; Katz, Jeffrey S; Waggoner, L Paul

    2018-01-01

    Specialized detector dogs are increasingly being utilized for the detection of modern threats. The Vapor Wake ® (VW) dog was developed to create a dog phenotype ideally suited for detecting hand-carried and body-worn explosives. VW dogs (VWDs) are trained to sample and alert to target odors in the aerodynamic wakes of moving persons, which entrains vapor and small particles from the person. The behavioral characteristics necessary for dogs to be successfully trained and employed for the application of VW are a distinct subset of the desired general characteristics of dogs used for detection tasks due to the dynamic nature of moving targets. The purpose of this study was to examine the behavioral characteristics of candidate detector dogs to determine the particular qualities that set apart VW-capable dogs from others. We assessed 146 candidate detector dogs from a VW breeding and training program. Dogs received identical puppy development and foundational odor training and underwent performance evaluations at 3, 6, 10, and 12 months old, after which they were sold for service. Dogs were categorized based on their final outcome of the training program, independently determined by private vendors, corresponding to three groups: dogs successfully sold for VW, dogs sold for standard explosives detection, and dogs that failed to be placed in any type of detector dog service (Washouts). Comparisons of behavioral evaluations between the groups were made across domains pertaining to search-related behaviors (Performance), reactions to novel stimuli (Environmental), and overall ease of learning new tasks (Trainability). Comparisons were also made at each evaluation to determine any early emergence of differences. VWDs scored significantly higher on Performance characteristics compared to standard explosives detection dogs (EDDs) and Washouts. However, Environmental characteristics did not differentiate VWDs from EDDs, though scores on these measures were significantly

  3. Contribution to uranium geochemistry in intrusive granites

    International Nuclear Information System (INIS)

    Coulomb, R.

    1959-01-01

    This work aims to define the position of a certain number of French granitic deposits within the field of the geochemistry of granites in general, and of the geochemistry of uranium in particular. The regions concerned are: - 3 French Hercynian ranges, in the Vendee, in Brittany and in the Morvan, - 1 African range, probably precambrian, of the Hoggar. For each range, the petrochemical framework is first of all determined and then the degree of chemical homogeneity of the rocks is evaluated. In the petrochemical groups thus obtained the geochemical behaviour of the uranium is studied. From a point of view of the geochemistry of the granites under investigation, a comparison of the laws of distribution of the major elements in the 4 ranges shows up a convergence of average composition which was not anticipated by geological and petrographic considerations alone. The statistical and geochemical distribution laws of the total uranium as a function of the petrochemical variations are established. A study of the chemical forms of uranium in the rocks has drawn an attention to the qualitative and quantitative importance of the fraction of this uranium soluble in dilute acids. We have therefore reconsidered on the one hand, the laws of distribution of the insoluble uranium, which represents essentially the uranium fixed in crystalline structures (zircon, allanite...), and we have justified on the other hand the interest presented by the soluble uranium: this, although more complex in character, presents a geochemical unity in post magmatic phenomena which makes possible to find a genetic connection between the uraniferous deposits and the intrusive massifs. Finally we have given a plan of the geochemical cycle of uranium, in which we hope to have provided some more accurate data on the igneous phase. (author) [fr

  4. Aspects of cold intrusions over Greece during autumn

    Science.gov (United States)

    Mita, Constantina; Marinaki, Aggeliki; Zeini, Konstantina; Konstantara, Metaxia

    2010-05-01

    This study is focused on the description of atmospheric disturbances that caused intense cold intrusions over Greece during autumn for a period of 25 years (1982-2006). The study was based on data analysis from the meteorological station network of the Hellenic National Meteorological Service (HNMS) and the European Centre for Medium Range Weather Forecasts (ECMWF). Initially, the days with temperature at the isobaric surface of 850 hPa less or equal to the mean temperature for the 10-day period the day under investigation belongs to are isolated, composing a new confined data set which was further used. An event of intense cold intrusion is identified based on a subjective set of criteria, considering the temperature decrease at the level of 850 hPa and its duration. In particular, the criteria that were used to identify a cold intrusion were: temperature variation between two successive days at the isobaric level of 850 hPa being equal or greater than 50 C at least once during the event and duration of the event of at least two successive days with continuous temperature decrease. Additionally, the synoptic analysis of the atmospheric disturbances involved using weather charts from ECMWF, revealed that all cases were related to low pressure systems at the level of 500 hPa, accompanied by cold air masses. Moreover, a methodology proposed to classify the cold intrusions based on general circulation characteristics of the atmosphere, resulted in seven major categories. More than half of the events belong in two categories, originated northwest of the greater Greek area (Greece and parts of neighbouring countries), between 400 and 600 N. Further analysis indicated that the frequency of events increases from September to November and the majority of the events lasted two to three days. Additionally, the non-parametric Mann-Kendall test was used for the investigation of the statistical significance of the trends appearing in the results. The tests revealed that over

  5. Investigation of thermal and hot-wire chemical vapor deposition copper thin films on TiN substrates using CupraSelect as precursor.

    Science.gov (United States)

    Papadimitropoulos, G; Davazoglou, D

    2011-09-01

    Copper films were deposited on oxidized Si substrates covered with TiN using a novel chemical vapor deposition reactor in which reactions were assisted by a heated tungsten filament (hot-wire CVD, HWCVD). Liquid at room temperature hexafluoroacetylacetonate Cu(I) trimethylvinylsilane (CupraSelect) was directly injected into the reactor with the aid of a direct-liquid injection (DLI) system using N2 as carrier gas. The deposition rates of HWCVD Cu films obtained on TiN covered substrates were found to increase with filament temperature (65 and 170 degrees C were tested). The resistivities of HWCVD Cu films were found to be higher than for thermally grown films due to the possible presence of impurities into the Cu films from the incomplete dissociation of the precursor and W impurities caused by the presence of the filament. For HWCVD films grown at a filament temperature of 170 degrees C, smaller grains are formed than at 65 degrees C as shown from the taken SEM micrographs. XRD diffractograms taken on Cu films deposited on TiN could not reveal the presence of W compounds originating from the filament because the relative peak was masked by the TiN [112] peak.

  6. An NPT Monte Carlo Molecular Simulation-Based Approach to Investigate Solid-Vapor Equilibrium: Application to Elemental Sulfur-H2S System

    KAUST Repository

    Kadoura, Ahmad Salim

    2013-06-01

    In this work, a method to estimate solid elemental sulfur solubility in pure and gas mixtures using Monte Carlo (MC) molecular simulation is proposed. This method is based on Isobaric-Isothermal (NPT) ensemble and the Widom insertion technique for the gas phase and a continuum model for the solid phase. This method avoids the difficulty of having to deal with high rejection rates that are usually encountered when simulating using Gibbs ensemble. The application of this method is tested with a system made of pure hydrogen sulfide gas (H2S) and solid elemental sulfur. However, this technique may be used for other solid-vapor systems provided the fugacity of the solid phase is known (e.g., through experimental work). Given solid fugacity at the desired pressure and temperature, the mole fraction of the solid dissolved in gas that would be in chemical equilibrium with the solid phase might be obtained. In other words a set of MC molecular simulation experiments is conducted on a single box given the pressure and temperature and for different mole fractions of the solute. The fugacity of the gas mixture is determined using the Widom insertion method and is compared with that predetermined for the solid phase until one finds the mole fraction which achieves the required fugacity. In this work, several examples of MC have been conducted and compared with experimental data. The Lennard-Jones parameters related to the sulfur molecule model (ɛ, σ) have been optimized to achieve better match with the experimental work.

  7. Investigation of deposition characteristics and properties of high-rate deposited silicon nitride films prepared by atmospheric pressure plasma chemical vapor deposition

    International Nuclear Information System (INIS)

    Kakiuchi, H.; Nakahama, Y.; Ohmi, H.; Yasutake, K.; Yoshii, K.; Mori, Y.

    2005-01-01

    Silicon nitride (SiN x ) films have been prepared at extremely high deposition rates by the atmospheric pressure plasma chemical vapor deposition (AP-PCVD) technique on Si(001) wafers from gas mixtures containing He, H 2 , SiH 4 and N 2 or NH 3 . A 150 MHz very high frequency (VHF) power supply was used to generate high-density radicals in the atmospheric pressure plasma. Deposition rate, composition and morphology of the SiN x films prepared with various deposition parameters were studied by scanning electron microscopy and Auger electron spectroscopy. Fourier transformation infrared (FTIR) absorption spectroscopy was also used to characterize the structure and the chemical bonding configurations of the films. Furthermore, etching rate with buffered hydrofluoric acid (BHF) solution, refractive index and capacitance-voltage (C-V) characteristics were measured to evaluate the dielectric properties of the films. It was found that effective passivation of dangling bonds and elimination of excessive hydrogen atoms at the film-growing surface seemed to be the most important factor to form SiN x film with a dense Si-N network. The C-V curve of the optimized film showed good interface properties, although further improvement was necessary for use in the industrial metal-insulator-semiconductor (MIS) applications

  8. Wave Induced Saline Intrusion in Sea Outfalls

    DEFF Research Database (Denmark)

    Larsen, Torben; Burrows, Richard

    1989-01-01

    Experimental and numerical studies have shown that the influence of wave increases the tendency of saline intrusion in multi-riser sea outfalls. The flow field in the diffusor under such unsteady and inhomogeneous circumstances is in general very complex, but when sufficient wave energy is dissip...

  9. Work Zone Intrusion Report Interface Design

    Science.gov (United States)

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  10. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  11. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  12. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  13. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    Seawater intrusion; coastal aquifers; density-dependent flow and ... The seawater intrusion mechanism in coastal aquifers generally causes the occurrence of ... (4) The dynamic viscosity of the fluid does not change with respect to salinity and.

  14. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  15. Physical model for vaporization

    OpenAIRE

    Garai, Jozsef

    2006-01-01

    Based on two assumptions, the surface layer is flexible, and the internal energy of the latent heat of vaporization is completely utilized by the atoms for overcoming on the surface resistance of the liquid, the enthalpy of vaporization was calculated for 45 elements. The theoretical values were tested against experiments with positive result.

  16. Experimental and theoretical investigations about the vaporization of laser-produced aerosols and individual particles inside inductively-coupled plasmas — Implications for the extraction efficiency of ions prior to mass spectrometry

    International Nuclear Information System (INIS)

    Flamigni, Luca; Koch, Joachim; Günther, Detlef

    2012-01-01

    Current quantification capabilities of laser ablation inductively-coupled plasma mass spectrometry (LA-ICP-MS) are known to be restricted by elemental fractionation as a result of LA-, transport-, and ICP-induced effects which, particularly, may provoke inaccuracies whenever calibration strategies on the basis of non-matrix matched standard materials are applied. The present study is dealing with the role of ICP in this complex scenario. Therefore, the vaporization process of laser-produced aerosols and subsequent diffusion losses occurring inside ICP sources were investigated using 2-D optical emission spectrometry (OES) and ICP-quadrupole (Q)MS of individual particles. For instance, Na- and Ca-specific OES of aerosols produced by LA of silicate glasses or metals revealed axial shifts in the onset and maximum position of atomic emission which were in the range of a few millimeters. The occurrence of these shifts was found to arise from composition-dependent particle/aerosol penetration depths, i.e. the displacement of axial vaporization starting points controlling the ion extraction efficiency through the ICP-MS vacuum interface due to a delayed, diffusion-driven expansion of oxidic vs. metallic aerosols. Furthermore, ICP-QMS of individual particles resulted in 1/e half-value signal durations of approximately 100 μs, which complies with modeled values if OES maxima are assumed to coincide with positions of instantaneous vaporization and starting points for atomic diffusion. To prove phenomena observed for their consistency, in addition, “ab initio” as well as semi-empirical simulations of particle/aerosol penetration depths followed by diffusion-driven expansion was accomplished indicating differences of up to 15% in the relative ion extraction efficiency depending on whether analytes are supplied as metals or oxides. Implications of these findings on the accuracy achievable by state-of-the-art LA-ICP-MS systems are outlined. - Highlights: ► Specification

  17. Non-intrusive load characterization of an airfoil using PIV

    Energy Technology Data Exchange (ETDEWEB)

    Oudheusden, B.W. van; Scarano, F.; Casimiri, E.W.F. [Dept. of Aerospace Engineering, Delft Univ. of Tech., Delft (Netherlands)

    2006-06-15

    An assessment is made of the feasibility of using PIV velocity data for the non-intrusive aerodynamic force characterization (lift, drag and pitching moment) of an airfoil. The method relies upon the application of control-volume approaches in combination with the deduction of the pressure from the PIV experimental data, by making use of the momentum equation. First, the consistency of the method is verified by means of synthetic data obtained from CFD. Subsequently, the procedure was applied in an experimental investigation, in which the PIV approach is validated against standard pressure-based methods (surface pressure distribution and wake rake). (orig.)

  18. Intrusive trauma memory: A review and functional analysis

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.; Holmes, E.A.

    2009-01-01

    Our contribution to this special issue focuses on the phenomenon of intrusive trauma memory. While intrusive trauma memories can undoubtedly cause impairment, we argue that they may exist for a potentially adaptive reason. Theory and experimental research on intrusion development are reviewed and

  19. Fracturing of doleritic intrusions and associated contact zones: Implications for fluid flow in volcanic basins

    Science.gov (United States)

    Senger, Kim; Buckley, Simon J.; Chevallier, Luc; Fagereng, Åke; Galland, Olivier; Kurz, Tobias H.; Ogata, Kei; Planke, Sverre; Tveranger, Jan

    2015-02-01

    Igneous intrusions act as both carriers and barriers to subsurface fluid flow and are therefore expected to significantly influence the distribution and migration of groundwater and hydrocarbons in volcanic basins. Given the low matrix permeability of igneous rocks, the effective permeability in- and around intrusions is intimately linked to the characteristics of their associated fracture networks. Natural fracturing is caused by numerous processes including magma cooling, thermal contraction, magma emplacement and mechanical disturbance of the host rock. Fracturing may be locally enhanced along intrusion-host rock interfaces, at dyke-sill junctions, or at the base of curving sills, thereby potentially enhancing permeability associated with these features. In order to improve our understanding of fractures associated with intrusive bodies emplaced in sedimentary host rocks, we have investigated a series of outcrops from the Karoo Basin of the Eastern Cape province of South Africa, where the siliciclastic Burgersdorp Formation has been intruded by various intrusions (thin dykes, mid-sized sheet intrusions and thick sills) belonging to the Karoo dolerite. We present a quantified analysis of fracturing in- and around these igneous intrusions based on five outcrops at three individual study sites, utilizing a combination of field data, high-resolution lidar virtual outcrop models and image processing. Our results show a significant difference between the three sites in terms of fracture orientation. The observed differences can be attributed to contrasting intrusion geometries, outcrop geometry (for lidar data) and tectonic setting. Two main fracture sets were identified in the dolerite at two of the sites, oriented parallel and perpendicular to the contact respectively. Fracture spacing was consistent between the three sites, and exhibits a higher degree of variation in the dolerites compared to the host rock. At one of the study sites, fracture frequency in the

  20. Piezoelectric trace vapor calibrator

    International Nuclear Information System (INIS)

    Verkouteren, R. Michael; Gillen, Greg; Taylor, David W.

    2006-01-01

    The design and performance of a vapor generator for calibration and testing of trace chemical sensors are described. The device utilizes piezoelectric ink-jet nozzles to dispense and vaporize precisely known amounts of analyte solutions as monodisperse droplets onto a hot ceramic surface, where the generated vapors are mixed with air before exiting the device. Injected droplets are monitored by microscope with strobed illumination, and the reproducibility of droplet volumes is optimized by adjustment of piezoelectric wave form parameters. Complete vaporization of the droplets occurs only across a 10 deg. C window within the transition boiling regime of the solvent, and the minimum and maximum rates of trace analyte that may be injected and evaporated are determined by thermodynamic principles and empirical observations of droplet formation and stability. By varying solution concentrations, droplet injection rates, air flow, and the number of active nozzles, the system is designed to deliver--on demand--continuous vapor concentrations across more than six orders of magnitude (nominally 290 fg/l to 1.05 μg/l). Vapor pulses containing femtogram to microgram quantities of analyte may also be generated. Calibrated ranges of three explosive vapors at ng/l levels were generated by the device and directly measured by ion mobility spectrometry (IMS). These data demonstrate expected linear trends within the limited working range of the IMS detector and also exhibit subtle nonlinear behavior from the IMS measurement process

  1. Metal Vapor Arcing Risk Assessment Tool

    Science.gov (United States)

    Hill, Monika C.; Leidecker, Henning W.

    2010-01-01

    The Tin Whisker Metal Vapor Arcing Risk Assessment Tool has been designed to evaluate the risk of metal vapor arcing and to help facilitate a decision toward a researched risk disposition. Users can evaluate a system without having to open up the hardware. This process allows for investigating components at risk rather than spending time and money analyzing every component. The tool points to a risk level and provides direction for appropriate action and documentation.

  2. Improvements to vapor generators

    International Nuclear Information System (INIS)

    Keller, Arthur; Monroe, Neil.

    1976-01-01

    A supporting system is proposed for vapor generators of the 'supported' type. Said supporting system is intended to compensate the disparities of thermal expansion due to the differences in the vertical dimensions of the tubes in the walls of the combustion chamber and their collectors compared to that of the balloon tanks and the connecting tube clusters of vaporization, the first one being longer than the second ones. Said system makes it possible to build said combustion chamber higher than the balloon tanks and the tube clusters of vaporization. The capacity of steam production is thus enhanced [fr

  3. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  4. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  5. Multilayer Statistical Intrusion Detection in Wireless Networks

    Science.gov (United States)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  6. Distributed fiber optic moisture intrusion sensing system

    Science.gov (United States)

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  7. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  8. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    Sulfide intrusion in seagrasses represents a global threat to seagrasses and thereby an important parameter in resilience of seagrass ecosystems. In contrast seegrasses colonize and grow in hostile sediments, where they are constantly exposed to invasion of toxic gaseous sulfide. Remarkably little...... strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis, tracing sulfur compounds combined with ecosystem parameters we found different spatial, intraspecific and interspecific strategies to cope with sulfidic sediments. 1...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  9. The role of human intrusion in the dutch safety study

    International Nuclear Information System (INIS)

    Prij, J.; Weers, A.W.v.; Glasbergen, P.; Slot, A.F.M.

    1989-01-01

    In the Netherlands the OPLA research program in which a large number of possible disposal concepts for radioactive waste is investigated has been carried out recently. The disposal concepts concern three different waste strategies, two disposal techiques and three different types of salt formations. In the OPLA program the post-closure safety of the disposal concepts has been investigated. The paper reviews the role of the human intrusion in this safety study. The hydrological consequences of human activities in the underground are discussed and it has been demonstrated that these effects could be taken into account during the groundwater transport calculations. Four different scenario's for human intrusion in the repository have been studied to obtain an indication of the radiological effects. The results show that extremely high doses may result if, after several hundred years, human beings come into direct contact with highly active waste. For the final assessment the probability that the doses will be received should be calculated. This should be done in a subsequent research

  10. WIPP performance assessment: impacts of human intrusion

    International Nuclear Information System (INIS)

    Anderson, D.R.; Hunter, R.L.; Bertram-Howery, S.G.; Lappin, A.R.

    1989-01-01

    The Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico is a research and development facility that may become the USA's first and only mined geologic repository for transuranic waste. Human intrusion into the WIPP repository after closure has been shown by preliminary sensitivity analyses and calculations of consequences to be an important, and perhaps the most important, factor in long-term repository performance

  11. AMDIS Case Conference: Intrusive Medication Safety Alerts.

    Science.gov (United States)

    Graham, J; Levick, D; Schreiber, R

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center's dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  12. AMDIS Case Conference: Intrusive Medication Safety Alerts

    OpenAIRE

    Graham, J.; Levick, D.; Schreiber, R.

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center’s dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  13. INTRUSIVE MARKETING METHODS A CONTEMPORARY CONSUMER PERSPECTIVE

    OpenAIRE

    Owais, Faizan

    2008-01-01

    Is marketing practice destroying the faith of consumers? It may be argued that marketing practice over recent years has taken a more direct approach that appears intrusive and manipulative to consumers. The marketing activities we see today are a desperate attempt to grab consumer attention in any way possible and it is all spelling out bad news for marketing. Marketers have been faced with many challenges, with markets at saturation point, competitiveness is on the rise and marketers are...

  14. Stochastic Tools for Network Intrusion Detection

    OpenAIRE

    Yu, Lu; Brooks, Richard R.

    2017-01-01

    With the rapid development of Internet and the sharp increase of network crime, network security has become very important and received a lot of attention. We model security issues as stochastic systems. This allows us to find weaknesses in existing security systems and propose new solutions. Exploring the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantages of the system weaknesses. We propose a hybrid network security scheme including intrusion detecti...

  15. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  16. Gasoline Reid Vapor Pressure

    Science.gov (United States)

    EPA regulates the vapor pressure of gasoline sold at retail stations during the summer ozone season to reduce evaporative emissions from gasoline that contribute to ground-level ozone and diminish the effects of ozone-related health problems.

  17. Dimers in nucleating vapors

    Science.gov (United States)

    Lushnikov, A. A.; Kulmala, M.

    1998-09-01

    The dimer stage of nucleation may affect considerably the rate of the nucleation process at high supersaturation of the nucleating vapor. Assuming that the dimer formation limits the nucleation rate, the kinetics of the particle formation-growth process is studied starting with the definition of dimers as bound states of two associating molecules. The partition function of dimer states is calculated by summing the Boltzmann factor over all classical bound states, and the equilibrium population of dimers is found for two types of intermolecular forces: the Lennard-Jones (LJ) and rectangular well+hard core (RW) potentials. The principle of detailed balance is used for calculating the evaporation rate of dimers. The kinetics of the particle formation-growth process is then investigated under the assumption that the trimers are stable with respect to evaporation and that the condensation rate is a power function of the particle mass. If the power exponent λ=n/(n+1) (n is a non-negative integer), the kinetics of the process is described by a finite set of moments of particle mass distribution. When the characteristic time of the particle formation by nucleation is much shorter than that of the condensational growth, n+2 universal functions of a nondimensional time define the kinetic process. These functions are calculated for λ=2/3 (gas-to-particle conversion in the free molecular regime) and λ=1/2 (formation of islands on surfaces).

  18. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  19. Wireless sensing without sensors—an experimental study of motion/intrusion detection using RF irregularity

    International Nuclear Information System (INIS)

    Lee, Pius W Q; Tan, Hwee-Pink; Seah, Winston K G; Yao, Zexi

    2010-01-01

    Motion and intrusion detection are often cited as wireless sensor network (WSN) applications with typical configurations comprising clusters of wireless nodes equipped with motion sensors to detect human motion. Currently, WSN performance is subjected to several constraints, namely radio irregularity and finite on-board computation/energy resources. Radio irregularity in radio frequency (RF) propagation rises to a higher level in the presence of human activity due to the absorption effect of the human body. In this paper, we investigate the feasibility of monitoring RF transmission for the purpose of intrusion detection through experimentation. With empirical data obtained from the Crossbow TelosB platform in several different environments, the impact of human activity on the signal strength of RF signals in a WSN is evaluated. We then propose a novel approach to intrusion detection by turning a constraint in WSN, namely radio irregularity, into an advantage for the purpose of intrusion detection, using signal fluctuations to detect the presence of human activity within the WSN. Unlike RF fingerprinting, the 'intruders' here neither transmit nor receive any RF signals. By enabling existing wireless infrastructures to serve as intrusion detectors instead of deploying numerous costly sensors, this approach shows great promise for providing novel solutions

  20. Free to love? The role of intrusive parenting for young adult children's romantic relationship quality.

    Science.gov (United States)

    Parise, Miriam; Manzi, Claudia; Donato, Silvia; Iafrate, Raffaella

    2017-01-01

    Intrusive parenting is a form of boundary disturbance in the parent-child relationship which has been consistently associated with children's maladjustment. The present study examines the role of intrusive parenting for young adult children's romantic relationship quality. Relying on data from a two-wave longitudinal study among young couples in transition to marriage in Italy, we investigated the link between young adults' perceived intrusive parenting and change in their romantic relationship quality from 6 months before marriage to 18 months after marriage, as well as the mediating role of change in the capacity to include the partner in the self. Data were analyzed using actor-partner interdependence modeling. Perceived intrusive parenting negatively predicted change in inclusion of the other in the self and change in romantic relationship quality for both partners. For females, change in their capacity of inclusion of the other in the self fully mediated the association between their perceived intrusive parenting and change in their own and partner's relationship quality. Limitations and implications for practice are discussed.

