WorldWideScience

Sample records for vapor intrusion vi

  1. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  2. Phytoforensics: Trees as bioindicators of potential indoor exposure via vapor intrusion.

    Directory of Open Access Journals (Sweden)

    Jordan L Wilson

    Full Text Available Human exposure to volatile organic compounds (VOCs via vapor intrusion (VI is an emerging public health concern with notable detrimental impacts on public health. Phytoforensics, plant sampling to semi-quantitatively delineate subsurface contamination, provides a potential non-invasive screening approach to detect VI potential, and plant sampling is effective and also time- and cost-efficient. Existing VI assessment methods are time- and resource-intensive, invasive, and require access into residential and commercial buildings to drill holes through basement slabs to install sampling ports or require substantial equipment to install groundwater or soil vapor sampling outside the home. Tree-core samples collected in 2 days at the PCE Southeast Contamination Site in York, Nebraska were analyzed for tetrachloroethene (PCE and results demonstrated positive correlations with groundwater, soil, soil-gas, sub-slab, and indoor-air samples collected over a 2-year period. Because tree-core samples were not collocated with other samples, interpolated surfaces of PCE concentrations were estimated so that comparisons could be made between pairs of data. Results indicate moderate to high correlation with average indoor-air and sub-slab PCE concentrations over long periods of time (months to years to an interpolated tree-core PCE concentration surface, with Spearman's correlation coefficients (ρ ranging from 0.31 to 0.53 that are comparable to the pairwise correlation between sub-slab and indoor-air PCE concentrations (ρ = 0.55, n = 89. Strong correlations between soil-gas, sub-slab, and indoor-air PCE concentrations and an interpolated tree-core PCE concentration surface indicate that trees are valid indicators of potential VI and human exposure to subsurface environment pollutants. The rapid and non-invasive nature of tree sampling are notable advantages: even with less than 60 trees in the vicinity of the source area, roughly 12 hours of tree

  3. Phytoforensics: Trees as bioindicators of potential indoor exposure via vapor intrusion.

    Science.gov (United States)

    Wilson, Jordan L; Samaranayake, V A; Limmer, Matt A; Burken, Joel G

    2018-01-01

    Human exposure to volatile organic compounds (VOCs) via vapor intrusion (VI) is an emerging public health concern with notable detrimental impacts on public health. Phytoforensics, plant sampling to semi-quantitatively delineate subsurface contamination, provides a potential non-invasive screening approach to detect VI potential, and plant sampling is effective and also time- and cost-efficient. Existing VI assessment methods are time- and resource-intensive, invasive, and require access into residential and commercial buildings to drill holes through basement slabs to install sampling ports or require substantial equipment to install groundwater or soil vapor sampling outside the home. Tree-core samples collected in 2 days at the PCE Southeast Contamination Site in York, Nebraska were analyzed for tetrachloroethene (PCE) and results demonstrated positive correlations with groundwater, soil, soil-gas, sub-slab, and indoor-air samples collected over a 2-year period. Because tree-core samples were not collocated with other samples, interpolated surfaces of PCE concentrations were estimated so that comparisons could be made between pairs of data. Results indicate moderate to high correlation with average indoor-air and sub-slab PCE concentrations over long periods of time (months to years) to an interpolated tree-core PCE concentration surface, with Spearman's correlation coefficients (ρ) ranging from 0.31 to 0.53 that are comparable to the pairwise correlation between sub-slab and indoor-air PCE concentrations (ρ = 0.55, n = 89). Strong correlations between soil-gas, sub-slab, and indoor-air PCE concentrations and an interpolated tree-core PCE concentration surface indicate that trees are valid indicators of potential VI and human exposure to subsurface environment pollutants. The rapid and non-invasive nature of tree sampling are notable advantages: even with less than 60 trees in the vicinity of the source area, roughly 12 hours of tree-core sampling with minimal

  4. Phytoforensics: Trees as bioindicators of potential indoor exposure via vapor intrusion

    Science.gov (United States)

    Wilson, Jordan L.; Samaranayake, V.A.; Limmer, Matthew A.; Burken, Joel G.

    2018-01-01

    Human exposure to volatile organic compounds (VOCs) via vapor intrusion (VI) is an emerging public health concern with notable detrimental impacts on public health. Phytoforensics, plant sampling to semi-quantitatively delineate subsurface contamination, provides a potential non-invasive screening approach to detect VI potential, and plant sampling is effective and also time- and cost-efficient. Existing VI assessment methods are time- and resource-intensive, invasive, and require access into residential and commercial buildings to drill holes through basement slabs to install sampling ports or require substantial equipment to install groundwater or soil vapor sampling outside the home. Tree-core samples collected in 2 days at the PCE Southeast Contamination Site in York, Nebraska were analyzed for tetrachloroethene (PCE) and results demonstrated positive correlations with groundwater, soil, soil-gas, sub-slab, and indoor-air samples collected over a 2-year period. Because tree-core samples were not collocated with other samples, interpolated surfaces of PCE concentrations were estimated so that comparisons could be made between pairs of data. Results indicate moderate to high correlation with average indoor-air and sub-slab PCE concentrations over long periods of time (months to years) to an interpolated tree-core PCE concentration surface, with Spearman’s correlation coefficients (ρ) ranging from 0.31 to 0.53 that are comparable to the pairwise correlation between sub-slab and indoor-air PCE concentrations (ρ = 0.55, n = 89). Strong correlations between soil-gas, sub-slab, and indoor-air PCE concentrations and an interpolated tree-core PCE concentration surface indicate that trees are valid indicators of potential VI and human exposure to subsurface environment pollutants. The rapid and non-invasive nature of tree sampling are notable advantages: even with less than 60 trees in the vicinity of the source area, roughly 12 hours of tree-core sampling with

  5. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  6. Evidence of a sewer vapor transport pathway at the USEPA vapor intrusion research duplex

    Science.gov (United States)

    The role of sewer lines as preferential pathways for vapor intrusion is poorly understood. Although the importance of sewer lines for volatile organic compound (VOC) transport has been documented at a small number of sites with vapor intrusion, sewer lines are not routinely sampl...

  7. Identification of Alternative Vapor Intrusion Pathways Using Controlled Pressure Testing, Soil Gas Monitoring, and Screening Model Calculations.

    Science.gov (United States)

    Guo, Yuanming; Holton, Chase; Luo, Hong; Dahlen, Paul; Gorder, Kyle; Dettenmaier, Erik; Johnson, Paul C

    2015-11-17

    Vapor intrusion (VI) pathway assessment and data interpretation have been guided by an historical conceptual model in which vapors originating from contaminated soil or groundwater diffuse upward through soil and are swept into a building by soil gas flow induced by building underpressurization. Recent studies reveal that alternative VI pathways involving neighborhood sewers, land drains, and other major underground piping can also be significant VI contributors, even to buildings beyond the delineated footprint of soil and groundwater contamination. This work illustrates how controlled-pressure-method testing (CPM), soil gas sampling, and screening-level emissions calculations can be used to identify significant alternative VI pathways that might go undetected by conventional sampling under natural conditions at some sites. The combined utility of these tools is shown through data collected at a long-term study house, where a significant alternative VI pathway was discovered and altered so that it could be manipulated to be on or off. Data collected during periods of natural and CPM conditions show that the alternative pathway was significant, but its presence was not identifiable under natural conditions; it was identified under CPM conditions when measured emission rates were 2 orders of magnitude greater than screening-model estimates and subfoundation vertical soil gas profiles changed and were no longer consistent with the conventional VI conceptual model.

  8. Microfabricated gas chromatograph for on-site determinations of TCE in indoor air arising from vapor intrusion. 2. Spatial/temporal monitoring.

    Science.gov (United States)

    Kim, Sun Kyu; Burris, David R; Bryant-Genevier, Jonathan; Gorder, Kyle A; Dettenmaier, Erik M; Zellers, Edward T

    2012-06-05

    We demonstrate the use of two prototype Si-microfabricated gas chromatographs (μGC) for continuous, short-term measurements of indoor trichloroethylene (TCE) vapor concentrations related to the investigation of TCE vapor intrusion (VI) in two houses. In the first house, with documented TCE VI, temporal variations in TCE air concentrations were monitored continuously for up to 48 h near the primary VI entry location under different levels of induced differential pressure (relative to the subslab). Concentrations ranged from 0.23 to 27 ppb by volume (1.2-150 μg/m(3)), and concentration trends agreed closely with those determined from concurrent reference samples. The sensitivity and temporal resolution of the measurements were sufficiently high to detect transient fluctuations in concentration resulting from short-term changes in variables affecting the extent of VI. Spatial monitoring showed a decreasing TCE concentration gradient with increasing distance from the primary VI entry location. In the second house, with no TCE VI, spatial profiles derived from the μGC prototype data revealed an intentionally hidden source of TCE within a closet, demonstrating the capability for locating non-VI sources. Concentrations measured in this house ranged from 0.51 to 56 ppb (2.7-300 μg/m(3)), in good agreement with reference method values. This first field demonstration of μGC technology for automated, near-real-time, selective VOC monitoring at low- or subppb levels augurs well for its use in short- and long-term on-site analysis of indoor air in support of VI assessments.

  9. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    Science.gov (United States)

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...

  10. A numerical investigation of vapor intrusion--the dynamic response of contaminant vapors to rainfall events.

    Science.gov (United States)

    Shen, Rui; Pennell, Kelly G; Suuberg, Eric M

    2012-10-15

    The U.S. government and various agencies have published guidelines for field investigation of vapor intrusion, most of which suggest soil gas sampling as an integral part of the investigation. Contaminant soil gas data are often relatively more stable than indoor air vapor concentration measurements, but meteorological conditions might influence soil gas values. Although a few field and numerical studies have considered some temporal effects on soil gas vapor transport, a full explanation of the contaminant vapor concentration response to rainfall events is not available. This manuscript seeks to demonstrate the effects on soil vapor transport during and after different rainfall events, by applying a coupled numerical model of fluid flow and vapor transport. Both a single rainfall event and seasonal rainfall events were modeled. For the single rainfall event models, the vapor response process could be divided into three steps: namely, infiltration, water redistribution, and establishment of a water lens atop the groundwater source. In the infiltration step, rainfall intensity was found to determine the speed of the wetting front and wash-out effect on the vapor. The passage of the wetting front led to an increase of the vapor concentration in both the infiltration and water redistribution steps and this effect is noted at soil probes located 1m below the ground surface. When the mixing of groundwater with infiltrated water was not allowed, a clean water lens accumulated above the groundwater source and led to a capping effect which can reduce diffusion rates of contaminant from the source. Seasonal rainfall with short time intervals involved superposition of the individual rainfall events. This modeling results indicated that for relatively deeper soil that the infiltration wetting front could not flood, the effects were damped out in less than a month after rain; while in the long term (years), possible formation of a water lens played a larger role in determining

  11. Relationship between vapor intrusion and human exposure to trichloroethylene.

    Science.gov (United States)

    Archer, Natalie P; Bradford, Carrie M; Villanacci, John F; Crain, Neil E; Corsi, Richard L; Chambers, David M; Burk, Tonia; Blount, Benjamin C

    2015-01-01

    Trichloroethylene (TCE) in groundwater has the potential to volatilize through soil into indoor air where it can be inhaled. The purpose of this study was to determine whether individuals living above TCE-contaminated groundwater are exposed to TCE through vapor intrusion. We examined associations between TCE concentrations in various environmental media and TCE concentrations in residents. For this assessment, indoor air, outdoor air, soil gas, and tap water samples were collected in and around 36 randomly selected homes; blood samples were collected from 63 residents of these homes. Additionally, a completed exposure survey was collected from each participant. Environmental and blood samples were analyzed for TCE. Mixed model multiple linear regression analyses were performed to determine associations between TCE in residents' blood and TCE in indoor air, outdoor air, and soil gas. Blood TCE concentrations were above the limit of quantitation (LOQ; ≥ 0.012 µg L(-1)) in 17.5% of the blood samples. Of the 36 homes, 54.3%, 47.2%, and >84% had detectable concentrations of TCE in indoor air, outdoor air, and soil gas, respectively. Both indoor air and soil gas concentrations were statistically significantly positively associated with participants' blood concentrations (P = 0.0002 and P = 0.04, respectively). Geometric mean blood concentrations of residents from homes with indoor air concentrations of >1.6 µg m(-3) were approximately 50 times higher than geometric mean blood TCE concentrations in participants from homes with no detectable TCE in indoor air (P < .0001; 95% CI 10.4-236.4). This study confirms the occurrence of vapor intrusion and demonstrates the magnitude of exposure from vapor intrusion of TCE in a residential setting.

  12. Vapor intrusion risk of lead scavengers 1,2-dibromoethane (EDB) and 1,2-dichloroethane (DCA).

    Science.gov (United States)

    Ma, Jie; Li, Haiyan; Spiese, Richard; Wilson, John; Yan, Guangxu; Guo, Shaohui

    2016-06-01

    Vapor intrusion of synthetic fuel additives represented a critical yet still neglected problem at sites impacted by petroleum fuel releases. This study used an advanced numerical model to simulate the vapor intrusion risk of lead scavengers 1,2-dibromoethane (ethylene dibromide, EDB) and 1,2-dichloroethane (DCA) under different site conditions. We found that simulated EDB and DCA indoor air concentrations can exceed USEPA screening level (4.7 × 10(-3) μg/m(3) for EDB and 1.1 × 10(-1) μg/m(3) for DCA) if the source concentration is high enough (is still within the concentration range found at leaking UST site). To evaluate the chance that vapor intrusion of EDB might exceed the USEPA screening levels for indoor air, the simulation results were compared to the distribution of EDB at leaking UST sites in the US. If there is no degradation of EDB or only abiotic degradation of EDB, from 15% to 37% of leaking UST sites might exceed the USEPA screening level. This study supports the statements made by USEPA in the Petroleum Vapor Intrusion (PVI) Guidance that the screening criteria for petroleum hydrocarbon may not provide sufficient protectiveness for fuel releases containing EDB and DCA. Based on a thorough literature review, we also compiled previous published data on the EDB and DCA groundwater source concentrations and their degradation rates. These data are valuable in evaluating EDB and DCA vapor intrusion risk. In addition, a set of refined attenuation factors based on site-specific information (e.g., soil types, source depths, and degradation rates) were provided for establishing site-specific screening criteria for EDB and DCA. Overall, this study points out that lead scavengers EDB and DCA may cause vapor intrusion problems. As more field data of EDB and DCA become available, we recommend that USEPA consider including these data in the existing PVI database and possibly revising the PVI Guidance as necessary. Copyright © 2016 Elsevier Ltd. All

  13. Three-dimensional vapor intrusion modeling approach that combines wind and stack effects on indoor, atmospheric, and subsurface domains.

    Science.gov (United States)

    Shirazi, Elham; Pennell, Kelly G

    2017-12-13

    Vapor intrusion (IV) exposure risks are difficult to characterize due to the role of atmospheric, building and subsurface processes. This study presents a three-dimensional VI model that extends the common subsurface fate and transport equations to incorporate wind and stack effects on indoor air pressure, building air exchange rate (AER) and indoor contaminant concentration to improve VI exposure risk estimates. The model incorporates three modeling programs: (1) COMSOL Multiphysics to model subsurface fate and transport processes, (2) CFD0 to model atmospheric air flow around the building, and (3) CONTAM to model indoor air quality. The combined VI model predicts AER values, zonal indoor air pressures and zonal indoor air contaminant concentrations as a function of wind speed, wind direction and outdoor and indoor temperature. Steady state modeling results for a single-story building with a basement demonstrate that wind speed, wind direction and opening locations in a building play important roles in changing the AER, indoor air pressure, and indoor air contaminant concentration. Calculated indoor air pressures ranged from approximately -10 Pa to +4 Pa depending on weather conditions and building characteristics. AER values, mass entry rates and indoor air concentrations vary depending on weather conditions and building characteristics. The presented modeling approach can be used to investigate the relationship between building features, AER, building pressures, soil gas concentrations, indoor air concentrations and VI exposure risks.

  14. A Numerical Investigation of Vapor Intrusion — the Dynamic Response of Contaminant Vapors to Rainfall Events

    Science.gov (United States)

    Shen, Rui; Pennell, Kelly G.; Suuberg, Eric M.

    2013-01-01

    The U.S. government and various agencies have published guidelines for field investigation of vapor intrusion, most of which suggest soil gas sampling as an integral part of the investigation. Contaminant soil gas data are often relatively more stable than indoor air vapor concentration measurements, but meteorological conditions might influence soil gas values. Although a few field and numerical studies have considered some temporal effects on soil gas vapor transport, a full explanation of the contaminant vapor concentration response to rainfall events is not available. This manuscript seeks to demonstrate the effects on soil vapor transport during and after different rainfall events, by applying a coupled numerical model of fluid flow and vapor transport. Both a single rainfall event and seasonal rainfall events were modeled. For the single rainfall event models, the vapor response process could be divided into three steps: namely, infiltration, water redistribution, and establishment of a water lens atop the groundwater source. In the infiltration step, rainfall intensity was found to determine the speed of the wetting front and wash-out effect on the vapor. The passage of the wetting front led to an increase of the vapor concentration in both the infiltration and water redistribution steps and this effect is noted at soil probes located 1 m below the ground surface. When the mixing of groundwater with infiltrated water was not allowed, a clean water lens accumulated above the groundwater source and led to a capping effect which can reduce diffusion rates of contaminant from the source. Seasonal rainfall with short time intervals involved superposition of the individual rainfall events. This modeling results indicated that for relatively deeper soil that the infiltration wetting front could not flood, the effects were damped out in less than a month after rain; while in the long term (years), possible formation of a water lens played a larger role in

  15. VOC SAMPLING IN THE WATER TABLE/CAPILLARY FRINGE AREA FOR ASSESSING IMPACT ON VAPOR INTRUSION AND INDOOR AIR QUALITY

    Science.gov (United States)

    Vapor intrusion has been determined to be a major pathway for increased indoor air contamination from volatile organic contaminants (VOCs) at certain contaminated sites. In order to properly assess vapor intrusion, it is important to adequately evaluate VOC concentrations in the...

  16. Tree Sampling as a Method to Assess Vapor Intrusion Potential at a Site Characterized by VOC-Contaminated Groundwater and Soil.

    Science.gov (United States)

    Wilson, Jordan L; Limmer, Matthew A; Samaranayake, V A; Schumacher, John G; Burken, Joel G

    2017-09-19

    Vapor intrusion (VI) by volatile organic compounds (VOCs) in the built environment presents a threat to human health. Traditional VI assessments are often time-, cost-, and labor-intensive; whereas traditional subsurface methods sample a relatively small volume in the subsurface and are difficult to collect within and near structures. Trees could provide a similar subsurface sample where roots act as the "sampler' and are already onsite. Regression models were developed to assess the relation between PCE concentrations in over 500 tree-core samples with PCE concentrations in over 50 groundwater and 1000 soil samples collected from a tetrachloroethylene- (PCE-) contaminated Superfund site and analyzed using gas chromatography. Results indicate that in planta concentrations are significantly and positively related to PCE concentrations in groundwater samples collected at depths less than 20 m (adjusted R 2 values greater than 0.80) and in soil samples (adjusted R 2 values greater than 0.90). Results indicate that a 30 cm diameter tree characterizes soil concentrations at depths less than 6 m over an area of 700-1600 m 2 , the volume of a typical basement. These findings indicate that tree sampling may be an appropriate method to detect contamination at shallow depths at sites with VI.

  17. Tree sampling as a method to assess vapor intrusion potential at a site characterized by VOC-contaminated groundwater and soil

    Science.gov (United States)

    Wilson, Jordan L.; Limmer, Matthew A.; Samaranayake, V. A.; Schumacher, John G.; Burken, Joel G.

    2017-01-01

    Vapor intrusion (VI) by volatile organic compounds (VOCs) in the built environment presents a threat to human health. Traditional VI assessments are often time-, cost-, and labor-intensive; whereas traditional subsurface methods sample a relatively small volume in the subsurface and are difficult to collect within and near structures. Trees could provide a similar subsurface sample where roots act as the “sampler’ and are already onsite. Regression models were developed to assess the relation between PCE concentrations in over 500 tree-core samples with PCE concentrations in over 50 groundwater and 1000 soil samples collected from a tetrachloroethylene- (PCE-) contaminated Superfund site and analyzed using gas chromatography. Results indicate that in planta concentrations are significantly and positively related to PCE concentrations in groundwater samples collected at depths less than 20 m (adjusted R2 values greater than 0.80) and in soil samples (adjusted R2 values greater than 0.90). Results indicate that a 30 cm diameter tree characterizes soil concentrations at depths less than 6 m over an area of 700–1600 m2, the volume of a typical basement. These findings indicate that tree sampling may be an appropriate method to detect contamination at shallow depths at sites with VI.