  1. Computer Game Play Reduces Intrusive Memories of Experimental Trauma via Reconsolidation-Update Mechanisms.

    Science.gov (United States)

    James, Ella L; Bonsall, Michael B; Hoppitt, Laura; Tunbridge, Elizabeth M; Geddes, John R; Milton, Amy L; Holmes, Emily A

    2015-08-01

    Memory of a traumatic event becomes consolidated within hours. Intrusive memories can then flash back repeatedly into the mind's eye and cause distress. We investigated whether reconsolidation-the process during which memories become malleable when recalled-can be blocked using a cognitive task and whether such an approach can reduce these unbidden intrusions. We predicted that reconsolidation of a reactivated visual memory of experimental trauma could be disrupted by engaging in a visuospatial task that would compete for visual working memory resources. We showed that intrusive memories were virtually abolished by playing the computer game Tetris following a memory-reactivation task 24 hr after initial exposure to experimental trauma. Furthermore, both memory reactivation and playing Tetris were required to reduce subsequent intrusions (Experiment 2), consistent with reconsolidation-update mechanisms. A simple, noninvasive cognitive-task procedure administered after emotional memory has already consolidated (i.e., > 24 hours after exposure to experimental trauma) may prevent the recurrence of intrusive memories of those emotional events. © The Author(s) 2015.

  2. Individual differences in spatial configuration learning predict the occurrence of intrusive memories.

    Science.gov (United States)

    Meyer, Thomas; Smeets, Tom; Giesbrecht, Timo; Quaedflieg, Conny W E M; Girardelli, Marta M; Mackay, Georgina R N; Merckelbach, Harald

    2013-03-01

    The dual-representation model of posttraumatic stress disorder (PTSD; Brewin, Gregory, Lipton, & Burgess, Psychological Review, 117, 210-232 2010) argues that intrusions occur when people fail to construct context-based representations during adverse experiences. The present study tested a specific prediction flowing from this model. In particular, we investigated whether the efficiency of temporal-lobe-based spatial configuration learning would account for individual differences in intrusive experiences and physiological reactivity in the laboratory. Participants (N = 82) completed the contextual cuing paradigm, which assesses spatial configuration learning that is believed to depend on associative encoding in the parahippocampus. They were then shown a trauma film. Afterward, startle responses were quantified during presentation of trauma reminder pictures versus unrelated neutral and emotional pictures. PTSD symptoms were recorded in the week following participation. Better configuration learning performance was associated with fewer perceptual intrusions, r = -.33, p .46) and had no direct effect on intrusion-related distress and overall PTSD symptoms, rs > -.12, ps > .29. However, configuration learning performance tended to be associated with reduced physiological responses to unrelated negative images, r = -.20, p = .07. Thus, while spatial configuration learning appears to be unrelated to affective responding to trauma reminders, our overall findings support the idea that the context-based memory system helps to reduce intrusions.

  3. Experimental Study of Nuclear Security System Components for Achieving the Intrusion Process via Sensor's Network System

    International Nuclear Information System (INIS)

    EL-Kafas, A.A.

    2011-01-01

    Cluster sensors are one of nuclear security system components which are used to detect any intrusion process of the nuclear sites. In this work, an experimental measuring test for sensor performance and procedures are presented. Sensor performance testing performed to determine whether a particular sensor will be acceptable in a proposed design. We have access to a sensors test field in which the sensor of interest is already properly installed and the parameters have been set to optimal levels by preliminary testing. The glass-breakage (G.B) and open door (O.D) sensors construction, operation and design for the investigated nuclear site are explained. Intrusion tests were carried out inside the field areas of the sensors to evaluate the sensor performance during the intrusion process. Experimental trials were performed for achieving the intrusion process via sensor network system. The performance and intrusion senses of cluster sensors inside the internal zones was recorded and evaluated. The obtained results explained that the tested and experimented G.B sensors have a probability of detection P (D) value 65% founded, and 80% P (D) of Open-door sensor

  4. Internet use, Facebook intrusion, and depression: Results of a cross-sectional study.

    Science.gov (United States)

    Błachnio, A; Przepiórka, A; Pantic, I

    2015-09-01

    Facebook has become a very popular social networking platform today, particularly among adolescents and young adults, profoundly changing the way they communicate and interact. However, some reports have indicated that excessive Facebook use might have detrimental effects on mental health and be associated with certain psychological problems. Because previous findings on the relationship between Facebook addiction and depression were not unambiguous, further investigation was required. The main objective of our study was to examine the potential associations between Internet use, depression, and Facebook intrusion. A total of 672 Facebook users took part in the cross-sectional study. The Facebook Intrusion Questionnaire and the Center for Epidemiologic Studies Depression Scale were used. For collecting the data, the snowball sampling procedure was used. We showed that depression can be a predictor of Facebook intrusion. Our results provides additional evidence that daily Internet use time in minutes, gender, and age are also predictors of Facebook intrusion: that Facebook intrusion can be predicted by being male, young age, and an extensive number of minutes spent online. On the basis of this study, it is possible to conclude that there are certain demographic - variables, such as age, gender, or time spent online - that may help in outlining the profile of a user who may be in danger of becoming addicted to Facebook. This piece of knowledge may serve for prevention purposes. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  5. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    Science.gov (United States)

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  6. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungwon Lee

    2009-05-01

    Full Text Available TheIP-based Ubiquitous Sensor Network (IP-USN is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System called RIDES (Robust Intrusion DEtection System for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  7. Acute effects of alcohol on intrusive memory development and viewpoint dependence in spatial memory support a dual representation model.

    Science.gov (United States)

    Bisby, James A; King, John A; Brewin, Chris R; Burgess, Neil; Curran, H Valerie

    2010-08-01

    A dual representation model of intrusive memory proposes that personally experienced events give rise to two types of representation: an image-based, egocentric representation based on sensory-perceptual features; and a more abstract, allocentric representation that incorporates spatiotemporal context. The model proposes that intrusions reflect involuntary reactivation of egocentric representations in the absence of a corresponding allocentric representation. We tested the model by investigating the effect of alcohol on intrusive memories and, concurrently, on egocentric and allocentric spatial memory. With a double-blind independent group design participants were administered alcohol (.4 or .8 g/kg) or placebo. A virtual environment was used to present objects and test recognition memory from the same viewpoint as presentation (tapping egocentric memory) or a shifted viewpoint (tapping allocentric memory). Participants were also exposed to a trauma video and required to detail intrusive memories for 7 days, after which explicit memory was assessed. There was a selective impairment of shifted-view recognition after the low dose of alcohol, whereas the high dose induced a global impairment in same-view and shifted-view conditions. Alcohol showed a dose-dependent inverted "U"-shaped effect on intrusions, with only the low dose increasing the number of intrusions, replicating previous work. When same-view recognition was intact, decrements in shifted-view recognition were associated with increases in intrusions. The differential effect of alcohol on intrusive memories and on same/shifted-view recognition support a dual representation model in which intrusions might reflect an imbalance between two types of memory representation. These findings highlight important clinical implications, given alcohol's involvement in real-life trauma. Copyright 2010 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.

  8. Engineering evaluation of intrusion prevention strategies for single-shell tanks

    International Nuclear Information System (INIS)

    Jenkins, C.E.

    1994-01-01

    In this study, previously implemented actions to prevent liquid intrusion into out-of-service single-shell tanks (SSTs), i.e., interim isolation or partial interim isolation, are investigated and expanded to identify additional cost-effective intrusion prevention techniques that could be reasonably taken until SSTs are ready for waste retrieval. Possible precipitation, groundwater, and condensation pathways and internal tank connections that could provide possible pathways for liquids are examined. Techniques to block identified potential pathways are developed and costed to determine the potential benefit to costed trade-offs for implementing the techniques. (Note: Surveillance data show increased waste surface levels for several SSTs that indicate possible liquid intrusion despite interim isolation activities.)

  9. assessment of Seawater Intrusion in Concrete by Measuring Chlorine Concentration

    International Nuclear Information System (INIS)

    Abdel-Monem, A.M.; Kansouh, W.A.; Osman, A.M.; Bashter, I.I.

    2011-01-01

    The object of this work is to measure water intrusion in concrete using a new methodology based on neutron activation technique. The applied method depends on measuring the activated gamma energy lines emitted from 38 Cl using a gamma spectrometer with Ge(Li) and HPGe detectors. Concrete samples with different percentages of silica fume (SF), up to 20 % submerged in seawater for different period of time were used to perform the investigation. Samples of concrete taken from different positions along the direction of water intrusion in concrete block were irradiated by thermal neutrons using the irradiation cell of 252 Cf neutron source and one of the vertical channels of search reactor at Delft University. The measured 38 Cl concentrations of the irradiated samples were used to plot groups of water profiles distribution in concrete samples with different SF % and submerged in seawater for different periods. These profiles were compared with the others which use here measured by neutron back emitted method where a satisfactory agreement was observed between the two. Further, the displayed measured results; show that the diffusivity for all water contents decreases with increasing the silica fume percentage up to 15 %. However, for concrete samples with silica fume 20 % the observed phenomenon is reversed due to the deterioration of concrete physical and mechanical properties

  10. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D. L.; Michlich, B. J.

    2000-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute nuclear technology and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested

  11. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D.L.; Micklich, B.J.

    2001-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute 'nuclear technology' and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested. (author)

  12. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  13. Ellipsometric investigation of nitrogen doped diamond thin films grown in microwave CH{sub 4}/H{sub 2}/N{sub 2} plasma enhanced chemical vapor deposition

    Energy Technology Data Exchange (ETDEWEB)

    Ficek, Mateusz, E-mail: rbogdan@eti.pg.gda.pl [Department of Metrology and Optoelectronics, Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology, 11/12 G. Narutowicza St., 80-233 Gdansk (Poland); Institute for Materials Research (IMO), Hasselt University, Wetenschapspark 1, B-3590 Diepenbeek (Belgium); Sankaran, Kamatchi J.; Haenen, Ken [Institute for Materials Research (IMO), Hasselt University, Wetenschapspark 1, B-3590 Diepenbeek (Belgium); IMOMEC, IMEC vzw, Wetenschapspark 1, B-3590 Diepenbeek (Belgium); Ryl, Jacek; Darowicki, Kazimierz [Department of Electrochemistry, Corrosion and Material Engineering, Gdansk University of Technology, 11/12 Narutowicza St., 80-233 Gdansk (Poland); Bogdanowicz, Robert [Department of Metrology and Optoelectronics, Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology, 11/12 G. Narutowicza St., 80-233 Gdansk (Poland); Materials and Process Simulation Center, California Institute of Technology, Pasadena, California 91125 (United States); Lin, I-Nan [Department of Physics, Tamkang University, Tamsui 251, Taiwan (China)

    2016-06-13

    The influence of N{sub 2} concentration (1%–8%) in CH{sub 4}/H{sub 2}/N{sub 2} plasma on structure and optical properties of nitrogen doped diamond (NDD) films was investigated. Thickness, roughness, and optical properties of the NDD films in the VIS–NIR range were investigated on the silicon substrates using spectroscopic ellipsometry. The samples exhibited relatively high refractive index (2.6 ± 0.25 at 550 nm) and extinction coefficient (0.05 ± 0.02 at 550 nm) with a transmittance of 60%. The optical investigation was supported by the molecular and atomic data delivered by Raman studies, bright field transmission electron microscopy imaging, and X-ray photoelectron spectroscopy diagnostics. Those results revealed that while the films grown in CH{sub 4}/H{sub 2} plasma contained micron-sized diamond grains, the films grown using CH{sub 4}/H{sub 2}/(4%)N{sub 2} plasma exhibited ultranano-sized diamond grains along with n-diamond and i-carbon clusters, which were surrounded by amorphous carbon grain boundaries.

  14. Correlating intrusion detection alerts on bot malware infections using neural network

    DEFF Research Database (Denmark)

    Kidmose, Egon; Stevanovic, Matija; Pedersen, Jens Myrup

    2016-01-01

    Millions of computers are infected with bot malware, form botnets and enable botmaster to perform malicious and criminal activities. Intrusion Detection Systems are deployed to detect infections, but they raise many correlated alerts for each infection, requiring a large manual investigation effort...

  15. Cybersecurity managing systems, conducting testing, and investigating intrusions

    CERN Document Server

    Mowbray, Thomas J

    2013-01-01

    A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a usef

  16. Thutmose - Investigation of Machine Learning-Based Intrusion Detection Systems

    Science.gov (United States)

    2016-06-01

    monitoring. This analyzed payload is within the application layer of the OSI model . The analysis tries to establish whether or not the payload is...24 3.2.5 Model Drift Experiments...ADVERSARIAL ENVIRONMENTS (SPIE DSS 2014) .................................................. 58 APPENDIX C - EVALUATING MODEL DRIFT IN MACHINE LEARNING

  17. What's the Deal with Methane at LUST Spill Sites? Part 2: Vapor Intrusion

    Science.gov (United States)

    This article is specifically intended to discuss methane produced from releases of ethanol and gasoline-ethanol mixtures. There may be other sources of methane at a site, including leaks of natural gas or methane produced from the natural decay of buried plant tissues or from the...

  18. Improved Assessment Strategies for Vapor Intrusion Passive Samplers and Building Pressure Control

    Science.gov (United States)

    2013-09-01

    contains an adsorbent medium surrounded by a stainless steel mesh. The outer cylinder is made up of microporous -sintered polyethylene through which the...inside the tube. The adsorbent is analyzed by thermal desorption, GC/MS or flame ionization detection (ATD/GC/MS&FID), as appropriate. International ...ambient, and workplace air is described in international standard EN ISO 16017-2 ( International Organization for Standardization, ISO, 2003). This

  19. Application of Advanced Sensor Technology to DoD Soil Vapor Intrusion Problems

    Science.gov (United States)

    2012-10-01

    Technical material contained in this report has been approved for public release. Mention of trade names or commercial products in this...found in a number of common household products (Agency for Toxic Substances and Disease Registry [ATSDR], 1997; Colorado Department of Public Health and...benzene, TCE, tetrachloroethylene (PCE), ethylbenzene and meta (m)-xylene, as well as several of their response patterns. a) b

  20. Vapor pressures and enthalpies of vaporization of azides

    International Nuclear Information System (INIS)

    Verevkin, Sergey P.; Emel'yanenko, Vladimir N.; Algarra, Manuel; Manuel Lopez-Romero, J.; Aguiar, Fabio; Enrique Rodriguez-Borges, J.; Esteves da Silva, Joaquim C.G.

    2011-01-01

    Highlights: → We prepared and measured vapor pressures and vaporization enthalpies of 7 azides. → We examined consistency of new and available in the literature data. → Data for geminal azides and azido-alkanes selected for thermochemical calculations. - Abstract: Vapor pressures of some azides have been determined by the transpiration method. The molar enthalpies of vaporization Δ l g H m of these compounds were derived from the temperature dependencies of vapor pressures. The measured data sets were successfully checked for internal consistency by comparison with vaporization enthalpies of similarly structured compounds.

  1. Experimental investigation of heavy water vapor viscosity at 100-5000C and (0.08-1,3).105n/m2

    International Nuclear Information System (INIS)

    Timrot, D.L.; Serednitskaya, M.A.; Bespalov, M.S.

    1974-01-01

    The heavy water steam viscosity is measured at a facility used earlier to measure steam viscosity of a conventional water. The measurements are performed by a relative method. The maximum relative error of the experiment is as low as 0.35%. The viscosity isotherm slope in the P-diagram is obtained with an accuracy of 0.1% which is connected with the exclusion of the systematic error in the calibration of the facility, and the error of reference to a given temperature. The viscosity is investigated on five isotherms from 100 to 500 0 C. It appeared possible to describe the viscosity of heavy and conventional water in the temperature range studied by a unified relationship: Mosup(D 2 O)=αMosup(H 2 ))+β

  2. Geophysical characterization from Itu intrusive suite

    International Nuclear Information System (INIS)

    Pascholati, M.E.

    1989-01-01

    The integrated use of geophysical, geological, geochemical, petrographical and remote sensing data resulted in a substantial increase in the knowledge of the Itu Intrusive Suite. The main geophysical method was gamma-ray spectrometry together with fluorimetry and autoradiography. Three methods were used for calculation of laboratory gamma-ray spectrometry data. For U, the regression method was the best one. For K and Th, equations system and absolute calibration presented the best results. Surface gamma-ray spectrometry allowed comparison with laboratory data and permitted important contribution to the study of environmental radiation. (author)

  3. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and...

  4. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  5. Introduction to gravity currents and intrusions

    CERN Document Server

    Ungarish, Marius

    2009-01-01

    The whole book is well written in a clear and pedagogical general style. … the author has, in my opinion, produced the first comprehensive book entirely devoted to the modeling of gravity currents and intrusions. This book will be particularly useful to graduate and PhD students, as well as to academics and research engineers working in this field. It may be used as a self-consistent document to get a detailed idea of the state of knowledge about a given problem or a guide toward more specialized papers. It is rich with ideas regarding the direction in which further research is warranted. This

  6. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  7. Late Neoproterozoic layered mafic intrusion of arc-affinity in the Arabian-Nubian Shield: A case study from the Shahira layered mafic intrusion, southern Sinai, Egypt

    Energy Technology Data Exchange (ETDEWEB)

    Azer, M.K.; Obeid, M.A.; Gahalan, H.A.

    2016-07-01

    The Shahira Layered Mafic Intrusion (SLMI), which belongs to the late Neoproterozoic plutonic rocks of the Arabian-Nubian Shield, is the largest layered mafic intrusion in southern Sinai. Field relations indicate that it is younger than the surrounding metamorphic rocks and older than the post-orogenic granites. Based on variation in mineral paragenesis and chemical composition, the SLMI is distinguished into pyroxene-hornblende gabbro, hornblende gabbro and diorite lithologies. The outer zone of the mafic intrusion is characterized by fine-grained rocks (chilled margin gabbroic facies), with typical subophitic and/or microgranular textures. Different rock units from the mafic intrusion show gradational boundaries in between. They show some indications of low grade metamorphism, where primary minerals are transformed into secondary ones. Geochemically, the Shahira layered mafic intrusion is characterized by enrichment in LILE relative to HFSE (e.g. Nb, P, Zr, Ti, Y), and LREE relative to HREE [(La/Lu)n= 4.75–8.58], with subalkaline characters. It has geochemical characteristics of pre-collisional arc-type environment. The geochemical signature of the investigated gabbros indicates partial melting of mantle wedge in a volcanic-arc setting, being followed by fractional crystallization and crustal contamination. Fractional crystallization processes played a vital role during emplacement of the Shahira intrusion and evolution of its mafic and intermediate rock units. The initial magma was evolved through crystallization of hornblende which was caused by slight increasing of H2O in the magma after crystallization of liquidus olivine, pyroxene and Ca-rich plagioclase. The gabbroic rocks crystallized at pressures between 4.5 and 6.9kbar (~15–20km depth). Whereas, the diorites yielded the lowest crystallization pressure between 1.0 to 4.4Kbar (<10km depth). Temperature was estimated by several geothermometers, which yielded crystallization temperatures ranging from 835

  8. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    OpenAIRE

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumben...

  9. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  10. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    Science.gov (United States)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    We will present a detailed microstructural and geochemical study of reactive liquid flow in Unit 9 of the Rum Eastern Layered Intrusion. In the study region, Unit 9 comprises an underlying lens-like body of peridotite overlain by a sequence of troctolite and gabbro (termed allivalite), with some local and minor anorthosite. The troctolite is separated from the overlying gabbro by a distinct, sub-horizontal, undulose horizon (the major wavy horizon). Higher in the stratigraphy is another, similar, horizon (the minor wavy horizon) that separates relatively clinopyroxene-poor gabbro from an overlying gabbro. To the north of the peridotite lens, both troctolite and gabbro grade into poikilitic gabbro. Clinopyroxene habit in the allivalite varies from thin rims around olivine in troctolite, to equigranular crystals in gabbro, to oikocrysts in the poikilitic gabbro. The poikilitic gabbros contain multiple generations of clinopyroxene, with Cr-rich (~1.1 wt.% Cr2O3), anhedral cores with moderate REE concentrations (core1) overgrown by an anhedral REE-depleted second generation with moderate Cr (~0.7 wt.% Cr2O3) (core2). These composite cores are rimmed by Cr-poor (~0.2 wt.% Cr2O3) and REE-poor to moderate clinopyroxene. We interpret these microstructures as a consequence of two separate episodes of partial melting triggered by the intrusion of hot olivine-phyric picrite to form the discontinuous lenses that comprise the Unit 9 peridotite. Loss of clinopyroxene-saturated partial melt from the lower part of the allivalite immediately following the early stages of sill intrusion resulted in the formation of clinopyroxene-poor gabbro. The spatial extent of clinopyroxene loss is marked by the minor wavy horizon. A further partial melting event stripped out almost all clinopyroxene from the lowest allivalite, to form a troctolite, with the major wavy horizon marking the extent of melting during this second episode. The poikilitic gabbro formed from clinopyroxene-saturated melt

  11. A new intrusion prevention model using planning knowledge graph

    Science.gov (United States)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  12. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  13. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  14. Multi-User Low Intrusive Occupancy Detection

    Directory of Open Access Journals (Sweden)

    Azkario Rizky Pratama

    2018-03-01

    Full Text Available Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS of BLE (Bluetooth Low Energy nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach.

  15. Investigation of cavitating flows by X-ray and optical imaging

    Science.gov (United States)

    Coutier-Delgosha, Olivier; Fuzier, Sylvie; Khlifa, Ilyass; Fezzaa, Kamel

    2015-11-01

    Hydrodynamic cavitation is the partial vaporization of high speed liquid flows. The turbulent, compressible and unsteady character of these flows makes their study unusually complex and challenging. Instabilities generated by the occurrence of cavitation have been investigated in the last years in the LML laboratory by various non-intrusive measurements including X-ray imaging (to obtain the fields of void fraction and velocity in both phases), and PIV with fluorescent particles (to obtain the velocity fields in both phases). It has been shown that cavitation is characterized by significant slip velocities between liquid and vapor, especially in the re-entrant jet area and the cavity wake. This results suggests some possible improvements in the numerical models currently used for CFD of cavitating flows. Professor at Arts et Metiers ParisTech, Director of the LML laboratory.

  16. A study on the intrusion model by physical modeling

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jung Yul; Kim, Yoo Sung; Hyun, Hye Ja [Korea Inst. of Geology Mining and Materials, Taejon (Korea, Republic of)

    1995-12-01

    In physical modeling, the actual phenomena of seismic wave propagation are directly measured like field survey and furthermore the structure and physical properties of subsurface can be known. So the measured datasets from physical modeling can be very desirable as input data to test the efficiency of various inversion algorithms. An underground structure formed by intrusion, which can be often seen in seismic section for oil exploration, is investigated by physical modeling. The model is characterized by various types of layer boundaries with steep dip angle. Therefore, this physical modeling data are very available not only to interpret seismic sections for oil exploration as a case history, but also to develop data processing techniques and estimate the capability of software such as migration, full waveform inversion. (author). 5 refs., 18 figs.

  17. Vapor liquid fraction determination

    International Nuclear Information System (INIS)

    1980-01-01

    This invention describes a method of measuring liquid and vapor fractions in a non-homogeneous fluid flowing through an elongate conduit, such as may be required with boiling water, non-boiling turbulent flows, fluidized bed experiments, water-gas mixing analysis, and nuclear plant cooling. (UK)

  18. Heat of vaporization spectrometer

    International Nuclear Information System (INIS)

    Edwards, D. Jr.