  18. Assessment of indoor air quality related to potential vapor intrusion: Issues for former manufactured gas plants

    International Nuclear Information System (INIS)

    Rames, Antoine; Guillossou, Gaelle; Ronga-Pezeret, Sylvaine; Hulot, Corinne

    2012-01-01

    The indoor air quality of buildings on sites with soil or groundwater contaminated with volatile or semi-volatile compounds can be degraded by potential vapor intrusion (VI) from these environmental media. For sites of former manufactured gas plants (MGP), the compounds that must be considered are BTEX (benzene, toluene, ethylbenzene, and xylenes), 8 of the 16 polycyclic aromatic hydrocarbons (PAHs) generally studied, and, to a lesser degree, phenol and hydrogen cyanide. Given the plausibility of VI and in accordance with current recommendations of the French Ministry of the Environment, measurements of indoor air quality (and outdoor air, for additional analyses) were conducted on two occasions during the winter and summer of 2010. These measurements simultaneously used multiple air sampling devices (Summa canisters, Gore modules, air pumps coupled to various matrices; such as XAD2, silica gel, etc.). Phenol and hydrogen cyanide have not previously been quantified (limit of quantification between 0.12 and 2.00 μg/m 3 ). BTEX and PAHs were found ubiquitously at concentrations on the order of 1 to 10 μg/m 3 for BTEX and naphthalene and one to ten ng/m 3 for PAHs other than naphthalene) at all 14 MGP and both control sites, regardless of where onsite the air was sampled (office, basement or crawl space, or outdoors). These levels (the maximum considered) do not allow us to conclude that the indoor air is degraded according to the official French guidelines for managing potentially contaminated sites and soils. Thus, no excess health risk is expected for residents of these sites because of exposure to possible VI, which cannot be ruled out in view of the ubiquity of some compounds. (authors)

  19. Influence of soil properties on vapor-phase sorption of trichloroethylene

    International Nuclear Information System (INIS)

    Bekele, Dawit N.; Naidu, Ravi; Chadalavada, Sreenivasulu

    2016-01-01

    Highlights: • Vapor intrusion is a major exposure pathway for volatile hydrocarbons. • Certainty in transport processes enhances vapor intrusion model precision. • Detailed understanding of vadose zone vapor transport processes save resources. • Vapor sorption near-steady-state conditions at sites may take months or years. • Type of clay fractions equitably affects sorption of trichloroethylene vapor. - Abstract: Current practices in health risk assessment from vapor intrusion (VI) using mathematical models are based on assumptions that the subsurface sorption equilibrium is attained. The time required for sorption to reach near-steady-state conditions at sites may take months or years to achieve. This study investigated the vapor phase attenuation of trichloroethylene (TCE) in five soils varying widely in clay and organic matter content using repacked columns. The primary indicators of TCE sorption were vapor retardation rate (R_t), the time required for the TCE vapor to pass through the soil column, and specific volume of retention (V_R), and total volume of TCE retained in soil. Results show TCE vapor retardation is mainly due to the rapid partitioning of the compound to SOM. However, the specific volume of retention of clayey soils with secondary mineral particles was higher. Linear regression analyses of the SOM and clay fraction with V_R show that a unit increase in clay fraction results in higher sorption of TCE (V_R) than the SOM. However, partitioning of TCE vapor was not consistent with the samples' surface areas but was mainly a function of the type of secondary minerals present in soils.

  20. Influence of soil properties on vapor-phase sorption of trichloroethylene

    Energy Technology Data Exchange (ETDEWEB)

    Bekele, Dawit N. [Global Center for Environmental Remediation, University of Newcastle, Callaghan, NSW 2308 (Australia); CRC for Contamination Assessment & Remediation of the Environment, Building X (Environmental Sciences Building), University of South Australia, Mawson Lakes, SA 5095 (Australia); Naidu, Ravi, E-mail: Ravi.Naidu@newcastle.edu.au [Global Center for Environmental Remediation, University of Newcastle, Callaghan, NSW 2308 (Australia); CRC for Contamination Assessment & Remediation of the Environment, Building X (Environmental Sciences Building), University of South Australia, Mawson Lakes, SA 5095 (Australia); Chadalavada, Sreenivasulu [Global Center for Environmental Remediation, University of Newcastle, Callaghan, NSW 2308 (Australia); CRC for Contamination Assessment & Remediation of the Environment, Building X (Environmental Sciences Building), University of South Australia, Mawson Lakes, SA 5095 (Australia)

    2016-04-05

    Highlights: • Vapor intrusion is a major exposure pathway for volatile hydrocarbons. • Certainty in transport processes enhances vapor intrusion model precision. • Detailed understanding of vadose zone vapor transport processes save resources. • Vapor sorption near-steady-state conditions at sites may take months or years. • Type of clay fractions equitably affects sorption of trichloroethylene vapor. - Abstract: Current practices in health risk assessment from vapor intrusion (VI) using mathematical models are based on assumptions that the subsurface sorption equilibrium is attained. The time required for sorption to reach near-steady-state conditions at sites may take months or years to achieve. This study investigated the vapor phase attenuation of trichloroethylene (TCE) in five soils varying widely in clay and organic matter content using repacked columns. The primary indicators of TCE sorption were vapor retardation rate (R{sub t}), the time required for the TCE vapor to pass through the soil column, and specific volume of retention (V{sub R}), and total volume of TCE retained in soil. Results show TCE vapor retardation is mainly due to the rapid partitioning of the compound to SOM. However, the specific volume of retention of clayey soils with secondary mineral particles was higher. Linear regression analyses of the SOM and clay fraction with V{sub R} show that a unit increase in clay fraction results in higher sorption of TCE (V{sub R}) than the SOM. However, partitioning of TCE vapor was not consistent with the samples' surface areas but was mainly a function of the type of secondary minerals present in soils.

  1. Protocol for Tier 2 Evaluation of Vapor Intrusion at Corrective Action Sites

    Science.gov (United States)

    2012-07-01

    and Evaluation o condition the evalu Contro negati buildi pressu Vapo intrusio “on” Contro positiv buildi pressu Vapo intrusio “off” Figure 2...of Vapor Intrusion 11 Table 3.1: Performance Objectives Performance Objective Data Requirements Success Criteria Results Quantitative ...defined in Appendix D of the demonstration plan. Quantitative objectives for Precision, Accuracy, Completeness, Representativeness, and Comparability

  2. An Excel®-based visualization tool of 2-D soil gas concentration profiles in petroleum vapor intrusion.

    Science.gov (United States)

    Verginelli, Iason; Yao, Yijun; Suuberg, Eric M

    2016-01-01

    In this study we present a petroleum vapor intrusion tool implemented in Microsoft ® Excel ® using Visual Basic for Applications (VBA) and integrated within a graphical interface. The latter helps users easily visualize two-dimensional soil gas concentration profiles and indoor concentrations as a function of site-specific conditions such as source strength and depth, biodegradation reaction rate constant, soil characteristics and building features. This tool is based on a two-dimensional explicit analytical model that combines steady-state diffusion-dominated vapor transport in a homogeneous soil with a piecewise first-order aerobic biodegradation model, in which rate is limited by oxygen availability. As recommended in the recently released United States Environmental Protection Agency's final Petroleum Vapor Intrusion guidance, a sensitivity analysis and a simplified Monte Carlo uncertainty analysis are also included in the spreadsheet.

  3. Impacts of Changes of Indoor Air Pressure and Air Exchange Rate in Vapor Intrusion Scenarios.

    Science.gov (United States)

    Shen, Rui; Suuberg, Eric M

    2016-02-01

    There has, in recent years, been increasing interest in understanding the transport processes of relevance in vapor intrusion of volatile organic compounds (VOCs) into buildings on contaminated sites. These studies have included fate and transport modeling. Most such models have simplified the prediction of indoor air contaminant vapor concentrations by employing a steady state assumption, which often results in difficulties in reconciling these results with field measurements. This paper focuses on two major factors that may be subject to significant transients in vapor intrusion situations, including the indoor air pressure and the air exchange rate in the subject building. A three-dimensional finite element model was employed with consideration of daily and seasonal variations in these factors. From the results, the variations of indoor air pressure and air exchange rate are seen to contribute to significant variations in indoor air contaminant vapor concentrations. Depending upon the assumptions regarding the variations in these parameters, the results are only sometimes consistent with the reports of several orders of magnitude in indoor air concentration variations from field studies. The results point to the need to examine more carefully the interplay of these factors in order to quantitatively understand the variations in potential indoor air exposures.

  4. 76 FR 5370 - Potential Addition of Vapor Intrusion Component to the Hazard Ranking System

    Science.gov (United States)

    2011-01-31

    ... Estimated Costs to Remediate Existing Sites Exceed Current Funding Levels, and More Sites are Expected to Be.... Methods for incorporating vapor intrusion into the HRS while, to the extent possible, maintaining the... will also be able to sign up for a mailing list that will be used to distribute logistical information...

  5. Final work plan : supplemental upward vapor intrusion investigation at the former CCC/USDA grain storage facility in Hanover, Kansas.

    Energy Technology Data Exchange (ETDEWEB)

    LaFreniere, L. M.; Environmental Science Division

    2008-12-15

    The Commodity Credit Corporation (CCC), an agency of the U.S. Department of Agriculture (USDA), operated a grain storage facility at the northeastern edge of the city of Hanover, Kansas, from 1950 until the early 1970s. During this time, commercial grain fumigants containing carbon tetrachloride were in common use by the grain storage industry to preserve grain in their facilities. In February 1998, trace to low levels of carbon tetrachloride (below the maximum contaminant level [MCL] of 5.0 {micro}g/L) were detected in two private wells near the former grain storage facility at Hanover, as part of a statewide USDA private well sampling program that was implemented by the Kansas Department of Health and Environment (KDHE) near former CCC/USDA facilities. In 2007, the CCC/USDA conducted near-surface soil sampling at 61 locations and also sampled indoor air at nine residences on or adjacent to its former Hanover facility to address the residents concerns regarding vapor intrusion. Low levels of carbon tetrachloride were detected at four of the nine homes. The results were submitted to the KDHE in October 2007 (Argonne 2007). On the basis of the results, the KDHE requested sub-slab sampling and/or indoor air sampling (KDHE 2007). This Work Plan describes, in detail, the proposed additional scope of work requested by the KDHE and has been developed as a supplement to the comprehensive site investigation work plan that is pending (Argonne 2008). Indoor air samples collected previously from four homes at Hanover were shown to contain the carbon tetrachloride at low concentrations (Table 2.1). It cannot be concluded from these previous data that the source of the detected carbon tetrachloride is vapor intrusion attributable to former grain storage operations of the CCC/USDA at Hanover. The technical objective of the vapor intrusion investigation described here is to assess the risk to human health due to the potential for upward migration of carbon tetrachloride and

  6. Petroleum Vapor - Field Technical

    Science.gov (United States)

    The screening approach being developed by EPA OUST to evaluate petroleum vapor intrusion (PVI) requires information that has not be routinely collected in the past at vapor intrusion sites. What is the best way to collect this data? What are the relevant data quality issues and ...

  7. Temporary vs. Permanent Sub-slab Ports: A Comparative Performance Study

    Science.gov (United States)

    Vapor intrusion (VI) is the migration of subsurface vapors, including radon and volatile organic compounds (VOCs), from the subsurface to indoor air. The VI exposure pathway extends from the contaminant source, which can be impacted soil, non-aqueous phase liquid, or contaminated...

  8. Growth of Wide Band Gap II-VI Compound Semiconductors by Physical Vapor Transport

    Science.gov (United States)

    Su, Ching-Hua; Sha, Yi-Gao

    1995-01-01

    The studies on the crystal growth and characterization of II-VI wide band gap compound semiconductors, such as ZnTe, CdS, ZnSe and ZnS, have been conducted over the past three decades. The research was not quite as extensive as that on Si, III-V, or even narrow band gap II-VI semiconductors because of the high melting temperatures as well as the specialized applications associated with these wide band gap semiconductors. In the past several years, major advances in the thin film technology such as Molecular Beam Epitaxy (MBE) and Metal Organic Chemical Vapor Deposition (MOCVD) have demonstrated the applications of these materials for the important devices such as light-emitting diode, laser and ultraviolet detectors and the tunability of energy band gap by employing ternary or even quaternary systems of these compounds. At the same time, the development in the crystal growth of bulk materials has not advanced far enough to provide low price, high quality substrates needed for the thin film growth technology.

  9. An Approach for Developing Site-Specific Lateral and Vertical Inclusion Zones within which Structures Should be Evaluated for Petroleum Vapor Intrusion due to Releases of Motor Fuel from Underground Storage Tanks

    Science.gov (United States)

    Buildings may be at risk from Petroleum Vapor Intrusion (PVI) when they overlie petroleum hydrocarbon contamination in the unsaturated zone or dissolved in groundwater. The U.S. EPA Office of Underground Storage Tanks (OUST) is preparing Guidance for Addressing Petroleum Vapor I...

  10. Accuracy and conservatism of vapour intrusion algorithms for contaminated land management

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bonders, J.

    2013-01-01

    This paper provides a view on the suitability of screening-level vapour intrusion (VI) algorithms for contaminated land management. It focuses on the accuracy and level of conservatism for a number of screening-level algorithms used for VI into buildings. The paper discusses the published evidence

  11. Sensitivity analysis on parameters and processes affecting vapor intrusion risk

    KAUST Repository

    Picone, Sara

    2012-03-30

    A one-dimensional numerical model was developed and used to identify the key processes controlling vapor intrusion risks by means of a sensitivity analysis. The model simulates the fate of a dissolved volatile organic compound present below the ventilated crawl space of a house. In contrast to the vast majority of previous studies, this model accounts for vertical variation of soil water saturation and includes aerobic biodegradation. The attenuation factor (ratio between concentration in the crawl space and source concentration) and the characteristic time to approach maximum concentrations were calculated and compared for a variety of scenarios. These concepts allow an understanding of controlling mechanisms and aid in the identification of critical parameters to be collected for field situations. The relative distance of the source to the nearest gas-filled pores of the unsaturated zone is the most critical parameter because diffusive contaminant transport is significantly slower in water-filled pores than in gas-filled pores. Therefore, attenuation factors decrease and characteristic times increase with increasing relative distance of the contaminant dissolved source to the nearest gas diffusion front. Aerobic biodegradation may decrease the attenuation factor by up to three orders of magnitude. Moreover, the occurrence of water table oscillations is of importance. Dynamic processes leading to a retreating water table increase the attenuation factor by two orders of magnitude because of the enhanced gas phase diffusion. © 2012 SETAC.

  12. Contaminant Gradients in Trees: Directional Tree Coring Reveals Boundaries of Soil and Soil-Gas Contamination with Potential Applications in Vapor Intrusion Assessment.

    Science.gov (United States)

    Wilson, Jordan L; Samaranayake, V A; Limmer, Matthew A; Schumacher, John G; Burken, Joel G

    2017-12-19

    Contaminated sites pose ecological and human-health risks through exposure to contaminated soil and groundwater. Whereas we can readily locate, monitor, and track contaminants in groundwater, it is harder to perform these tasks in the vadose zone. In this study, tree-core samples were collected at a Superfund site to determine if the sample-collection location around a particular tree could reveal the subsurface location, or direction, of soil and soil-gas contaminant plumes. Contaminant-centroid vectors were calculated from tree-core data to reveal contaminant distributions in directional tree samples at a higher resolution, and vectors were correlated with soil-gas characterization collected using conventional methods. Results clearly demonstrated that directional tree coring around tree trunks can indicate gradients in soil and soil-gas contaminant plumes, and the strength of the correlations were directly proportionate to the magnitude of tree-core concentration gradients (spearman's coefficient of -0.61 and -0.55 in soil and tree-core gradients, respectively). Linear regression indicates agreement between the concentration-centroid vectors is significantly affected by in planta and soil concentration gradients and when concentration centroids in soil are closer to trees. Given the existing link between soil-gas and vapor intrusion, this study also indicates that directional tree coring might be applicable in vapor intrusion assessment.

  13. INDOOR AIR CONCENTRATION UNIT CONVERSIONS

    Science.gov (United States)

    Migration of volatile chemicals from the subsurface into overlying buildings is called vapor intrusion (VI). Volatile organic chemicals in contaminated soils or groundwater can emit vapors, which can migrate through subsurface soils and may enter the indoor air of overlying buil...

  14. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  15. UNCERTAINTY AND THE JOHNSON-ETTINGER MODEL FOR VAPOR INTRUSION CALCULATIONS

    Science.gov (United States)

    The Johnson-Ettinger Model is widely used for assessing the impacts of contaminated vapors on residential air quality. Typical use of this model relies on a suite of estimated data, with few site-specific measurements. Software was developed to provide the public with automate...

  16. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  17. Elucidating the mechanism of Cr(VI) formation upon the interaction with metal oxides during coal oxy-fuel combustion.

    Science.gov (United States)

    Chen, Juan; Jiao, Facun; Zhang, Lian; Yao, Hong; Ninomiya, Yoshihiko

    2013-10-15

    The thermodynamics underpinning the interaction of Cr-bearing species with basic metal oxides, i.e. K2O, Fe2O3, MgO and CaO, during the air and oxy-fuel combustion of coal have been examined. The synchrotron-based X-ray adsorption near-edge spectroscopy (XANES) was used for Cr speciation. For the oxides tested, Cr(VI) formation is dominated by the reduction potential of the metals. The oxides of Ca(2+) with high reduction potential favored the oxidation of Cr(III), same for K(+). The other two basic metals, Fe2O3 and MgO with lower reduction potentials reacted with Cr(III) to form the corresponding chromites at the temperatures above 600°C. Coal combustion experiments in drop-tube furnace have confirmed the rapid capture of Cr vapors, either trivalent or hexavalent, by CaO into solid ash. The existence of HCl in flue gas favored the vaporization of Cr as CrO2Cl2, which was in turn captured by CaO into chromate. Both Fe2O3 and MgO exhibited less capability on scavenging the Cr(VI) vapor. Particularly, MgO alone exhibited a low capability for capturing the vaporized Cr(III) vapors. However, its co-existence with CaO in the furnace inhibited the Cr(VI) formation. This is beneficial for minimizing the toxicity of Cr in the coal combustion-derived fly ash. Copyright © 2013 Elsevier B.V. All rights reserved.

  18. METEOROLOGICAL INFLUENCES ON VAPOR INCIDENTS IN THE 200 EAST and 200 WEST TANK FARMS FROM CY1995 TO CY2004

    International Nuclear Information System (INIS)

    HOCKING, M.J.

    2005-01-01

    Revised for a more comprehensive overview of vapor incidents reported at the Hanford Tank Farms. Investigation into the meteorological influences on vapor incidents in the tank farm to determine what, if any, meteorological influences contribute to the reporting of odors, smells, vapors, and other gases. Weather phenomena, specifically barometric pressure, and wind velocity and direction can potentially cause or exacerbate a vapor release within the farm systems. The purpose of this document is to gather and evaluate the meteorological and weather information for the Tank Farms Shift Log Vapor Incident entries and determine what, if any, meteorological influences contribute to the reporting of odors, smells, vapors, and other gases such as propane. A part of the evaluation will be determining which of the incidents are related to actual ''intrusive'' work, and which are ''transient.'' Transient vapor incidents are herein defined as those vapors encountered during walkdowns, surveys, or other activities that did not require working directly with the tanks, pits, transfer lines, etc. Another part of the investigation will involve determining if there are barometric pressures or other weather related phenomena that might cause or contribute vapors being released when there are no ''intrusive'' activities. A final purpose is to evaluate whether there is any correlation between the 242-A Evaporator operations and Vapor Incidents entered on the Shift Log

  19. METEOROLOGICAL INFLUENCES ON VAPOR INCIDENTS IN THE 200 EAST & 200 WEST TANK FARMS FROM CY1995 TO CY2004

    Energy Technology Data Exchange (ETDEWEB)

    HOCKING, M.J.

    2005-01-31

    Revised for a more comprehensive overview of vapor incidents reported at the Hanford Tank Farms. Investigation into the meteorological influences on vapor incidents in the tank farm to determine what, if any, meteorological influences contribute to the reporting of odors, smells, vapors, and other gases. Weather phenomena, specifically barometric pressure, and wind velocity and direction can potentially cause or exacerbate a vapor release within the farm systems. The purpose of this document is to gather and evaluate the meteorological and weather information for the Tank Farms Shift Log Vapor Incident entries and determine what, if any, meteorological influences contribute to the reporting of odors, smells, vapors, and other gases such as propane. A part of the evaluation will be determining which of the incidents are related to actual ''intrusive'' work, and which are ''transient.'' Transient vapor incidents are herein defined as those vapors encountered during walkdowns, surveys, or other activities that did not require working directly with the tanks, pits, transfer lines, etc. Another part of the investigation will involve determining if there are barometric pressures or other weather related phenomena that might cause or contribute vapors being released when there are no ''intrusive'' activities. A final purpose is to evaluate whether there is any correlation between the 242-A Evaporator operations and Vapor Incidents entered on the Shift Log.

  20. Vapor Intrusion Facility Points, South Bay CA, 2014, US EPA Region 9

    Data.gov (United States)

    U.S. Environmental Protection Agency — POINT locations for the South Bay Vapor Instrusion Sites were derived from the NPL data for Region 9. One site, Philips Semiconductor, was extracted from the...

  1. Corrosion inhibitor development for slightly sour environments with oxygen intrusion

    Energy Technology Data Exchange (ETDEWEB)

    Wylde, J.; Wang, H.; Li, J. [Clariant Oil Services North America, Calgary, AB (Canada)

    2009-07-01

    This presentation reported on a study that examined the effect of oxygen on the inhibition of carbon steel in slightly sour corrosion, and the initiation and propagation of localized attack. Oxygen can enter sour water injection systems through the vapor space in storage tanks and process system. Oxygen aggravates the corrosion attack by participating in the cathodic reaction under full or partial diffusion control. Laboratory testing results were reported in this presentation along with the development of corrosion inhibitors for such a slightly sour system. Bubble testing cells were used with continuous H{sub 2}/CO{sub 2} mixture gas sparging and occasional oxygen intrusion of 2 to 4 hours during a week long test. Linear polarization resistance (LPR) measurements and weight loss corrosion coupons were used to quantify the corrosion attack. The findings were presented in terms of the magnitude of localized attacks at different oxygen concentrations and intrusion periods, with and without the presence of corrosion inhibitors. tabs., figs.

  2. Human intrusion: New ideas?

    International Nuclear Information System (INIS)

    Cooper, J.R.

    2002-01-01

    Inadvertent human intrusion has been an issue for the disposal of solid radioactive waste for many years. This paper discusses proposals for an approach for evaluating the radiological significance of human intrusion as put forward by ICRP with contribution from work at IAEA. The approach focuses on the consequences of the intrusion. Protective actions could, however, include steps to reduce the probability of human intrusion as well as the consequences. (author)

  3. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  4. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  5. Network Intrusion Forensic Analysis Using Intrusion Detection System

    OpenAIRE

    Manish Kumar; Dr. M. Hanumanthappa; Dr. T.V. Suresh Kumar

    2011-01-01

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investi...

  6. Count out your intrusions: Effects of verbal encoding on intrusive memories

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.

    2009-01-01

    Peri-traumatic information processing is thought to affect the development of intrusive trauma memories. This study aimed to replicate and improve the study by Holmes, Brewin, and Hennessy (2004, Exp. 3) on the role of peri-traumatic verbal processing in analogue traumatic intrusion development.

  7. Options for human intrusion

    International Nuclear Information System (INIS)

    Bauser, M.; Williams, R.

    1993-01-01

    This paper addresses options for dealing with human intrusion in terms of performance requirements and repository siting and design requirements. Options are presented, along with the advantages and disadvantages of certain approaches. At the conclusion, a conceptual approach is offered emphasizing both the minimization of subjective judgements concerning future human activity, and specification of repository requirements to minimize the likelihood of human intrusion and any resulting, harmful effects should intrusion occur

  8. Nonvolatile Memories Using Quantum Dot (QD) Floating Gates Assembled on II-VI Tunnel Insulators

    Science.gov (United States)

    Suarez, E.; Gogna, M.; Al-Amoody, F.; Karmakar, S.; Ayers, J.; Heller, E.; Jain, F.

    2010-07-01

    This paper presents preliminary data on quantum dot gate nonvolatile memories using nearly lattice-matched ZnS/Zn0.95Mg0.05S/ZnS tunnel insulators. The GeO x -cladded Ge and SiO x -cladded Si quantum dots (QDs) are self-assembled site-specifically on the II-VI insulator grown epitaxially over the Si channel (formed between the source and drain region). The pseudomorphic II-VI stack serves both as a tunnel insulator and a high- κ dielectric. The effect of Mg incorporation in ZnMgS is also investigated. For the control gate insulator, we have used Si3N4 and SiO2 layers grown by plasma- enhanced chemical vapor deposition.

  9. Analysis of KROTOS KS-2 and KS-4 steam explosion experiments with TEXAS-VI

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Ronghua, E-mail: rhchen@mail.xjtu.edu.cn [State Key Laboratory of Multiphase Flow in Power Engineering, School of Nuclear Science and Technology, Xi’an Jiaotong University, Xi’an 710049 (China); Wang, Jun [Nuclear Engineering and Engineering Physics, College of Engineering, University of Wisconsin Madison, WI 53706 (United States); Su, G.H.; Qiu, Suizheng [State Key Laboratory of Multiphase Flow in Power Engineering, School of Nuclear Science and Technology, Xi’an Jiaotong University, Xi’an 710049 (China); Corradini, M.L., E-mail: Corradini@engr.wisc.edu [Nuclear Engineering and Engineering Physics, College of Engineering, University of Wisconsin Madison, WI 53706 (United States)

    2016-12-01

    Highlights: • The KS-2 and KS-4 steam explosion experiments were analyzed by TEXAS-VI. • The coarse mixing status up to the explosion triggering time was well predicted by TEXAS-VI. • The predicted dynamic explosion pressure was in good agreement with the experimental results. - Abstract: TEXAS-VI is a transient, three-field, one-dimensional mechanistic model for the steam explosion phenomena. A fuel solidification model and associated fragmentation criteria of the solidifying particle for both the mixing phase and explosion phase were developed and incorporated into TEXAS-VI to account for solidification. In the present study, TEXAS-VI was used to analyze the KS-2 and KS-4 steam explosion experiments, which were performed in the KROTOS facility as part of the OECD-SERENA-2 program. In the simulation, the KROTOS experimental facility was modeled as Eulerian control volumes based on the facility geometry. The molten corium jet was divided up into a series of LaGrangian master particles equal to the initial jet diameter. Both the mixing phase and the explosion phase of the experiments were simulated by TEXAS-VI. Comparison to test data indicates that the fuel jet kinematics and the vapor volume during the mixing phase were well predicted by TEXAS-VI. The TEXAS-VI prediction of the dynamic explosion pressure at different axial locations in the test was also in good agreement with the experimental results. The maximum pressure of KS-2 and KS-4 predicted by TEXAS-VI were 16.7 MPa and 41.9 MPa, respectively. The KS-4 maximum steam explosion pressure predicted by TEXAS-VI was higher than that of KS-2, which was consistent with experiment observation. The observed differences of the dynamic explosion pressure between the KS-2 and KS-4 experiments were also successfully simulated by TEXAS-VI. This suggests that TEXAS-VI is able to analyze the effect of prototypic melt compositions on the steam explosion phenomena. Additional benchmarking and evaluations are ongoing.

  10. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  11. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  12. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  13. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  14. Organometallic vapor-phase epitaxy theory and practice

    CERN Document Server

    Stringfellow, Gerald B

    1989-01-01

    Here is one of the first single-author treatments of organometallic vapor-phase epitaxy (OMVPE)--a leading technique for the fabrication of semiconductor materials and devices. Also included are metal-organic molecular-beam epitaxy (MOMBE) and chemical-beam epitaxy (CBE) ultra-high-vacuum deposition techniques using organometallic source molecules. Of interest to researchers, students, and people in the semiconductor industry, this book provides a basic foundation for understanding the technique and the application of OMVPE for the growth of both III-V and II-VI semiconductor materials and the

  15. Influence of Saharan dust outbreaks and atmospheric stability upon vertical profiles of size-segregated aerosols and water vapor

    Science.gov (United States)

    Giménez, Joaquín; Pastor, Carlos; Castañer, Ramón; Nicolás, José; Crespo, Javier; Carratalá, Adoración

    2010-01-01

    Vertical profiles of aerosols and meteorological parameters were obtained using a hot air balloon and motorized paraglider. They were studied under anticyclonic conditions in four different contexts. Three flights occurred near sunrise, and one took place in the central hours of the day. The effects of North African dust intrusions were analyzed, whose entrance to the study area took place above the Stable Boundary Layer (SBL) in flight 1 and below it in flight 2. These flights have been compared with a non-intrusion situation (flight 3). A fourth flight characterized the profiles in the central hours of the day with a well-formed Convective Boundary Layer (CBL). With respect to the particle number distribution, the results show that not all sizes increase within the presence of an intrusion; during the first flight the smallest particles were not affected. The particle sizes affected in the second flight fell within the 0.35-2.5 μm interval. Under situations of convective dynamics, the reduction percentage of the particle number concentration reduces with increasing altitude, independently of their size, with respect to stability conditions. The negative vertical gradient for aerosols and water vapor, characteristic of a highly stable SBL (flight 3) becomes a constant profile within a CBL (flight 4). There are two situations that seem to alter the negative vertical gradient of the water vapor mixing ratio within the SBL: the presence of an intrusion and the possible stratification of the SBL based on different degrees of stability.

  16. 76 FR 14660 - Public Comment on the Development of Final Guidance for Evaluating the Vapor Intrusion to Indoor...

    Science.gov (United States)

    2011-03-17

    ... the RCRA Docket is (202) 566-0270. FOR FURTHER INFORMATION CONTACT: Stiven Foster, Policy Analysis... petroleum hydrocarbons should be addressed; How the guidance applies to Superfund Five-Year reviews; When or... intrusion can occur when there is migration of volatile chemicals from contaminated groundwater or soil into...

  17. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  18. Vapor Intrusion Estimation Tool for Unsaturated Zone Contaminant Sources. User’s Guide

    Science.gov (United States)

    2016-08-30

    estimation process when applying the tool. The tool described here is focused on vapor-phase diffusion from the current vadose zone source , and is not...from the current defined vadose zone source ). The estimated soil gas contaminant concentration obtained from the pre-modeled scenarios for a building...need a full site-specific numerical model to assess the impacts beyond the current vadose zone source . 35 5.0 References Brennan, R.A., N

  19. Tank 241-C-111 headspace gas and vapor sample results - August 1993 samples

    International Nuclear Information System (INIS)

    Huckaby, J.L.

    1994-01-01

    Tank 241-C-111 is on the ferrocyanide Watch List. Gas and vapor samples were collected to assure safe conditions before planned intrusive work was performed. Sample analyses showed that hydrogen is about ten times higher in the tank headspace than in ambient air. Nitrous oxide is about sixty times higher than ambient levels. The hydrogen cyanide concentration was below 0.04 ppbv, and the average NO x concentration was 8.6 ppmv

  20. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  1. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  2. An international perspective on Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  3. Temporary vs. Permanent Sub-slab Ports: A Comparative ...

    Science.gov (United States)

    Vapor intrusion (VI) is the migration of subsurface vapors, including radon and volatile organic compounds (VOCs), from the subsurface to indoor air. The VI exposure pathway extends from the contaminant source, which can be impacted soil, non-aqueous phase liquid, or contaminated groundwater, to indoor air-exposure points. Therefore, contaminated matrices may include groundwater, soil, soil gas, and indoor air. VOC contaminants of concern typically include halogenated solvents such as trichloroethene, tetrachloroethene, and chloroform, as well as petroleum hydrocarbons, such as the aromatic VOCs benzene, toluene, and xylenes. Radon is a colorless radioactive gas that is released by radioactive decay of radionuclides in rock and soil that migrate into homes through VI in a similar fashion to VOCs. This project focused on the performance of permanent versus temporary sub-slab sampling ports for the determination of VI of halogenated VOCs and radon into an unoccupied house. VOC and radon concentrations measured simultaneously in soil gas using collocated temporary and permanent ports appeared to be independent of the type of port. The variability between collocated temporary and permanent ports was much less than the spatial variability between different locations within a single residential duplex. The agreement of the majority of VOC and radon concentrations, 0–36% relative percent difference, and 2–19% relative standard deviation respectively, of each sub-sl

  4. An electrochemical study of U(VI) and Cr(VI) in molten borates

    International Nuclear Information System (INIS)

    Brigaudeau, M.; Gregori de Pinochet, I. de

    1977-01-01

    The electrochemical reduction of U(VI) and Cr(VI), in molten Na 2 B 4 O 7 at 800 deg C was studied by means of linear sweep voltammetry, and chronopotentiometry. The reduction of U(VI) to U(V) proceeded reversibly at a platinum electrode. The diffusion coefficient for the U(VI) species at 800 deg C was 4.10 -7 cm 2 .s -1 . The activation energy of diffusion was (34,8 +- 0,8) kcal. mole -1 . Electrochemical studies of Cr(VI) at 800 0 C reveal a two-step reduction process at a platinum electrode. Only the voltammogram for the first step charge transfer process was studied. Analysis indicated that Cr(VI) is reversibly reduced to Cr(III) at a platinum electrode. The diffusion coefficient for Cr(VI) at 800 0 C is 1,9.10 -7 cm 2 .s -1 [fr

  5. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  6. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  7. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    Part of the stakeholder consultation addressed strategies that media audiences are developing to cope with pressures and intrusions in a changing media environment, characterised by digitalisation and interactive possibilities. We interviewed ten stakeholders representing interests such as content...... production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...... no consensual motivation, nor any clear avenue for action. Therefore, we have analysed different discursive positions that prevent acknowledging or taking action upon the pressures and intrusions that we presented to these stakeholders. The discursive positions are outlined below....

  8. Vi, de civiliserede

    DEFF Research Database (Denmark)

    Nyemann, Dorthe

    2016-01-01

    Vi har i årtier troet på, at mennesker under de rette omstændigheder kan lykkes med at leve i fred og fordragelighed med hinanden. Skal vi til at erkende, at også vores samfundsstrukturer kun er en tynd fernis ovenpå et utæmmeligt voldspotentiale og egoisme?......Vi har i årtier troet på, at mennesker under de rette omstændigheder kan lykkes med at leve i fred og fordragelighed med hinanden. Skal vi til at erkende, at også vores samfundsstrukturer kun er en tynd fernis ovenpå et utæmmeligt voldspotentiale og egoisme?...

  9. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  10. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    International Conference on Computational Intelligence and Natural Computing, volume 2, pages 413–416, June 2009. • Rung Ching Chen, Kai -Fan Cheng, and...Chia-Fen Hsieh . “Using rough set and support vector machine for network intrusion detection.” International Journal of Network Security & Its...intrusion detection using FP tree rules.” Journal Of Advanced Networking and Applications, 1(1):30–39, 2009. • Ming-Yang Su, Gwo-Jong Yu , and Chun-Yuen

  11. From intrusive to oscillating thoughts.

    Science.gov (United States)

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  12. Plutonium(VI) accumulation and reduction by lichen biomass: correlation with U(VI)

    International Nuclear Information System (INIS)

    Ohnuki, Toshihiko; Aoyagi, Hisao; Kitatsuji, Yoshihiro; Samadfam, Mohammad; Kimura, Yasuhiko; William Purvis, O.

    2004-01-01

    The uptake of plutonium(VI) and uranium(VI) by lichen biomass was studied in the foliose lichen Parmotrema tinctorum to elucidate the migration behavior of Pu and U in the terrestrial environment. Pu and U uptake by P. tinctorum averaged 0.040±0.010 and 0.055±0.015 g g dry -1 , respectively, after 96 h incubation with 4.0x10 -4 mol l -1 Pu solutions of pH 3, 4 and 5. SEM observations showed that the accumulated Pu is evenly distributed on the upper and lower surfaces of P. tinctorum, in contrast to U(VI), which accumulated in both cortical and medullary layers. UV/VIS absorption spectroscopy demonstrates that a fraction of Pu(VI) in the solution is reduced to Pu(V) by the organic substances released from P. tinctorum, and the accumulated Pu on the surface is reduced to Pu(IV), while U(VI) keeps the oxidation state of VI. Since the solubility of Pu(IV) hydroxides is very low, reduced Pu(VI) does not penetrate to the medullary layers, but is probably precipitated as Pu(IV) hydroxides on the cortical lichen surface. It is concluded that the uptake and reduction of Pu(VI) by lichens is important to determine the mobilization and oxidation states of Pu in the terrestrial environment

  13. Anaerobic bio-removal of uranium (VI) and chromium (VI): Comparison of microbial community structure

    International Nuclear Information System (INIS)

    Martins, Monica; Faleiro, Maria Leonor; Chaves, Sandra; Tenreiro, Rogerio; Santos, Erika; Costa, Maria Clara

    2010-01-01

    Several microbial communities, obtained from uranium contaminated and non-contaminated samples, were investigated for their ability to remove uranium (VI) and the cultures capable for this removal were further assessed on their efficiency for chromium (VI) removal. The highest efficiency for removal of both metals was observed on a consortium from a non-contaminated soil collected in Monchique thermal place, which was capable to remove 91% of 22 mg L -1 U(VI) and 99% of 13 mg L -1 Cr(VI). This study revealed that uranium (VI) removing communities have also ability to remove chromium (VI), but when uranium (VI) was replaced by chromium (VI) several differences in the structure of all bacterial communities were observed. TGGE and phylogenetic analysis of 16S rRNA gene showed that the uranium (VI) removing bacterial consortia are mainly composed by members of Rhodocyclaceae family and Clostridium genus. On the other hand, bacteria from Enterobacteriaceae family were detected in the community with ability for chromium (VI) removal. The existence of members of Enterobacteriaceae and Rhodocyclaceae families never reported as chromium or uranium removing bacteria, respectively, is also a relevant finding, encouraging the exploitation of microorganisms with new abilities that can be useful for bioremediation.

  14. Anaerobic bio-removal of uranium (VI) and chromium (VI): Comparison of microbial community structure

    Energy Technology Data Exchange (ETDEWEB)

    Martins, Monica [Centro de Ciencias do Mar, Universidade do Algarve, Campus de Gambelas, 8005-139 Faro (Portugal); Faleiro, Maria Leonor [IBB - Centro de Biomedicina Molecular e Estrutural, Universidade do Algarve, Campus de Gambelas, 8005-139 Faro (Portugal); Chaves, Sandra; Tenreiro, Rogerio [Universidade de Lisboa, Faculdade de Ciencias, Centro de Biodiversidade, Genomica Integrativa e Funcional (BioFIG), Campus de FCUL, Campo Grande 1749-016 Lisboa (Portugal); Santos, Erika [Centro de Ciencias do Mar, Universidade do Algarve, Campus de Gambelas, 8005-139 Faro (Portugal); Costa, Maria Clara, E-mail: mcorada@ualg.pt [Centro de Ciencias do Mar, Universidade do Algarve, Campus de Gambelas, 8005-139 Faro (Portugal)

    2010-04-15

    Several microbial communities, obtained from uranium contaminated and non-contaminated samples, were investigated for their ability to remove uranium (VI) and the cultures capable for this removal were further assessed on their efficiency for chromium (VI) removal. The highest efficiency for removal of both metals was observed on a consortium from a non-contaminated soil collected in Monchique thermal place, which was capable to remove 91% of 22 mg L{sup -1} U(VI) and 99% of 13 mg L{sup -1} Cr(VI). This study revealed that uranium (VI) removing communities have also ability to remove chromium (VI), but when uranium (VI) was replaced by chromium (VI) several differences in the structure of all bacterial communities were observed. TGGE and phylogenetic analysis of 16S rRNA gene showed that the uranium (VI) removing bacterial consortia are mainly composed by members of Rhodocyclaceae family and Clostridium genus. On the other hand, bacteria from Enterobacteriaceae family were detected in the community with ability for chromium (VI) removal. The existence of members of Enterobacteriaceae and Rhodocyclaceae families never reported as chromium or uranium removing bacteria, respectively, is also a relevant finding, encouraging the exploitation of microorganisms with new abilities that can be useful for bioremediation.

  15. Determination of Chlorinated Solvent Sorption by Porous Material-Application to Trichloroethene Vapor on Cement Mortar.

    Science.gov (United States)

    Musielak, Marion; Brusseau, Mark L; Marcoux, Manuel; Morrison, Candice; Quintard, Michel

    2014-08-01

    Experiments have been performed to investigate the sorption of trichloroethene (TCE) vapor by concrete material or, more specifically, the cement mortar component. Gas-flow experiments were conducted using columns packed with small pieces of cement mortar obtained from the grinding of typical concrete material. Transport and retardation of TCE at high vapor concentrations (500 mg L -1 ) was compared to that of a non-reactive gas tracer (Sulfur Hexafluoride, SF6). The results show a large magnitude of retardation (retardation factor = 23) and sorption (sorption coefficient = 10.6 cm 3 g -1 ) for TCE, compared to negligible sorption for SF6. This magnitude of sorption obtained with pollutant vapor is much bigger than the one obtained for aqueous-flow experiments conducted for water-saturated systems. The considerable sorption exhibited for TCE under vapor-flow conditions is attributed to some combination of accumulation at the air-water interface and vapor-phase adsorption, both of which are anticipated to be significant for this system given the large surface area associated with the cement mortar. Transport of both SF6 and TCE was simulated successfully with a two-region physical non-equilibrium model, consistent with the dual-medium structure of the crushed cement mortar. This work emphasizes the importance of taking into account sorption phenomena when modeling transport of volatile organic compounds through concrete material, especially in regard to assessing vapor intrusion.