    1978-01-01

    Multilayer desorption measurements of various substances adsorbed on a stainless steel substrate are found to exhibit desorption profiles consistent with a zeroth order desorption model. The singleness of the desorption transients together with their narrow peak widths makes the technique ideally suited for a heat of vaporization spectrometer for either substance analysis or identification

  19. Enthalpy of Vaporization and Vapor Pressures: An Inexpensive Apparatus

    Science.gov (United States)

    Battino, Rubin; Dolson, David A.; Hall, Michael A.; Letcher, Trevor M.

    2007-01-01

    A simple and inexpensive method to determine the enthalpy of vaporization of liquids by measuring vapor pressure as a function of temperature is described. The vapor pressures measured with the stopcock cell were higher than the literature values and those measured with the sidearm rubber septum cell were both higher and lower than literature…

  20. Tank 241-C-111 headspace gas and vapor sample results - August 1993 samples

    International Nuclear Information System (INIS)

    Huckaby, J.L.

    1994-01-01

    Tank 241-C-111 is on the ferrocyanide Watch List. Gas and vapor samples were collected to assure safe conditions before planned intrusive work was performed. Sample analyses showed that hydrogen is about ten times higher in the tank headspace than in ambient air. Nitrous oxide is about sixty times higher than ambient levels. The hydrogen cyanide concentration was below 0.04 ppbv, and the average NO x concentration was 8.6 ppmv

  1. Salt Intrusion in the Tweed Estuary

    Science.gov (United States)

    Uncles, R. J.; Stephens, J. A.

    1996-09-01

    Results are presented from a 2-week field programme in the Tweed Estuary, U.K. Maximum values of the empirically based Estuarine Richardson Number, Ri E, occurred during neap tides, and minimum values occurred during spring tides. Estimated values of Ri Evaried between 0·3 and 2·3, suggesting the occurrence of partially mixed to stratified conditions, depending on tidal state and freshwater inflow. These relatively large values of Ri Ewere consistent with both observed strong salinity stratification and large salt fluxes due to vertical shear transport. Low values (0·5) values in the halocline. A velocity maximum occurred within the halocline during the early flood. Wave-like spatial oscillations of the halocline occurred on the ebb. The oscillation troughs were situated above deep holes located just down-estuary of the rail and old road bridges. There was an indication that the constricted flow between the bridges' arches resulted in enhanced mixing of near-surface waters and a thickening of the halocline. It is also possible that these wave-like structures were stationary, near-critical internal lee waves, triggered by the deep holes. Trapping of high-salinity waters occurred on the ebb. Saline pools were isolated within a deep hole or deeper section of bed by the falling halocline. When the salt wedge moved further down-estuary, the ' trapped ' waters were subjected to strongly ebbing, overlying freshwater, and were subsequently entrained and flushed. The salinity intrusion was a strong function of spring-neap tidal state and a weaker function of freshwater inflow. The estimated salinity intrusion varied from about 4·7 to 7·6 km during the fieldwork period. The strong dependence on tidal range followed from the comparable lengths of the tidal excursion and salinity intrusion. Long excursion lengths were also partly responsible for the short residence (or flushing) times and their strong dependence on spring-neap tidal state. For typical summer freshwater

  2. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  3. An ontology-based intrusion patterns classification system | Shonubi ...

    African Journals Online (AJOL)

    Studies have shown that computer intrusions have been on the increase in recent times. Many techniques and patterns are being used by intruders to gain access to data on host computer networks. In this work, intrusion patterns were identified and classified and inherent knowledge were represented using an ontology of ...

  4. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  5. An evaluation of classification algorithms for intrusion detection ...

    African Journals Online (AJOL)

    An evaluation of classification algorithms for intrusion detection. ... Log in or Register to get access to full text downloads. ... Most of the available IDSs use all the 41 features in the network to evaluate and search for intrusive pattern in which ...

  6. Intrusive Memories of Distressing Information: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Eva Battaglini

    Full Text Available Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42 viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13 demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13. Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC and dorsolateral prefrontal cortex (dlPFC, inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories.

  7. Thermal History and Crystallinity of Sheet Intrusions

    Science.gov (United States)

    Whittington, A. G.; Nabelek, P. I.; Hofmeister, A.

    2011-12-01

    Magma emplaced in a sheet intrusion has two potential fates: to crystallize, or quench to glass. Rapidly chilled sheet margins are typically glassy or microcrystalline, while interiors are coarser-grained. The actual textures result from a combination of thermal history and crystallization kinetics, which are related by various feedback mechanisms. The thermal history of cooling sheet intrusions is often approximated using the analytical solution for a semi-infinite half-space, which uses constant thermal properties such as heat capacity (CP), thermal diffusivity (D) and thermal conductivity (k = DρCP), where ρ is density. In reality, both CP and D are strongly T-dependent for glasses and crystals, and melts have higher CP and lower D than crystals or glasses. Another first-order feature ignored in the analytical solution is latent heat of crystallization (ΔHxt), which can be implemented numerically as extra heat capacity over the crystallization interval. For rhyolite melts, D is ~0.5 mm2s-1 and k is ~1.5 Wm-1K-1, which are similar to those of major crustal rock types and granitic protoliths at magmatic temperatures, suggesting that changes in thermal properties accompanying partial melting of the crust should be relatively minor. Numerical models of hot (~920°C liquidus for 0.5 wt.% H2O) shallow rhyolite intrusions indicate that the key difference in thermal history between bodies that quench to obsidian, and those that crystallize, results from the release of latent heat of crystallization, which enables bodies that crystallize to remain at high temperatures for much longer times. The time to solidification is similar in both cases, however, because solidification requires cooling through the glass transition (Tg ~620°C) in the first case, and cooling only to the solidus (~770°C) in the second. For basaltic melts, D is ~0.3 mm2s-1 and k is ~1.0 Wm-1K-1, compared to ~0.6 mm2s-1 and 2.5 Wm-1K-1 for crystalline basalt or peridotite at magmatic temperatures

  8. Stress, intrusive imagery, and chronic distress

    International Nuclear Information System (INIS)

    Baum, A.

    1990-01-01

    Discusses the nature of stress in the context of problems with its definition and sources of confusion regarding its usefulness and specificity. Stress can be defined as a negative emotional experience accompanied by predictable biochemical, physiological, and behavioral changes that are directed toward adaptation either by manipulating the situation to alter the stressor or by accommodating its effects. Chronic stress is more complex than most definitions suggest and is clearly not limited to situations in which stressors persist for long periods of time. Responses may habituate before a stressor disappears or may persist long beyond the physical presence of the stressor. This latter case, in which chronic stress and associated biobehavioral changes outlast their original cause, is considered in light of research at Three Mile Island and among Vietnam veterans. The role of intrusive images of the stressor or uncontrollable thoughts about it in maintaining stress is explored

  9. Metallogenic aspects of Itu intrusive suite

    International Nuclear Information System (INIS)

    Amaral, G.; Pascholati, E.M.

    1990-01-01

    The integrated use of geological, geochemical, geophysical and remote sensing data is providing interesting new information on the metallogenic characteristics of the Itu Intrusive Suite. During World War II, up to 1959, a wolframite deposit was mined near the border of the northernmost body (Itupeva Granite). This deposit is formed by greisen veins associated with cassiterite and topaz, clearly linked with later phases of magmatic differentiation. Generally those veins are related to hydrothermal alteration of the granites and the above mentioned shear zone. U, Th and K determinations by field and laboratory gammaspectrometry were used for regional distribution analysis of those elements and its ratios and calculation of radioactivity heat production. In this aspects, the Itupeva Granite is the hottest and presents several anomalies in the Th/U ratio, indicative of late or post magmatic oxidation processes. (author)

  10. Vapor pressure and enthalpy of vaporization of linear aliphatic alkanediamines

    International Nuclear Information System (INIS)

    Pozdeev, Vasiliy A.; Verevkin, Sergey P.

    2011-01-01

    Highlights: → We measured vapor pressure of diamines H 2 N-(CH 2 ) n -NH 2 with n = 3 to 12. → Vaporization enthalpies at 298 K were derived. → We examined consistency of new and available in the literature data. → Enthalpies of vaporization show linear dependence on numbers n. → Enthalpies of vaporization correlate linearly with Kovat's indices. - Abstract: Vapor pressures and the molar enthalpies of vaporization of the linear aliphatic alkanediamines H 2 N-(CH 2 ) n -NH 2 with n = (3 to 12) have been determined using the transpiration method. A linear correlation of enthalpies of vaporization (at T = 298.15 K) of the alkanediamines with the number n and with the Kovat's indices has been found, proving the internal consistency of the measured data.

  11. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  12. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  13. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  14. A Machine Learning Based Intrusion Impact Analysis Scheme for Clouds

    Directory of Open Access Journals (Sweden)

    Junaid Arshad

    2012-01-01

    Full Text Available Clouds represent a major paradigm shift, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of on demand expandable computing infrastructures. However, Clouds introduce novel security challenges which need to be addressed to facilitate widespread adoption. This paper is focused on one such challenge - intrusion impact analysis. In particular, we highlight the significance of intrusion impact analysis for the overall security of Clouds. Additionally, we present a machine learning based scheme to address this challenge in accordance with the specific requirements of Clouds for intrusion impact analysis. We also present rigorous evaluation performed to assess the effectiveness and feasibility of the proposed method to address this challenge for Clouds. The evaluation results demonstrate high degree of effectiveness to correctly determine the impact of an intrusion along with significant reduction with respect to the intrusion response time.

  15. Executive functions in adolescents with spina bifida: relations with autonomy development and parental intrusiveness.

    Science.gov (United States)

    Tuminello, Elizabeth R; Holmbeck, Grayson N; Olson, Rick

    2012-01-01

    The current study was part of a larger longitudinal investigation and examined the relation of parent-report and performance measures of executive functioning (EF) with measures of behavioral and emotional autonomy and parental intrusiveness in adolescents with and without spina bifida (SB; n=65 in a comparison sample and 61 in an SB sample; M age=14.55, SD=0.63). For both groups, higher levels of parent-reported EF problems predicted higher levels of observed child dependency and lower levels of teacher-reported intrinsic motivation. Higher scores on performance EF measures predicted lower levels of observed child dependency and observed maternal intrusiveness for both groups. In adolescents with SB only, higher performance EF scores predicted higher intrinsic motivation and emotional autonomy from both mother and father and predicted lower levels of observed paternal intrusiveness. While causal conclusions cannot be drawn, EFs appear to be closely related to autonomy development and parental intrusiveness, particularly for adolescents with SB. These results suggest that the inclusion of EF training in interventions targeting adolescents with SB may be beneficial for autonomy development.

  16. A methodological framework to assess the environmental and economic effects of injection barriers against seawater intrusion.

    Science.gov (United States)

    Siarkos, Ilias; Latinopoulos, Dionysis; Mallios, Zisis; Latinopoulos, Pericles

    2017-05-15

    Seawater intrusion is responsible for the progressive deterioration of groundwater quality in numerous coastal aquifers worldwide. As a consequence, seawater intrusion may constitute a serious threat to local groundwater resources, as well as to the regional economy of coastal areas. To alleviate these negative effects, a number of well-designed protective measures could be implemented. The implementation of these measures is usually associated with significant benefits for the environment and the local economy. In this perspective, the present study investigates the particular case of constructing injection barriers for controlling seawater intrusion by developing a methodological framework that combines numerical modeling with spatial and cost-benefit analyses. To this task, we introduce a novel approach, which considers the socio-economic aspects of seawater intrusion in the modeling procedure, and at the same time focuses on the spatial and temporal relationships between water salinity and farmers' income. To test the proposed methodology two alternative artificial recharge scenarios - with different volumes of water used for injection - are assessed. According to the results of this analysis, both scenarios are likely to have a positive impact on groundwater quality, as well as, a net economic benefit to local society. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Forecasting deflation, intrusion and eruption at inflating volcanoes

    Science.gov (United States)

    Blake, Stephen; Cortés, Joaquín A.

    2018-01-01

    A principal goal of volcanology is to successfully forecast the start of volcanic eruptions. This paper introduces a general forecasting method, which relies on a stream of monitoring data and a statistical description of a given threshold criterion for an eruption to start. Specifically we investigate the timing of intrusive and eruptive events at inflating volcanoes. The gradual inflation of the ground surface is a well-known phenomenon at many volcanoes and is attributable to pressurised magma accumulating within a shallow chamber. Inflation usually culminates in a rapid deflation event caused by magma escaping from the chamber to produce a shallow intrusion and, in some cases, a volcanic eruption. We show that the ground elevation during 15 inflation periods at Krafla volcano, Iceland, increased with time towards a limiting value by following a decaying exponential with characteristic timescale τ. The available data for Krafla, Kilauea and Mauna Loa volcanoes show that the duration of inflation (t*) is approximately equal to τ. The distribution of t* / τ values follows a log-logistic distribution in which the central 60% of the data lie between 0.99 deflation event starting during a specified time interval to be estimated. The time window in which there is a specified probability of deflation starting can also be forecast, and forecasts can be updated after each new deformation measurement. The method provides stronger forecasts than one based on the distribution of repose times alone and is transferable to other types of monitoring data and/or other patterns of pre-eruptive unrest.

  18. Laser vapor phase deposition of semiconductors

    Energy Technology Data Exchange (ETDEWEB)

    Karlov, N.V.; Luk' ianchuk, B.S.; Sisakian, E.V.; Shafeev, G.A.

    1987-06-01

    The pyrolytic effect of IR laser radiation is investigated with reference to the initiation and control of the vapor phase deposition of semiconductor films. By selecting the gas mixture composition and laser emission parameters, it is possible to control the deposition and crystal formation processes on the surface of semiconductors, with the main control action achieved due to the nonadiabatic kinetics of reactions in the gas phase and high temperatures in the laser heating zone. This control mechanism is demonstrated experimentally during the laser vapor deposition of germanium and silicon films from tetrachlorides on single-crystal Si and Ge substrates. 5 references.

  19. Fractional condensation of biomass pyrolysis vapors

    NARCIS (Netherlands)

    Westerhof, Roel Johannes Maria; Brilman, Derk Willem Frederik; Garcia Perez, M.; Wang, Zhouhong; Oudenhoven, Stijn; van Swaaij, Willibrordus Petrus Maria; Kersten, Sascha R.A.

    2011-01-01

    In this paper, we have investigated the possibilities to steer the composition and, thus, the quality of pyrolysis liquids by the reactor temperature and the pyrolysis vapor condenser temperature. Pine wood was pyrolyzed in a 1 kg/h fluidized-bed pyrolysis reactor operated at 330 or 480 °C. The

  20. Constrained Vapor Bubble Experiment

    Science.gov (United States)

    Gokhale, Shripad; Plawsky, Joel; Wayner, Peter C., Jr.; Zheng, Ling; Wang, Ying-Xi

    2002-11-01

    Microgravity experiments on the Constrained Vapor Bubble Heat Exchanger, CVB, are being developed for the International Space Station. In particular, we present results of a precursory experimental and theoretical study of the vertical Constrained Vapor Bubble in the Earth's environment. A novel non-isothermal experimental setup was designed and built to study the transport processes in an ethanol/quartz vertical CVB system. Temperature profiles were measured using an in situ PC (personal computer)-based LabView data acquisition system via thermocouples. Film thickness profiles were measured using interferometry. A theoretical model was developed to predict the curvature profile of the stable film in the evaporator. The concept of the total amount of evaporation, which can be obtained directly by integrating the experimental temperature profile, was introduced. Experimentally measured curvature profiles are in good agreement with modeling results. For microgravity conditions, an analytical expression, which reveals an inherent relation between temperature and curvature profiles, was derived.

  1. Numerical modeling of a vaporizing multicomponent droplet

    Science.gov (United States)

    Megaridis, C. M.; Sirignano, W. A.

    The fundamental processes governing the energy, mass, and momentum exchange between the liquid and gas phases of vaporizing, multicomponent liquid droplets have been investigated. The axisymmetric configuration under consideration consists of an isolated multicomponent droplet vaporizing in a convective environment. The model considers different volatilities of the liquid components, variable liquid properties due to variation of the species concentrations, and non-Fickian multicomponent gaseous diffusion. The bicomponent droplet model was employed to examine the commonly used assumptions of unity Lewis number in the liquid phase and Fickian gaseous diffusion. It is found that the droplet drag coefficients, the vaporization rates, and the related transfer numbers are not influenced by the above assumptions in a significant way.

  2. Vapor condensation device

    International Nuclear Information System (INIS)

    Sakurai, Manabu; Hirayama, Fumio; Kurosawa, Setsumi; Yoshikawa, Jun; Hosaka, Seiichi.

    1992-01-01

    The present invention enables to separate and remove 14 C as CO 3 - ions without condensation in a vapor condensation can of a nuclear facility. That is, the vapor condensation device of the nuclear facility comprises (1) a spray pipe for spraying an acidic aqueous solution to the evaporation surface of an evaporation section, (2) a spray pump for sending the acidic aqueous solution to the spray pipe, (3) a tank for storing the acidic aqueous solution, (4) a pH sensor for detecting pH of the evaporation section, (5) a pH control section for controlling the spray pump, depending on the result of the detection of the pH sensor. With such a constitution, the pH of liquid wastes on the vaporization surface is controlled to 7 by spraying an aqueous solution of dilute sulfuric acid to the evaporation surface, thereby enabling to increase the transfer rate of 14 C to condensates to 60 to 70%. If 14 C is separated and removed as a CO 2 gas from the evaporation surface, the pH of the liquid wastes returns to the alkaline range of 9 to 10 and the liquid wastes are returned to a heating section. The amount of spraying the aqueous solution of dilute sulfuric acid can be controlled till the pH is reduced to 5. (I.S.)

  3. The vapor pressures of explosives

    Energy Technology Data Exchange (ETDEWEB)

    Ewing, Robert G.; Waltman, Melanie J.; Atkinson, David A.; Grate, Jay W.; Hotchkiss, Peter

    2013-01-05

    The vapor pressures of many explosive compounds are extremely low and thus determining accurate values proves difficult. Many researchers, using a variety of methods, have measured and reported the vapor pressures of explosives compounds at single temperatures, or as a function of temperature using vapor pressure equations. There are large variations in reported vapor pressures for many of these compounds, and some errors exist within individual papers. This article provides a review of explosive vapor pressures and describes the methods used to determine them. We have compiled primary vapor pressure relationships traceable to the original citations and include the temperature ranges for which they have been determined. Corrected values are reported as needed and described in the text. In addition, after critically examining the available data, we calculate and tabulate vapor pressures at 25 °C.

  4. VAPOR PRESSURES AND HEATS OF VAPORIZATION OF PRIMARY COAL TARS

    Energy Technology Data Exchange (ETDEWEB)

    Eric M. Suuberg; Vahur Oja

    1997-07-01

    This project had as its main focus the determination of vapor pressures of coal pyrolysis tars. It involved performing measurements of these vapor pressures and from them, developing vapor pressure correlations suitable for use in advanced pyrolysis models (those models which explicitly account for mass transport limitations). This report is divided into five main chapters. Each chapter is a relatively stand-alone section. Chapter A reviews the general nature of coal tars and gives a summary of existing vapor pressure correlations for coal tars and model compounds. Chapter B summarizes the main experimental approaches for coal tar preparation and characterization which have been used throughout the project. Chapter C is concerned with the selection of the model compounds for coal pyrolysis tars and reviews the data available to us on the vapor pressures of high boiling point aromatic compounds. This chapter also deals with the question of identifying factors that govern the vapor pressures of coal tar model materials and their mixtures. Chapter D covers the vapor pressures and heats of vaporization of primary cellulose tars. Chapter E discusses the results of the main focus of this study. In summary, this work provides improved understanding of the volatility of coal and cellulose pyrolysis tars. It has resulted in new experimentally verified vapor pressure correlations for use in pyrolysis models. Further research on this topic should aim at developing general vapor pressure correlations for all coal tars, based on their molecular weight together with certain specific chemical characteristics i.e. hydroxyl group content.

  5. Large-scale circulation associated with moisture intrusions into the Arctic during winter

    Science.gov (United States)

    Woods, Cian; Caballero, Rodrigo; Svensson, Gunilla

    2014-05-01

    Observations during recent decades show that there is a greater near surface warming occurring in the Arctic, particularly during winter, than at lower latitudes. Understanding the mechanisms controlling surface temperature in the Arctic is therefore an important priority in climate research. The surface energy budget is a key proximate control on Arctic surface temperature. During winter, insolation is low or absent and the atmospheric boundary layer is typically very stable, limiting turbulent hear exchange, so that the surface energy budget is almost entirely governed by longwave radiation. The net surface longwave radiation (NetLW) at this time has a strikingly bimodal distribution: conditions oscillate between a 'radiatively clear' state with rapid surface heat loss and a "moist cloudy" state with NetLW ˜ 0 W m-2. Each state can persist for days or weeks at a time but transitions between them happen in a matter of hours. This distribution of NetLW has important implications for the Arctic climate, as even a small shift in the frequency of occupancy of each state would be enough to significantly affect the overall surface energy budget and thus winter sea ice thickness. The clear and cloudy states typically occur during periods of relatively high and low surface pressure respectively, suggesting a link with synoptic-scale dynamics. This suggestion is consistent with previous studies indicating that the formation of low-level and mid-level clouds over the Arctic Ocean is typically associated with cyclonic activity and passing frontal systems . More recent work has shown that intense filamentary moisture intrusion events are a common feature in the Arctic and can induce large episodic increases of longwave radiation into the surface. The poleward transport of water vapor across 70N during boreal winter is examined in the ERA-Interim reanalysis product and 16 of the Coupled Model Intercomparison Project Phase 5 (CMIP5) models, focusing on intense moisture

  6. New Observations of the Gulf of Aden Intermediate Water Intrusion into the Red Sea.

    Science.gov (United States)

    Bower, A.; Abualnaja, Y.

    2012-04-01

    The three-layer exchange flow between the Red Sea and the Indian Ocean during summer is characterized by a thick, northward intrusion of relatively cold, low-salinity and low in dissolved oxygen (Water (GAIW), sandwiched between two thin layers of outflow water. The flux of GAIW into the Red Sea is important in the heat, freshwater and nutrient budgets of the Red Sea, but the structure and pathways of the intrusion are not well-known due to a paucity of hydrographic and direct velocity observations. A research cruise was executed at the eastern side of the Red Sea during September-October 2011 to conduct the first large-scale survey of the intrusion. This mission is part of a series of expeditions in the Red Sea designed to investigate the seasonal Red Sea circulation. Surprisingly, the GAIW intrusion was observed to stretch nearly the entire length of the Red Sea (~1500 km) as a narrow eastern boundary current with subsurface velocity maximum of 0.1-0.3 m/s in the depth range 50-100 m. The intruding layer is weakly stratified compared to the background, possibly an indication of strong vertical mixing as it flows through the strait. Some GAIW was observed to enter deep channels in a coral reef bank (Farasan Banks) located in the southeastern Red Sea, and to enter the Red Sea interior, the latter possibly due to interactions between the boundary current and mesoscale eddies. The pathways and erosion of the GAIW intrusion will likely have major implications for the spatial distribution of biological productivity.

  7. Paleomagnetism of Siberian Trap Intrusions: Implications for the Timing and Intensity of the Magmatic Activity

    Science.gov (United States)

    Latyshev, Anton; Veselovskiy, Roman; Mirsayanova, Elina; Ulyahina, Polina

    2016-04-01

    Large Igneous Provinces (LIPs) are the areas of the exceptional interest due to associated Cu-Ni-Pt deposits, problems of the causal link between volcanic hazards and mass extinctions, and questions about mantle plume dynamics. High-precise U-Pb and 40Ar/39Ar dating determined the duration of the main phase of the most voluminous Siberian Trap province formation as 1-2 Ma (Kamo et al., 2003; Reichow et al., 2008). Recent paleomagnetic investigations demonstrated the predominance of pulsating volcanic activity during LIPs formation (Chenet et al., 2009; Pavlov et al., 2015). We perform the results of detailed paleomagnetic study of intrusive complexes from Tunguska syncline and Angara-Taseeva depression (Siberian Trap province). Our data taken together with the previous paleomagnetic results from trap intrusions revealed two different styles of magmatic activity. In the central part of Tunguska syncline emplacement of was rather even without sharp bursts. Local intrusive events coeval to volcanic eruptions took place within spatially limited areas. In contrast, in the periphery of Tunguska syncline several short and powerful peaks of magmatic activity happened on the background of weak prolonged magmatism. These events resulted in huge Padunsky, Tulunsky and some other sills in the southern part of the Siberian platform. According to our paleomagnetic data, the duration of such pulses did not exceed 10-100 thousand years. Taking into account our paleomagnetic data and recent U-Pb ages for Siberian trap intrusions from (Burgess, Bowring, 2015), it is possible to correlate intrusive complexes with the volcanic section. In particular, formation the largest Tulunsky and Padunsky sills happened right after the termination of the main phase of Permian-Triassic volcanic activity on the Siberian platform. This work was supported by grants RFBR # 16-35-60114 and 15-35-20599 and Ministry of Education and Science of the Russian Federation (grant 14.Z50.31.0017).

  8. Feature Selection of Network Intrusion Data using Genetic Algorithm and Particle Swarm Optimization

    Directory of Open Access Journals (Sweden)

    Iwan Syarif

    2016-12-01

    Full Text Available This paper describes the advantages of using Evolutionary Algorithms (EA for feature selection on network intrusion dataset. Most current Network Intrusion Detection Systems (NIDS are unable to detect intrusions in real time because of high dimensional data produced during daily operation. Extracting knowledge from huge data such as intrusion data requires new approach. The more complex the datasets, the higher computation time and the harder they are to be interpreted and analyzed. This paper investigates the performance of feature selection algoritms in network intrusiona data. We used Genetic Algorithms (GA and Particle Swarm Optimizations (PSO as feature selection algorithms. When applied to network intrusion datasets, both GA and PSO have significantly reduces the number of features. Our experiments show that GA successfully reduces the number of attributes from 41 to 15 while PSO reduces the number of attributes from 41 to 9. Using k Nearest Neighbour (k-NN as a classifier,the GA-reduced dataset which consists of 37% of original attributes, has accuracy improvement from 99.28% to 99.70% and its execution time is also 4.8 faster than the execution time of original dataset. Using the same classifier, PSO-reduced dataset which consists of 22% of original attributes, has the fastest execution time (7.2 times faster than the execution time of original datasets. However, its accuracy is slightly reduced 0.02% from 99.28% to 99.26%. Overall, both GA and PSO are good solution as feature selection techniques because theyhave shown very good performance in reducing the number of features significantly while still maintaining and sometimes improving the classification accuracy as well as reducing the computation time.

  9. Dating of authigenic clays related to igneous intrusions in Hunter Valley Coals

    International Nuclear Information System (INIS)

    Zwingmann, H.

    2000-01-01

    The Sydney Basin is composed mainly of Permian and Triassic marine and non-marine clastic sedimentary strata together with economically significant coal deposits and volumetrically minor igneous rocks. Many of these igneous rocks are also economically significant not only for their use in the construction industry but also for their deleterious effects on coal mining, particularly in underground mines utilising longwall extraction systems. Igneous activity in the Sydney Basin ranges from Early Permian to Tertiary in age and although episodic in nature, activity was unlikely to have ceased for periods of more than approximately 10 million years (Carr and Facer 1980; Embleton et al. 1982). Dating of the time of emplacement of igneous rocks using the K-Ar isotopic system is a relatively straightforward procedure if suitable analytical facilities and samples of appropriate, fresh, primary minerals are available. In the case of intrusions in coal seams, however, the occurrence of fresh, primary minerals is very rare due to widespread alteration produced by interaction between the igneous rock and fluids in the coal seam. This interaction produces a variety of secondary minerals with most primary minerals and glass being altered to clays (mainly kaolinite) and carbonates. Consequently, relatively few isotopic dates for intrusions into coal seams have been determined. A detailed study of several hundred samples of igneous rocks from the Sydney Basin found only six samples of intrusions into coal seams that were suitable for conventional K-Ar dating (Carr and Facer 1980). Techniques for K-Ar dating of authigenic illite, developed in response to the need by the petroleum industry to understand the timing of diagenesis in petroleum source-rocks and reservoirs, are now well established (Clauer and Chaudhuri 1995). As part of a larger project on the impact of igneous intrusions on coal mining and the alienation of coal reserves, a preliminary investigation of the timing of

  10. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  11. Application of non-intrusive geophysical techniques at the Mixed Waste Landfill, Technical Area 3, Sandia National Laboratories, New Mexico

    International Nuclear Information System (INIS)

    Peace, J.L.; Goering, T.J.

    1996-03-01

    The Environmental Restoration Project at Sandia National Laboratories, New Mexico is tasked with assessment and remediation of the Mixed Waste Landfill in Technical Area 3. The Mixed Waste Landfill is an inactive radioactive and mixed waste disposal site. The landfill contains disposal pits and trenches of questionable location and dimension. Non-intrusive geophysical techniques were utilized to provide an effective means of determining the location and dimension of suspected waste disposal trenches before Resource Conservation and Recovery Act intrusive assessment activities were initiated. Geophysical instruments selected for this investigation included a Geonics EM-31 ground conductivity meter, the new Geonics EM-61 high precision, time-domain metal detector, and a Geometrics 856 total field magnetometer. The results of these non-intrusive geophysical techniques were evaluated to enhance the efficiency and cost-effectiveness of future waste-site investigations at Environmental Restoration Project sites

  12. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  13. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  14. Torque Control During Intrusion on Upper Central Incisor in Labial and Lingual bracket System - A 3D Finite Element Study.

    Science.gov (United States)

    Pol, Tejas R; Vandekar, Meghna; Patil, Anuradha; Desai, Sanjana; Shetty, Vikram; Hazarika, Saptarshi

    2018-01-01

    The aim of present study was to investigate the difference of torque control during intrusive force on upper central incisors with normal, under and high torque in lingual and labial orthodontic systems through 3D finite element analysis. Six 3D models of an upper right central incisor with different torque were designed in Solid Works 2006. Software ANSYS Version 16.0 was used to evaluate intrusive force on upper central incisor model . An intrusive force of 0.15 N was applied to the bracket slot in different torque models and the displacements along a path of nodes in the upper central incisor was assessed. On application of Intrusive force on under torqued upper central incisor in Labial system produce labial crown movement but in Lingual system caused lingual movement in the apical and incisal parts. The same intrusive force in normal-torqued central incisor led to a palatal movement in apical and labial displacement of incisal edge in Lingual system and a palatal displacement in apical area and a labial movement in the incisal edge in Labial systemin. In overtorqued upper central incisor, the labial crown displacement in Labial system is more than Lingual system. In labial and lingual system on application of the same forces in upper central incisor with different inclinations showed different responses. The magnitudes of torque Loss during intrusive loads in incisors with normal, under and over-torque were higher in Labial system than Lingual orthodontic appliances. Key words: FEM, lingual orthodontics, intrusion, torque control, labial bracket systems.

  15. Modelling saline intrusion for repository performance assessment

    International Nuclear Information System (INIS)

    Jackson, C.P.

    1989-04-01

    UK Nirex Ltd are currently considering the possibility of disposal of radioactive waste by burial in deep underground repositories. The natural pathway for radionuclides from such a repository to return to Man's immediate environment (the biosphere) is via groundwater. Thus analyses of the groundwater flow in the neighbourhood of a possible repository, and consequent radionuclide transport form an important part of a performance assessment for a repository. Some of the areas in the UK that might be considered as possible locations for a repository are near the coast. If a repository is located in a coastal region seawater may intrude into the groundwater flow system. As seawater is denser than fresh water buoyancy forces acting on the intruding saline water may have significant effects on the groundwater flow system, and consequently on the time for radionuclides to return to the biosphere. Further, the chemistry of the repository near-field may be strongly influenced by the salinity of the groundwater. It is therefore important for Nirex to have a capability for reliably modelling saline intrusion to an appropriate degree of accuracy in order to make performance assessments for a repository in a coastal region. This report describes work undertaken in the Nirex Research programme to provide such a capability. (author)

  16. Formation of continental crust by intrusive magmatism

    Science.gov (United States)

    Rozel, A. B.; Golabek, G. J.; Jain, C.; Tackley, P. J.; Gerya, T.

    2017-09-01

    How were the continents formed in the Earth? No global numerical simulation of our planet ever managed to generate continental material self-consistently. In the present study, we show that the latest developments of the convection code StagYY enable to estimate how to produce the early continents, more than 3 billion years ago. In our models, melting of pyrolitic rocks generates a basaltic melt and leaves behind a depleted solid residue (a harzburgite). The melt generated in the mantle is transported to the surface. Only basaltic rocks melting again can generate continental crust. Should the basaltic melt always reach the open air and cool down? Should the melt be intruded warm in the pre-existing crust? The present study shows that both processes have to be considered to produce continents. Indeed, granitoids can only be created in a tight window of pressure-temperature. If all basalt is quickly cooled by surface volcanism, the lithosphere will be too cold. If all basalt is intruded warm below the crust then the lithosphere will be too warm. The key is to have both volcanism and plutonism (intrusive magmatism) to reach the optimal temperature and form massive volumes of continental material.

  17. On the classification of seawater intrusion

    Science.gov (United States)

    Werner, Adrian D.

    2017-08-01

    Seawater intrusion (SWI) arising from aquifer depletion is often classified as ;active; or ;passive;, depending on whether seawater moves in the same direction as groundwater flow or not. However, recent studies have demonstrated that alternative forms of active SWI show distinctly different characteristics, to the degree that the term ;active SWI; may be misleading without additional qualification. In response, this article proposes to modify hydrogeology lexicon by defining and characterizing three classes of SWI, namely passive SWI, passive-active SWI and active SWI. The threshold parameter combinations for the onset of each form of SWI are developed using sharp-interface, steady-state analytical solutions. Numerical simulation is then applied to a hypothetical case study to test the developed theory and to provide additional insights into dispersive SWI behavior. The results indicate that the three classes of SWI are readily predictable, with the exception of active SWI occurring in the presence of distributed recharge. The key characteristics of each SWI class are described to distinguish their most defining features. For example, active SWI occurring in aquifers receiving distributed recharge only creates watertable salinization downstream of the groundwater mound and only where dispersion effects are significant. The revised classification of SWI proposed in this article, along with the analysis of thresholds and SWI characteristics, provides coastal aquifer custodians with an improved basis upon which to expect salinization mechanisms to impact freshwater availability following aquifer depletion.

  18. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei

    2010-01-01

    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  19. Non-intrusive uncertainty quantification in structural-acoustic systems using polynomial chaos expansion method

    Directory of Open Access Journals (Sweden)

    Wang Mingjie

    2017-01-01

    Full Text Available A framework of non-intrusive polynomial chaos expansion method (PC was proposed to investigate the statistic characteristics of the response of structural-acoustic system containing random uncertainty. The PC method does not need to reformulate model equations, and the statistics of the response can be evaluated directly. The results show that compared to the direct Monte Carlo method (MCM based on the original numerical model, the PC method is effective and more efficient.

  20. An assessment of the radiological impact of human intrusion at the UK Low Level Waste Repository (LLWR) - 59356

    International Nuclear Information System (INIS)

    Hicks, Tim; Baldwin, Tamara; Cummings, Richard; Sumerling, Trevor

    2012-01-01

    The UK Low Level Waste Repository Ltd submitted an Environmental Safety Case for the disposal of low-level waste (LLW) to the Environment Agency on the 1 May 2011. The Environmental Safety Case (ESC) presents a complete case for the environmental safety of the Low Level Waste Repository (LLWR) both during operations and in the long term (Cummings et al, in these proceedings). This includes an assessment of the long-term radiological safety of the facility, including an assessment of the potential consequences of human intrusion at the site. The human intrusion assessment is based on a cautiously realistic approach in defining intrusion cases and parameter values. A range of possible human intrusion events was considered based on present-day technologies and credible future uses of the site. This process resulted in the identification of geotechnical investigations, a housing development and a smallholding as requiring quantitative assessment. A particular feature of the site is that, because of its proximity to the coast and in view of expected global sea-level rise, it is vulnerable to coastal erosion. During such erosion, wastes and engineered barrier materials will be exposed, and could become targets for investigation or recovery. Therefore, human intrusion events have been included that are associated with such activities. A radiological assessment model has been developed to analyse the impacts of potential human intrusion at the site. A key feature of the model is the representation of the spatial layout of the disposal site, including the engineered cap design and the large-scale spatial heterogeneity of radionuclide concentrations within the repository. The model has been used to calculate the radiation dose to intruders and to others following intrusion at different times and at different locations across the site, for the each of the selected intrusion events, considering all relevant exposure modes. Potential doses due to radon and its daughters in

  1. Performance of horizontal versus vertical vapor extraction wells

    International Nuclear Information System (INIS)

    Birdsell, K.H.; Roseberg, N.D.; Edlund, K.M.

    1994-06-01

    Vapor extraction wells used for site remediation of volatile organic chemicals in the vadose zone are typically vertical wells. Over the past few years, there has been an increased interest in horizontal wells for environmental remediation. Despite the interest and potential benefits of horizontal wells, there has been little study of the relative performance of horizontal and vertical vapor extraction wells. This study uses numerical simulations to investigate the relative performance of horizontal versus vertical vapor extraction wells under a variety of conditions. The most significant conclusion that can be drawn from this study is that in a homogeneous medium, a single, horizontal vapor extraction well outperforms a single, vertical vapor extraction well (with surface capping) only for long, linear plumes. Guidelines are presented regarding the use of horizontal wells

  2. Pretreated Butterfly Wings for Tuning the Selective Vapor Sensing

    Directory of Open Access Journals (Sweden)

    Gábor Piszter

    2016-09-01

    Full Text Available Photonic nanoarchitectures occurring in the scales of Blue butterflies are responsible for their vivid blue wing coloration. These nanoarchitectures are quasi-ordered nanocomposites which are constituted from a chitin matrix with embedded air holes. Therefore, they can act as chemically selective sensors due to their color changes when mixing volatile vapors in the surrounding atmosphere which condensate into the nanoarchitecture through capillary condensation. Using a home-built vapor-mixing setup, the spectral changes caused by the different air + vapor mixtures were efficiently characterized. It was found that the spectral shift is vapor-specific and proportional with the vapor concentration. We showed that the conformal modification of the scale surface by atomic layer deposition and by ethanol pretreatment can significantly alter the optical response and chemical selectivity, which points the way to the efficient production of sensor arrays based on the knowledge obtained through the investigation of modified butterfly wings.

  3. Pretreated Butterfly Wings for Tuning the Selective Vapor Sensing.

    Science.gov (United States)

    Piszter, Gábor; Kertész, Krisztián; Bálint, Zsolt; Biró, László Péter

    2016-09-07

    Photonic nanoarchitectures occurring in the scales of Blue butterflies are responsible for their vivid blue wing coloration. These nanoarchitectures are quasi-ordered nanocomposites which are constituted from a chitin matrix with embedded air holes. Therefore, they can act as chemically selective sensors due to their color changes when mixing volatile vapors in the surrounding atmosphere which condensate into the nanoarchitecture through capillary condensation. Using a home-built vapor-mixing setup, the spectral changes caused by the different air + vapor mixtures were efficiently characterized. It was found that the spectral shift is vapor-specific and proportional with the vapor concentration. We showed that the conformal modification of the scale surface by atomic layer deposition and by ethanol pretreatment can significantly alter the optical response and chemical selectivity, which points the way to the efficient production of sensor arrays based on the knowledge obtained through the investigation of modified butterfly wings.

  4. Numerical simulation of superheated vapor bubble rising in stagnant liquid

    Science.gov (United States)

    Samkhaniani, N.; Ansari, M. R.

    2017-09-01

    In present study, the rising of superheated vapor bubble in saturated liquid is simulated using volume of fluid method in OpenFOAM cfd package. The surface tension between vapor-liquid phases is considered using continuous surface force method. In order to reduce spurious current near interface, Lafaurie smoothing filter is applied to improve curvature calculation. Phase change is considered using Tanasawa mass transfer model. The variation of saturation temperature in vapor bubble with local pressure is considered with simplified Clausius-Clapeyron relation. The couple velocity-pressure equation is solved using PISO algorithm. The numerical model is validated with: (1) isothermal bubble rising and (2) one-dimensional horizontal film condensation. Then, the shape and life time history of single superheated vapor bubble are investigated. The present numerical study shows vapor bubble in saturated liquid undergoes boiling and condensation. It indicates bubble life time is nearly linear proportional with bubble size and superheat temperature.

  5. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  6. QOS and Control-Theoretic Techniques for Intrusion Tolerance

    National Research Council Canada - National Science Library

    Ye, Nong

    2004-01-01

    ...), even in the face of intrusions. This report examines two host-based resources, a router and a web server, and presents simulated models of modifications that can be made to these resources to make them QoS-capable...

  7. Heart rate, startle response, and intrusive trauma memories

    Science.gov (United States)

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  8. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    spatiotemporal relations to form complex events which model the intrusion patterns. ... Wireless sensor networks; complex event processing; event stream; ...... of the 2006 ACM SIGMOD International Conference on Management of Data, 407– ...

  9. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  10. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  11. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  12. Nuclear waste disposal facility intrusion: an archeologist's perspective

    International Nuclear Information System (INIS)

    Virginia, C.; Christie, L.

    1981-01-01

    A scenario is presented for the intrusion of a shallow land burial site by archeologists from a future generation. A description is given for the potential widespread exposure and contamination of populations by recovered artifacts

  13. How Intrusion Detection Can Improve Software Decoy Applications

    National Research Council Canada - National Science Library

    Monteiro, Valter

    2003-01-01

    This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack...

  14. Ant colony induced decision trees for intrusion detection

    CSIR Research Space (South Africa)

    Botes, FH

    2017-06-01

    Full Text Available platform. Intrusion Detection Systems (IDS) analyse network traffic to identify suspicious patterns with the intention to compromise the system. Practitioners train classifiers to classify the data within different categories e.g. malicious or normal...

  15. Intrusion resistant underground structure (IRUS) - safety assessment and licensing

    International Nuclear Information System (INIS)

    Lange, B. A.

    1997-01-01

    This paper describes the safety goals, human exposure scenarios and critical groups, the syvac-nsure performance assessment code, groundwater pathway safety results, and inadvertent human intrusion of the IRUS. 2 tabs

  16. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against

  17. Simulation of sea water intrusion in coastal aquifers

    Indian Academy of Sciences (India)

    dependent miscible flow and transport modelling approach for simulation of seawater intrusion in coastal aquifers. A nonlinear optimization-based simulation methodology was used in this study. Various steady state simulations are performed for a ...

  18. Nuclear system vaporization

    International Nuclear Information System (INIS)

    Bougault, R.; Brou, R.; Colin, J.; Cussol, D.; Durand, D.; Le Brun, C.; Lecolley, J.F.; Lopez, O.; Louvel, M.; Nakagawa, T.; Peter, J.; Regimbart, R.; Steckmeyer, J.C.; Tamain, B.; Vient, E.; Yuasa-Nakagawa, K.; Wieloch, A.

    1998-01-01

    A particular case of the hot nuclei de-excitation is the total nuclear dislocation into light particles (n, p, d, t, 3 He and α). Such events were first observed at bombarding energies lower than 100 MeV/nucleon due to high detection performances of the INDRA multidetector. The light system Ar + Ni was studied at several bombarding energies ranging from 32 to 95 MeV/nucleon. The events associated to a total vaporization of the system occur above the energy threshold of ∼ 50 MeV/nucleon. A study of the form of these events shows that we have essentially two sources. The excitation energy of these sources may be determined by means of the kinematic properties of their de-excitation products. A preliminary study results in excitation energy values of the order 10 - 14 MeV/nucleon. The theoretical calculation based on a statistical model modified to take into account high excitation energies and excited levels in the lightest nuclei predicts that the vaporization of the two partner nuclei in the Ar + Ni system takes place when the excitation energy exceeds 12 MeV/nucleon what is qualitatively in agreement with the values deduced from calorimetric analysis

  19. A survey of intrusion detection techniques in Cloud

    OpenAIRE

    Modi, C.; Patel, D.; Patel, H.; Borisaniya, B.; Patel, A.; Rajarajan, M.

    2013-01-01

    Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and...

  20. Environmental data processor of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Rogers, M.S.

    1977-06-01

    A data acquisition system oriented specifically toward collection and processing of various meteorological and environmental parameters has been designed around a National Semiconductor IMP-16 microprocessor, This system, called the Environmental Data Processor (EDP), was developed specifically for use with the Adaptive Intrusion Data System (AIDS) in a perimeter intrusion alarm evaluation, although its design is sufficiently general to permit use elsewhere. This report describes in general detail the design of the EDP and its interaction with other AIDS components

  1. Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

    OpenAIRE

    Jingyu Wang; xuefeng Zheng; Dengliang Luo

    2011-01-01

    Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources and reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. In order to address the problem of intrusion tolerance of cloud computing platform and sensitive data in...

  2. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  3. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  4. When Intrusion Detection Meets Blockchain Technology: A Review

    OpenAIRE

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju; Wang, Yu; Han, Jinguang

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness ...

  5. Multisensor Fusion for Intrusion Detection and Situational Awareness

    OpenAIRE

    Hallstensen, Christoffer V

    2017-01-01

    Cybercrime damage costs the world several trillion dollars annually. And al-though technical solutions to protect organizations from hackers are being con-tinuously developed, criminals learn fast to circumvent them. The question is,therefore, how to create leverage to protect an organization by improving in-trusion detection and situational awareness? This thesis seeks to contribute tothe prior art in intrusion detection and situational awareness by using a multi-sensor data fusion...

  6. Unique Challenges in WiFi Intrusion Detection

    OpenAIRE

    Milliken, Jonny

    2014-01-01

    The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more deta...

  7. A Survey on Anomaly Based Host Intrusion Detection System

    Science.gov (United States)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  8. Rapid laccolith intrusion driven by explosive volcanic eruption.

    Science.gov (United States)

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  9. Fusion of arkosic sand by intrusive andesite

    Science.gov (United States)

    Bailey, Roy A.

    1954-01-01

    An andesite dike in the Valles Mountains of northern New Mexico has intruded and partly fused arkosic sediments for a distance of 50 feet from its contacts. The dike is semi-circular in form, has a maximum width of about 100 feet, and is about 500 feet long. Small associated arcuate dikes are arranged in spiral fashion around the main dike, suggesting that they were intruded along shear fractures similar to those described by Burbank (1941). The fused rocks surrounding the andesite dike are of three general types: 1) partly fused arkosic sand, 2) fused clay, and 3) hybrid rocks. The fused arkosic sand consists of relict detrital grains of quartz, orthoclose, and plagioclase, imbedded in colorless glass containing microlites of tridymite, cordierite, and magnetite. The relict quartz grains are corroded and embayed by glass; the orthoclase is sanidinized and partly fused; and the plagioclase is inverted to the high temperature form and is partly fused. The fused clay, which was originally a mixture of montmorillonite and hydromica, consists primarily of cordierite but also contains needle-like crystals of sillimanite (?) or mullite (?). The hybrid rocks originated in part by intermixing of fused arkosic sediments and andesitic liquid and in part by diffusion of mafic constituents through the fused sediments. They are rich in cordierite and magnetite and also contain hypersthene, augite, and plagioclase. The composition of pigeonite in the andesite indicates that the temperature of the andesite at the time of intrusion probably did not exceed 1200?C. Samples of arkosic sand were fused in the presence of water in a Morey bomb at 1050?C. Stability relations of certain minerals in the fused sand suggest that fusion may have taken place at a lower temperature, however, and the fluxing action of volatiles from the andesite are thought to have made this possible.