  16. Large-scale circulation associated with moisture intrusions into the Arctic during winter

    Science.gov (United States)

    Woods, Cian; Caballero, Rodrigo; Svensson, Gunilla

    2014-05-01

    Observations during recent decades show that there is a greater near surface warming occurring in the Arctic, particularly during winter, than at lower latitudes. Understanding the mechanisms controlling surface temperature in the Arctic is therefore an important priority in climate research. The surface energy budget is a key proximate control on Arctic surface temperature. During winter, insolation is low or absent and the atmospheric boundary layer is typically very stable, limiting turbulent hear exchange, so that the surface energy budget is almost entirely governed by longwave radiation. The net surface longwave radiation (NetLW) at this time has a strikingly bimodal distribution: conditions oscillate between a 'radiatively clear' state with rapid surface heat loss and a "moist cloudy" state with NetLW ˜ 0 W m-2. Each state can persist for days or weeks at a time but transitions between them happen in a matter of hours. This distribution of NetLW has important implications for the Arctic climate, as even a small shift in the frequency of occupancy of each state would be enough to significantly affect the overall surface energy budget and thus winter sea ice thickness. The clear and cloudy states typically occur during periods of relatively high and low surface pressure respectively, suggesting a link with synoptic-scale dynamics. This suggestion is consistent with previous studies indicating that the formation of low-level and mid-level clouds over the Arctic Ocean is typically associated with cyclonic activity and passing frontal systems . More recent work has shown that intense filamentary moisture intrusion events are a common feature in the Arctic and can induce large episodic increases of longwave radiation into the surface. The poleward transport of water vapor across 70N during boreal winter is examined in the ERA-Interim reanalysis product and 16 of the Coupled Model Intercomparison Project Phase 5 (CMIP5) models, focusing on intense moisture

  17. II-VI semiconductor compounds

    CERN Document Server

    1993-01-01

    For condensed matter physicists and electronic engineers, this volume deals with aspects of II-VI semiconductor compounds. Areas covered include devices and applications of II-VI compounds; Co-based II-IV semi-magnetic semiconductors; and electronic structure of strained II-VI superlattices.

  18. Intrusive trauma memory: A review and functional analysis

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.; Holmes, E.A.

    2009-01-01

    Our contribution to this special issue focuses on the phenomenon of intrusive trauma memory. While intrusive trauma memories can undoubtedly cause impairment, we argue that they may exist for a potentially adaptive reason. Theory and experimental research on intrusion development are reviewed and

  19. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  20. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  1. Rapid laccolith intrusion driven by explosive volcanic eruption.

    Science.gov (United States)

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  2. Cinética e equilíbrio de adsorção dos oxiânions Cr (VI, Mo (VI e Se (VI pelo sal de amônio quaternário de quitosana Kinetics and equilibrium of adsorption of oxyanions Cr (VI, Mo (VI and Se (VI by quaternary ammonium chitosan salt

    Directory of Open Access Journals (Sweden)

    Viviane A. Spinelli

    2005-07-01

    Full Text Available O sal quaternário de quitosana foi sintetizado com cloreto de glicidil trimetil amônio. A modificação química foi caracterizada por espectrometria no IV, RMN de 13C e ¹H, e mmol/g de grupos quaternários presentes na matriz polimérica por condutimetria. A remoção de Cr (VI, Mo (VI e Se (VI, em meio aquoso, foi investigada em processo de batelada. A adsorção mostrou ser dependente do pH para o Cr (VI e Se (VI, com um pH ótimo de adsorção, entre 4,0 a 6,0. Para o Mo (VI a adsorção manteve-se quase constante no intervalo de pH entre 4,0 e 11,5. O modelo de isoterma de Langmuir descreveu melhor os dados de equilíbrio na faixa de concentração investigada. No presente estudo, um grama do sal quaternário de quitosana reticulado com glutaraldeído adsorveu 68,3 mg de Cr, 63,4 mg de Mo e 90,0 mg de Se. A velocidade de adsorção, no processo, segue a equação cinética de pseudo segunda-ordem, sendo que o equilíbrio para os três íons foi alcançado próximo aos 200 minutos. A análise dispersiva de raios-X para o Cr (VI mostrou que o principal mecanismo de adsorção é a troca iônica entre os íons Cl- da superfície do polímero pelos oxiânions. O trocador aniônico apresentou a seguinte ordem de seletividade: Cr (VI > Mo (VI > Se (VI.Quaternary chitosan salt was synthesized in the presence of glycidyl trimetyl ammonium chloride. The polymer was characterized by spectroscopic techniques: infrared, 13C and ¹H NMR, while the amount of quaternary ammonium groups was obtained by condutimetry. The removal of Cr (VI, Mo (VI and Se (VI from aqueous solutions was carried out in batch adsorption processes. The process seemed to be pH dependent for Cr (VI and Se (VI with an optimum pH ranging from 4.0 to 6.0; while for Mo (VI the adsorption remained almost constant within the range between 4.0 and 11.5. The Langmuir isotherm model provided the best fit of the equilibrium data over the whole concentration investigated. In the experiment

  3. U(VI) sorption on kaolinite. Effects of pH, U(VI) concentration and oxyanions

    International Nuclear Information System (INIS)

    Liang Gao; Ziqian Yang; Keliang Shi; Xuefeng Wang; Zhijun Guo; Wangsuo Wu

    2010-01-01

    U(VI) sorption on kaolinite was studied as functions of contact time, pH, U(VI) concentration, solid-to-liquid ratio (m/V) by using a batch experimental method. The effects of sulfate and phosphate on U(VI) sorption were also investigated. It was found that the sorption kinetics of U(VI) can be described by a pseudo-second-order model. Potentiometric titrations at variable ionic strengths indicated that the titration curves of kaolinite were not sensitive to ionic strength, and that the pH of the zero net proton charge (pH PZNPC ) was at 6.9. The sorption of U(VI) on kaolinite increased with pH up to 6.5 and reached a plateau at pH >6.5. The presence of phosphate strongly increased U(VI) sorption especially at pH <5.5, which may be due to formation of ternary surface complexes involving phosphate. In contrast, the presence of sulfate did not cause any apparent effect on U(VI) sorption. A double layer model was used to interpret both results of potentiometric titrations and U(VI) sorption on kaolinite. (author)

  4. KENO-VI Primer: A Primer for Criticality Calculations with SCALE/KENO-VI Using GeeWiz

    International Nuclear Information System (INIS)

    Bowman, Stephen M.

    2008-01-01

    The SCALE (Standardized Computer Analyses for Licensing Evaluation) computer software system developed at Oak Ridge National Laboratory is widely used and accepted around the world for criticality safety analyses. The well-known KENO-VI three-dimensional Monte Carlo criticality computer code is one of the primary criticality safety analysis tools in SCALE. The KENO-VI primer is designed to help a new user understand and use the SCALE/KENO-VI Monte Carlo code for nuclear criticality safety analyses. It assumes that the user has a college education in a technical field. There is no assumption of familiarity with Monte Carlo codes in general or with SCALE/KENO-VI in particular. The primer is designed to teach by example, with each example illustrating two or three features of SCALE/KENO-VI that are useful in criticality analyses. The primer is based on SCALE 6, which includes the Graphically Enhanced Editing Wizard (GeeWiz) Windows user interface. Each example uses GeeWiz to provide the framework for preparing input data and viewing output results. Starting with a Quickstart section, the primer gives an overview of the basic requirements for SCALE/KENO-VI input and allows the user to quickly run a simple criticality problem with SCALE/KENO-VI. The sections that follow Quickstart include a list of basic objectives at the beginning that identifies the goal of the section and the individual SCALE/KENO-VI features that are covered in detail in the sample problems in that section. Upon completion of the primer, a new user should be comfortable using GeeWiz to set up criticality problems in SCALE/KENO-VI. The primer provides a starting point for the criticality safety analyst who uses SCALE/KENO-VI. Complete descriptions are provided in the SCALE/KENO-VI manual. Although the primer is self-contained, it is intended as a companion volume to the SCALE/KENO-VI documentation. (The SCALE manual is provided on the SCALE installation DVD.) The primer provides specific examples of

  5. Mobile vapor recovery and vapor scavenging unit

    International Nuclear Information System (INIS)

    Stokes, C.A.; Steppe, D.E.

    1991-01-01

    This patent describes a mobile anti- pollution apparatus, for the recovery of hydrocarbon emissions. It comprises a mobile platform upon which is mounted a vapor recovery unit for recovering vapors including light hydrocarbons, the vapor recovery unit having an inlet and an outlet end, the inlet end adapted for coupling to an external source of hydrocarbon vapor emissions to recover a portion of the vapors including light hydrocarbons emitted therefrom, and the outlet end adapted for connection to a means for conveying unrecovered vapors to a vapor scavenging unit, the vapor scavenging unit comprising an internal combustion engine adapted for utilizing light hydrocarbon in the unrecovered vapors exiting from the vapor recovery unit as supplemental fuel

  6. Cranial mononeuropathy VI

    Science.gov (United States)

    ... Abducens palsy; Lateral rectus palsy; VIth nerve palsy; Cranial nerve VI palsy; Sixth nerve palsy; Neuropathy - sixth nerve ... Cranial mononeuropathy VI is damage to the sixth cranial nerve. This nerve is also called the abducens nerve. ...

  7. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  8. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  9. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  10. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  11. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  12. Enzymatic reduction of U(VI) in groundwaters; Reduction enzymatique de U(VI) dans des eaux souterraines

    Energy Technology Data Exchange (ETDEWEB)

    Addelouas, A.; Gong, W. [Center for Radioactive Waste Management, Advanced Materials Laboratory, 1001 University, Albuquerque (United States); Lutze, W.; Nuttall, E. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Chemical and Nuclear Engineering; Fritz, B.; Crovisier, J.L. [Centre National de la Recherche Scientifique (CNRS), 67 - Strasbourg (France). Centre de Sedimentologie et Geochimie de la Surface

    1999-03-01

    The use of enzymatic reduction of U(VI) in remediation of groundwater contaminated with U(VI) is receiving considerable attention. Certain strains of bacteria can combine the oxidation of an organic compound to the reduction of U(VI) to U(IV), which precipitates as uraninite. In the present study, we tested the reduction of U(VI) in groundwaters with various origins and compositions. In all groundwaters u(VI) was reduced by sulfate reducing bacteria that had been activated by ethanol and tri-metaphosphate. The reduction rate of U(VI) depends on sulfate concentration in water and the abundance of bacteria in the system. This work shows that bacteria capable of U(VI) reduction are ubiquitous in nature, and suggests the possibility of a large application of the enzymatic reduction of U(VI) for in situ clean up of groundwaters contaminated with uranium. (authors) 12 refs.

  13. Intrusive Memories of Distressing Information: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Eva Battaglini

    Full Text Available Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42 viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13 demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13. Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC and dorsolateral prefrontal cortex (dlPFC, inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories.

  14. Waste storage in the vadose zone affected by water vapor condensation and leaching

    International Nuclear Information System (INIS)

    Cary, J.W.; Gee, G.W.; Whyatt, G.A.

    1990-08-01

    One of the major concerns associated with waste storage in the vadose zone is that toxic materials may somehow be leached and transported by advecting water down to the water table and reach the accessible environment through either a well or discharge to a river. Consequently, care is taken to provide barriers over and around the storage sites to reduce contact between infiltrating water and the buried waste form. In some cases, it is important to consider the intrusion of water vapor as well as water in the liquid phase. Water vapor diffuses through porous material along vapor pressure gradients. A slightly low temperature, or the presence of water-soluble components in the waste, favors water condensation resulting in leaching of the waste form and advection of water-soluble components to the water table. A simple analysis is presented that allows one to estimate the rate of vapor condensation as a function of waste composition and backfill materials. An example using a waste form surrounded by concrete and gravel layers is presented. The use of thermal gradients to offset condensation effects of water-soluble components in the waste form is discussed. Thermal gradients may be controlled by design factors that alter the atmospheric energy exchange across the soil surface or that interrupt the geothermal heat field. 7 refs., 2 figs., 1 tab

  15. Finalize field testing of cold climate heat pump (CCHP) based on tandem vapor injection compressors

    Energy Technology Data Exchange (ETDEWEB)

    Shen, Bo [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Baxter, Van D. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Abdelaziz, Omar [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Rice, C. Keith [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-03-01

    This report describes the system diagram and control algorithm of a prototype air-source cold climate heat pump (CCHP) using tandem vapor injection (VI) compressors. The prototype was installed in Fairbanks, Alaska and underwent field testing starting in 09/2016. The field testing results of the past six months, including compressor run time fractions, measured COPs and heating capacities, etc., are presented as a function of the ambient temperature. Two lessons learned are also reported.

  16. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  17. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  18. Human intrusion: issues concerning its assessment

    International Nuclear Information System (INIS)

    Grimwood, P.D.; Smith, G.M.

    1989-01-01

    The potential significance of human intrusion in the performance assessment of radioactive waste repositories has been increasingly recognized in recent years. It is however an area of assessment in which subjective judgments dominate. This paper identifies some of the issues involved. These include regulatory criteria, scenario development, probability assignment, consequence assessment and measures to mitigate human intrusion

  19. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  20. Magmatic intrusions in the lunar crust

    Science.gov (United States)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  1. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  2. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  3. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  4. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  5. Evidential reasoning research on intrusion detection

    Science.gov (United States)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  6. Uranium(VI) speciation by spectroscopy

    International Nuclear Information System (INIS)

    Meinrath, G.

    1997-01-01

    The application of UV-Vis and time-resolved laser-induced fluorescence (TRLF) spectroscopies to direct of uranium(VI) in environmental samples offers various prospects that have, however, serious limitations. While UV-Vis spectroscopy is probably not sensitive enough to detect uranium(VI) species in the majority of environmental samples, TRLFS is principially able to speciate uranium(VI) at very low concentration levels in the nanomol range. Speciation by TRLFS can be based on three parameters: excitation spectrum, emission spectrum and lifetime of the fluorescence emission process. Due to quenching effects, the lifetime may not be expected to be as characteristics as, e.g., the emission spectrum. Quenching of U(VI) fluorescence by reaction with organic substances, inorganic ions and formation of carbonate radicals is one important limiting factor in the application of U(VI) fluorescence spectroscopy. Fundamental photophysical criteria are illustrated using UV-Vis and fluorescence spectra of U(VI) hydrolysis and carbonato species as examples. (author)

  7. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  8. Spray Chemical Vapor Deposition of Single-Source Precursors for Chalcopyrite I-III-VI2 Thin-Film Materials

    Science.gov (United States)

    Hepp, Aloysius F.; Banger, Kulbinder K.; Jin, Michael H.-C.; Harris, Jerry D.; McNatt, Jeremiah S.; Dickman, John E.

    2008-01-01

    Thin-film solar cells on flexible, lightweight, space-qualified substrates provide an attractive approach to fabricating solar arrays with high mass-specific power. A polycrystalline chalcopyrite absorber layer is among the new generation of photovoltaic device technologies for thin film solar cells. At NASA Glenn Research Center we have focused on the development of new single-source precursors (SSPs) for deposition of semiconducting chalcopyrite materials onto lightweight, flexible substrates. We describe the syntheses and thermal modulation of SSPs via molecular engineering. Copper indium disulfide and related thin-film materials were deposited via aerosol-assisted chemical vapor deposition using SSPs. Processing and post-processing parameters were varied in order to modify morphology, stoichiometry, crystallography, electrical properties, and optical properties to optimize device quality. Growth at atmospheric pressure in a horizontal hotwall reactor at 395 C yielded the best device films. Placing the susceptor closer to the evaporation zone and flowing a more precursor-rich carrier gas through the reactor yielded shinier-, smoother-, and denser-looking films. Growth of (112)-oriented films yielded more Cu-rich films with fewer secondary phases than growth of (204)/(220)-oriented films. Post-deposition sulfur-vapor annealing enhanced stoichiometry and crystallinity of the films. Photoluminescence studies revealed four major emission bands and a broad band associated with deep defects. The highest device efficiency for an aerosol-assisted chemical vapor deposited cell was one percent.

  9. A Survey on Anomaly Based Host Intrusion Detection System

    Science.gov (United States)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  10. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  11. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  12. Anion Exchange in II-VI Semiconducting Nanostructures via Atomic Templating.

    Science.gov (United States)

    Agarwal, Rahul; Krook, Nadia M; Ren, Ming-Liang; Tan, Liang Z; Liu, Wenjing; Rappe, Andrew M; Agarwal, Ritesh

    2018-03-14

    Controlled chemical transformation of nanostructures is a promising technique to obtain precisely designed novel materials, which are difficult to synthesize otherwise. We report high-temperature vapor-phase anion-exchange reactions to chemically transform II-VI semiconductor nanostructures (100-300 nm length scale) while retaining the single crystallinity, crystal structure, morphology, and even defect distribution of the parent material via atomic templating. The concept of atomic templating is employed to obtain kinetically controlled, thermodynamically metastable structural phases such as zincblende CdSe and CdS from zincblende CdTe upon complete chemical replacement of Te with Se or S. The underlying transformation mechanisms are explained through first-principles density functional theory calculations. Atomic templating is a unique path to independently tune materials' phase and composition at the nanoscale, allowing the synthesis of novel materials.

  13. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    Science.gov (United States)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    We will present a detailed microstructural and geochemical study of reactive liquid flow in Unit 9 of the Rum Eastern Layered Intrusion. In the study region, Unit 9 comprises an underlying lens-like body of peridotite overlain by a sequence of troctolite and gabbro (termed allivalite), with some local and minor anorthosite. The troctolite is separated from the overlying gabbro by a distinct, sub-horizontal, undulose horizon (the major wavy horizon). Higher in the stratigraphy is another, similar, horizon (the minor wavy horizon) that separates relatively clinopyroxene-poor gabbro from an overlying gabbro. To the north of the peridotite lens, both troctolite and gabbro grade into poikilitic gabbro. Clinopyroxene habit in the allivalite varies from thin rims around olivine in troctolite, to equigranular crystals in gabbro, to oikocrysts in the poikilitic gabbro. The poikilitic gabbros contain multiple generations of clinopyroxene, with Cr-rich (~1.1 wt.% Cr2O3), anhedral cores with moderate REE concentrations (core1) overgrown by an anhedral REE-depleted second generation with moderate Cr (~0.7 wt.% Cr2O3) (core2). These composite cores are rimmed by Cr-poor (~0.2 wt.% Cr2O3) and REE-poor to moderate clinopyroxene. We interpret these microstructures as a consequence of two separate episodes of partial melting triggered by the intrusion of hot olivine-phyric picrite to form the discontinuous lenses that comprise the Unit 9 peridotite. Loss of clinopyroxene-saturated partial melt from the lower part of the allivalite immediately following the early stages of sill intrusion resulted in the formation of clinopyroxene-poor gabbro. The spatial extent of clinopyroxene loss is marked by the minor wavy horizon. A further partial melting event stripped out almost all clinopyroxene from the lowest allivalite, to form a troctolite, with the major wavy horizon marking the extent of melting during this second episode. The poikilitic gabbro formed from clinopyroxene-saturated melt

  14. Diverse anaerobic Cr(VI) tolerant bacteria from Cr(VI)-contaminated 100H site at Hanford

    Science.gov (United States)

    Chakraborty, R.; Phan, R.; Lam, S.; Leung, C.; Brodie, E. L.; Hazen, T. C.

    2007-12-01

    Hexavalent Chromium [Cr(VI)] is a widespread contaminant found in soil, sediment, and ground water. Cr(VI) is more soluble, toxic, carcinogenic, and mutagenic compared to its reduced form Cr(III). In order to stimulate microbially mediated reduction of Cr(VI), a poly-lactate compound HRC was injected into the chromium contaminated aquifers at site 100H at Hanford. Based on the results of the bacterial community composition using high-density DNA microarray analysis of 16S rRNA gene products, we recently investigated the diversity of the dominant anaerobic culturable microbial population present at this site and their role in Cr(VI) reduction. Positive enrichments set up at 30°C using specific defined anaerobic media resulted in the isolation of an iron reducing isolate strain HAF, a sulfate reducing isolate strain HBLS and a nitrate reducing isolate, strain HLN among several others. Preliminary 16S rDNA sequence analysis identifies strain HAF as Geobacter metallireducens, strain HLN as Pseudomonas stutzeri and strain HBLS as a member of Desulfovibrio species. Strain HAF isolated with acetate as the electron donor utilized propionate, glycerol and pyruvate as alternative carbon sources, and reduced metals like Mn(IV) and Cr(VI). Growth was optimal at 37°C, pH of 6.5 and 0% salinity. Strain HLN isolated with lactate as electron donor utilized acetate, glycerol and pyruvate as alternative carbon sources, and reduced metals like Mn(IV) and Cr(VI). Optimal growth was observed at 37°C, at a pH of 7.5 and 0.3% salinity. Anaerobic active washed cell suspension of strain HLN reduced almost 95 micromolar Cr(VI) within 4 hours relative to controls. Further, with 100 micromolar Cr(VI) as the sole electron acceptor, cells of strain HLN grew to cell numbers of 4.05X 107/ml over a period of 24hrs after an initial lag, demonstrating direct enzymatic Cr(VI) reduction by this species. 10mM lactate served as the sole electron donor. These results demonstrate that Cr(VI

  15. A new intrusion prevention model using planning knowledge graph

    Science.gov (United States)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  16. Bringing part of the lab to the field: On-site chromium speciation in seawater by electrodeposition of Cr(III)/Cr(VI) on portable coiled-filament assemblies and measurement in the lab by electrothermal, near-torch vaporization sample introduction and inductively coupled plasma-atomic emission spectrometry

    International Nuclear Information System (INIS)

    Badiei, Hamid R.; McEnaney, Jennifer; Karanassios, Vassili

    2012-01-01

    A field-deployable electrochemical approach to preconcentration, matrix clean up and selective electrodeposition of Cr(III) and Cr(III) + Cr(VI) in seawater is described. Using portable, battery-operated electrochemical instrumentation, Cr species in seawater were electrodeposited in the field on portable coiled-filament assemblies made from Re. Assemblies with dried residues of Cr(III) or Cr(III) + Cr(VI) on them were transported to the lab for concentration determination by electrothermal, near-torch vaporization (NTV) sample introduction and inductively coupled plasma-atomic emission spectrometry (ICP-AES). Electrodeposition offers selective species deposition, preconcentration and matrix clean up from seawater samples. For selective deposition, free Cr(VI) was electrodeposited at − 0.3 V and Cr(III) + Cr(VI) at − 1.6 V (both vs Ag/AgCl). Interestingly, at 0 V (vs Ag/AgCl) and in the absence of an electrodeposition potential only Cr(VI) was spontaneously and selectively adsorbed on the coil and reasons for this are given. Due to preconcentration afforded by electrodeposition, the detection limits obtained after a 60 s electrodeposition at the voltages stated above using buffered (pH = 4.7) artificial seawater spiked with either Cr(III) or Cr(VI) were 20 pg/mL for Cr(III) and 10 pg/mL for Cr(VI). For comparison, the detection limit for Cr obtained by pipetting directly on the coil 5 μL of diluted standard solution was 500 pg/mL, thus it was concluded that electrodeposition offered 40 to 60 fold improvements. Matrix clean up is required due to the high salt content of seawater and this was addressed by simply rinsing the coil with 18.2 MΩ water without any loss of Cr species. Reasons for this are provided. The method was validated in the lab using buffered artificial seawater and it was used in the field for the first time by sampling seawater, buffering it and immediately electrodepositing Cr species on portable assemblies on-site. Electrodeposition in the

  17. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients

    Directory of Open Access Journals (Sweden)

    Usha Bapat

    2012-01-01

    Full Text Available To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients′ above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life

  18. Enzymatic reduction of U(VI) in groundwaters

    International Nuclear Information System (INIS)

    Addelouas, A.; Gong, W.; Lutze, W.; Nuttall, E.; Fritz, B.; Crovisier, J.L.