  10. Non-Intrusive Battery Health Monitoring

    Directory of Open Access Journals (Sweden)

    Gajewski Laurent

    2017-01-01

    Full Text Available The “Non-intrusive battery health monitoring”, developed by Airbus Defence and Space (ADS in cooperation with the CIRIMAT-CNRS laboratory and supported by CNES, aims at providing a diagnosis of the battery ageing in flight, called State of Health (SOH, using only the post-treatment of the battery telemetries. The battery current and voltage telemetries are used by a signal processing tool on ground to characterize and to model the battery at low frequencies which allows monitoring the evolution of its degradation with great accuracy. The frequential behaviour estimation is based on inherent disturbances on the current during the nominal functioning of the battery. For instance, on-board thermal control or equipment consumption generates random disturbances on battery current around an average current. The battery voltage response to these current random disturbances enables to model the low frequency impedance of the battery by a signal processing tool. The re-created impedance is then compared with the evolution model of the low frequencies impedance as a function of the battery ageing to estimate accurately battery degradation. Hence, this method could be applied to satellites which are already in orbit and whose battery telemetries acquisition system fulfils the constraints determined in the study. This innovative method is an improvement of present state-of-the-art and is important to have a more accurate in-flight knowledge of battery ageing which is crucial for mission and operation planning and also for possible satellite mission extension or deorbitation. This method is patented by Airbus Defence and Space and CNES.

  11. Microscale interfacial behavior at vapor film collapse on high-temperature particle surface

    International Nuclear Information System (INIS)

    Abe, Yutaka; Tochio, Daisuke

    2009-01-01

    It has been pointed out that vapor film on a premixed high-temperature droplet surface should be collapsed to trigger vapor explosion. Thus, it is important to clarify the micromechanism of vapor film collapse behavior for the occurrence of vapor explosion. In the present study, microscale vapor-liquid interface behavior upon vapor film collapse caused by an external pressure pulse is experimentally observed and qualitatively analyzed. In the analytical investigation, interfacial temperature and interface movement were estimated with heat conduction analysis and visual data processing technique. Results show that condensation can possibly occur at the vapor-liquid interface when the pressure pulse arrived. That is, this result indicates that the vapor film collapse behavior is dominated not by fluid motion but by phase change. (author)

  12. Similarities and differences in vapor explosion criteria

    International Nuclear Information System (INIS)

    Cronenberg, A.W.

    1978-01-01

    An overview of recent ideas pertaining to vapor explosion criteria indicates that in general sense, a consensus of opinion is emerging on the conditions applicable to explosive vaporization. Experimental and theoretical work has lead a number of investigators to the formulation of such conditions which are quite similar in many respects, although the quantitative details of the model formulation of such conditions are somewhat different. All model concepts are consistent in that an initial period of stable film boiling, separating molten fuel from coolant, is considered necessary (at least for large-scale interactions and efficient intermixing), with subsequent breakdown of film boiling due to pressure and/or thermal effects, followed by intimate fuel-coolant contact and a rapid vaporization process which is sufficient to cause shock pressurization. Although differences arise as to the conditions for and the energetics associated with film boiling destabilization and the mode and energetics of fragmentation and intermixing. However, the principal area of difference seems to be the question of what constitutes the requisite condition(s) for rapid vapor production to cause shock pressurization

  13. Multicomponent droplet vaporization in a convecting environment

    International Nuclear Information System (INIS)

    Megaridis, C.M.; Sirignano, W.A.

    1990-01-01

    In this paper a parametric study of the fundamental exchange processes for energy, mass and momentum between the liquid and gas phases of multicomponent liquid vaporizing droplets is presented. The model, which examines an isolated, vaporizing, multicomponent droplet in an axisymmetric, convecting environment, considers the different volatilities of the liquid components, the alteration of the liquid-phase properties due to the spatial/temporal variations of the species concentrations and also the effects of multicomponent diffusion. In addition, the model accounts for variable thermophysical properties, surface blowing and droplet surface regression due to vaporization, transient droplet heating with internal liquid circulation, and finally droplet deceleration with respect to the free flow due to drag. The numerical calculation employs finite-difference techniques and an iterative solution procedure that provides time-varying spatially-resolved data for both phases. The effects of initial droplet composition, ambient temperature, initial Reynolds number (based on droplet diameter), and volatility differential between the two liquid components are investigated for a liquid droplet consisting of two components with very different volatilities. It is found that mixtures with higher concentration of the less volatile substance actually vaporize faster on account of intrinsically higher liquid heating rates

  14. Investigation of SiO{sub 2} film growth on 4H-SiC by direct thermal oxidation and postoxidation annealing techniques in HNO{sub 3} and H{sub 2}O vapor at varied process durations

    Energy Technology Data Exchange (ETDEWEB)

    Poobalan, Banu [Electronic Materials Research Group, School of Materials and Mineral Resources Engineering, Engineering Campus, Universiti Sains Malaysia, 14300 Nibong Tebal, Seberang Perai Selatan, Penang (Malaysia); Moon, Jeong Hyun; Kim, Sang-Cheol; Joo, Sung-Jae; Bahng, Wook; Kang, In Ho; Kim, Nam-Kyun [Power Semiconductor Research Centre, Korea Electrotechnology Research Institute, PO Box 20, Changwon, Gyungnam 641120 (Korea, Republic of); Cheong, Kuan Yew, E-mail: cheong@eng.usm.my [Electronic Materials Research Group, School of Materials and Mineral Resources Engineering, Engineering Campus, Universiti Sains Malaysia, 14300 Nibong Tebal, Seberang Perai Selatan, Penang (Malaysia)

    2014-11-03

    This study has revealed that HNO{sub 3} and H{sub 2}O vapors can be utilized as direct thermal oxidation or postoxidation annealing agents at a temperature above 1000 °C; as they play a major role in simultaneous oxidation/nitridation/hydrogenation processes at the bulk oxide and SiO{sub 2}/SiC interface. The varied process durations of the above-mentioned techniques contribute to the development of thicker gate oxides for high power device applications with improved electrical properties, lower interface-state density and higher breakdown voltage as compared to oxides grown through a more conventional wet (H{sub 2}O vapor only) oxidation technique. The study highlights the effects of hydrogen and nitrogen species on the passivation of structural defects at the bulk oxide and the SiO{sub 2}/SiC interface, which are revealed through the use of Time-of-Flight Secondary Ion Mass Spectroscopy and X-ray Photoelectron Spectroscopy. The physical properties of the substrate after oxide removal show that the surface roughness decreases as the process durations increase with longer hours of H{sub 2}O and HNO{sub 3} vapor exposures on the samples, which is mainly due to the significant reduction of carbon content at the SiO{sub 2}/SiC interface. - Highlights: • Direct thermal oxidation and postoxidation annealing techniques in HNO{sub 3}/H{sub 2}O vapor • SiO{sub 2} film growth in H{sub 2}O/HNO{sub 3}vapor at varied process durations • Thicker SiO{sub 2} film growth via annealing than direct growth in HNO{sub 3}/H{sub 2}O vapor • Nitrogen and hydrogen as passivation elements in SiO{sub 2}/SiC interface and SiO{sub 2} bulk • Significant reduction of carbon and Si-dangling bonds at the SiC/SiO{sub 2} interface.

  15. Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Su, Chunhua

    2017-01-01

    many kinds of information among sensors, whereas such network is vulnerable to a wide range of attacks, especially insider attacks, due to its natural environment and inherent unreliable transmission. To safeguard its security, intrusion detection systems (IDSs) are widely adopted in a WSN to defend...... against insider attacks through implementing proper trustbased mechanisms. However, in the era of big data, sensors may generate excessive information and data, which could degrade the effectiveness of trust computation. In this paper, we focus on this challenge and propose a way of combining Bayesian......-based trust management with traffic sampling for wireless intrusion detection under a hierarchical structure. In the evaluation, we investigate the performance of our approach in both a simulated and a real network environment. Experimental results demonstrate that packet-based trust management would become...

  16. Evaluating the Precision of Auditory Sensory Memory as an Index of Intrusion in Tinnitus.

    Science.gov (United States)

    Barrett, Doug J K; Pilling, Michael

    The purpose of this study was to investigate the potential of measures of auditory short-term memory (ASTM) to provide a clinical measure of intrusion in tinnitus. Response functions for six normal listeners on a delayed pitch discrimination task were contrasted in three conditions designed to manipulate attention in the presence and absence of simulated tinnitus: (1) no-tinnitus, (2) ignore-tinnitus, and (3) attend-tinnitus. Delayed pitch discrimination functions were more variable in the presence of simulated tinnitus when listeners were asked to divide attention between the primary task and the amplitude of the tinnitus tone. Changes in the variability of auditory short-term memory may provide a novel means of quantifying the level of intrusion associated with the tinnitus percept during listening.

  17. Distributed Intrusion Sensor Using DFB Laser with Optical Feedback and Saturable Absorber

    Directory of Open Access Journals (Sweden)

    Kyoo Nam Choi

    2018-01-01

    Full Text Available Characteristics of a distributed intrusion sensor using a coherent DFB laser diode with an external optical feedback and saturable absorber were experimentally investigated. The stimulus at a location of 2 km using a PZT transducer placed the location of a simulated intruder in Φ-OTDR trace after averaging 32 times. Field trials demonstrated the detection of a vehicle and a pedestrian crossing above the sensing line and a loop in a burial depth of 50 cm. This distributed intrusion sensor using a coherent DFB laser diode as the light source had the advantages of a simple structure and intruder detection capability at the underground burial location.

  18. SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    The development of collaborative intrusion detection networks (CIDNs) aims to enhance the performance of a single intrusion detection system (IDS), through communicating and collecting information from other IDS nodes. To defend CIDNs against insider attacks, trust-based mechanisms are crucial...... and render CIDNs still vulnerable to advanced insider attacks in a practical deployment. In this paper, our motivation is to investigate the effect of On-Off attacks on challenge-based CIDNs. In particular, as a study, we explore a special On-Off attack (called SOOA), which can keep responding normally...... to one node while acting abnormally to another node. In the evaluation, we explore the attack performance under simulated CIDN environments. Experimental results indicate that our attack can interfere the effectiveness of trust computation for CIDN nodes....

  19. Chemical vapor composites (CVC)

    International Nuclear Information System (INIS)

    Reagan, P.

    1993-01-01

    The Chemical Vapor Composite, CVC trademark , process fabricates composite material by simply mixing particles (powders and or fibers) with CVD reactants which are transported and co-deposited on a hot substrate. A key feature of the CVC process is the control provided by varing the density, geometry (aspect ratio) and composition of the entrained particles in the matrix material, during deposition. The process can fabricate composite components to net shape (± 0.013 mm) on a machined substrate in a single step. The microstructure of the deposit is described and several examples of different types of particles in the matrix are illustrated. Mechanical properties of SiC composite material fabricated with SiC powder and fiber will be presented. Several examples of low cost ceramic composite products will be shown. (orig.)

  20. Iron bromide vapor laser

    Science.gov (United States)

    Sukhanov, V. B.; Shiyanov, D. V.; Trigub, M. V.; Dimaki, V. A.; Evtushenko, G. S.

    2016-03-01

    We have studied the characteristics of a pulsed gas-discharge laser on iron bromide vapor generating radiation with a wavelength of 452.9 nm at a pulse repetition frequency (PRF) of 5-30 kHz. The maximum output power amounted to 10 mW at a PRF within 5-15 kHz for a voltage of 20-25 kV applied to electrodes of the discharge tube. Addition of HBr to the medium produced leveling of the radial profile of emission. Initial weak lasing at a wavelength of 868.9 nm was observed for the first time, which ceased with buildup of the main 452.9-nm line.

  1. Effect of vapor-phase oxygen on chemical vapor deposition growth of graphene

    Science.gov (United States)

    Terasawa, Tomo-o.; Saiki, Koichiro

    2015-03-01

    To obtain a large-area single-crystal graphene, chemical vapor deposition (CVD) growth on Cu is considered the most promising. Recently, the surface oxygen on Cu has been found to suppress the nucleation of graphene. However, the effect of oxygen in the vapor phase was not elucidated sufficiently. Here, we investigate the effect of O2 partial pressure (PO2) on the CVD growth of graphene using radiation-mode optical microscopy. The nucleation density of graphene decreases monotonically with PO2, while its growth rate reaches a maximum at a certain pressure. Our results indicate that PO2 is an important parameter to optimize in the CVD growth of graphene.

  2. Numerical simulations of hydrothermal circulation resulting from basalt intrusions in a buried spreading center

    Science.gov (United States)

    Fisher, A.T.; Narasimhan, T.N.

    1991-01-01

    A two-dimensional, one by two-kilometer section through the seafloor was simulated with a numerical model to investigate coupled fluid and heat flow resulting from basalt intrusions in a buried spreading center. Boundary and initial conditions and physical properties of both sediments and basalt were constrained by field surveys and drilling in the Guaymas Basin, central Gulf of California. Parametric variations in these studies included sediment and basalt permeability, anisotropy in sediment permeability, and the size of heat sources. Faults were introduced through new intrusions both before and after cooling.Background heat input caused fluid convection at velocities ≤ 3 cm a−1 through shallow sediments. Eighty to ninety percent of the heat introduced at the base of the simulations exited through the upper, horizontal surface, even when the vertical boundaries were made permeable to fluid flow. The simulated injection of a 25–50 m thick basalt intrusion at a depth of 250 m resulted in about 10 yr of pore-fluid expulsion through the sea-floor in all cases, leaving the sediments above the intrusions strongly underpressured. A longer period of fluid recharge followed, sometimes accompanied by reductions in total seafloor heat output of 10% in comparison to pre-intrusion values. Additional discharge-recharge events were dispersed chaotically through the duration of the cooling period. These cycles in heat and fluid flow resulted from the response of the simulated system to a thermodynamic shock, the sudden emplacement of a large heat source, and not from mechanical displacement of sediments and pore fluids, which was not simulated.Water/rock mass ratios calculated from numerical simulations are in good agreement with geochemical estimates from materials recovered from the Guaymas Basin, assuming a bulk basalt permeability value of at least 10−17 m2/(10−2 mD). The addition of faults through intrusions and sediments in these simulations did not facilitate

  3. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients

    Directory of Open Access Journals (Sweden)

    Usha Bapat

    2012-01-01

    Full Text Available To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients′ above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life

  4. Vapor-droplet flow equations

    International Nuclear Information System (INIS)

    Crowe, C.T.

    1975-01-01

    General features of a vapor-droplet flow are discussed and the equations expressing the conservation of mass, momentum, and energy for the vapor, liquid, and mixture using the control volume approach are derived. The phenomenological laws describing the exchange of mass, momentum, and energy between phases are also reviewed. The results have application to development of water-dominated geothermal resources

  5. Vapor pressure and enthalpy of vaporization of aliphatic propanediamines

    International Nuclear Information System (INIS)

    Verevkin, Sergey P.; Chernyak, Yury

    2012-01-01

    Highlights: ► We measured vapor pressure of four aliphatic 1,3-diamines. ► Vaporization enthalpies at 298 K were derived. ► We examined consistency of new and available data in the literature. ► A group-contribution method for prediction was developed. - Abstract: Vapor pressures of four aliphatic propanediamines including N-methyl-1,3-propanediamine (MPDA), N,N-dimethyl-1,3-propanediamine (DMPDA), N,N-diethyl-1,3-propanediamine (DEPDA) and N,N,N′,N′-tetramethyl-1,3-propanediamine (4MPDA) were measured using the transpiration method. The vapor pressures developed in this work and reported in the literature were used to derive molar enthalpy of vaporization values at the reference temperature 298.15 K. An internal consistency check of the enthalpy of vaporization was performed for the aliphatic propanediamines studied in this work. A group-contribution method was developed for the validation and prediction vaporization enthalpies of amines and diamines.

  6. Large Scale Water Vapor Sources Relative to the October 2000 Piedmont Flood

    Science.gov (United States)

    Turato, Barbara; Reale, Oreste; Siccardi, Franco

    2003-01-01

    Very intense mesoscale or synoptic-scale rainfall events can occasionally be observed in the Mediterranean region without any deep cyclone developing over the areas affected by precipitation. In these perplexing cases the synoptic situation can superficially look similar to cases in which very little precipitation occurs. These situations could possibly baffle the operational weather forecasters. In this article, the major precipitation event that affected Piedmont (Italy) between 13 and 16 October 2000 is investigated. This is one of the cases in which no intense cyclone was observed within the Mediterranean region at any time, only a moderate system was present, and yet exceptional rainfall and flooding occurred. The emphasis of this study is on the moisture origin and transport. Moisture and energy balances are computed on different space- and time-scales, revealing that precipitation exceeds evaporation over an area inclusive of Piedmont and the northwestern Mediterranean region, on a time-scale encompassing the event and about two weeks preceding it. This is suggestive of an important moisture contribution originating from outside the region. A synoptic and dynamic analysis is then performed to outline the potential mechanisms that could have contributed to the large-scale moisture transport. The central part of the work uses a quasi-isentropic water-vapor back trajectory technique. The moisture sources obtained by this technique are compared with the results of the balances and with the synoptic situation, to unveil possible dynamic mechanisms and physical processes involved. It is found that moisture sources on a variety of atmospheric scales contribute to this event. First, an important contribution is caused by the extratropical remnants of former tropical storm Leslie. The large-scale environment related to this system allows a significant amount of moisture to be carried towards Europe. This happens on a time- scale of about 5-15 days preceding the

  7. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  8. Vaporization of fault water during seismic slip

    Science.gov (United States)

    Chen, Jianye; Niemeijer, André R.; Fokker, Peter A.

    2017-06-01

    Laboratory and numerical studies, as well as field observations, indicate that phase transitions of pore water might be an important process in large earthquakes. We present a model of the thermo-hydro-chemo-mechanical processes, including a two-phase mixture model to incorporate the phase transitions of pore water, occurring during fast slip (i.e., a natural earthquake) in order to investigate the effects of vaporization on the coseismic slip. Using parameters from typical natural faults, our modeling shows that vaporization can indeed occur at the shallow depths of an earthquake, irrespective of the wide variability of the parameters involved (sliding velocity, friction coefficient, gouge permeability and porosity, and shear-induced dilatancy). Due to the fast kinetics, water vaporization can cause a rapid slip weakening even when the hydrological conditions of the fault zone are not favorable for thermal pressurization, e.g., when permeability is high. At the same time, the latent heat associated with the phase transition causes the temperature rise in the slip zone to be buffered. Our parametric analyses reveal that the amount of frictional work is the principal factor controlling the onset and activity of vaporization and that it can easily be achieved in earthquakes. Our study shows that coseismic pore fluid vaporization might have played important roles at shallow depths of large earthquakes by enhancing slip weakening and buffering the temperature rise. The combined effects may provide an alternative explanation for the fact that low-temperature anomalies were measured in the slip zones at shallow depths of large earthquakes.

  9. The contribution of thought-action fusion and thought suppression in the development of obsession-like intrusions in normal participants.

    Science.gov (United States)

    Rassin, E

    2001-09-01

    Both thought-action fusion (TAF: i.e., a cognitive bias implying an inflated sense of responsibility for one's own thoughts) and thought suppression have been claimed to contribute to the development of obsession-like intrusions. Therefore, it seems plausible that conjunction of these phenomena results in highly intense intrusions. However, possible interactions between TAF and thought suppression have not yet been investigated experimentally. In the current study, healthy volunteers were exposed to a TAF-like intrusion. They were, then, randomly assigned to a suppression (n=21) or non-suppression condition (n=19). Next, visual analogue scales (VASs) were completed measuring anxiety, feelings of responsibility and guilt, urge to neutralise and so on. Contrary to expectation, several VAS scores were lower for participants in the suppression group than for those in the non-suppression group. Hence, it is concluded that thought suppression may, at least in the short term, alleviate discomfort caused by TAF-like intrusions.

  10. Influence of Saharan dust outbreaks and atmospheric stability upon vertical profiles of size-segregated aerosols and water vapor

    Science.gov (United States)

    Giménez, Joaquín; Pastor, Carlos; Castañer, Ramón; Nicolás, José; Crespo, Javier; Carratalá, Adoración

    2010-01-01

    Vertical profiles of aerosols and meteorological parameters were obtained using a hot air balloon and motorized paraglider. They were studied under anticyclonic conditions in four different contexts. Three flights occurred near sunrise, and one took place in the central hours of the day. The effects of North African dust intrusions were analyzed, whose entrance to the study area took place above the Stable Boundary Layer (SBL) in flight 1 and below it in flight 2. These flights have been compared with a non-intrusion situation (flight 3). A fourth flight characterized the profiles in the central hours of the day with a well-formed Convective Boundary Layer (CBL). With respect to the particle number distribution, the results show that not all sizes increase within the presence of an intrusion; during the first flight the smallest particles were not affected. The particle sizes affected in the second flight fell within the 0.35-2.5 μm interval. Under situations of convective dynamics, the reduction percentage of the particle number concentration reduces with increasing altitude, independently of their size, with respect to stability conditions. The negative vertical gradient for aerosols and water vapor, characteristic of a highly stable SBL (flight 3) becomes a constant profile within a CBL (flight 4). There are two situations that seem to alter the negative vertical gradient of the water vapor mixing ratio within the SBL: the presence of an intrusion and the possible stratification of the SBL based on different degrees of stability.

  11. Vapor pressure measured with inflatable plastic bag

    Science.gov (United States)

    1965-01-01

    Deflated plastic bag in a vacuum chamber measures initial low vapor pressures of materials. The bag captures the test sample vapors and visual observation of the vapor-inflated bag under increasing external pressures yields pertinent data.

  12. Study on the effect of subcooling on vapor film collapse on high temperature particle surface

    International Nuclear Information System (INIS)

    Abe, Yutaka; Tochio, Daisuke; Yanagida, Hiroshi

    2000-01-01

    Thermal detonation model is proposed to describe vapor explosion. According to this model, vapor film on pre-mixed high temperature droplet surface is needed to be collapsed for the trigger of the vapor explosion. It is pointed out that the vapor film collapse behavior is significantly affected by the subcooling of low temperature liquid. However, the effect of subcooling on micro-mechanism of vapor film collapse behavior is not experimentally well identified. The objective of the present research is to experimentally investigate the effect of subcooling on micro-mechanism of film boiling collapse behavior. As the results, it is experimentally clarified that the vapor film collapse behavior in low subcooling condition is qualitatively different from the vapor film collapse behavior in high subcooling condition. In case of vapor film collapse by pressure pulse, homogeneous vapor generation occurred all over the surface of steel particle in low subcooling condition. On the other hand, heterogeneous vapor generation was observed for higher subcooling condition. In case of vapor film collapse spontaneously, fluctuation of the gas-liquid interface after quenching propagated from bottom to top of the steel particle heterogeneously in low subcooling condition. On the other hand, simultaneous vapor generation occurred for higher subcooling condition. And the time transient of pressure, particle surface temperature, water temperature and visual information were simultaneously measured in the vapor film collapse experiment by external pressure pulse. Film thickness was estimated by visual data processing technique with the pictures taken by the high-speed video camera. Temperature and heat flux at the vapor-liquid interface were estimated by solving the heat condition equation with the measured pressure, liquid temperature and vapor film thickness as boundary conditions. Movement of the vapor-liquid interface were estimated with the PIV technique with the visual observation

  13. Kissing Bug (Triatoma spp.) Intrusion into Homes: Troublesome Bites and Domiciliation.

    Science.gov (United States)

    Klotz, Stephen A; Shirazi, F Mazda; Boesen, Keith; Beatty, Norman L; Dorn, Patricia L; Smith, Shannon; Schmidt, Justin O

    2016-01-01

    Kissing bugs (Triatoma spp.) frequently enter homes and bite human and pet occupants. Bites may lead to severe allergic reactions and, in some cases, death. Kissing bugs are also vectors of Trypanosoma cruzi, the cause of Chagas disease. In general, modern houses in the United States are not conducive to domiciliation of kissing bugs (bugs living out their entire life within the home with the presence of eggs, nymphs, adults, and exuviae). Construction features such as concrete foundations, solid walls and ceilings, window screens, tight thresholds for doors and windows, and other measures impede bug entry into homes, and air conditioning reduces the need for open doors and windows. Where Chagas disease is endemic in Mexico and Central and South America, homes often have thatch roofs, adobe walls, and open doors and windows. We investigated numerous instances of kissing bug intrusions into homes in Southern Arizona, California, and Louisiana and documented the reactions to kissing bug bites. Our work confirms the importance of modern home construction in limiting kissing bug intrusions. Older homes, especially those lacking modern screening, caulking, and weather stripping to reduce air leakage, may be subject to kissing bug intrusions and domiciliation. We describe a community in Southern Arizona where domiciliation of homes by Triatoma recurva is common. We also provide recent data regarding kissing bug bites and allergic reactions to the bites.