    1999-01-01

    The use of enzymatic reduction of U(VI) in remediation of groundwater contaminated with U(VI) is receiving considerable attention. Certain strains of bacteria can combine the oxidation of an organic compound to the reduction of U(VI) to U(IV), which precipitates as uraninite. In the present study, we tested the reduction of U(VI) in groundwaters with various origins and compositions. In all groundwaters u(VI) was reduced by sulfate reducing bacteria that had been activated by ethanol and tri-metaphosphate. The reduction rate of U(VI) depends on sulfate concentration in water and the abundance of bacteria in the system. This work shows that bacteria capable of U(VI) reduction are ubiquitous in nature, and suggests the possibility of a large application of the enzymatic reduction of U(VI) for in situ clean up of groundwaters contaminated with uranium. (authors)

  19. Biological intrusion barriers for large-volume waste-disposal sites

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Cline, J.F.; Rickard, W.H.

    1982-01-01

    intrusion of plants and animals into shallow land burial sites with subsequent mobilization of toxic and radiotoxic materials has occured. Based on recent pathway modeling studies, such intrusions can contribute to the dose received by man. This paper describes past work on developing biological intrusion barrier systems for application to large volume waste site stabilization. State-of-the-art concepts employing rock and chemical barriers are discussed relative to long term serviceability and cost of application. The interaction of bio-intrusion barrier systems with other processes affecting trench cover stability are discussed to ensure that trench cover designs minimize the potential dose to man. 3 figures, 6 tables

  20. Multi-year composite view of ozone enhancements and stratosphere-to-troposphere transport in dry intrusions of northern hemisphere extratropical cyclones

    Science.gov (United States)

    Jaegle, L.; Wood, R.; Wargan, K.

    2017-12-01

    We examine the role of extratropical cyclones in stratosphere-to-troposphere (STT) exchange by using cyclone-centric composites of O3 retrievals from the Microwave Limb Sounder (MLS) and the Tropospheric Emission Spectrometer (TES) onboard the Aura satellite and contrasting them to composites obtained with Modern-Era Retrospective-analysis for Research and Applications (MERRA and MERRA-2) as well as with the GEOS-Chem chemical transport model. MERRA sea level pressure fields are used to identify 15,978 extratropical cyclones in the northern hemisphere (NH) between 2005 and 2012. The lowermost stratosphere (261 hPa) and middle troposphere (424 hPa) composites of these cyclones feature a distinct 1,000 km wide O3 enhancement in the dry intrusion to the southwest of the cyclone center, coinciding with a lowered tropopause, enhanced potential vorticity, and decreased water vapor. In the lowermost stratosphere, MLS composites show that the dry intrusion O3 enhancements reach a 210 ppbv maximum in April. In the middle troposphere, TES composites display dry intrusion maximum O3 enhancements of 27 ppbv in May. The magnitude and seasonality of these enhancements are captured by MERRA and MERRA-2, but GEOS-Chem is a factor of two too low. The MERRA-2 composites show that the O3-rich dry intrusion forms a coherent and vertically aligned structure between 300 and 800 hPa, wrapping cyclonically with the warm conveyor belt. In winter and spring dry intrusions, O3 is enhanced by 100 pbbv or 100-130% relative to background conditions at 300 hPa, with a significant contribution reaching pressure altitudes below 500 hPa (6-20 ppbv or 15-30% enhancement). We calculate that extratropical cyclones result in a STT flux of 119 Tg O3 yr-1, accounting for 42% of the annual NH O3 extratropical STT flux. The STT flux in cyclones is highest in spring and displays a strong dependence on westerly 300 hPa wind speeds.

  1. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    OpenAIRE

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumben...

  2. Identification of Human Intrusion Types into Radwaste Disposal Facility

    International Nuclear Information System (INIS)

    Budi Setiawan

    2007-01-01

    Human intrusion has long been recognized as a potentially important post-closure safety issue for rad waste disposal facility. It is due to the difficulties in predicting future human activities. For the preliminary study of human intrusion, identification of human intrusion types need to be recognized and investigated also the approaching of problem solving must be known to predict the prevention act and accepted risk. (author)

  3. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  4. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  5. II-VI Narrow-Bandgap Semiconductors for Optoelectronics

    Science.gov (United States)

    Baker, Ian

    The field of narrow-gap II-VI materials is dominated by the compound semiconductor mercury cadmium telluride, (Hg1-x Cd x Te or MCT), which supports a large industry in infrared detectors, cameras and infrared systems. It is probably true to say that HgCdTe is the third most studied semiconductor after silicon and gallium arsenide. Hg1-x Cd x Te is the material most widely used in high-performance infrared detectors at present. By changing the composition x the spectral response of the detector can be made to cover the range from 1 μm to beyond 17 μm. The advantages of this system arise from a number of features, notably: close lattice matching, high optical absorption coefficient, low carrier generation rate, high electron mobility and readily available doping techniques. These advantages mean that very sensitive infrared detectors can be produced at relatively high operating temperatures. Hg1-x Cd x Te multilayers can be readily grown in vapor-phase epitaxial processes. This provides the device engineer with complex doping and composition profiles that can be used to further enhance the electro-optic performance, leading to low-cost, large-area detectors in the future. The main purpose of this chapter is to describe the applications, device physics and technology of II-VI narrow-bandgap devices, focusing on HgCdTe but also including Hg1-x Mn x Te and Hg1-x Zn x Te. It concludes with a review of the research and development programs into third-generation infrared detector technology (so-called GEN III detectors) being performed in centers around the world.

  6. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  7. Vapor pressures and enthalpies of vaporization of azides

    International Nuclear Information System (INIS)

    Verevkin, Sergey P.; Emel'yanenko, Vladimir N.; Algarra, Manuel; Manuel Lopez-Romero, J.; Aguiar, Fabio; Enrique Rodriguez-Borges, J.; Esteves da Silva, Joaquim C.G.

    2011-01-01

    Highlights: → We prepared and measured vapor pressures and vaporization enthalpies of 7 azides. → We examined consistency of new and available in the literature data. → Data for geminal azides and azido-alkanes selected for thermochemical calculations. - Abstract: Vapor pressures of some azides have been determined by the transpiration method. The molar enthalpies of vaporization Δ l g H m of these compounds were derived from the temperature dependencies of vapor pressures. The measured data sets were successfully checked for internal consistency by comparison with vaporization enthalpies of similarly structured compounds.

  8. Enzymatic U(VI) reduction by Desulfosporosinus species

    International Nuclear Information System (INIS)

    Suzuki, Y.; Kelly, S.D.; Kemner, K.M.; Banfield, J.F.

    2004-01-01

    Here we tested U(VI) reduction by a Desulfosporosinus species (sp.) isolate and type strain (DSM 765) in cell suspensions (pH 7) containing 1 mM U(VI) and lactate, under an atmosphere containing N 2 -CO 2 -H 2 (90: 5: 5). Although neither Desulfosporosinus species (spp.) reduced U(VI) in cell suspensions with 0.25% Na-bicarbonate or 0.85% NaCl, U(VI) was reduced in these solutions by a control strain, desulfovibrio desulfuricans (ATCC 642). However, both Desulfosporosinus strains reduced U(VI) in cell suspensions depleted in bicarbonate and NaCl. No U(VI) reduction was observed without lactate and H 2 electron donors or with heat-killed cells, indicating enzymatic U(VI) reduction. Uranium(VI) reduction by both strains was inhibited when 1 mM CuCl 2 was added to the cell suspensions. Because the Desulfosporosinus DSM 765 does not contain cytochrome c 3 used by Desulfovibrio spp. to reduce U(VI), Desulfosporosinus species reduce uranium via a different enzymatic pathway. (orig.)

  9. Heart rate, startle response, and intrusive trauma memories

    Science.gov (United States)

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  10. Kiintoainehäviöselvitys

    OpenAIRE

    Ylimys, Jussi

    2014-01-01

    Teoriaosassa käydään läpi yleisesti pyörrepuhdistuslaitoksen toimintaa sekä kiintoainehäviöitä paperi- ja kartonkitehtailla. Tämän opinnäytetyön tarkoituksena oli tutkia Metsä Boardin Kyröskosken tehtaan kiintoainehäviötä. Työssä selvitettiin, minkälaista kiintoainetta jätevesilaitokselle päätyy ja miksi. Selvityksen kohteena oli myös, missä kohteissa kiintoainehäviöt tarkalleen syntyvät ja kuinka paljon häviötä tapahtuu. Kahden edellä mainitun tiedon perusteella selvitettiin, kuinka palj...

  11. Peroxo complexes of molybdenum(VI), tungsten(VI), uranium(VI), zirconium(IV) and thorium(IV) ions containing tridentate Schiff bases derived from salicylaldehyde and amino acids

    International Nuclear Information System (INIS)

    Tarafder, M.T.H.; Khan, A.R.

    1997-01-01

    The synthesis of peroxo complexes of molybdenum(VI), tungsten(VI), uranium(VI), zirconium(IV), thorium(IV) and their possible oxygen transfer reactions is presented. An attempt has also been made to study the size of the metal ions and the electronic effect derived from the tridentate Schiff bases on the v 1 (O-O) mode of the complexes in their IR spectra

  12. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  13. The appraisal of intrusive thoughts in relation to obsessional-compulsive symptoms.

    Science.gov (United States)

    Barrera, Terri L; Norton, Peter J

    2011-01-01

    Research has shown that although intrusive thoughts occur universally, the majority of individuals do not view intrusive thoughts as being problematic (Freeston, Ladouceur, Thibodeau, & Gagnon, 1991; Rachman & de Silva, 1978; Salkovskis & Harrison, 1984). Thus, it is not the presence of intrusive thoughts that leads to obsessional problems but rather some other factor that plays a role in the development of abnormal obsessions. According to the cognitive model of obsessive-compulsive disorder (OCD) put forth by Salkovskis (1985), the crucial factor that differentiates between individuals with OCD and those without is the individual's appraisal of the naturally occurring intrusive thoughts. This study aimed to test Salkovskis's model by examining the role of cognitive biases (responsibility, thought-action fusion, and thought control) as well as distress in the relationship between intrusive thoughts and obsessive-compulsive symptoms in an undergraduate sample of 326 students. An existing measure of intrusive thoughts (the Revised Obsessional Intrusions Inventory) was modified for this study to include a scale of distress associated with each intrusive thought in addition to the current frequency scale. When the Yale-Brown Obsessive-Compulsive Scale was used as the measure of OCD symptoms, a significant interaction effect of frequency and distress of intrusive thoughts resulted. Additionally, a significant three-way interaction of Frequency × Distress × Responsibility was found when the Obsessive Compulsive Inventory-Revised was used as the measure of OCD symptoms. These results indicate that the appraisal of intrusive thoughts is important in predicting OCD symptoms, thus providing support for Salkovskis's model of OCD.

  14. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  15. Saharan dust intrusions in Spain: Health impacts and associated synoptic conditions.

    Science.gov (United States)

    Díaz, Julio; Linares, Cristina; Carmona, Rocío; Russo, Ana; Ortiz, Cristina; Salvador, Pedro; Trigo, Ricardo Machado

    2017-07-01

    A lot of papers have been published about the impact on mortality of Sahara dust intrusions in individual cities. However, there is a lack of studies that analyse the impact on a country and scarcer if in addition the analysis takes into account the meteorological conditions that favour these intrusions. The main aim is to examine the effect of Saharan dust intrusions on daily mortality in different Spanish regions and to characterize the large-scale atmospheric circulation anomalies associated with such dust intrusions. For determination of days with Saharan dust intrusions, we used information supplied by the Ministry of Agriculture, Food & Environment, it divides Spain into 9 main areas. In each of these regions, a representative province was selected. A time series analysis has been performed to analyse the relationship between daily mortality and PM 10 levels in the period from 01.01.04 to 31.12.09, using Poisson regression and stratifying the analysis by the presence or absence of Saharan dust advections. The proportion of days on which there are Saharan dust intrusions rises to 30% of days. The synoptic pattern is characterised by an anticyclonic ridge extending from northern Africa to the Iberian Peninsula. Particulate matter (PM) on days with intrusions are associated with daily mortality, something that does not occur on days without intrusions, indicating that Saharan dust may be a risk factor for daily mortality. In other cases, what Saharan dust intrusions do is to change the PM-related mortality behaviour pattern, going from PM 2.5 . A study such as the one conducted here, in which meteorological analysis of synoptic situations which favour Saharan dust intrusions, is combined with the effect on health at a city level, would seem to be crucial when it comes to analysing the differentiated mortality pattern in situations of Saharan dust intrusions. Copyright © 2017 Elsevier Inc. All rights reserved.

  16. ENDF-201, ENDF/B-VI summary documentation supplement 1, ENDF/HE-VI summary documentation

    International Nuclear Information System (INIS)

    McLane, V.

    1996-12-01

    The National Nuclear Data Center (NNDC) provides coordination for and serves as the secretariat to the Cross Section Evaluation Working Group (CSWEG). CSEWG is responsible for the oversight of the ENDF/B Evaluated Nuclear Data File. All data are checked and reviewed by CSEWG, and the file is maintained at the NNDC. For a description of the ENDF/B-VI file, see the ENDF-102 Data Formats and Procedures for the Evaluated Nuclear Data File ENDF-6. The purpose of this addendum to the ENDF/B-VI Summary Documentation is to provide documentation of Releases 1, 2, 3, and 4 for the ENDF/B-VI and ENDF/HE-VI evaluated nuclear data libraries. These releases contain many new and revised evaluations for the neutron, photo-atomic interaction, radioactive decay data, spontaneous fission product yield, neutron-induced fission product yield, thermal neutron scattering, proton, deuteron, and triton sublibraries. The summaries have been extracted mainly from the ENDF/B-VI File 1 comments (MT = 451), which have been checked, edited, and may also include supplementary information. Some summaries have been provided by the evaluators in electronic format, while others are extracted from reports on the evaluations. All references have been checked and corrected, or updated where appropriate. A list of the laboratories which have contributed evaluations used in ENDF/B-VI is given

  17. ENDF-201, ENDF/B-VI summary documentation supplement 1, ENDF/HE-VI summary documentation

    Energy Technology Data Exchange (ETDEWEB)

    McLane, V.

    1996-12-01

    The National Nuclear Data Center (NNDC) provides coordination for and serves as the secretariat to the Cross Section Evaluation Working Group (CSWEG). CSEWG is responsible for the oversight of the ENDF/B Evaluated Nuclear Data File. All data are checked and reviewed by CSEWG, and the file is maintained at the NNDC. For a description of the ENDF/B-VI file, see the ENDF-102 Data Formats and Procedures for the Evaluated Nuclear Data File ENDF-6. The purpose of this addendum to the ENDF/B-VI Summary Documentation is to provide documentation of Releases 1, 2, 3, and 4 for the ENDF/B-VI and ENDF/HE-VI evaluated nuclear data libraries. These releases contain many new and revised evaluations for the neutron, photo-atomic interaction, radioactive decay data, spontaneous fission product yield, neutron-induced fission product yield, thermal neutron scattering, proton, deuteron, and triton sublibraries. The summaries have been extracted mainly from the ENDF/B-VI File 1 comments (MT = 451), which have been checked, edited, and may also include supplementary information. Some summaries have been provided by the evaluators in electronic format, while others are extracted from reports on the evaluations. All references have been checked and corrected, or updated where appropriate. A list of the laboratories which have contributed evaluations used in ENDF/B-VI is given.

  18. 24 CFR 971.11 - HOPE VI developments.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false HOPE VI developments. 971.11... § 971.11 HOPE VI developments. Developments with HOPE VI implementation grants that have approved HOPE... with reasonable revitalization plans. Future HUD actions to approve or deny proposed HOPE VI...

  19. An evaluation of classification algorithms for intrusion detection ...

    African Journals Online (AJOL)

    An evaluation of classification algorithms for intrusion detection. ... Log in or Register to get access to full text downloads. ... Most of the available IDSs use all the 41 features in the network to evaluate and search for intrusive pattern in which ...

  20. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  1. Non-Intrusive Intelligibility Prediction Using a Codebook-Based Approach

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Kavalekalam, Mathew Shaji; Xenaki, Angeliki

    2017-01-01

    It could be beneficial for users of hearing aids if these were able to automatically adjust the processing according to the speech intelligibility in the specific acoustic environment. Most speech intelligibility metrics are intrusive, i.e., they require a clean reference signal, which is rarely...... a high correlation between the proposed non-intrusive codebookbased STOI (NIC-STOI) and the intrusive STOI indicating that NIC-STOI is a suitable metric for automatic classification of speech signals...

  2. Technology-derived storage solutions for stabilizing insulin in extreme weather conditions I: the ViViCap-1 device.

    Science.gov (United States)

    Pfützner, Andreas; Pesach, Gidi; Nagar, Ron

    2017-06-01

    Injectable life-saving drugs should not be exposed to temperatures 30°C/86°F. Frequently, weather conditions exceed these temperature thresholds in many countries. Insulin is to be kept at 4-8°C/~ 39-47°F until use and once opened, is supposed to be stable for up to 31 days at room temperature (exception: 42 days for insulin levemir). Extremely hot or cold external temperature can lead to insulin degradation in a very short time with loss of its glucose-lowering efficacy. Combined chemical and engineering solutions for heat protection are employed in ViViCap-1 for disposable insulin pens. The device works based on vacuum insulation and heat consumption by phase-change material. Laboratory studies with exposure of ViViCap-1 to hot outside conditions were performed to evaluate the device performance. ViViCap-1 keeps insulin at an internal temperature phase-change process and 'recharges' the device for further use. ViViCap-1 performed within its specifications. The small and convenient device maintains the efficacy and safety of using insulin even when carried under hot weather conditions.

  3. Reduction of ferrate(VI) and oxidation of cyanate in a Fe(VI)-TiO2-UV-NCO- system.

    Science.gov (United States)

    Winkelmann, Kurt; Sharma, Virender K; Lin, Yekaterina; Shreve, Katherine A; Winkelmann, Catherine; Hoisington, Laura J; Yngard, Ria A

    2008-08-01

    The aqueous photocatalytic degradation of cyanate (NCO(-)), which is a long-lived neurotoxin formed during the remediation of cyanide in industrial waste streams, was studied in the ferrate(VI)-UV-TiO2-NCO(-) system. Kinetics measurements of the photocatalytic reduction of ferrate(VI) were carried out as a function of [NCO(-)], [ferrate(VI)], [O(2)], light intensity (I(o)), and amount of TiO2 in suspensions at pH 9.0. The photocatalytic reduction rate of ferrate(VI) in the studied system can be expressed as -d[Fe(VI)]/dt=kI(o)(0.5) [NCO(-)] [TiO2]. The rate of photocatalytic oxidation of cyanate with ferrate(VI) was greater than the rate in the analogous system without ferrate(VI). The possibility of involvement of reactive ferrate(V) species for this enhancement was determined by studying the reactivity of ferrate(V) with NCO(-) in a homogeneous solution using a premix pulse radiolysis technique. The rate constant for the reaction of ferrate(V) and NCO(-) in alkaline medium was estimated to be (9.60+/-0.07) x 10(2) M(-1) s(-1), which is much slower than the ferrate(VI) self-decomposition reaction (k approximately 10(7) M(-1) s(-1)). An analysis of the kinetic data in the Fe(VI)-UV-TiO2-NCO(-) system suggests that ferrate(V) is not directly participating in the oxidation of cyanate. Possible reactions in the system are presented to explain results of ferrate(VI) reduction and oxidation of cyanate.

  4. Bringing part of the lab to the field: On-site chromium speciation in seawater by electrodeposition of Cr(III)/Cr(VI) on portable coiled-filament assemblies and measurement in the lab by electrothermal, near-torch vaporization sample introduction and inductively coupled plasma-atomic emission spectrometry

    Science.gov (United States)

    Badiei, Hamid R.; McEnaney, Jennifer; Karanassios, Vassili

    2012-12-01

    A field-deployable electrochemical approach to preconcentration, matrix clean up and selective electrodeposition of Cr(III) and Cr(III) + Cr(VI) in seawater is described. Using portable, battery-operated electrochemical instrumentation, Cr species in seawater were electrodeposited in the field on portable coiled-filament assemblies made from Re. Assemblies with dried residues of Cr(III) or Cr(III) + Cr(VI) on them were transported to the lab for concentration determination by electrothermal, near-torch vaporization (NTV) sample introduction and inductively coupled plasma-atomic emission spectrometry (ICP-AES). Electrodeposition offers selective species deposition, preconcentration and matrix clean up from seawater samples. For selective deposition, free Cr(VI) was electrodeposited at - 0.3 V and Cr(III) + Cr(VI) at - 1.6 V (both vs Ag/AgCl). Interestingly, at 0 V (vs Ag/AgCl) and in the absence of an electrodeposition potential only Cr(VI) was spontaneously and selectively adsorbed on the coil and reasons for this are given. Due to preconcentration afforded by electrodeposition, the detection limits obtained after a 60 s electrodeposition at the voltages stated above using buffered (pH = 4.7) artificial seawater spiked with either Cr(III) or Cr(VI) were 20 pg/mL for Cr(III) and 10 pg/mL for Cr(VI). For comparison, the detection limit for Cr obtained by pipetting directly on the coil 5 μL of diluted standard solution was 500 pg/mL, thus it was concluded that electrodeposition offered 40 to 60 fold improvements. Matrix clean up is required due to the high salt content of seawater and this was addressed by simply rinsing the coil with 18.2 MΩ water without any loss of Cr species. Reasons for this are provided. The method was validated in the lab using buffered artificial seawater and it was used in the field for the first time by sampling seawater, buffering it and immediately electrodepositing Cr species on portable assemblies on-site. Electrodeposition in the

  5. Intrusion of Magmatic Bodies Into the Continental Crust: 3-D Numerical Models

    Science.gov (United States)

    Gorczyk, Weronika; Vogt, Katharina

    2018-03-01

    Magma intrusion is a major material transfer process in the Earth's continental crust. Yet the mechanical behavior of the intruding magma and its host are a matter of debate. In this study we present a series of numerical thermomechanical simulations on magma emplacement in 3-D. Our results demonstrate the response of the continental crust to magma intrusion. We observe change in intrusion geometries between dikes, cone sheets, sills, plutons, ponds, funnels, finger-shaped and stock-like intrusions, and injection time. The rheology and temperature of the host are the main controlling factors in the transition between these different modes of intrusion. Viscous deformation in the warm and deep crust favors host rock displacement and plutons at the crust-mantle boundary forming deep-seated plutons or magma ponds in the lower to middle crust. Brittle deformation in the cool and shallow crust induces cone-shaped fractures in the host rock and enables emplacement of finger- or stock-like intrusions at shallow or intermediate depth. Here the passage of magmatic and hydrothermal fluids from the intrusion through the fracture pattern may result in the formation of ore deposits. A combination of viscous and brittle deformation forms funnel-shaped intrusions in the middle crust. Intrusion of low-density magma may more over result in T-shaped intrusions in cross section with magma sheets at the surface.

  6. Indoor Air Contamination from Hazardous Waste Sites: Improving the Evidence Base for Decision-Making.

    Science.gov (United States)

    Johnston, Jill; MacDonald Gibson, Jacqueline

    2015-11-27

    At hazardous waste sites, volatile chemicals can migrate through groundwater and soil into buildings, a process known as vapor intrusion. Due to increasing recognition of vapor intrusion as a potential indoor air pollution source, in 2015 the U.S. Environmental Protection Agency (EPA) released a new vapor intrusion guidance document. The guidance specifies two conditions for demonstrating that remediation is needed: (1) proof of a vapor intrusion pathway; and (2) evidence that human health risks exceed established thresholds (for example, one excess cancer among 10,000 exposed people). However, the guidance lacks details on methods for demonstrating these conditions. We review current evidence suggesting that monitoring and modeling approaches commonly employed at vapor intrusion sites do not adequately characterize long-term exposure and in many cases may underestimate risks. On the basis of this evidence, we recommend specific approaches to monitoring and modeling to account for these uncertainties. We propose a value of information approach to integrate the lines of evidence at a site and determine if more information is needed before deciding whether the two conditions specified in the vapor intrusion guidance are satisfied. To facilitate data collection and decision-making, we recommend a multi-directional community engagement strategy and consideration of environment justice concerns.

  7. Nuisance alarm suppression techniques for fibre-optic intrusion detection systems

    Science.gov (United States)

    Mahmoud, Seedahmed S.; Visagathilagar, Yuvaraja; Katsifolis, Jim

    2012-02-01

    The suppression of nuisance alarms without degrading sensitivity in fibre-optic intrusion detection systems is important for maintaining acceptable performance. Signal processing algorithms that maintain the POD and minimize nuisance alarms are crucial for achieving this. A level crossings algorithm is presented for suppressing torrential rain-induced nuisance alarms in a fibre-optic fence-based perimeter intrusion detection system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr, and intrusion events can be detected simultaneously during rain periods. The use of a level crossing based detection and novel classification algorithm is also presented demonstrating the suppression of nuisance events and discrimination of nuisance and intrusion events in a buried pipeline fibre-optic intrusion detection system. The sensor employed for both types of systems is a distributed bidirectional fibre-optic Mach Zehnder interferometer.

  8. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  9. Vi har intet lært - hvornår lærer vi det?

    DEFF Research Database (Denmark)

    Sodemann, Morten

    2016-01-01

    WHO anså fra i går ikke længere ebola for at være en trussel mod global folkesundhed, så fra i dag er kameraerne slukket i Vestafrika og vi er tilbage hvor vi startede. SDG målene skal have et dansk udtryk, men hvad er de danske kompetencer på globalt plan når sundhed ikke længere er en kerneakti......WHO anså fra i går ikke længere ebola for at være en trussel mod global folkesundhed, så fra i dag er kameraerne slukket i Vestafrika og vi er tilbage hvor vi startede. SDG målene skal have et dansk udtryk, men hvad er de danske kompetencer på globalt plan når sundhed ikke længere er en...

  10. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  11. An ontology-based intrusion patterns classification system | Shonubi ...

    African Journals Online (AJOL)

    Studies have shown that computer intrusions have been on the increase in recent times. Many techniques and patterns are being used by intruders to gain access to data on host computer networks. In this work, intrusion patterns were identified and classified and inherent knowledge were represented using an ontology of ...

  12. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    Seawater intrusion; coastal aquifers; density-dependent flow and ... The seawater intrusion mechanism in coastal aquifers generally causes the occurrence of ... (4) The dynamic viscosity of the fluid does not change with respect to salinity and.

  13. A Machine Learning Based Intrusion Impact Analysis Scheme for Clouds

    Directory of Open Access Journals (Sweden)

    Junaid Arshad

    2012-01-01

    Full Text Available Clouds represent a major paradigm shift, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of on demand expandable computing infrastructures. However, Clouds introduce novel security challenges which need to be addressed to facilitate widespread adoption. This paper is focused on one such challenge - intrusion impact analysis. In particular, we highlight the significance of intrusion impact analysis for the overall security of Clouds. Additionally, we present a machine learning based scheme to address this challenge in accordance with the specific requirements of Clouds for intrusion impact analysis. We also present rigorous evaluation performed to assess the effectiveness and feasibility of the proposed method to address this challenge for Clouds. The evaluation results demonstrate high degree of effectiveness to correctly determine the impact of an intrusion along with significant reduction with respect to the intrusion response time.

  14. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    -intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results......Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non...

  15. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  16. Effect of uranium (VI) on the growth of yeast and influence of metabolism of yeast on adsorption of U (VI)

    International Nuclear Information System (INIS)

    Sakamoto, Fuminori; Ohnuki, Toshihiko; Kozai, Naofumi; Wakai, Eiichi; Francis, A.J.

    2005-01-01

    We have carried out the growth experiments of 3 strains of yeast in a medium containing uranium (VI) to elucidate the effect of U (VI) on the growth of microorganisms. Hansenula fabianii J640 grew in the liquid medium containing 0.1 mM U (VI) at lower rate than the control, but Saccharomyces cerevisiae did not grow under this condition. The H. fabianii J640 pre-cultured for 21 h in the liquid medium without U (VI) grew even after the exposure to 1 mM U (VI), but did not grow without pre-cultivation. For the pre-cultured H. fabianii J640, radioactivity of U in the medium was the same as the initial one for 110 h, and then gradually decreased. TEM-EDS analysis of H. fabianii J640 exposed to 1 mM U (VI) for 165 h showed accumulation of U (VI) on the cells. When H. fabianii J640 was not pre-cultured, radioactivity of U in the medium was lower than the initial one. These results indicated that U (VI) inhibits the growth of yeast, and that the adsorption of U (VI) by the cells depends on the metabolism of yeast. (author)

  17. Preparation and properties of N-Phenylbutyrohydroxamic acid and N-p-Chlorophenylbutyrohydroxamic acid and their uses as extracting agents for Chromium (VI), Molybdenum (VI), Titanium (IV) and Uranium (VI)

    Energy Technology Data Exchange (ETDEWEB)

    Abu Elnour, Sawsan Hassan [Department of Chemistry, Faculty of Science, University of Khartoum, Khartoum (Sudan)

    1993-05-01

    Two lignads, N-phenylbutyrohydroxamic acid (1), N-p-chlorophenylbutyryl chloride with {beta} phenyl-hydroylamine and N-p-chlorophenylhydroxylamine, respectively. The acids prepared were identified and characterised through their reactions with Vanadiun (V) and iron (III), their melting points, infra-red spectra and nitrogen content. The extractive properties of these acids towards the metals Cr (VI), Mo (VI), Ti (IV) and U (VI) were examined at different PH values. The percentage of maximum extraction with the two acids was found to be as follows : for Cr (VI) at PH 1, (100%) for both acids, Mo (VI) at PH 2 (33.34%) with acid (I) and (16.67%) with acid (II) and U (VI) at PH 6 (72%) with acid (I) and (76%) with acid (II). The metal: Ligand complexes ratios were determined by using the continuous variation method, the ratio of the two ligands with four metals was found to be 1:2. Finally the suitability of the two acids for spectrophotometric determination of four metals was examined.(Author) 90 refs. , 24 tabs. , 24 figs

  18. Preparation and properties of N-Phenylbutyrohydroxamic acid and N-p-Chlorophenylbutyrohydroxamic acid and their uses as extracting agents for Chromium (VI), Molybdenum (VI), Titanium (IV) and Uranium (VI)

    International Nuclear Information System (INIS)

    Abu Elnour, Sawsan Hassan

    1993-05-01

    Two lignads, N-phenylbutyrohydroxamic acid (1), N-p-chlorophenylbutyryl chloride with β phenyl-hydroylamine and N-p-chlorophenylhydroxylamine, respectively. The acids prepared were identified and characterised through their reactions with Vanadiun (V) and iron (III), their melting points, infra-red spectra and nitrogen content. The extractive properties of these acids towards the metals Cr (VI), Mo (VI), Ti (IV) and U (VI) were examined at different PH values. The percentage of maximum extraction with the two acids was found to be as follows : for Cr (VI) at PH 1, (100%) for both acids, Mo (VI) at PH 2 (33.34%) with acid (I) and (16.67%) with acid (II) and U (VI) at PH 6 (72%) with acid (I) and (76%) with acid (II). The metal: Ligand complexes ratios were determined by using the continuous variation method, the ratio of the two ligands with four metals was found to be 1:2. Finally the suitability of the two acids for spectrophotometric determination of four metals was examined.(Author)

  19. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  20. Intrusion problematic during water supply systems’ operation

    OpenAIRE

    Jesus Mora-Rodriguez, P. Amparo López-Jimenez, Helena M. Ramos

    2011-01-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuse...

  1. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection.

    Science.gov (United States)

    Hu, Weiming; Gao, Jun; Wang, Yanguo; Wu, Ou; Maybank, Stephen

    2014-01-01

    Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.

  2. Appraisal and control of sexual and non-sexual intrusive thoughts in university students.

    Science.gov (United States)

    Clark, D A; Purdon, C; Byers, E S

    2000-05-01

    This study examined differences in the appraisal and thought control strategies associated with the perceived control of unwanted sexual and non-sexual intrusive thoughts. Eleven appraisal dimensions, subjective physiological arousal and 10 thought control strategies were measured in 171 university students who were administered the Revised Obsessive Intrusions Inventory-Sex Version, a self-report measure of unwanted intrusive thoughts. Thought-action fusion (TAF) likelihood was a significant unique predictor of the perceived controllability of respondents' most upsetting sexual and non-sexual intrusive thought. Moreover greater subjective physiological arousal was a significant predictor of reduced control over sexual intrusions, whereas worry that one might act on an intrusive thought and greater effort to control the intrusion were significant unique predictors of the control of non-sexual intrusive thoughts. Various thought control strategies were more often used in response to non-sexual than sexual cognitions. The results are discussed in terms of the differential role of various appraisal processes in the control of unwanted sexual and non-sexual thoughts.

  3. Toddler inhibited temperament, maternal cortisol reactivity and embarrassment, and intrusive parenting.

    Science.gov (United States)

    Kiel, Elizabeth J; Buss, Kristin A

    2013-06-01

    The relevance of parenting behavior to toddlers' development necessitates a better understanding of the influences on parents during parent-child interactions. Toddlers' inhibited temperament may relate to parenting behaviors, such as intrusiveness, that predict outcomes later in childhood. The conditions under which inhibited temperament relates to intrusiveness, however, remain understudied. A multimethod approach would acknowledge that several levels of processes determine mothers' experiences during situations in which they witness their toddlers interacting with novelty. As such, the current study examined maternal cortisol reactivity and embarrassment about shyness as moderators of the relation between toddlers' inhibited temperament and maternal intrusive behavior. Participants included 92 24-month-old toddlers and their mothers. Toddlers' inhibited temperament and maternal intrusiveness were measured observationally in the laboratory. Mothers supplied saliva samples at the beginning of the laboratory visit and 20 minutes after observation. Maternal cortisol reactivity interacted with inhibited temperament in relation to intrusive behavior, such that mothers with higher levels of cortisol reactivity were observed to be more intrusive with more highly inhibited toddlers. Embarrassment related to intrusive behavior as a main effect. These results highlight the importance of considering child characteristics and psychobiological processes in relation to parenting behavior. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  4. Source characteristics and tectonic setting of mafic-ultramafic intrusions in North Xinjiang, NW China: Insights from the petrology and geochemistry of the Lubei mafic-ultramafic intrusion

    Science.gov (United States)

    Chen, Bao-Yun; Yu, Jin-Jie; Liu, Shuai-Jie

    2018-05-01

    The newly discovered Lubei sulfide-bearing mafic-ultramafic intrusion forms the western extension of the Huangshan-Jin'erquan mafic-ultramafic intrusion belt in East Tianshan, NW China. The Lubei intrusion comprises hornblende peridotite, lherzolite, and harzburgite in its southern portion, gabbro in its middle portion, and hornblende gabbro in its northern portion. Intrusive relationships indicate that three magma pulses were involved in the formation of the intrusion, and that they were likely evolved from a common primitive magma. Estimated compositions of the Lubei primitive magma are similar to those of island arc calc-alkaline basalt except for the low Na2O and CaO contents of the Lubei primitive magma. This paper reports on the mineral compositions, whole-rock major and trace element contents, and Rb-Sr and Sm-Nd isotopic compositions of the Lubei intrusion, and a zircon LA-MC-ICP-MS U-Pb age for hornblende gabbro. The Lubei intrusion is characterized by enrichment in large-ion lithophile elements, depletion in high-field-strength elements, and marked negative Nb and Ta anomalies, with enrichment in chondrite-normalized light rare earth elements. It exhibits low (87Sr/86Sr)i ratios of 0.70333-0.70636 and low (143Nd/144Nd)i ratios of 0.51214-0.51260, with positive εNd values of +4.01 to +6.33. LA-ICP-MS U-Pb zircon ages yielded a weighted-mean age of 287.9 ± 1.6 Ma for the Lubei intrusion. Contemporaneous mafic-ultramafic intrusions in different tectonic domains in North Xinjiang show similar geological and geochemical signatures to the Lubei intrusion, suggesting a source region of metasomatized mantle previously modified by hydrous fluids from the slab subducted beneath the North Xinjiang region in the early Permian. Metasomatism of the mantle was dominated by hydrous fluids and was related to subduction of the Paleo-Asian oceanic lithosphere during the Paleozoic. Sr-Nd-Pb isotopic compositions suggest that the mantle source was a mixture of depleted mid

  5. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS.

  6. Unique Challenges in WiFi Intrusion Detection

    OpenAIRE

    Milliken, Jonny

    2014-01-01

    The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more deta...

  7. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  8. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  9. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...... the intersection of IDSs and blockchains. In particular, we introduce the background of intrusion detection and blockchain, discuss the applicability of blockchain to intrusion detection, and identify open challenges in this direction....

  10. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M.; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N.; Mazzoni, Elvis; Pappas, Ilias O.; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M. S.; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS. PMID:27994566

  11. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Directory of Open Access Journals (Sweden)

    Agata Błachnio

    2016-12-01

    Full Text Available The increase in the number of users of social networking sites has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2,628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Measure, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively and low context (positively; of the personality variables, conscientiousness and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of social networking sites (SNS.

  12. Vapor pressure and enthalpy of vaporization of aliphatic propanediamines

    International Nuclear Information System (INIS)

    Verevkin, Sergey P.; Chernyak, Yury

    2012-01-01

    Highlights: ► We measured vapor pressure of four aliphatic 1,3-diamines. ► Vaporization enthalpies at 298 K were derived. ► We examined consistency of new and available data in the literature. ► A group-contribution method for prediction was developed. - Abstract: Vapor pressures of four aliphatic propanediamines including N-methyl-1,3-propanediamine (MPDA), N,N-dimethyl-1,3-propanediamine (DMPDA), N,N-diethyl-1,3-propanediamine (DEPDA) and N,N,N′,N′-tetramethyl-1,3-propanediamine (4MPDA) were measured using the transpiration method. The vapor pressures developed in this work and reported in the literature were used to derive molar enthalpy of vaporization values at the reference temperature 298.15 K. An internal consistency check of the enthalpy of vaporization was performed for the aliphatic propanediamines studied in this work. A group-contribution method was developed for the validation and prediction vaporization enthalpies of amines and diamines.

  13. Fast Photo-detection in Phototransistors based on Group III-VI Layered Materials.

    Science.gov (United States)

    Patil, Prasanna; Ghosh, Sujoy; Wasala, Milinda; Lei, Sidong; Vajtai, Robert; Ajayan, Pulickel; Talapatra, Saikat

    Response time of a photo detector is one of the crucial aspect of photo-detection. Recently it has been shown that direct band gap of few layered group III-VI materials helps in increased absorption of light thereby enhancing the photo responsive properties of these materials. Ternary system of Copper Indium Selenide has been extensively used in optoelectronics industry and it is expected that 2D layered structure of Copper Indium Selenide will be a key component of future optoelectronics devices based on 2D materials. Here we report fast photo detection in few layers of Copper Indium Selenide (CuIn7Se11) phototransistor. Few-layers of CuIn7Se11 flakes were exfoliated from crystals grown using chemical vapor transport technique. Our photo response characterization indicates responsivity of 104 mA/W with external quantum efficiency exceeding 103. We have found response time of few μs which is one of the fastest response among photodetectors based on 2D materials. We also found specific detectivity of 1012 Jones which is an order higher than conventional photodetectors. A comparison between response times of various layered group III-VI materials will be presented and discussed. This work is supported by the U.S. Army Research Office through a MURI Grant # W911NF-11-1-0362.