  14. Seasonal fluctuations of ichthyoplankton assemblage in the northeastern South China Sea influenced by the Kuroshio intrusion

    Science.gov (United States)

    Huang, Delian; Zhang, Xia; Jiang, Zhijian; Zhang, Jingping; Arbi, Iman; Jiang, Xin; Huang, Xiaoping; Zhang, Wenjing

    2017-09-01

    The distribution and assemblage of ichthyoplankton related to local hydrographic features, especially intrusion of the Kuroshio Current (KC) and Guangdong Coastal Current (GCC) in the northeastern South China Sea (NESCS) were investigated in this study. A total of 193 species of ichthyoplankton belonging to 141 genera and 66 families were recognized in summer 2015 and late-winter 2016. The ichthyoplankton assemblage was identified with distinct seasonal differences, and the differences were responded well with the oceanography conditions. In summer, the assemblages were identified into offshore and inshore groups, as controlled by the South China Sea Warm Current (SCSWC) in off-shelf, upwelling, and the diluted water from the Pearl River in inshore. In winter, three groups were divided, representing the southwestern inshore, intrusion of the KC in the eastern offshore, and the GCC in the northern inshore area, respectively. Furthermore, Sigmops gracilis and Vinciguerria sp.3 were probably brought into the NESCS by intrusion of the KC from the eastern Luzon Strait. In addition, high ichthyoplankton abundance was found in high chlorophyll a located in upwelling areas in the northern coastal area in summer and in the southwestern Taiwan Bank in winter, respectively. The nutrition outcropped by the upwelling together, and those brought from the Pearl River probably supported high food availability of the ichthyoplankton in the northern coast of the NESCS.

  15. A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features

    Directory of Open Access Journals (Sweden)

    P. Amudha

    2015-01-01

    Full Text Available Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony (MABC with Enhanced Particle Swarm Optimization (EPSO to predict the intrusion detection problem. The algorithms are combined together to find out better optimization results and the classification accuracies are obtained by 10-fold cross-validation method. The purpose of this paper is to select the most relevant features that can represent the pattern of the network traffic and test its effect on the success of the proposed hybrid classification algorithm. To investigate the performance of the proposed method, intrusion detection KDDCup’99 benchmark dataset from the UCI Machine Learning repository is used. The performance of the proposed method is compared with the other machine learning algorithms and found to be significantly different.

  16. Bacterial amplification and in-place carpet drying: implications for category 1 water intrusion restoration.

    Science.gov (United States)

    Holland, Jim; Banta, John; Passmore, Boni; Ayers, Mark; Abbott, Sean P; Cole, Eugene C

    2012-05-01

    The study described in this article investigated whether in-place carpet drying processes resulted in bacterial amplification following water intrusion from a clean water source (category 1) in a residential indoor environment. Bacterial amplification was examined after wetting a 10-year-old carpet and pad that had no history of water intrusion. Three test areas were extracted and dried using industry-recommended procedures for in-place drying and compared to a control area that was not extracted or dried. Results from carpet, pad, and subsurface dust demonstrated that bacterial amplification occurred in all test areas. CFUs of bacteria per gram of carpet surface dust and subsurface dust prior to water intrusion were lower than levels in subsurface dust after in-place drying. The authors' study contributes to information regarding the restoration of water-based carpet damage by professional water damage restoration companies, building maintenance personnel, and housekeeping managers. Results suggest that the appropriate response time for carpet pad salvage is considerably shorter than the current industry recommendation of 72 hours.

  17. Intrusion of soil covered uranium mill tailings by whitetail prairie dogs and Richardson's ground squirrels

    International Nuclear Information System (INIS)

    Shuman, R.

    1984-01-01

    The primary objective of the reclamation of uranium mill tailings is the long-term isolation of the matrial from the biosphere. Fossorial and semi-fossorial species represent a potentially disruptive influence as a result of their burrowing habits. The potential for intrusion was investigated with respect to two sciurids, the whitetail prairie dog (Cynomys leucurus) and Richardson's ground squirrel (Spermophilus richardsonii). Populations of prairie dogs were established on a control area, lacking a tailings layer, and two experimental areas, underlain by a waste layer, in southeastern Wyoming. Weekly measurements of prairie dog mound surface activities were conducted to demonstrate penetration, or lack thereof, of the tailings layer. Additionally, the impact of burrowing upon radon flux was determined. Limited penetration of the waste layer was noted after which frequency of inhabitance of the intruding burrow system declined. No significant changes in radon flux were detected. In another experiment, it was found that Richardson's ground squirrels burrowed to less extreme depths when confronted by mill tailings. Additional work at an inactive tailings pile in western Colorado revealed repeated intrusion through a shallow cover, and subsequent transport of radioactive material to the ground surface by prairie dogs. Radon flux from burrow entrances was significantly greater than that from undisturbed ground. Data suggested that textural and pH properties of tailings material may act to discourage repeated intrusion at some sites. 58 references

  18. Orthodontic intrusion of maxillary incisors: a 3D finite element method study

    Directory of Open Access Journals (Sweden)

    Armando Yukio Saga

    2016-02-01

    Full Text Available Objective: In orthodontic treatment, intrusion movement of maxillary incisors is often necessary. Therefore, the objective of this investigation is to evaluate the initial distribution patterns and magnitude of compressive stress in the periodontal ligament (PDL in a simulation of orthodontic intrusion of maxillary incisors, considering the points of force application. Methods: Anatomic 3D models reconstructed from cone-beam computed tomography scans were used to simulate maxillary incisors intrusion loading. The points of force application selected were: centered between central incisors brackets (LOAD 1; bilaterally between the brackets of central and lateral incisors (LOAD 2; bilaterally distal to the brackets of lateral incisors (LOAD 3; bilaterally 7 mm distal to the center of brackets of lateral incisors (LOAD 4. Results and Conclusions: Stress concentrated at the PDL apex region, irrespective of the point of orthodontic force application. The four load models showed distinct contour plots and compressive stress values over the midsagittal reference line. The contour plots of central and lateral incisors were not similar in the same load model. LOAD 3 resulted in more balanced compressive stress distribution.

  19. Differences in clinical intrusive thoughts between obsessive-compulsive disorder, generalized anxiety disorder, and hypochondria.

    Science.gov (United States)

    Romero-Sanchiz, Pablo; Nogueira-Arjona, Raquel; Godoy-Ávila, Antonio; Gavino-Lázaro, Aurora; Freeston, Mark H

    2017-11-01

    Differences and similarities between intrusive thoughts typical of obsessive-compulsive disorder, generalized anxiety disorder, and hypochondriasis are relevant for their differential diagnosis, formulation, and psychological treatment. Previous research in non-clinical samples pointed out the relevance of some process variables, such as responsibility, guilt, or neutralization strategies. This research is aimed to investigate the differences and similarities between clinical obsessions, worries, and illness intrusions in some of these process variables. A second aim is to identify models based on these variables that could reliably differentiate between them. Three groups of patients with obsessive-compulsive disorder (n = 35; 60% women, mean age 38.57), generalized anxiety disorder (n = 36; 61.1% women, mean age 41.50), and hypochondriasis (n = 34; 70.6% women, mean age 31.59) were evaluated using the Cognitive Intrusions Questionnaire-Transdiagnostic Version (Romero-Sanchiz, Nogueira-Arjona, Godoy-Ávila, Gavino-Lázaro, & Freeston, ). The results showed that some appraisals (e.g., responsibility or egodystonicity), emotions (e.g., guilt or insecurity), neutralization strategies, and other variables (e.g., verbal content or trigger from body sensation) are relevant for the discrimination between obsessions, worries, and illness intrusions. The results also showed 3 stable models based on these variables for the discrimination between these thoughts. The implication of these results in the diagnosis, formulation, and psychological treatment of obsessive-compulsive disorder, generalized anxiety disorder, and hypochondriasis is discussed. Copyright © 2017 John Wiley & Sons, Ltd.

  20. Managing saltwater intrusion in coastal arid regions and its societal implications for agriculture

    Directory of Open Access Journals (Sweden)

    J. Grundmann

    2016-05-01

    Full Text Available Coastal aquifers in arid and semiarid regions are particularly at risk due to intrusion of salty marine water. Since groundwater is predominantly used in irrigated agriculture, its excessive pumping – above the natural rate of replenishment – strengthen the intrusion process. Using this increasingly saline water for irrigation, leads to a destruction of valuable agricultural resources and the economic basis of farmers and their communities. The limitation of resources (water and soil in these regions requires a societal adaptation and change in behaviour as well as the development of appropriate management strategies for a transition towards stable and sustainable future hydrosystem states. Besides a description of the system dynamics and the spatial consequences of adaptation on the resources availability, the contribution combines results of an empirical survey with stakeholders and physically based modelling of the groundwater-agriculture hydrosystem interactions. This includes an analysis of stakeholders' (farmers and decision makers behaviour and opinions regarding several management interventions aiming on water demand and water resources management as well as the thinking of decision makers how farmers will behave. In this context, the technical counter measures to manage the saltwater intrusion by simulating different groundwater pumping strategies and scenarios are evaluated from the economic and social point of view and if the spatial variability of the aquifer's hydrogeology is taken into consideration. The study is exemplarily investigated for the south Batinah region in the Sultanate of Oman, which is affected by saltwater intrusion into a coastal aquifer system due to excessive groundwater withdrawal for irrigated agriculture.

  1. Passive vapor extraction feasibility study

    International Nuclear Information System (INIS)

    Rohay, V.J.

    1994-01-01

    Demonstration of a passive vapor extraction remediation system is planned for sites in the 200 West Area used in the past for the disposal of waste liquids containing carbon tetrachloride. The passive vapor extraction units will consist of a 4-in.-diameter pipe, a check valve, a canister filled with granular activated carbon, and a wind turbine. The check valve will prevent inflow of air that otherwise would dilute the soil gas and make its subsequent extraction less efficient. The granular activated carbon is used to adsorb the carbon tetrachloride from the air. The wind turbine enhances extraction rates on windy days. Passive vapor extraction units will be designed and operated to meet all applicable or relevant and appropriate requirements. Based on a cost analysis, passive vapor extraction was found to be a cost-effective method for remediation of soils containing lower concentrations of volatile contaminants. Passive vapor extraction used on wells that average 10-stdft 3 /min air flow rates was found to be more cost effective than active vapor extraction for concentrations below 500 parts per million by volume (ppm) of carbon tetrachloride. For wells that average 5-stdft 3 /min air flow rates, passive vapor extraction is more cost effective below 100 ppm

  2. The lithium vapor box divertor

    International Nuclear Information System (INIS)

    Goldston, R J; Schwartz, J; Myers, R

    2016-01-01

    It has long been recognized that volumetric dissipation of the plasma heat flux from a fusion power system is preferable to its localized impingement on a material surface. Volumetric dissipation mitigates both the anticipated very high heat flux and intense particle-induced damage due to sputtering. Recent projections to a tokamak demonstration power plant suggest an immense upstream parallel heat flux, of order 20 GW m −2 , implying that fully detached operation may be a requirement for the success of fusion power. Building on pioneering work on the use of lithium by Nagayama et al and by Ono et al as well as earlier work on the gas box divertor by Watkins and Rebut, we present here a concept for a lithium vapor box divertor, in which lithium vapor extracts momentum and energy from a fusion-power-plant divertor plasma, using fully volumetric processes. At the high powers and pressures that are projected this requires a high density of lithium vapor, which must be isolated from the main plasma in order to avoid lithium build-up on the chamber walls or in the plasma. Isolation is achieved through a powerful multi-box differential pumping scheme available only for condensable vapors. The preliminary box-wise calculations are encouraging, but much more work is required to demonstrate the practical viability of this scheme, taking into account at least 2D plasma and vapor flows within and between the vapor boxes and out of the vapor boxes to the main plasma. (paper)

  3. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  4. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  5. Toxicity of vapor phase petroleum contaminants to microbial degrader communities

    International Nuclear Information System (INIS)

    Long, S.C.; Davey, C.A.

    1994-01-01

    Petroleum products constitute the largest quantity of synthetic organic chemical products produced in the US. They are comprised of mostly hydrocarbon constituents from many different chemical classes including alkenes, cycloalkanes, aromatic compounds, and polyaromatic hydrocarbons. Many petroleum constituents are classified as volatile organic compounds or VOCs. Petroleum products also constitute a major portion of environmental pollution. One emerging technology, with promise for applications to VOCs in subsurface soil environments, is bioventing coupled with soil vapor extraction. These technologies involve volatilization of contaminants into the soil gas phase by injection and withdrawal of air. This air movement causes enhancement of the aerobic microbial degradation of the mobilized vapors by the indigenous populations. This study investigated the effects of exposure of mixed, subsurface microbial communities to vapor phase petroleum constituents or vapors of petroleum mixtures. Soil slurries were prepared and plated onto mineral salts agar plates and exposed to vapor phase contaminants at equilibrium with pure product. Representative n-alkane, branched alkane, cycloalkane, and aromatic compounds were tested as well as petroleum product mixtures. Vapor exposure altered the numbers and morphologies of the colonies enumerated when compared to controls. However, even at high, equilibrium vapor concentrations, microbial degrader populations were not completely inhibited

  6. Strontium isotopic geochemistry of intrusive rocks, Puerto Rico, Greater Antilles

    International Nuclear Information System (INIS)

    Jones, L.M.; Kesler, S.E.

    1980-01-01

    The strontium isotope geochemistry is given for three Puerto Rican intrusive rocks: the granodioritic Morovis and San Lorenzo plutons and the Rio Blanco stock of quartz dioritic composition. The average calculated initial 87 Sr/ 86 Sr ratios are 0.70370, 0.70355 and 0.70408, respectively. In addition, the San Lorenzo data establish a whole-rock isochron of 71 +- 2 m.y., which agrees with the previously reported K-Ar age of 73 m.y. Similarity of most of the intrusive rocks in the Greater Antilles with respect to their strontium isotopic geochemistry regardless of their major element composition indicates that intrusive magmas with a wide range of composition can be derived from a single source material. The most likely source material, in view of the available isotopic data, is the mantle wedge overlying the subduction zone. (orig.)

  7. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    Science.gov (United States)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  8. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  9. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  10. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...... the intersection of IDSs and blockchains. In particular, we introduce the background of intrusion detection and blockchain, discuss the applicability of blockchain to intrusion detection, and identify open challenges in this direction....

  11. Tubing For Sampling Hydrazine Vapor

    Science.gov (United States)

    Travis, Josh; Taffe, Patricia S.; Rose-Pehrsson, Susan L.; Wyatt, Jeffrey R.

    1993-01-01

    Report evaluates flexible tubing used for transporting such hypergolic vapors as those of hydrazines for quantitative analysis. Describes experiments in which variety of tubing materials, chosen for their known compatibility with hydrazine, flexibility, and resistance to heat.

  12. Vapor trap for liquid metal

    Energy Technology Data Exchange (ETDEWEB)

    Watanabe, T

    1968-05-22

    In a pipe system which transfers liquid metal, inert gas (cover gas) is packed above the surface of the liquid metal to prevent oxidization of the liquid. If the metal vapor is contained in such cover gas, the circulating system of the cover gas is blocked due to condensation of liquid metal inside the system. The present invention relates to an improvement in vapor trap to remove the metal vapor from the cover gas. The trap consists of a cylindrical outer body, an inlet nozzle which is deeply inserted inside the outer body and has a number of holes to inject the cove gas into the body, metal mesh or steel wool which covers the exterior of the nozzle and on which the condensation of the metal gas takes place, and a heater wire hich is wound around the nozzle to prevent condensation of the metal vapor at the inner peripheral side of the mesh.

  13. Working group 4B - human intrusion: Design/performance requirements

    International Nuclear Information System (INIS)

    Channell, J.

    1993-01-01

    There is no summary of the progress made by working group 4B (Human Intrusion: Design/performance Requirements) during the Electric Power Research Institute's EPRI Workshop on the technical basis of EPA HLW Disposal Criteria, March 1993. This group was to discuss the waste disposal standard, 40 CFR Part 191, in terms of the design and performance requirements of human intrusion. Instead, because there were so few members, they combined with working group 4A and studied the three-tier approach to evaluating postclosure performance

  14. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments....

  15. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  16. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  17. Lower crustal intrusions beneath the southern Baikal Rift Zone

    DEFF Research Database (Denmark)

    Nielsen, Christoffer; Thybo, Hans

    2009-01-01

    centre. The BEST (Baikal Explosion Seismic Transect) project acquired a 360-km long, deep seismic, refraction/wide-angle reflection profile in 2002 across southern Lake Baikal. The data from this project is used for identification of large-scale crustal structures and modelling of the seismic velocities....../s and 7.9 km/s. We interpret this feature as resulting from mafic to ultra-mafic intrusions in the form of sills. Petrological interpretation of the velocity values suggests that the intrusions are sorted by fractional crystallization into plagioclase-rich low-velocity layers and pyroxene- and olivine...

  18. Experimental study of vapor explosion of molten salt and low boiling point liquid

    International Nuclear Information System (INIS)

    Iida, Yoshihiro; Takashima, Takeo

    1987-01-01

    Fundamental study of vapor explosion using small drops of high temperature liquid and low boiling point liquid and a series of small-scale vapor explosion tests are carried out. A single or plural drops of molten LiNO 3 are dropped into ethyl alcohol and the temperature range of two liquids wherein the fragmentation occurs is examined. The propagation phenomenon of vapor explosion between two drops is photographed and the pressure trace is proved to be well consistent with the behavior of the vapor bubble regions. A small amount of molten Flinak and tin which are enclosed in a test tube is dropped into tapped water. The temperature effect of two liquids onto the occurrence of vapor explosion is investigated. Some considerations are made with respect to the upper and lower temperature limits of vapor explosion to occur. A qualitative modeling of vapor explosion mechanism is proposed and discussed. (author)

  19. Solvent vapor annealing of an insoluble molecular semiconductor

    KAUST Repository

    Amassian, Aram

    2010-01-01

    Solvent vapor annealing has been proposed as a low-cost, highly versatile, and room-temperature alternative to thermal annealing of organic semiconductors and devices. In this article, we investigate the solvent vapor annealing process of a model insoluble molecular semiconductor thin film - pentacene on SiO 2 exposed to acetone vapor - using a combination of optical reflectance and two-dimensional grazing incidence X-ray diffraction measurements performed in situ, during processing. These measurements provide valuable and new insight into the solvent vapor annealing process; they demonstrate that solvent molecules interact mainly with the surface of the film to induce a solid-solid transition without noticeable swelling, dissolving or melting of the molecular material. © 2010 The Royal Society of Chemistry.

  20. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  1. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  2. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    International Nuclear Information System (INIS)

    James L. Jones

    2003-01-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more ''out-of-the-box'' solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed ''out-of-the-box'' solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense

  3. Predicting Seawater Intrusion in Coastal Groundwater Boreholes Using Self-Potential Data

    Science.gov (United States)

    Graham, M.; MacAllister, D. J.; Jackson, M.; Vinogradov, J.; Butler, A. P.

    2017-12-01

    Many coastal groundwater abstraction wells are under threat from seawater intrusion: this is exacerbated in summer by low water tables and increased abstraction. Existing hydrochemistry or geophysical techniques often fail to predict the timing of intrusion events. We investigate whether the presence and transport of seawater can influence self-potentials (SPs) measured within groundwater boreholes, with the aim of using SP monitoring to provide early warning of saline intrusion. SP data collection: SP data were collected from a coastal groundwater borehole and an inland borehole (> 60 km from the coast) in the Seaford Chalk of southern England. The SP gradient in the inland borehole was approximately 0.05 mV/m, while that in the coastal borehole varied from 0.16-0.26 mV/m throughout the monitoring period. Spectral analysis showed that semi-diurnal fluctuations in the SP gradient were several orders of magnitude higher at the coast than inland, indicating a strong influence from oceanic tides. A characteristic decrease in the gradient, or precursor, was observed in the coastal borehole several days prior to seawater intrusion. Modelling results: Hydrodynamic transport and geoelectric modelling suggest that observed pressure changes (associated with the streaming potential) are insufficient to explain either the magnitude of the coastal SP gradient or the semi-diurnal SP fluctuations. By contrast, a model of the exclusion-diffusion potential closely matches these observations and produces a precursor similar to that observed in the field. Sensitivity analysis suggests that both a sharp saline front and spatial variations in the exclusion efficiency arising from aquifer heterogeneities are necessary to explain the SP gradient observed in the coastal borehole. The presence of the precursor in the model depends also on the presence and depth of fractures near the base of the borehole. Conclusions: Our results indicate that SP monitoring, combined with hydrodynamic

  4. Melting temperature, vapor density, and vapor pressure of molybdenum pentafluoride

    Energy Technology Data Exchange (ETDEWEB)

    Krause, Jr, R F; Douglas, T B [National Bureau of Standards, Washington, D.C. (USA). Inst. for Materials Research

    1977-12-01

    A sample of MoF/sub 5/ was prepared by reaction of MoF/sub 6/(g) and Mo(c). Melting curves of temperature against time established the melting temperature at zero impurity to be 318.85 K, the enthalpy of fusion to be 6.1 kJ mol/sup -1/ (+ - 5 per cent), and the cryoscopic impurity of the sample to be 0.15 mole per cent. In the presence of MoF/sub 6/(g) which was added to suppress disproportionation, the vapor density of MoF/sub 5/ over the liquid was measured by the transpiration method at 343, 363, and 383 K, the total MoF/sub 5/ that evaporated being determined by permanganate titration. The total vapor pressure of MoF/sub 5/ oligomers over the liquid was measured by a simple static method at 373 and 392 K, while melting temperatures were taken alternately to monitor possible contamination of the sample. Although the vapor pressures were adjusted for disproportionation, solution of MoF/sub 6/ in MoF/sub 5/ (1), and wall adsorption of MoF/sub 6/ their percentage uncertainty is probably several times that of the vapor densities. A combination of the two properties indicates the average extent of association of the saturated vapor to be near 2, which is the value for the dimer species (MoF/sub 5/)/sub 2/.

  5. METEOROLOGICAL INFLUENCES ON VAPOR INCIDENTS IN THE 200 EAST and 200 WEST TANK FARMS FROM CY2001 THRU CY2004

    International Nuclear Information System (INIS)

    FAUROTE, J.M.

    2004-01-01

    Investigation into the meteorological influences on vapor incidents in the tank farms to determine what, if any, meteorological influences contribute to the reporting of odors, smells, vapors, and other gases. Weather phenomena, specifically barometric pressure, and wind velocity and direction can potentially cause or exacerbate a vapor release within the farm systems

  6. Inclined to see it your way: Do altercentric intrusion effects in visual perspective taking reflect an intrinsically social process?