  14. Different roles of ROS and Nrf2 in Cr(VI)-induced inflammatory responses in normal and Cr(VI)-transformed cells

    Energy Technology Data Exchange (ETDEWEB)

    Roy, Ram Vinod; Pratheeshkumar, Poyil; Son, Yong-Ok; Wang, Lei [Center for Research on Environmental Disease, University of Kentucky, 1095 VA Drive, Lexington, KY 40536 (United States); Department of Toxicology and Cancer Biology, College of Medicine, University of Kentucky, 1095 VA Drive, Lexington, KY 40536 (United States); Hitron, John Andrew [Center for Research on Environmental Disease, University of Kentucky, 1095 VA Drive, Lexington, KY 40536 (United States); Divya, Sasidharan Padmaja; Zhang, Zhuo [Department of Toxicology and Cancer Biology, College of Medicine, University of Kentucky, 1095 VA Drive, Lexington, KY 40536 (United States); Shi, Xianglin, E-mail: xshi5@email.uky.edu [Center for Research on Environmental Disease, University of Kentucky, 1095 VA Drive, Lexington, KY 40536 (United States)

    2016-09-15

    Hexavalent chromium (Cr(VI)) is classified as a human carcinogen. Cr(VI) has been associated with adenocarcinomas and squamous cell carcinoma of the lung. The present study shows that acute Cr(VI) treatment in human bronchial epithelial cells (BEAS-2B) increased inflammatory responses (TNF-α, COX-2, and NF-кB/p65) and expression of Nrf2. Cr(VI)-induced generation of reactive oxygen species (ROS) are responsible for increased inflammation. Despite the fact that Nrf2 is a master regulator of response to oxidative stress, silencing of Nrf2 in the acute Cr(VI) treatment had no effect on Cr(VI)-induced inflammation. In contrast, in Cr(VI)-transformed (CrT) cells, Nrf2 is constitutively activated. Knock-down of this protein resulted in decreased inflammation, while silencing of SOD2 and CAT had no effect in the expression of these inflammatory proteins. Results obtained from the knock-down of Nrf2 in CrT cells are very different from the results obtained in the acute Cr(VI) treatment. In BEAS-2B cells, knock-down of Nrf2 had no effect in the inflammation levels, while in CrT cells a decrease in the expression of inflammation markers was observed. These results indicate that before transformation, ROS plays a critical role while Nrf2 not in Cr(VI)-induced inflammation, whereas after transformation (CrT cells), Nrf2 is constitutively activated and this protein maintains inflammation while ROS not. Constitutively high levels of Nrf2 in CrT binds to the promoter regions of COX-2 and TNF-α, leading to increased inflammation. Collectively, our results demonstrate that before cell transformation ROS are important in Cr(VI)-induced inflammation and after transformation a constitutively high level of Nrf2 is important. - Highlights: • Cr(VI)-induced ROS increased inflammation, while Nrf2 had no effect. • In the CrT cells knock-down of Nrf2 resulted in decreased inflammation. • Mechanistic differences in regulating Cr(VI)-induced inflammation.

  15. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor .... and after amplification is finally read by a digital multimeter (Fluke make: 179 true ... To study the response of the present FO refractometer, propylene glycol has been ... values of all the samples were initially measured by Abbe's refractometer.

  16. U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland

    DEFF Research Database (Denmark)

    Þórarinsson, Sigurjón Böðvar; Holm, Paul Martin; Tappe, Sebatstian

    2016-01-01

    Several major tholeiitic (e.g. the Skaergaard intrusion) and alkaline (e.g. the Kangerlussuaq Syenite) intrusive complexes of the North Atlantic Large Igneous Province are exposed along the Kangerlussuaq Fjord in East Greenland. The Kærven Complex forms a satellite intrusion to the Kangerlussuaq ...

  17. Kinetic investigations of quinoline oxidation by ferrate(VI).

    Science.gov (United States)

    Luo, Zhiyong; Li, Xueming; Zhai, Jun

    2016-01-01

    Quinoline is considered as one of the most toxic and carcinogenic compounds and is commonly found in industrial wastewaters, which require treatment before being discharged. Removal of quinoline by the use of an environmentally friendly oxidant, potassium ferrate(VI) (K2FeO4), was assessed by studying the kinetics of the oxidation of quinoline by ferrate(VI) (Fe(VI)) as a function of pH (8.53-10.53) and temperature (21-36°C) in this work. The reaction of quinoline with Fe(VI) was found to be first order in Fe(VI), half order in quinoline, and 1.5 order overall. The observed rate constant at 28°C decreased non-linearly from 0.5334 to 0.2365 M(-0.5) min(-1) with an increase in pH from 8.53 to 10.03. Considering the equilibria of Fe(VI) and quinoline, the reaction between quinoline and Fe(VI) contained two parallel reactions under the given pH conditions. The individual rate constants of these two reactions were determined. The results indicate that the protonated species of Fe(VI) reacts more quickly with quinoline than the deprotonated form of Fe(VI). The reaction activation energy Ea was obtained to be 51.44 kJ·mol(-1), and it was slightly lower than that of conventional chemical reaction. It reveals that the oxidation of quinoline by Fe(VI) is feasible in the routine water treatment.

  18. Immunization with the conjugate vaccine Vi-CRM₁₉₇ against Salmonella typhi induces Vi-specific mucosal and systemic immune responses in mice.

    Science.gov (United States)

    Fiorino, Fabio; Ciabattini, Annalisa; Rondini, Simona; Pozzi, Gianni; Martin, Laura B; Medaglini, Donata

    2012-09-21

    Typhoid fever is a public health problem, especially among young children in developing countries. To address this need, a glycoconjugate vaccine Vi-CRM₁₉₇, composed of the polysaccharide antigen Vi covalently conjugated to the non-toxic mutant of diphtheria toxin CRM₁₉₇, is under development. Here, we assessed the antibody and cellular responses, both local and systemic, following subcutaneous injection of Vi-CRM₁₉₇. The glycoconjugate elicited Vi-specific serum IgG titers significantly higher than unconjugated Vi, with prevalence of IgG1 that persisted for at least 60 days after immunization. Vi-specific IgG, but not IgA, were present in intestinal washes. Lymphocytes proliferation after restimulation with Vi-CRM₁₉₇ was observed in spleen and mesenteric lymph nodes. These data confirm the immunogenicity of Vi-CRM₁₉₇ and demonstrate that the vaccine-specific antibody and cellular immune responses are present also in the intestinal tract, thus strengthening the suitability of Vi-CRM₁₉₇ as a promising candidate vaccine against Salmonella Typhi. Copyright © 2012 Elsevier Ltd. All rights reserved.

  19. A survey of intrusion detection techniques in Cloud

    OpenAIRE

    Modi, C.; Patel, D.; Patel, H.; Borisaniya, B.; Patel, A.; Rajarajan, M.

    2013-01-01

    Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and...

  20. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  1. Vapor pressure and enthalpy of vaporization of linear aliphatic alkanediamines

    International Nuclear Information System (INIS)

    Pozdeev, Vasiliy A.; Verevkin, Sergey P.

    2011-01-01

    Highlights: → We measured vapor pressure of diamines H 2 N-(CH 2 ) n -NH 2 with n = 3 to 12. → Vaporization enthalpies at 298 K were derived. → We examined consistency of new and available in the literature data. → Enthalpies of vaporization show linear dependence on numbers n. → Enthalpies of vaporization correlate linearly with Kovat's indices. - Abstract: Vapor pressures and the molar enthalpies of vaporization of the linear aliphatic alkanediamines H 2 N-(CH 2 ) n -NH 2 with n = (3 to 12) have been determined using the transpiration method. A linear correlation of enthalpies of vaporization (at T = 298.15 K) of the alkanediamines with the number n and with the Kovat's indices has been found, proving the internal consistency of the measured data.

  2. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  3. Vapor Intrusion from Entrapped NAPL Sources and Groundwater Plumes: Process Understanding and Improved Modeling Tools for Pathway Assessment

    Science.gov (United States)

    2014-07-01

    into a building ....149 Figure 5.52: Effect of infiltration at 1 mm/hr for 24 hours on vapor signals in sandy clay loam scenario...shown above, there will also likely be large diameter sanitary sewers running the length of each street. Each house on the street will have a sewer...permeability, a discontinuous clay layer system, and a system with scattered obstacles (e.g. utilities). The layered systems indicated that the sequence of

  4. Association between intrusive negative autobiographical memories and depression: A meta-analytic investigation.

    Science.gov (United States)

    Mihailova, Stella; Jobson, Laura

    2018-02-23

    The study investigated several associations between depression and intrusive negative autobiographical memories. A systematic literature search identified 23 eligible studies (N = 2,582), which provided 59 effect sizes. Separate meta-analyses indicated that depression was moderately, positively associated with intrusive memory frequency, memory distress, maladaptive memory appraisals, memory avoidance, and memory rumination. Intrusive memory vividness was not significantly associated with depression. There were insufficient data to examine the relationship between depression and memory vantage perspective. Between-study heterogeneity was high for intrusive memory frequency and memory avoidance, and the percentage of females in studies significantly moderated the relationship between these variables and depression. An additional exploratory meta-analysis (3 studies; N = 257) indicated that intrusive memories were experienced more frequently by those with posttraumatic stress disorder than those with depression. Overall, the findings suggest that intrusive memories warrant clinical attention as they may contribute to the maintenance of depressive symptomatology. Copyright © 2018 John Wiley & Sons, Ltd.

  5. Metalorganic chemical vapor deposition of ZnO:N using NO as dopant

    International Nuclear Information System (INIS)

    Dangbegnon, J.K.; Talla, K.; Roro, K.T.; Botha, J.R.

    2009-01-01

    Highly c-axis orientated ZnO was grown by metal organic chemical vapor deposition (MOCVD) using NO as both oxidant and nitrogen dopant source. The properties of the deposited material are investigated by X-ray diffraction to study the crystalline quality of the thin films. Photoluminescence measurements are used to determine the optical properties of the material as a function of VI/II ratio and post growth-annealing temperature. Two transitions appear at 3.228 and 3.156 eV and are interpreted as involving active nitrogen acceptors. An increase in the NO flow increases the concentration of nitrogen in the films, which are activated by subsequent annealing at 600 deg. C in an oxygen ambient.

  6. Metalorganic chemical vapor deposition of ZnO:N using NO as dopant

    Energy Technology Data Exchange (ETDEWEB)

    Dangbegnon, J.K., E-mail: JulienKouadio.Dangbegnon@nmmu.ac.z [Department of Physics, PO Box 77000, Nelson Mandela Metropolitan University, Port Elizabeth (South Africa); Talla, K.; Roro, K.T.; Botha, J.R. [Department of Physics, PO Box 77000, Nelson Mandela Metropolitan University, Port Elizabeth (South Africa)

    2009-12-01

    Highly c-axis orientated ZnO was grown by metal organic chemical vapor deposition (MOCVD) using NO as both oxidant and nitrogen dopant source. The properties of the deposited material are investigated by X-ray diffraction to study the crystalline quality of the thin films. Photoluminescence measurements are used to determine the optical properties of the material as a function of VI/II ratio and post growth-annealing temperature. Two transitions appear at 3.228 and 3.156 eV and are interpreted as involving active nitrogen acceptors. An increase in the NO flow increases the concentration of nitrogen in the films, which are activated by subsequent annealing at 600 deg. C in an oxygen ambient.

  7. Intensively exploited Mediterranean aquifers: resilience and proximity to critical points of seawater intrusion

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2013-11-01

    We investigate here seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta Aquifer, the Israel Coastal Aquifer and the Cyprus Akrotiri Aquifer. Using a generalized analytical sharp-interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future sea intrusion forcings. We identify two different critical limits of sea intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete sea intrusion upto the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that sea intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that the advance of seawater currently seriously threatens the Nile Delta Aquifer and the Israel Coastal Aquifer. The Cyprus Akrotiri Aquifer is currently somewhat less threatened by increased seawater intrusion.

  8. Intensively exploited Mediterranean aquifers: resilience to seawater intrusion and proximity to critical thresholds

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2014-05-01

    We investigate seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta, Israel Coastal and Cyprus Akrotiri aquifers. Using a generalized analytical sharp interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future seawater intrusion forcings. We identify two different critical limits of seawater intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete seawater intrusion up to the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that seawater intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that (a) the intruding seawater currently seriously threatens the Nile Delta aquifer, (b) in the Israel Coastal aquifer the sharp interface toe approaches the well location and (c) the Cyprus Akrotiri aquifer is currently somewhat less threatened by increased seawater intrusion.

  9. Electrochemical alkaline Fe(VI) water purification and remediation.

    Science.gov (United States)

    Licht, Stuart; Yu, Xingwen

    2005-10-15

    Fe(VI) is an unusual and strongly oxidizing form of iron, which provides a potentially less hazardous water-purifying agent than chlorine. A novel on-line electrochemical Fe(VI) water purification methodology is introduced. Fe(VI) addition had been a barrier to its effective use in water remediation, because solid Fe(VI) salts require complex (costly) syntheses steps and solutions of Fe(VI) decompose. Online electrochemical Fe(VI) water purification avoids these limitations, in which Fe(VI) is directly prepared in solution from an iron anode as the FeO42- ion, and is added to the contaminant stream. Added FeO42- decomposes, by oxidizing a wide range of water contaminants including sulfides (demonstrated in this study) and other sulfur-containing compounds, cyanides (demonstrated in this study), arsenic (demonstrated in this study), ammonia and other nitrogen-containing compounds (previously demonstrated), a wide range of organics (phenol demonstrated in this study), algae, and viruses (each previously demonstrated).

  10. Electronic structure, fluorescence and photochemistry of the uranyl ion, and comparison with octahedral uranium (VI), ruthenyl (VI), rhenium (V) and osmium (VI) complexes

    Energy Technology Data Exchange (ETDEWEB)

    Joergensen, C K [Geneva Univ. (Switzerland)

    1977-01-01

    The highly anisotropic uranyl complexes (with very short U-O distances and very long distances to the ligating atoms in the equatorial plane) are compared with trans-dioxo complexes of 4d/sup 2/Ru(VI) and 5d/sup 2/Re(V) and Os(VI). A major difference is the low-lying empty 5f orbitals, and the first excited state is highly oxidizing, and sufficiently long-lived to abstract hydrogen atoms from most organic molecules. It is argued that even the low concentrations of uranyl carbonate present in sea water is excited by solar radiation roughly every 10 minutes. Octahedral U(VI)O/sub 6/ in perovskites and UF/sub 6/ are also discussed, as well as trans-lawrencium chemistry.

  11. Hazard Models From Periodic Dike Intrusions at Kı¯lauea Volcano, Hawai`i

    Science.gov (United States)

    Montgomery-Brown, E. K.; Miklius, A.

    2016-12-01

    The persistence and regular recurrence intervals of dike intrusions in the East Rift Zone (ERZ) of Kı¯lauea Volcano lead to the possibility of constructing a time-dependent intrusion hazard model. Dike intrusions are commonly observed in Kı¯lauea Volcano's ERZ and can occur repeatedly in regions that correlate with seismic segments (sections of rift seismicity with persistent definitive lateral boundaries) proposed by Wright and Klein (USGS PP1806, 2014). Five such ERZ intrusions have occurred since 1983 with inferred locations downrift of the bend in Kı¯lauea's ERZ, with the first (1983) being the start of the ongoing ERZ eruption. The ERZ intrusions occur on one of two segments that are spatially coincident with seismic segments: Makaopuhi (1993 and 2007) and Nāpau (1983, 1997, and 2011). During each intrusion, the amount of inferred dike opening was between 2 and 3 meters. The times between ERZ intrusions for same-segment pairs are all close to 14 years: 14.07 (1983-1997), 14.09 (1997-2011), and 13.95 (1993-2007) years, with the Nāpau segment becoming active about 3.5 years after the Makaopuhi segment in each case. Four additional upper ERZ intrusions are also considered here. Dikes in the upper ERZ have much smaller opening ( 10 cm), and have shorter recurrence intervals of 8 years with more variability. The amount of modeled dike opening during each of these events roughly corresponds to the amount of seaward south flank motion and deep rift opening accumulated in the time between events. Additionally, the recurrence interval of 14 years appears to be unaffected by the magma surge of 2003-2007, suggesting that flank motion, rather than magma supply, could be a controlling factor in the timing and periodicity of intrusions. Flank control over the timing of magma intrusions runs counter to the historical research suggesting that dike intrusions at Kı¯lauea are driven by magma overpressure. This relatively free sliding may have resulted from decreased

  12. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  13. Biosorption of Cr(VI) by coconut coir: Spectroscopic investigation on the reaction mechanism of Cr(VI) with lignocellulosic material

    International Nuclear Information System (INIS)

    Shen, Ying-Shuian; Wang, Shan-Li; Huang, Shiuh-Tsuen; Tzou, Yu-Min; Huang, Jang-Hung

    2010-01-01

    In this study, the removal mechanism of Cr(VI) from water by coconut coir (CC) was investigated using X-ray photoelectron spectroscopy (XPS), Cr K-edge X-ray absorption near edge structure (XANES) and FTIR spectroscopy. The results showed that, upon reaction with CC at pH 3, Cr(VI) was reduced to Cr(III), which was either bound to CC or released back into solution. As revealed by the FTIR spectra of CC before and after reacting with Cr(VI), the phenolic methoxyl and hydroxyl groups of lignin in CC are the dominant drivers of Cr(VI) reduction, giving rise to carbonyl and carboxyl groups on CC. These functional groups can subsequently provide binding sites for Cr(III) resulting from Cr(VI) reduction. In conjunction with forming complexes with carbonyl and carboxyl groups, the formation of Cr(III) hydroxide precipitate could also readily occur as revealed by the linear combination fitting of the Cr K-edge XANES spectrum using a set of reference compounds. The phenolic groups in lignin are responsible for initiating Cr(VI) reduction, so lignocellulosic materials containing a higher amount of phenolic groups are expected to be more effective scavengers for removal of Cr(VI) from the environment.

  14. Biosorption of Cr(VI) by coconut coir: Spectroscopic investigation on the reaction mechanism of Cr(VI) with lignocellulosic material

    Energy Technology Data Exchange (ETDEWEB)

    Shen, Ying-Shuian [Department of Soil and Environmental Sciences, National Chung Hsing University, 250 Kuo Kuang Road, Taichung 40227, Taiwan (China); Wang, Shan-Li, E-mail: slwang@nchu.edu.tw [Department of Soil and Environmental Sciences, National Chung Hsing University, 250 Kuo Kuang Road, Taichung 40227, Taiwan (China); Huang, Shiuh-Tsuen [Department of Soil and Environmental Sciences, National Chung Hsing University, 250 Kuo Kuang Road, Taichung 40227, Taiwan (China); Department of Science Application and Dissemination, National Taichung University, Taichung, Taiwan (China); Tzou, Yu-Min; Huang, Jang-Hung [Department of Soil and Environmental Sciences, National Chung Hsing University, 250 Kuo Kuang Road, Taichung 40227, Taiwan (China)

    2010-07-15

    In this study, the removal mechanism of Cr(VI) from water by coconut coir (CC) was investigated using X-ray photoelectron spectroscopy (XPS), Cr K-edge X-ray absorption near edge structure (XANES) and FTIR spectroscopy. The results showed that, upon reaction with CC at pH 3, Cr(VI) was reduced to Cr(III), which was either bound to CC or released back into solution. As revealed by the FTIR spectra of CC before and after reacting with Cr(VI), the phenolic methoxyl and hydroxyl groups of lignin in CC are the dominant drivers of Cr(VI) reduction, giving rise to carbonyl and carboxyl groups on CC. These functional groups can subsequently provide binding sites for Cr(III) resulting from Cr(VI) reduction. In conjunction with forming complexes with carbonyl and carboxyl groups, the formation of Cr(III) hydroxide precipitate could also readily occur as revealed by the linear combination fitting of the Cr K-edge XANES spectrum using a set of reference compounds. The phenolic groups in lignin are responsible for initiating Cr(VI) reduction, so lignocellulosic materials containing a higher amount of phenolic groups are expected to be more effective scavengers for removal of Cr(VI) from the environment.

  15. Biosorption of Cr(VI) by coconut coir: spectroscopic investigation on the reaction mechanism of Cr(VI) with lignocellulosic material.

    Science.gov (United States)

    Shen, Ying-Shuian; Wang, Shan-Li; Huang, Shiuh-Tsuen; Tzou, Yu-Min; Huang, Jang-Hung

    2010-07-15

    In this study, the removal mechanism of Cr(VI) from water by coconut coir (CC) was investigated using X-ray photoelectron spectroscopy (XPS), Cr K-edge X-ray absorption near edge structure (XANES) and FTIR spectroscopy. The results showed that, upon reaction with CC at pH 3, Cr(VI) was reduced to Cr(III), which was either bound to CC or released back into solution. As revealed by the FTIR spectra of CC before and after reacting with Cr(VI), the phenolic methoxyl and hydroxyl groups of lignin in CC are the dominant drivers of Cr(VI) reduction, giving rise to carbonyl and carboxyl groups on CC. These functional groups can subsequently provide binding sites for Cr(III) resulting from Cr(VI) reduction. In conjunction with forming complexes with carbonyl and carboxyl groups, the formation of Cr(III) hydroxide precipitate could also readily occur as revealed by the linear combination fitting of the Cr K-edge XANES spectrum using a set of reference compounds. The phenolic groups in lignin are responsible for initiating Cr(VI) reduction, so lignocellulosic materials containing a higher amount of phenolic groups are expected to be more effective scavengers for removal of Cr(VI) from the environment. 2010 Elsevier B.V. All rights reserved.

  16. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  17. Multisensor Fusion for Intrusion Detection and Situational Awareness

    OpenAIRE

    Hallstensen, Christoffer V

    2017-01-01

    Cybercrime damage costs the world several trillion dollars annually. And al-though technical solutions to protect organizations from hackers are being con-tinuously developed, criminals learn fast to circumvent them. The question is,therefore, how to create leverage to protect an organization by improving in-trusion detection and situational awareness? This thesis seeks to contribute tothe prior art in intrusion detection and situational awareness by using a multi-sensor data fusion...