    Science.gov (United States)

    Kragh Nielsen, Maria; Slade, Lance; Levy, Joseph P; Holmes, Amanda

    2015-01-01

    It has been suggested that some aspects of mental state understanding recruit a rudimentary, but fast and efficient, processing system, demonstrated by the obligatory slowing down of judgements about what the self can see when this is incongruent with what another can see. We tested the social nature of this system by investigating to what extent these altercentric intrusions are elicited under conditions that differed in their social relevance and, further, how these related to self-reported social perspective taking and empathy. In Experiment 1, adult participants were asked to make "self" or "other" perspective-taking judgements during congruent ("self" and "other" can see the same items) or incongruent conditions ("self" and "other" cannot see the same items) in conditions that were social (i.e., involving a social agent), semisocial (an arrow), or nonsocial (a dual-coloured block). Reaction time indices of altercentric intrusion effects were present across all conditions, but were significantly stronger for the social than for the less social conditions. Self-reported perspective taking and empathy correlated with altercentric intrusion effects in the social condition only. In Experiment 2, the significant correlations for the social condition were replicated, but this time with gaze duration indices of altercentric intrusion effects. Findings are discussed with regard to the degree to which this rudimentary system is socially specialized and how it is linked to more conceptual understanding.

  7. Modeling the influence of river discharge on salt intrusion and residual circulation in Danshuei River estuary, Taiwan

    Science.gov (United States)

    Liu, W.-C.; Chen, W.-B.; Cheng, R.T.; Hsu, M.-H.; Kuo, A.Y.

    2007-01-01

    A 3-D, time-dependent, baroclinic, hydrodynamic and salinity model was implemented and applied to the Danshuei River estuarine system and the adjacent coastal sea in Taiwan. The model forcing functions consist of tidal elevations along the open boundaries and freshwater inflows from the main stream and major tributaries in the Danshuei River estuarine system. The bottom friction coefficient was adjusted to achieve model calibration and verification in model simulations of barotropic and baroclinic flows. The turbulent diffusivities were ascertained through comparison of simulated salinity time series with observations. The model simulation results are in qualitative agreement with the available field data. The validated model was then used to investigate the influence of freshwater discharge on residual current and salinity intrusion under different freshwater inflow condition in the Danshuei River estuarine system. The model results reveal that the characteristic two-layered estuarine circulation prevails most of the time at Kuan-Du station near the river mouth. Comparing the estuarine circulation under low- and mean flow conditions, the circulation strengthens during low-flow period and its strength decreases at moderate river discharge. The river discharge is a dominating factor affecting the salinity intrusion in the estuarine system. A correlation between the distance of salt intrusion and freshwater discharge has been established allowing prediction of salt intrusion for different inflow conditions. ?? 2007 Elsevier Ltd. All rights reserved.

  8. Integral Analysis of Field Work and Laboratory Electrical Resistivity Imaging for Saline Water Intrusion Prediction in Groundwater

    Science.gov (United States)

    Zawawi, M. H.; Zahar, M. F.; Hashim, M. M. M.; Hazreek, Z. A. M.; Zahari, N. M.; Kamaruddin, M. A.

    2018-04-01

    Saline water intrusion is a serious threat to the groundwater as many part of the world utilize groundwater as their main source of fresh water supply. The usage of high salinity level of water as drinking water can lead to a very serious health hazard towards human. Saline water intrusion is a process by which induced flow of seawater into freshwater aquifer along the coastal area. It might happen due to human action and/or by natural event. The climate change and rise up of sea level may speed up the saline water intrusion process. The conventional method for distinguishing and checking saltwater interference to groundwater along the coast aquifers is to gather and test the groundwater from series of observation wells (borehole) with an end goal to give the important information about the hydrochemistry data to conclude whether the water in the well are safe to consume or not. An integrated approach of field and laboratory electrical resistivity investigation is proposed for indicating the contact region between saline and fresh groundwater. It was found that correlation for both soilbox produced almost identical curvilinear trends for 2% increment of seawater tested using sand sample. This project contributes towards predicting the saline water intrusion to the groundwater by non-destructive test that can replaced the conventional method of groundwater monitoring using series of boreholes in the coastal area

  9. Nocturnal insomnia symptoms and stress-induced cognitive intrusions in risk for depression: A 2-year prospective study.

    Science.gov (United States)

    Kalmbach, David A; Pillai, Vivek; Drake, Christopher L

    2018-01-01

    Nearly half of US adults endorse insomnia symptoms. Sleep problems increase risk for depression during stress, but the mechanisms are unclear. During high stress, individuals having difficulty falling or staying asleep may be vulnerable to cognitive intrusions after stressful events, given that the inability to sleep creates a period of unstructured and socially isolated time in bed. We investigated the unique and combined effects of insomnia symptoms and stress-induced cognitive intrusions on risk for incident depression. 1126 non-depressed US adults with no history of DSM-5 insomnia disorder completed 3 annual web-based surveys on sleep, stress, and depression. We examined whether nocturnal insomnia symptoms and stress-induced cognitive intrusions predicted depression 1y and 2y later. Finally, we compared depression-risk across four groups: non-perseverators with good sleep, non-perseverators with insomnia symptoms, perseverators with good sleep, and perseverators with insomnia symptoms. Insomnia symptoms (β = .10-.13, p good sleeping non-perseverators had the lowest rates (3.3%, Relative Risk = 3.94). Perseverators with sleep latency >30 m reported greater depression than good sleeping perseverators (t = 2.09, p stress creates a depressogenic mindset, and nocturnal wakefulness may augment the effects of cognitive arousal on depression development. Poor sleepers may be especially vulnerable to cognitive intrusions when having difficulty initiating sleep. As treatable behaviors, nighttime wakefulness and cognitive arousal may be targeted to reduce risk for depression in poor sleepers.

  10. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  11. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  12. Capability for intrusion detection at nuclear fuel sites

    International Nuclear Information System (INIS)

    1978-03-01

    A safeguards vulnerability assessment was conducted at three separate licensed nuclear processing facilities. Emphasis was placed on: (1) performance of the total intrusion detection system, and (2) vulnerability of the system to compromise by insiders. The security guards were interviewed to evaluate their effectiveness in executing their duties in accordance with the plant's security plan and to assess their knowledge regarding the operation of the security equipment. A review of the training schedule showed that the guards, along with the other plant employees, are required to periodically attend in-plant training sessions. The vulnerability assessments continued with interviews of the personnel responsible for maintaining the security equipment, with discussions of detector false alarm and maintenance problems. The second part of the vulnerability assessments was to evaluate the effectiveness of the intrusion detection systems including the interior and the perimeter sensors, CCTV surveillance devices and the exterior lighting. Two types of perimeter detectors are used at the sites, a fence disturbance sensor and an infrared barrier type detector. Infrared barrier type detectors have a higher probability of detection, especially in conjunction with dedicated CCTV cameras. The exterior lights satisfy the 0.2 footcandle illumination requirement. The interior intrusion detection systems included ultrasonic motion detectors, microwave motion detectors,balanced magnetic switches, and CCTV cameras. Entrance doors to the materials access areas and vital areas are protected with balanced magnetic switches. The interior intrusion detection systems at the three nuclear processing sites are considered satisfactory with the exception of the areas protected with ultrasonic motion detectors

  13. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  14. Data Fusion for Network Intrusion Detection: A Review

    Directory of Open Access Journals (Sweden)

    Guoquan Li

    2018-01-01

    Full Text Available Rapid progress of networking technologies leads to an exponential growth in the number of unauthorized or malicious network actions. As a component of defense-in-depth, Network Intrusion Detection System (NIDS has been expected to detect malicious behaviors. Currently, NIDSs are implemented by various classification techniques, but these techniques are not advanced enough to accurately detect complex or synthetic attacks, especially in the situation of facing massive high-dimensional data. Besides, the inherent defects of NIDSs, namely, high false alarm rate and low detection rate, have not been effectively solved. In order to solve these problems, data fusion (DF has been applied into network intrusion detection and has achieved good results. However, the literature still lacks thorough analysis and evaluation on data fusion techniques in the field of intrusion detection. Therefore, it is necessary to conduct a comprehensive review on them. In this article, we focus on DF techniques for network intrusion detection and propose a specific definition to describe it. We review the recent advances of DF techniques and propose a series of criteria to compare their performance. Finally, based on the results of the literature review, a number of open issues and future research directions are proposed at the end of this work.

  15. A Labeled Data Set For Flow-based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Sadre, R.; van Vliet, Frank; Pras, Aiko; Nunzi, Giorgio; Scoglio, Caterina; Li, Xing

    2009-01-01

    Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field, benchmarking of flow-based IDS is still an open issue. In this paper, we propose the first publicly available, labeled data set

  16. Intrusion of beach-disposed dredger spoil into the Mhlathuze ...

    African Journals Online (AJOL)

    Sediment intrusion and its impact on the beds of the seagrass Zostera capensis in the estuary were monitored from 1996 to 1999. Fine sediment did enter the estuary from the marine environment and was deposited mainly in its lower reaches, where its settling on the leaves of Zostera resulted in a major die-back. However ...

  17. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  18. AANtID: an alternative approach to network intrusion detection ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Security has become not just a feature of an information system, but the core and a necessity especially the systems that communicate and transmit data over the Internet for they are more ... Keywords: Intrusion, Genetic Algorithm, detection, Security, DARPA dataset ...

  19. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    the Earth that includes accretion and dispersal of supercontinents, viz., Columbia (Rogers and. Santosh 2002; Zhao et al 2004) and Rodinia. Keywords. Chhattisgarh Supergroup; Singhora Group; diabasic intrusive; geochemistry and age. J. Earth Syst. Sci. 120, No. 2, April 2011, pp. 223–236 c Indian Academy of Sciences.

  20. Approaches in anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, S.; Di Pietro, R.; Mancini, L.V.

    2008-01-01

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  1. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  2. On emulation-based network intrusion detection systems

    NARCIS (Netherlands)

    Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; Etalle, S.; Stavrou, A.; Bos, H.; Portokalidis, G.

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity.

  3. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    2008-01-01

    We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying a new method for anomaly detection on the

  4. Approaches in Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  5. Petrography of some altered intrusive rocks from the Lower Benue ...

    African Journals Online (AJOL)

    Petrography of some altered intrusive rocks from the Lower Benue Trough, Nigeria. Smart C Obiora, Alphonso C Umeji. Abstract. No Abstract. Journal of Mining and Geology 2005, Vol 41(1): 1-9. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  6. Revised predictive equations for salt intrusion modelling in estuaries

    NARCIS (Netherlands)

    Gisen, J.I.A.; Savenije, H.H.G.; Nijzink, R.C.

    2015-01-01

    For one-dimensional salt intrusion models to be predictive, we need predictive equations to link model parameters to observable hydraulic and geometric variables. The one-dimensional model of Savenije (1993b) made use of predictive equations for the Van der Burgh coefficient $K$ and the dispersion

  7. Pre-Stressor Interference Control and Intrusive Memories

    NARCIS (Netherlands)

    Verwoerd, J.; Wessel, I.; De Jong, P.J.; Nieuwenhuis, Maurice; Huntjens, R.J.C.

    Although intrusive imagery is a common response in the aftermath of a stressful or traumatic event, only a minority of trauma victims show persistent re-experiencing and related psychopathology. Individual differences in pre-trauma executive control possibly play a critical role. Therefore, this

  8. Salt intrusion study in Cochin estuary - Using empirical models

    Digital Repository Service at National Institute of Oceanography (India)

    Jacob, B.; Revichandran, C.; NaveenKumar, K.R.

    been applied to the Cochin estuary in the present study to identify the most suitable model for predicting the salt intrusion length. Comparison of the obtained results indicate that the model of Van der Burgh (1972) is the most suitable empirical model...

  9. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data

    Science.gov (United States)

    2012-03-01

    52 Table 7. Place Reachability Statistics for Low Level CPN...54 Table 8. Place Reachability Statistics for High Level CPN................................................. 55 Table 9. Password Stealing...the efficiency of traditional anti-virus software tools that are dependent on gigantic , continuously updated databases. Fortunately, Intrusion

  10. State of the Practice of Intrusion Detection Technologies

    Science.gov (United States)

    2000-01-01

    functions, procedures, and scripts, an Oracle database structure, Borne shell scripts, and configuration files which together communicate with ASIM Sensor...34Plugging the Holes in eCommerce Leads to 135% Growth in the Intrusion Detection and Vulnerability Assessment Software Market," PRNewswire. August

  11. Saltwater Intrusion Appraisal of Shallow Aquifer in Burutu Area of ...

    African Journals Online (AJOL)

    ADOWIE PERE

    is not caused by saltwater intrusion rather by iron which cannot be separately distinguished from groundwater by ... The sand and gravels forms the aquifer in the. Formation and are .... K.S; Soulios, G; Pliakas, F; Tsokas, G ( 2016). Seawater ...

  12. Illness intrusiveness among survivors of autologous blood and marrow transplantation.

    Science.gov (United States)

    Schimmer, A D; Elliott, M E; Abbey, S E; Raiz, L; Keating, A; Beanlands, H J; McCay, E; Messner, H A; Lipton, J H; Devins, G M

    2001-12-15

    Illness-induced disruptions to lifestyles, activities, and interests (i.e., illness intrusiveness) compromise subjective well-being. The authors measured illness intrusiveness in autologous blood and bone marrow transplantation (ABMT) survivors and compared the results with survivors of solid organ transplants. Forty-four of 64 consecutive ABMT survivors referred to the University of Toronto ABMT long-term follow-up clinic completed the Illness Intrusiveness Ratings Scale (IIRS), the Affect Balance Scale (ABS), the Atkinson Life Happiness Rating (ATKLH), the Beck Hopelessness Scale (BHS), and the Center for Epidemiologic Studies Depression (CES-D) Scale. Mean time from ABMT to evaluation was 4.6 +/- 2.8 years. All patients were in remission or had stable disease at the time of evaluation. Autologous blood and bone marrow transplantation patients' IIRS scores were compared with scores reported by recipients of kidney (n = 357), liver (n = 150), lung (n = 77), and heart (n = 60) transplants. Mean IIRS score for the 44 ABMT patients was 37.2 +/- 17 (maximum possible score, 91; minimum possible score, 13). Higher IIRS scores correlated with lower scores on the ABS (r = -0.54; P work, financial situation, and active recreation. Despite achieving a remission after ABMT, patients continue to experience illness intrusiveness compromising subjective well-being. Copyright 2001 American Cancer Society.

  13. Efficient cooling of rocky planets by intrusive magmatism

    Science.gov (United States)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  14. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  15. Trauma Films, Information Processing, and Intrusive Memory Development

    Science.gov (United States)

    Holmes, Emily A.; Brewin, Chris R.; Hennessy, Richard G.

    2004-01-01

    Three experiments indexed the effect of various concurrent tasks, while watching a traumatic film, on intrusive memory development. Hypotheses were based on the dual-representation theory of posttraumatic stress disorder (C. R. Brewin, T. Dalgleish, & S. Joseph, 1996). Nonclinical participants viewed a trauma film under various encoding conditions…

  16. Non-Intrusive Solution of Stochastic and Parametric Equations

    KAUST Repository

    Matthies, Hermann

    2015-01-07

    Many problems depend on parameters, which may be a finite set of numerical values, or mathematically more complicated objects like for example processes or fields. We address the situation where we have an equation which depends on parameters; stochastic equations are a special case of such parametric problems where the parameters are elements from a probability space. One common way to represent this dependability on parameters is by evaluating the state (or solution) of the system under investigation for different values of the parameters. But often one wants to evaluate the solution quickly for a new set of parameters where it has not been sampled. In this situation it may be advantageous to express the parameter dependent solution with an approximation which allows for rapid evaluation of the solution. Such approximations are also called proxy or surrogate models, response functions, or emulators. All these methods may be seen as functional approximations—representations of the solution by an “easily computable” function of the parameters, as opposed to pure samples. The most obvious methods of approximation used are based on interpolation, in this context often labelled as collocation. In the frequent situation where one has a “solver” for the equation for a given parameter value, i.e. a software component or a program, it is evident that this can be used to independently—if desired in parallel—solve for all the parameter values which subsequently may be used either for the interpolation or in the quadrature for the projection. Such methods are therefore uncoupled for each parameter value, and they additionally often carry the label “non-intrusive”. Without much argument all other methods— which produce a coupled system of equations–are almost always labelled as “intrusive”, meaning that one cannot use the original solver. We want to show here that this not necessarily the case. Another approach is to choose some other projection onto

  17. Non-Intrusive Solution of Stochastic and Parametric Equations

    KAUST Repository

    Matthies, Hermann

    2015-01-01

    Many problems depend on parameters, which may be a finite set of numerical values, or mathematically more complicated objects like for example processes or fields. We address the situation where we have an equation which depends on parameters; stochastic equations are a special case of such parametric problems where the parameters are elements from a probability space. One common way to represent this dependability on parameters is by evaluating the state (or solution) of the system under investigation for different values of the parameters. But often one wants to evaluate the solution quickly for a new set of parameters where it has not been sampled. In this situation it may be advantageous to express the parameter dependent solution with an approximation which allows for rapid evaluation of the solution. Such approximations are also called proxy or surrogate models, response functions, or emulators. All these methods may be seen as functional approximations—representations of the solution by an “easily computable” function of the parameters, as opposed to pure samples. The most obvious methods of approximation used are based on interpolation, in this context often labelled as collocation. In the frequent situation where one has a “solver” for the equation for a given parameter value, i.e. a software component or a program, it is evident that this can be used to independently—if desired in parallel—solve for all the parameter values which subsequently may be used either for the interpolation or in the quadrature for the projection. Such methods are therefore uncoupled for each parameter value, and they additionally often carry the label “non-intrusive”. Without much argument all other methods— which produce a coupled system of equations–are almost always labelled as “intrusive”, meaning that one cannot use the original solver. We want to show here that this not necessarily the case. Another approach is to choose some other projection onto

  18. Radiological risks due to intrusion into a deep bedrock repository

    International Nuclear Information System (INIS)

    Nordlinder, S.; Bergstroem, U.; Edlund, O.

    1999-01-01

    The Swedish concept for disposal of high-level waste is a deep (500 m) bedrock repository (SFL) protected by multiple barriers that isolate the waste from the environment for such a long time that the physical decay will cause a substantial reduction of the radioactivity. The aim of concentration and isolation of high-level waste is to reduce the radiation risk. Intrusion in the repository may introduce a small residual risk to individuals. A risk analysis was performed comprising dose assessment and probabilities of occurrence. Intrusions may be considered to take place either due to conscious actions or by actions without any knowledge about the repository. For conscious intrusion it may be assumed that there will be enough knowledge to manage the radiation situation in a professional manner. Several reasons for making inadvertent intrusion are possible. Independently of the purpose, the most probable initial way of coming into contact with the radioactive material is by deep drilling. Examples of causes for drilling could be general scientific purposes or exploitation of geothermal energy. Dose assessments were made for intrusion due to inclined drilling directly into a canister, and drilling near an initially malfunctioning canister from which radionuclides have leaked into the groundwater. For the former case, external pathways were considered due to exposure from a core of the canister with fuel and contaminated bore dust. The most common drilling method is with water flushing for removal of bore dust, which will not cause any substantial transfer of radionuclides to air. For the second case, it was assumed that there was a well in the vicinity. The only pathway considered was therefore consumption of water because it dominates the exposure. The highest dose rates to man were, as expected, obtained by drilling into the canister. Dose rates decrease with time after closure. During the first time the relatively short-lived radionuclides Cs-137 and Sr-90 give

  19. The effect of destination linked feature selection in real-time network intrusion detection

    CSIR Research Space (South Africa)

    Mzila, P

    2013-07-01

    Full Text Available techniques in the network intrusion detection system (NIDS) is the feature selection technique. The ability of NIDS to accurately identify intrusion from the network traffic relies heavily on feature selection, which describes the pattern of the network...

  20. Non-intrusive optical study of gas and its exchange in human maxillary sinuses

    Science.gov (United States)

    Persson, L.; Andersson, M.; Svensson, T.; Cassel-Engquist, M.; Svanberg, K.; Svanberg, S.

    2007-07-01

    We demonstrate a novel non-intrusive technique based on tunable diode laser absorption spectroscopy to investigate human maxillary sinuses in vivo. The technique relies on the fact that free gases have much sharper absorption features (typical a few GHz) than the surrounding tissue. Molecular oxygen was detected at 760 nm. Volunteers have been investigated by injecting near-infrared light fibre-optically in contact with the palate inside the mouth. The multiply scattered light was detected externally by a handheld probe on and around the cheek bone. A significant signal difference in oxygen imprint was observed when comparing volunteers with widely different anamnesis regarding maxillary sinus status. Control measurements through the hand and through the cheek below the cheekbone were also performed to investigate any possible oxygen offset in the setup. These provided a consistently non-detectable signal level. The passages between the nasal cavity and the maxillary sinuses were also non-intrusively optically studied, to the best of our knowledge for the first time. These measurements provide information on the channel conductivity which may prove useful in facial sinus diagnostics. The results suggest that a clinical trial together with an ear-nose-throat (ENT) clinic should be carried out to investigate the clinical use of the new technique.

  1. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  2. Ensemble regression model-based anomaly detection for cyber-physical intrusion detection in smart grids

    DEFF Research Database (Denmark)

    Kosek, Anna Magdalena; Gehrke, Oliver

    2016-01-01

    The shift from centralised large production to distributed energy production has several consequences for current power system operation. The replacement of large power plants by growing numbers of distributed energy resources (DERs) increases the dependency of the power system on small scale......, distributed production. Many of these DERs can be accessed and controlled remotely, posing a cybersecurity risk. This paper investigates an intrusion detection system which evaluates the DER operation in order to discover unauthorized control actions. The proposed anomaly detection method is based...

  3. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    International Nuclear Information System (INIS)

    P. Bernot

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  4. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  5. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  6. U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland

    DEFF Research Database (Denmark)

    Þórarinsson, Sigurjón Böðvar; Holm, Paul Martin; Tappe, Sebatstian

    2016-01-01

    Several major tholeiitic (e.g. the Skaergaard intrusion) and alkaline (e.g. the Kangerlussuaq Syenite) intrusive complexes of the North Atlantic Large Igneous Province are exposed along the Kangerlussuaq Fjord in East Greenland. The Kærven Complex forms a satellite intrusion to the Kangerlussuaq ...

  7. Nocturnal insomnia symptoms and stress-induced cognitive intrusions in risk for depression: A 2-year prospective study

    Science.gov (United States)

    Pillai, Vivek; Drake, Christopher L.

    2018-01-01

    Nearly half of US adults endorse insomnia symptoms. Sleep problems increase risk for depression during stress, but the mechanisms are unclear. During high stress, individuals having difficulty falling or staying asleep may be vulnerable to cognitive intrusions after stressful events, given that the inability to sleep creates a period of unstructured and socially isolated time in bed. We investigated the unique and combined effects of insomnia symptoms and stress-induced cognitive intrusions on risk for incident depression. 1126 non-depressed US adults with no history of DSM-5 insomnia disorder completed 3 annual web-based surveys on sleep, stress, and depression. We examined whether nocturnal insomnia symptoms and stress-induced cognitive intrusions predicted depression 1y and 2y later. Finally, we compared depression-risk across four groups: non-perseverators with good sleep, non-perseverators with insomnia symptoms, perseverators with good sleep, and perseverators with insomnia symptoms. Insomnia symptoms (β = .10–.13, p insomnia had the highest rates of depression (13.0%), whereas good sleeping non-perseverators had the lowest rates (3.3%, Relative Risk = 3.94). Perseverators with sleep latency >30 m reported greater depression than good sleeping perseverators (t = 2.09, p < .04). Cognitive intrusions following stress creates a depressogenic mindset, and nocturnal wakefulness may augment the effects of cognitive arousal on depression development. Poor sleepers may be especially vulnerable to cognitive intrusions when having difficulty initiating sleep. As treatable behaviors, nighttime wakefulness and cognitive arousal may be targeted to reduce risk for depression in poor sleepers. PMID:29438400

  8. Thermal plasma chemical vapor deposition

    International Nuclear Information System (INIS)

    Heberlein, J.; Pfender, E.

    1993-01-01

    Thermal plasmas, with temperatures up to and even exceeding 10 4 K, are capable of producing high density vapor phase precursors for the deposition of relatively thick films. Although this technology is still in its infancy, it will fill the void between the relatively slow deposition processes such as physical vapor deposition and the high rate thermal spray deposition processes. In this chapter, the present state-of-the-art of this field is reviewed with emphasis on the various types of reactors proposed for this emerging technology. Only applications which attracted particular attention, namely diamond and high T c superconducting film deposition, are discussed in greater detail. (orig.)

  9. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  10. Waste Tank Vapor Project: Tank vapor database development

    International Nuclear Information System (INIS)

    Seesing, P.R.; Birn, M.B.; Manke, K.L.

    1994-09-01

    The objective of the Tank Vapor Database (TVD) Development task in FY 1994 was to create a database to store, retrieve, and analyze data collected from the vapor phase of Hanford waste tanks. The data needed to be accessible over the Hanford Local Area Network to users at both Westinghouse Hanford Company (WHC) and Pacific Northwest Laboratory (PNL). The data were restricted to results published in cleared reports from the laboratories analyzing vapor samples. Emphasis was placed on ease of access and flexibility of data formatting and reporting mechanisms. Because of time and budget constraints, a Rapid Application Development strategy was adopted by the database development team. An extensive data modeling exercise was conducted to determine the scope of information contained in the database. a A SUN Sparcstation 1000 was procured as the database file server. A multi-user relational database management system, Sybase reg-sign, was chosen to provide the basic data storage and retrieval capabilities. Two packages were chosen for the user interface to the database: DataPrism reg-sign and Business Objects trademark. A prototype database was constructed to provide the Waste Tank Vapor Project's Toxicology task with summarized and detailed information presented at Vapor Conference 4 by WHC, PNL, Oak Ridge National Laboratory, and Oregon Graduate Institute. The prototype was used to develop a list of reported compounds, and the range of values for compounds reported by the analytical laboratories using different sample containers and analysis methodologies. The prototype allowed a panel of toxicology experts to identify carcinogens and compounds whose concentrations were within the reach of regulatory limits. The database and user documentation was made available for general access in September 1994

  11. Identifying seawater intrusion in coastal areas by means of 1D and quasi-2D joint inversion of TDEM and VES data

    Science.gov (United States)

    Martínez-Moreno, F. J.; Monteiro-Santos, F. A.; Bernardo, I.; Farzamian, M.; Nascimento, C.; Fernandes, J.; Casal, B.; Ribeiro, J. A.

    2017-09-01

    Seawater intrusion is an increasingly widespread problem in coastal aquifers caused by climate changes -sea-level rise, extreme phenomena like flooding and droughts- and groundwater depletion near to the coastline. To evaluate and mitigate the environmental risks of this phenomenon it is necessary to characterize the coastal aquifer and the salt intrusion. Geophysical methods are the most appropriate tool to address these researches. Among all geophysical techniques, electrical methods are able to detect seawater intrusions due to the high resistivity contrast between saltwater, freshwater and geological layers. The combination of two or more geophysical methods is recommended and they are more efficient when both data are inverted jointly because the final model encompasses the physical properties measured for each methods. In this investigation, joint inversion of vertical electric and time domain soundings has been performed to examine seawater intrusion in an area within the Ferragudo-Albufeira aquifer system (Algarve, South of Portugal). For this purpose two profiles combining electrical resistivity tomography (ERT) and time domain electromagnetic (TDEM) methods were measured and the results were compared with the information obtained from exploration drilling. Three different inversions have been carried out: single inversion of the ERT and TDEM data, 1D joint inversion and quasi-2D joint inversion. Single inversion results identify seawater intrusion, although the sedimentary layers detected in exploration drilling were not well differentiated. The models obtained with 1D joint inversion improve the previous inversion due to better detection of sedimentary layer and the seawater intrusion appear to be better defined. Finally, the quasi-2D joint inversion reveals a more realistic shape of the seawater intrusion and it is able to distinguish more sedimentary layers recognised in the exploration drilling. This study demonstrates that the quasi-2D joint

  12. Comparison of sensor characteristics of three real-time monitors for organic vapors.

    Science.gov (United States)

    Hori, Hajime; Ishimatsu, Sumiyo; Fueta, Yukiko; Hinoue, Mitsuo; Ishidao, Toru

    2015-01-01

    Sensor characteristics and performance of three real-time monitors for volatile organic compounds (VOC monitor) equipped with a photo ionization detector (PID), a sensor using the interference enhanced reflection (IER) method and a semiconductor gas sensor were investigated for 52 organic solvent vapors designated as class 1 and class 2 of organic solvents by the Ordinance of Organic Solvent Poisoning Prevention in Japan. Test vapors were prepared by injecting each liquid solvent into a 50 l Tedlar® bag and perfectly vaporizing it. The vapor concentration was from one-tenth to twice the administrative control level for all solvents. The vapor concentration was measured with the monitors and a gas chromatograph equipped with a flame ionization detector simultaneously, and the values were compared. The monitor with the PID sensor could measure many organic vapors, but it could not detect some vapors with high ionization potential. The IER sensor could also detect many vapors, but a linear response was not obtained for some vapors. A semiconductor sensor could detect methanol that could not be detected by PID and IER sensors. Working environment measurement of organic vapors by real-time monitors may be possible, but sensor characteristics and their limitations should be known.

  13. Boundary vapor contentsin an annular channel

    International Nuclear Information System (INIS)

    Remizov, O.V.; Shurkin, N.G.; Podgornyj, K.K.; Gal'chenko, Eh.F.; Bukhteev, I.S.

    1978-01-01

    The work is aimed at the experimental investigation of the worsening of the heat transfer in an annular channel. The experiments have been carried out on the annular channel 32x28x3000 mm with the even distribution of the heat flux along the length at pressures of 6.9-19.6 MPa, flow rate of 350-1000 kg/m 2 s, and specific heat fluxes from 0.18 up to 0.6 MW/m 2 . Heating is external, oneside. Water monodistillate of the following composition has been used as a coolant: pH 9; dry residue - 0.8-1.2 mg/kg, oxygen -10-15 mg/kg. It is found out that the change character of the temperature field of the heating surface of the annular channel at the regime with the worsen of heat emission depends on the ratio of regime parameters. At pressures of 6.9-13.7 MPa and flow rate of 350-500 kg/m 2 s the channel wall temperature rises monotoneously, never reaching its maximum. With pressure rise > 13.7 MPa and mass velocity > 500 kg/m 2 s the temperature of the heat emitting surface reaches its maximum, and then slowly falls. At pressures of 6.9-11.8 MPa the boundary vapor content value within the whole range of mass velocities does not depend on the specific heat flux q. At pressures higher than 13.7 MPa and mass velocities of 350-1000 kg/m 2 s the boundary vapor content depends on q. The heating of the external or internal surface of the annular channel affects the value of the boundary vapor content within the whole range of regime parameters' change under investigation

  14. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    -intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results......Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non...

  15. Estimated vapor pressure for WTP process streams

    Energy Technology Data Exchange (ETDEWEB)

    Pike, J. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Poirier, M. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2015-01-01

    Design assumptions during the vacuum refill phase of the Pulsed Jet Mixers (PJMs) in the Hanford Waste Treatment and Immobilization Plant (WTP) equate the vapor pressure of all process streams to that of water when calculating the temperature at which the vacuum refill is reduced or eliminated. WTP design authority asked the authors to assess this assumption by performing calculations on proposed feed slurries to calculate the vapor pressure as a function of temperature. The vapor pressure was estimated for each WTP waste group. The vapor pressure suppression caused by dissolved solids is much greater than the increase caused by organic components such that the vapor pressure for all of the waste group compositions is less than that of pure water. The vapor pressure for each group at 145°F ranges from 81% to 98% of the vapor pressure of water. If desired, the PJM could be operated at higher temperatures for waste groups with high dissolved solids that suppress vapor pressure. The SO4 group with the highest vapor pressure suppression could be operated up to 153°F before reaching the same vapor pressure of water at 145°F. However, most groups would reach equivalent vapor pressure at 147 to 148°F. If any of these waste streams are diluted, the vapor pressure can exceed the vapor pressure of water at mass dilution ratios greater than 10, but the overall effect is less than 0.5%.

  16. Vapor generation methods for explosives detection research

    Energy Technology Data Exchange (ETDEWEB)

    Grate, Jay W.; Ewing, Robert G.; Atkinson, David A.

    2012-12-01

    The generation of calibrated vapor samples of explosives compounds remains a challenge due to the low vapor pressures of the explosives, adsorption of explosives on container and tubing walls, and the requirement to manage (typically) multiple temperature zones as the vapor is generated, diluted, and delivered. Methods that have been described to generate vapors can be classified as continuous or pulsed flow vapor generators. Vapor sources for continuous flow generators are typically explosives compounds supported on a solid support, or compounds contained in a permeation or diffusion device. Sources are held at elevated isothermal temperatures. Similar sources can be used for pulsed vapor generators; however, pulsed systems may also use injection of solutions onto heated surfaces with generation of both solvent and explosives vapors, transient peaks from a gas chromatograph, or vapors generated by s programmed thermal desorption. This article reviews vapor generator approaches with emphasis on the method of generating the vapors and on practical aspects of vapor dilution and handling. In addition, a gas chromatographic system with two ovens that is configurable with up to four heating ropes is proposed that could serve as a single integrated platform for explosives vapor generation and device testing. Issues related to standards, calibration, and safety are also discussed.

  17. Intrusion detection model using fusion of chi-square feature selection and multi class SVM

    Directory of Open Access Journals (Sweden)

    Ikram Sumaiya Thaseen

    2017-10-01

    Full Text Available Intrusion detection is a promising area of research in the domain of security with the rapid development of internet in everyday life. Many intrusion detection systems (IDS employ a sole classifier algorithm for classifying network traffic as normal or abnormal. Due to the large amount of data, these sole classifier models fail to achieve a high attack detection rate with reduced false alarm rate. However by applying dimensionality reduction, data can be efficiently reduced to an optimal set of attributes without loss of information and then classified accurately using a multi class modeling technique for identifying the different network attacks. In this paper, we propose an intrusion detection model using chi-square feature selection and multi class support vector machine (SVM. A parameter tuning technique is adopted for optimization of Radial Basis Function kernel parameter namely gamma represented by ‘ϒ’ and over fitting constant ‘C’. These are the two important parameters required for the SVM model. The main idea behind this model is to construct a multi class SVM which has not been adopted for IDS so far to decrease the training and testing time and increase the individual classification accuracy of the network attacks. The investigational results on NSL-KDD dataset which is an enhanced version of KDDCup 1999 dataset shows that our proposed approach results in a better detection rate and reduced false alarm rate. An experimentation on the computational time required for training and testing is also carried out for usage in time critical applications.

  18. Carbonate reservoirs modified by magmatic intrusions in the Bachu area, Tarim Basin, NW China

    Directory of Open Access Journals (Sweden)

    Kang Xu

    2015-09-01

    Full Text Available Oil and gas exploration in carbonate rocks was extremely successful in recent years in the Ordovician in Tarim Basin, NW China. Here, we investigate the carbonate reservoirs in the Bachu area of the Tarim Basin through petrological and geochemical studies combined with oil and gas exploration data. Geochemical analysis included the major, trace, and rare earth elements; fluid inclusion thermometry; clay mineral characterization; and carbon and oxygen isotopes of the carbonate rocks. Homogenization temperatures of the fluid inclusions of Well He-3 in the Bachu area indicate three groups, 60–80 °C, 90–130 °C, and 140–170 °C, and suggest that the carbonate rocks experienced modification due to heating events. The porosity in the reservoir is defined by fractures and secondary pores, and there is a notable increase in the porosity of the carbonate reservoirs in proximity to magmatic intrusion, particularly approximately 8–10 m from the intrusive rocks. The development of secondary pores was controlled by lithofacies and corrosion by various fluids. We identify supercritical fluids with high density (138.12–143.97 mg/cm3 in the Bachu area. The negative correlations of δ13C (−2.76‰ to −0.97‰ and δ18O (−7.91‰ to −5.07‰ suggest that the carbonate rocks in the study area were modified by high-salinity hydrothermal fluid. The formation of clay minerals, such as illite and montmorillonite, caused a decrease in porosity. Our study demonstrates the effect of magmatic intrusions in modifying the reservoir characteristics of carbonate rocks and has important implications for oil and gas exploration.

  19. Preliminary experimental results for a non-intrusive scheme for the detection of flaws in metal pipelines

    Science.gov (United States)

    Aydin, K.; Shinde, S.; Suhail, M.; Vyas, A.; Zieher, K. W.

    2002-05-01

    An acoustic pulse echo scheme for non-intrusive detection of flaws in metal pipelines has been investigated in the laboratory. The primary pulse is generated by a pulsed magnetic field enclosing a short section of a free pipe. The detection is by an electrostatic detector surrounding a short section of the pipe. Reflected pulses from thin areas, with a longitudinal extension of about one pipe radius and a reduction of the wall thickness of 40%, can be detected clearly.

  20. Biological intrusion of low-level-waste trench covers

    Science.gov (United States)

    Hakonson, T. E.; Gladney, E. S.

    The long-term integrity of low-level waste shallow land burialsites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. The need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatment is demonstrated. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and sil overburden depth.

  1. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  2. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    International Nuclear Information System (INIS)

    Bernot, P.

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  3. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  4. Use of behavioral biometrics in intrusion detection and online gaming

    Science.gov (United States)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2006-04-01

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

  5. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  6. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  7. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  8. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  9. Thermodynamics of water intrusion in nanoporous hydrophobic solids.

    Science.gov (United States)

    Cailliez, Fabien; Trzpit, Mickael; Soulard, Michel; Demachy, Isabelle; Boutin, Anne; Patarin, Joël; Fuchs, Alain H

    2008-08-28

    We report a joint experimental and molecular simulation study of water intrusion in silicalite-1 and ferrerite zeolites. The main conclusion of this study is that water condensation takes place through a genuine first-order phase transition, provided that the interconnected pores structure is 3-dimensional. In the extreme confinement situation (ferrierite zeolite), condensation takes place through a continuous transition, which is explained by a shift of both the first-order transition line and the critical point with increasing confinement. The present findings are at odds with the common belief that conventional phase transitions cannot take place in microporous solids such as zeolites. The most important features of the intrusion/extrusion process can be understood in terms of equilibrium thermodynamics considerations. We believe that these findings are very general for hydrophobic solids, i.e. for both nonwetting as well as wetting water-solid interface systems.

  10. Medication Adherence using Non-intrusive Wearable Sensors

    Directory of Open Access Journals (Sweden)

    T. H. Lim

    2017-12-01

    Full Text Available Activity recognition approaches have been applied in home ambient systems to monitor the status and well- being of occupant especially for home care systems. With the advancement of embedded wireless sensing devices, various applications have been proposed to monitor user´s activities and maintain a healthy lifestyle. In this paper, we propose and evaluate a Smart Medication Alert and Treatment Electronic Systems (SmartMATES using a non-intrusive wearable activity recognition sensing system to monitor and alert an user for missing medication prescription. Two sensors are used to collect data from the accelerometer and radio transceiver. Based on the data collected, SmartMATES processes the data and generate a model for the various actions including taking medication. We have evaluated the SmartMATES on 9 participants. The results show that the SmartMATES can identify and prevent missing dosage in a less intrusive way than existing mobile application and traditional approaches.

  11. Manipulating recall vantage perspective of intrusive memories in dysphoria.

    Science.gov (United States)

    Williams, Alishia D; Moulds, Michelle L

    2008-10-01

    The current study attempted to experimentally manipulate mode of recall (field, observer perspective) in a sample of mildly dysphoric participants (N=134) who reported a distressing intrusive memory of negative autobiographical event. Specifically, the current study sought to ascertain whether shifting participants into a converse perspective would have differential effects on the reported experience of their memory. Results indicated that shifting participants from a field to an observer perspective resulted in decreased experiential ratings: specifically, reduced distress and vividness. Also, as anticipated, the converse shift in perspective (from observer to field) did not lead to a corresponding increase in experiential ratings, but did result in reduced ratings of observation and a trend was observed for decreased levels of detachment. The findings support the notion that recall perspective has a functional role in the regulation of intrusion-related distress and represents a cognitive avoidance mechanism.

  12. Vapor generating unit blowdown arrangement

    International Nuclear Information System (INIS)

    McDonald, B.N.

    1978-01-01

    A vapor generating unit having a U-shaped tube bundle is provided with an orificed downcomer shroud and a fluid flow distribution plate between the lower hot and cold leg regions to promote fluid entrained sediment deposition in proximity to an apertured blowdown pipe

  13. An Immune-inspired Adaptive Automated Intrusion Response System Model

    Directory of Open Access Journals (Sweden)

    Ling-xi Peng

    2012-09-01

    Full Text Available An immune-inspired adaptive automated intrusion response system model, named as , is proposed. The descriptions of self, non-self, immunocyte, memory detector, mature detector and immature detector of the network transactions, and the realtime network danger evaluation equations are given. Then, the automated response polices are adaptively performed or adjusted according to the realtime network danger. Thus, not only accurately evaluates the network attacks, but also greatly reduces the response times and response costs.

  14. Assessment of permeation quality of concrete through mercury intrusion porosimetry

    International Nuclear Information System (INIS)

    Kumar, Rakesh; Bhattacharjee, B.

    2004-01-01

    Permeation quality of laboratory cast concrete beams was determined through initial surface absorption test (ISAT). The pore system characteristics of the same concrete beam specimens were determined through mercury intrusion porosimetry (MIP). Data so obtained on the measured initial surface absorption rate of water by concrete and characteristics of pore system of concrete estimated from porosimetry results were used to develop correlations between them. Through these correlations, potential of MIP in assessing the durability quality of concrete in actual structure is demonstrated

  15. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    OpenAIRE

    Dhanalakshmi Krishnan Sadhasivan; Kannapiran Balasubramanian

    2017-01-01

    Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to...

  16. Mass memory formatter subsystem of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-09-01

    The Mass Memory Formatter was developed as part of the Adaptive Intrusion Data System (AIDS) to control a 2.4-megabit mass memory. The data from a Memory Controlled Processor is formatted before it is stored in the memory and reformatted during the readout mode. The data is then transmitted to a NOVA 2 minicomputer-controlled magnetic tape recorder for storage. Techniques and circuits are described

  17. Waste storage in the vadose zone affected by water vapor condensation and leaching

    International Nuclear Information System (INIS)

    Cary, J.W.; Gee, G.W.; Whyatt, G.A.

    1990-08-01

    One of the major concerns associated with waste storage in the vadose zone is that toxic materials may somehow be leached and transported by advecting water down to the water table and reach the accessible environment through either a well or discharge to a river. Consequently, care is taken to provide barriers over and around the storage sites to reduce contact between infiltrating water and the buried waste form. In some cases, it is important to consider the intrusion of water vapor as well as water in the liquid phase. Water vapor diffuses through porous material along vapor pressure gradients. A slightly low temperature, or the presence of water-soluble components in the waste, favors water condensation resulting in leaching of the waste form and advection of water-soluble components to the water table. A simple analysis is presented that allows one to estimate the rate of vapor condensation as a function of waste composition and backfill materials. An example using a waste form surrounded by concrete and gravel layers is presented. The use of thermal gradients to offset condensation effects of water-soluble components in the waste form is discussed. Thermal gradients may be controlled by design factors that alter the atmospheric energy exchange across the soil surface or that interrupt the geothermal heat field. 7 refs., 2 figs., 1 tab

  18. Vapor plume oscillation mechanisms in transient keyhole during tandem dual beam fiber laser welding

    Science.gov (United States)

    Chen, Xin; Zhang, Xiaosi; Pang, Shengyong; Hu, Renzhi; Xiao, Jianzhong

    2018-01-01

    Vapor plume oscillations are common physical phenomena that have an important influence on the welding process in dual beam laser welding. However, until now, the oscillation mechanisms of vapor plumes remain unclear. This is primarily because mesoscale vapor plume dynamics inside a millimeter-scale, invisible, and time-dependent keyhole are difficult to quantitatively observe. In this paper, based on a developed three-dimensional (3D) comprehensive model, the vapor plume evolutions in a dynamical keyhole are directly simulated in tandem dual beam, short-wavelength laser welding. Combined with the vapor plume behaviors outside the keyhole observed by high-speed imaging, the vapor plume oscillations in dynamical keyholes at different inter-beam distances are the first, to our knowledge, to be quantitatively analyzed. It is found that vapor plume oscillations outside the keyhole mainly result from vapor plume instabilities inside the keyhole. The ejection velocity at the keyhole opening and dynamical behaviors outside the keyhole of a vapor plume both violently oscillate with the same order of magnitude of high frequency (several kHz). Furthermore, the ejection speed at the keyhole opening and ejection area outside the keyhole both decrease as the beam distance increases, while the degree of vapor plume instability first decreases and then increases with increasing beam distance from 0.6 to 1.0 mm. Moreover, the oscillation mechanisms of a vapor plume inside the dynamical keyhole irradiated by dual laser beams are investigated by thoroughly analyzing the vapor plume occurrence and flow process. The vapor plume oscillations in the dynamical keyhole are found to mainly result from violent local evaporations and severe keyhole geometry variations. In short, the quantitative method and these findings can serve as a reference for further understanding of the physical mechanisms in dual beam laser welding and of processing optimizations in industrial applications.

  19. Vapor Explosions with Subcooled Freon

    International Nuclear Information System (INIS)

    Henry, R.E.; Fauske, Hans K.; McUmber, L.M.

    1976-01-01

    Explosive vapor formation accompanied by destructive shock waves, can be produced when two liquids, at much different temperatures, are brought into intimate contact. A proposed analytical model states that the interface temperature upon contact between the two liquid systems, gust be greater than or equal to the spontaneous nucleation temperature of that liquid-liquid system and that the thermal boundary layer must be sufficiently developed to support a critical size cavity. For time scales greater than 10-12 sec, the interface temperature upon contact of two semi-infinite masses, with constant thermal properties, can be related to the initial liquid temperatures. The spontaneous nucleation behavior at the interface can either be heterogeneous or homogeneous in nature. In either case, the critical size cavities, which initiate the vaporization process, are produced by local density fluctuations within the cold liquid. For homogeneous conditions, the two liquids present a well-wetted system and the vapor embryos are produced entirely within the cold liquid. For heterogeneous conditions, which result from poor, or imperfect wetting, at the liquid-liquid interface, the critical sized cavities are created at the interface at somewhat lower temperatures. A sequence of experiments, using Freon-22 and water, Freon-22 and mineral oil, and Freon-12 and mineral oil have been performed to test this spontaneous nucleation premise. For Freon-22 at its normal boiling point, the interface temperature of the water must be at least 77 deg. C before the interface temperature equals or exceeds the minimum homogeneous nucleation value of 54 deg. C and 84 deg. C before the interface temperature equals 60 deg. C where the homogeneous nucleation rate becomes truly explosive. The Freon-water test demonstrated explosive interactions for water temperatures considerably lower than this value and this was attributed to the heterogeneous nucleation characteristics of that particular system

  20. Numerical Simulation of Vapor Bubble Growth and Heat Transfer in a Thin Liquid Film

    International Nuclear Information System (INIS)

    Yu-Jia, Tao; Xiu-Lan, Huai; Zhi-Gang, Li

    2009-01-01

    A mathematical model is developed to investigate the dynamics of vapor bubble growth in a thin liquid film, movement of the interface between two fluids and the surface heat transfer characteristics. The model takes into account the effects of phase change between the vapor and liquid, gravity, surface tension and viscosity. The details of the multiphase now and heat transfer are discussed for two cases: (1) when a water micro-droplet impacts a thin liquid film with a vapor bubble growing and (2) when the vapor bubble grows and merges with the vapor layer above the liquid film without the droplet impacting. The development trend of the interface between the vapor and liquid is coincident qualitatively with the available literature, mostly at the first stage. We also provide an important method to better understand the mechanism of nucleate spray cooling. (fundamental areas of phenomenology (including applications))