  18. When Intrusion Detection Meets Blockchain Technology: A Review

    OpenAIRE

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju; Wang, Yu; Han, Jinguang

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness ...

  19. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes

    Science.gov (United States)

    L., Passarelli; E., Rivalta; A., Shuler

    2014-01-01

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process. PMID:24469260

  20. Isolation of a star-shaped uranium(V/VI) cluster from the anaerobic photochemical reduction of uranyl(VI)

    International Nuclear Information System (INIS)

    Chatelain, Lucile; White, Sarah; Scopelliti, Rosario; Mazzanti, Marinella

    2016-01-01

    Actinide oxo clusters are an important class of compounds due to their impact on actinide migration in the environment. The photolytic reduction of uranyl(VI) has potential application in catalysis and spent nuclear fuel reprocessing, but the intermediate species involved in this reduction have not yet been elucidated. Here we show that the photolysis of partially hydrated uranyl(VI) in anaerobic conditions leads to the reduction of uranyl(VI), and to the incorporation of the resulting U V species into the stable mixed-valent star-shaped U VI /U V oxo cluster [U(UO 2 ) 5 (μ 3 -O) 5 (PhCOO) 5 (Py) 7 ]. This cluster is only the second example of a U VI /U V cluster and the first one associating uranyl groups to a non-uranyl(V) center. The U V center in 1 is stable, while the reaction of uranyl(V) iodide with potassium benzoate leads to immediate disproportionation and formation of the U 12 IV U 4 V O 24 cluster {[K(Py) 2 ] 2 [K(Py)] 2 [U 16 O 24 (PhCOO) 24 (Py) 2 ]}.

  1. Comparison of U(VI) adsorption onto nanoscale zero-valent iron and red soil in the presence of U(VI)–CO_3/Ca–U(VI)–CO_3 complexes

    International Nuclear Information System (INIS)

    Zhang, Zhibin; Liu, Jun; Cao, Xiaohong; Luo, Xuanping; Hua, Rong; Liu, Yan; Yu, Xiaofeng; He, Likai

    2015-01-01

    Highlights: • NZVI can be used for adsorbing U(VI)–CO_3 complexes. • Use of NZVI is feasible for remediation of uranium-contaminated soils. • The mechanism of U(VI)–CO_3 complexes adsorbing onto NZVI has been explained. - Abstract: The influence of U(VI)–CO_3 and Ca–U(VI)–CO_3 complexes on U(VI) adsorption onto red soil and nanoscale zero-valent iron (NZVI) was investigated using batch adsorption and fixed-bed column experiments to simulate the feasibility of NZVI as the reactive medium in permeable- reactive barriers (PRB) for in situ remediation of uranium-contaminated red soils. The adsorption capacity (q_e) and distribution constant (K_d) of NZVI and red soil decreased with increasing pH, dissolved carbonate and calcium concentrations, but the q_e and K_d values of NZVI were 5–10 times higher than those of red soil. The breakthrough pore volume (PV) values increased with the decrease of pH, dissolved carbonate and calcium concentration; however, the breakthrough PV values of the PRB column filled with 5% NZVI were 2.0–3.5 times higher than the 100% red soil column. The U(VI)–CO_3 complexes adsorbed onto the surface of red soil/NZVI (≡SOH) to form SO–UO_2CO_3"− or SO–UO_2 (CO_3)_2"3"−. XPS and XRD analysis further confirmed the reduction of U(VI) to U(IV) and the formation of FeOOH on NZVI surfaces. The findings of this study are significant to the remediation of uranium-contaminated red soils and the consideration of practical U(VI) species in the natural environment.

  2. Petroleum Release Assessment and Impacts of Weather Extremes

    Science.gov (United States)

    Contaminated ground water and vapor intrusion are two major exposure pathways of concern at petroleum release sites. EPA has recently developed a model for petroleum vapor intrusion, called PVIScreen, which incorporates variability and uncertainty in input parameters. This ap...

  3. Data Fusion for Network Intrusion Detection: A Review

    Directory of Open Access Journals (Sweden)

    Guoquan Li

    2018-01-01

    Full Text Available Rapid progress of networking technologies leads to an exponential growth in the number of unauthorized or malicious network actions. As a component of defense-in-depth, Network Intrusion Detection System (NIDS has been expected to detect malicious behaviors. Currently, NIDSs are implemented by various classification techniques, but these techniques are not advanced enough to accurately detect complex or synthetic attacks, especially in the situation of facing massive high-dimensional data. Besides, the inherent defects of NIDSs, namely, high false alarm rate and low detection rate, have not been effectively solved. In order to solve these problems, data fusion (DF has been applied into network intrusion detection and has achieved good results. However, the literature still lacks thorough analysis and evaluation on data fusion techniques in the field of intrusion detection. Therefore, it is necessary to conduct a comprehensive review on them. In this article, we focus on DF techniques for network intrusion detection and propose a specific definition to describe it. We review the recent advances of DF techniques and propose a series of criteria to compare their performance. Finally, based on the results of the literature review, a number of open issues and future research directions are proposed at the end of this work.

  4. Efficient cooling of rocky planets by intrusive magmatism

    Science.gov (United States)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  5. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  6. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  7. Reactivity of nitrido complexes of ruthenium(VI), osmium(VI), and manganese(V) bearing Schiff base and simple anionic ligands.

    Science.gov (United States)

    Man, Wai-Lun; Lam, William W Y; Lau, Tai-Chu

    2014-02-18

    Nitrido complexes (M≡N) may be key intermediates in chemical and biological nitrogen fixation and serve as useful reagents for nitrogenation of organic compounds. Osmium(VI) nitrido complexes bearing 2,2':6',2″-terpyridine (terpy), 2,2'-bipyridine (bpy), or hydrotris(1-pyrazolyl)borate anion (Tp) ligands are highly electrophilic: they can react with a variety of nucleophiles to generate novel osmium(IV)/(V) complexes. This Account describes our recent results studying the reactivity of nitridocomplexes of ruthenium(VI), osmium(VI), and manganese(V) that bear Schiff bases and other simple anionic ligands. We demonstrate that these nitrido complexes exhibit rich chemical reactivity. They react with various nucleophiles, activate C-H bonds, undergo N···N coupling, catalyze the oxidation of organic compounds, and show anticancer activities. Ruthenium(VI) nitrido complexes bearing Schiff base ligands, such as [Ru(VI)(N)(salchda)(CH3OH)](+) (salchda = N,N'-bis(salicylidene)o-cyclohexyldiamine dianion), are highly electrophilic. This complex reacts readily at ambient conditions with a variety of nucleophiles at rates that are much faster than similar reactions using Os(VI)≡N. This complex also carries out unique reactions, including the direct aziridination of alkenes, C-H bond activation of alkanes and C-N bond cleavage of anilines. The addition of ligands such as pyridine can enhance the reactivity of [Ru(VI)(N)(salchda)(CH3OH)](+). Therefore researchers can tune the reactivity of Ru≡N by adding a ligand L trans to nitride: L-Ru≡N. Moreover, the addition of various nucleophiles (Nu) to Ru(VI)≡N initially generate the ruthenium(IV) imido species Ru(IV)-N(Nu), a new class of hydrogen-atom transfer (HAT) reagents. Nucleophiles also readily add to coordinated Schiff base ligands in Os(VI)≡N and Ru(VI)≡N complexes. These additions are often stereospecific, suggesting that the nitrido ligand has a directing effect on the incoming nucleophile. M≡N is also

  8. Remote measurement of high preeruptive water vapor emissions at Sabancaya volcano by passive differential optical absorption spectroscopy

    Science.gov (United States)

    Kern, Christoph; Masias, Pablo; Apaza, Fredy; Reath, Kevin; Platt, Ulrich

    2017-01-01

    Water (H2O) is by far the most abundant volcanic volatile species and plays a predominant role in driving volcanic eruptions. However, numerous difficulties associated with making accurate measurements of water vapor in volcanic plumes have limited their use as a diagnostic tool. Here we present the first detection of water vapor in a volcanic plume using passive visible-light differential optical absorption spectroscopy (DOAS). Ultraviolet and visible-light DOAS measurements were made on 21 May 2016 at Sabancaya Volcano, Peru. We find that Sabancaya's plume contained an exceptionally high relative water vapor abundance 6 months prior to its November 2016 eruption. Our measurements yielded average sulfur dioxide (SO2) emission rates of 800–900 t/d, H2O emission rates of around 250,000 t/d, and an H2O/SO2 molecular ratio of 1000 which is about an order of magnitude larger than typically found in high-temperature volcanic gases. We attribute the high water vapor emissions to a boiling-off of Sabancaya's hydrothermal system caused by intrusion of magma to shallow depths. This hypothesis is supported by a significant increase in the thermal output of the volcanic edifice detected in infrared satellite imagery leading up to and after our measurements. Though the measurement conditions encountered at Sabancaya were very favorable for our experiment, we show that visible-light DOAS systems could be used to measure water vapor emissions at numerous other high-elevation volcanoes. Such measurements would provide observatories with additional information particularly useful for forecasting eruptions at volcanoes harboring significant hydrothermal systems.

  9. VAPOR PRESSURES AND HEATS OF VAPORIZATION OF PRIMARY COAL TARS

    Energy Technology Data Exchange (ETDEWEB)

    Eric M. Suuberg; Vahur Oja

    1997-07-01

    This project had as its main focus the determination of vapor pressures of coal pyrolysis tars. It involved performing measurements of these vapor pressures and from them, developing vapor pressure correlations suitable for use in advanced pyrolysis models (those models which explicitly account for mass transport limitations). This report is divided into five main chapters. Each chapter is a relatively stand-alone section. Chapter A reviews the general nature of coal tars and gives a summary of existing vapor pressure correlations for coal tars and model compounds. Chapter B summarizes the main experimental approaches for coal tar preparation and characterization which have been used throughout the project. Chapter C is concerned with the selection of the model compounds for coal pyrolysis tars and reviews the data available to us on the vapor pressures of high boiling point aromatic compounds. This chapter also deals with the question of identifying factors that govern the vapor pressures of coal tar model materials and their mixtures. Chapter D covers the vapor pressures and heats of vaporization of primary cellulose tars. Chapter E discusses the results of the main focus of this study. In summary, this work provides improved understanding of the volatility of coal and cellulose pyrolysis tars. It has resulted in new experimentally verified vapor pressure correlations for use in pyrolysis models. Further research on this topic should aim at developing general vapor pressure correlations for all coal tars, based on their molecular weight together with certain specific chemical characteristics i.e. hydroxyl group content.

  10. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  11. Mechanisms of chromium (VI)-induced apoptosis in anterior pituitary cells.

    Science.gov (United States)

    Quinteros, Fernanda A; Machiavelli, Leticia I; Miler, Eliana A; Cabilla, Jimena P; Duvilanski, Beatriz H

    2008-07-30

    Hexavalent chromium (Cr (VI)) is a highly toxic metal. Exposure to Cr (VI) compounds may affect reproductive functions. Due to the importance of anterior pituitary hormones on reproductive physiology we have studied the effects of Cr (VI) on anterior pituitary. We previously demonstrated that, after in vivo Cr (VI) administration, Cr accumulates in the pituitary gland and affects prolactin secretion. In vitro, Cr (VI) causes apoptosis in anterior pituitary cells due to oxidative stress generation. To better understand the mechanisms involved in Cr (VI)-induced apoptosis we studied: (a) whether Cr (VI) affects the intracellular antioxidant response and (b) which of the apoptotic factors participates in Cr (VI) effect. Our results show that Cr (VI) treatment induces a decrease in catalase and glutathione peroxidase (GPx) activity but does not modify glutathione reductase (GR) activity. Cr (VI) exposure causes an increase of GSH levels. p53 and Bax mRNA are also upregulated by the metal. Pifithrin alpha, a p53 transcriptional inhibitor, increases Cr (VI) cytotoxicity, suggesting a role of p53 as a survival molecule. The antioxidant N-acetyl-cysteine (NAC) could prevent Bax mRNA increase and caspase 3 activation, confirming that Cr (VI)-induced apoptosis involves oxidative stress generation.

  12. Conjunctive Management of Multi-Aquifer System for Saltwater Intrusion Mitigation

    Science.gov (United States)

    Tsai, F. T. C.; Pham, H. V.

    2015-12-01

    Due to excessive groundwater withdrawals, many water wells in Baton Rouge, Louisiana experience undesirable chloride concentration because of saltwater intrusion. The study goal is to develop a conjunctive management framework that takes advantage of the Baton Rouge multi-aquifer system to mitigate saltwater intrusion. The conjunctive management framework utilizes several hydraulic control techniques to mitigate saltwater encroachment. These hydraulic control approaches include pumping well relocation, freshwater injection, saltwater scavenging, and their combinations. Specific objectives of the study are: (1) constructing scientific geologic architectures of the "800-foot" sand, the "1,000-foot" sand, the "1,200-foot" sand, the "1,500-foot" sand, the "1,700-foot" sand, and the "2,000-foot" sand, (2) developing scientific saltwater intrusion models for these sands. (3) using connector wells to draw native groundwater from one sand and inject to another sand to create hydraulic barriers to halt saltwater intrusion, (4) using scavenger wells or well couples to impede saltwater intrusion progress and reduce chloride concentration in pumping wells, and (5) reducing cones of depression by relocating and dispersing pumping wells to different sands. The study utilizes optimization techniques and newest LSU high performance computing (HPC) facilities to derive solutions. The conjunctive management framework serves as a scientific tool to assist policy makers to solve the urgent saltwater encroachment issue in the Baton Rouge area. The research results will help water companies as well as industries in East Baton Rouge Parish and neighboring parishes by reducing their saltwater intrusion threats, which in turn would sustain Capital Area economic development.

  13. Emissions of chromium (VI) from arc welding.

    Science.gov (United States)

    Heung, William; Yun, Myoung-Jin; Chang, Daniel P Y; Green, Peter G; Halm, Chris

    2007-02-01

    The presence of Cr in the +6 oxidation state (Cr[VI]) is still observed in ambient air samples in California despite steps taken to reduce emissions from plating operations. One known source of emission of Cr(VI) is welding, especially with high Cr-content materials, such as stainless steels. An experimental effort was undertaken to expand and update Cr(VI) emission factors by conducting tests on four types of arc-welding operations: gas-metal arc welding (GMAW), shielded metal arc welding (SMAW), fluxcore arc welding, and pulsed GMAW. Standard American Welding Society hood results were compared with a total enclosure method that permitted isokinetic sampling for particle size-cut measurement, as well as total collection of the aerosol. The fraction of Cr(VI) emitted per unit mass of Cr electrode consumed was determined. Consistent with AP-42 data, initial results indicate that a significant fraction of the total Cr in the aerosol is in the +6 oxidation state. The fraction of Cr(VI) and total aerosol mass produced by the different arc welding methods varies with the type of welding process used. Self-shielded electrodes that do not use a shield gas, for example, SMAW, produce greater amounts of Cr(VI) per unit mass of electrode consumed. The formation of Cr(VI) from standard electrode wires used for welding mild steel was below the method detection limit after eliminating an artifact in the analytical method used.

  14. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  15. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  16. Enthalpy of Vaporization and Vapor Pressures: An Inexpensive Apparatus

    Science.gov (United States)

    Battino, Rubin; Dolson, David A.; Hall, Michael A.; Letcher, Trevor M.

    2007-01-01

    A simple and inexpensive method to determine the enthalpy of vaporization of liquids by measuring vapor pressure as a function of temperature is described. The vapor pressures measured with the stopcock cell were higher than the literature values and those measured with the sidearm rubber septum cell were both higher and lower than literature…

  17. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  18. Review on assessment methodology for human intrusion into a repository for radioactive waste

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility

  19. Review on assessment methodology for human intrusion into a repository for radioactive waste

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-09-15

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility.

  20. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  1. Computational neural network regression model for Host based Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Gautam

    2016-09-01

    Full Text Available The current scenario of information gathering and storing in secure system is a challenging task due to increasing cyber-attacks. There exists computational neural network techniques designed for intrusion detection system, which provide security to single machine and entire network's machine. In this paper, we have used two types of computational neural network models, namely, Generalized Regression Neural Network (GRNN model and Multilayer Perceptron Neural Network (MPNN model for Host based Intrusion Detection System using log files that are generated by a single personal computer. The simulation results show correctly classified percentage of normal and abnormal (intrusion class using confusion matrix. On the basis of results and discussion, we found that the Host based Intrusion Systems Model (HISM significantly improved the detection accuracy while retaining minimum false alarm rate.

  2. Vapor pressures and vaporization enthalpy of codlemone by correlation gas chromatography

    International Nuclear Information System (INIS)

    Schultz, Shannon M.; Harris, Harold H.; Chickos, James S.

    2015-01-01

    Highlights: • The vaporization enthalpy of codlemone has been evaluated. • The vapor pressure of codlemone has been evaluated from T = (298.15 to T b ) K. • Vapor pressures for the 1-alkanols standards are available from T = (298.15 to 500) K. - Abstract: The vapor pressure and vaporization enthalpy of codlemone (trans, trans 8,10-dodecadien-1-ol), the female sex hormone of the codling moth is evaluated by correlation gas chromatography using a series of saturated primary alcohols as standards. A vaporization enthalpy of (92.3 ± 2.6) kJ · mol −1 and a vapor pressure, p/Pa = (0.083 ± 0.012) were evaluated at T = 298.15 K. An equation for the evaluation of vapor pressure from ambient temperature to boiling has been derived by correlation for codlemone. The calculated boiling temperature of T B = 389 K at p = 267 Pa is within the temperature range reported in the literature. A normal boiling temperature of T B = (549.1 ± 0.1) K is also estimated by extrapolation

  3. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  4. Vi-da: vitiligo diagnostic assistance mobile application

    Science.gov (United States)

    Nugraha, G. A.; Nurhudatiana, A.; Bahana, R.

    2018-03-01

    Vitiligo is a skin disorder in which white patches of depigmentation appear on different parts of the body. Usually, patients come to hospitals or clinics to have their vitiligo conditions assessed. This can be very tiring to the patients, as vitiligo treatments usually take a relatively long period of time, which can range from months to years. To address this challenge, we present in this paper a prototype of an Android-based mobile application called Vi-DA, which stands for Vitiligo Diagnostic Assistance. Vi-DA consists of three subsystems, which are user sign-up subsystem, camera and image analysis subsystem, and progress report subsystem. The mobile application was developed in Java programming language and uses MySQL as the database system. Vi-DA adopts a vitiligo segmentation algorithm to segment input image into normal skin area, vitiligo skin area, and non-skin area. Results showed that Vi-DA gave comparable results to the previous system implemented in Matlab. User acceptance testing results also showed that all respondents agreed on the usefulness of the system and agreed to use Vi-DA again in the future. Vi-DA benefits both dermatologists and patients as not only a computer-aided diagnosis (CAD) tool but also as a smart application that can be used for self-assessment at home.

  5. Intrusion mechanics according to Burstone with the NiTi-SE-steel uprighting spring.

    Science.gov (United States)

    Sander, F G; Wichelhaus, A; Schiemann, C

    1996-08-01

    Intrusion mechanics according to Burstone can be regarded as a practicable method for the intrusion of incisors. 1. By applying the NiTi-SE-steel uprighting spring, relatively constant forces can be exerted over a large range of intrusion on both sides of the anterior tooth archwire. 2. By bending a 150 degrees tip-back bend or a curvature into the steel portion, the uprighting spring presented here is brought into the plastic range of the characteristic curve of force. 3. Application of sliding hooks on the intrusion spring permits readjustment for force transfer onto the anterior archwire. 4. Connecting the anterior archwire with the posterior elements by means of a steel ligature can be recommended only in some cases, because sagittally directed forces may be produced. 5. The adult patients presented showed an average intrusion of 0.6 mm/month, if a linear connection was presupposed. 6. An intrusive effect on the incisors could first be detected clinically after 6 to 8 weeks. 7. Application of a torque-key proves especially useful in controlling the incisor position during intrusion in order to avoid unnecessary radiography. 8. Actual prediction of the centre of resistance with the help of a cephalometric radiograph proved not to be feasible. 9. The calculated maximal intrusion of the mandibular incisors was 7 mm. 10. The torque-segmented archwire with crimped hooks and pseudoelastic springs between the molars and the crimped hooks proved very effective for retrusion and intrusion of maxillary incisors. The maxillary anterior teeth can be retruded by a total of 7 mm without readjustment. 11. Constant moments and forces could be transferred by applying preformed arch wires and segmented arch wires.

  6. ViA: a perceptual visualization assistant

    Science.gov (United States)

    Healey, Chris G.; St. Amant, Robert; Elhaddad, Mahmoud S.

    2000-05-01

    This paper describes an automated visualized assistant called ViA. ViA is designed to help users construct perceptually optical visualizations to represent, explore, and analyze large, complex, multidimensional datasets. We have approached this problem by studying what is known about the control of human visual attention. By harnessing the low-level human visual system, we can support our dual goals of rapid and accurate visualization. Perceptual guidelines that we have built using psychophysical experiments form the basis for ViA. ViA uses modified mixed-initiative planning algorithms from artificial intelligence to search of perceptually optical data attribute to visual feature mappings. Our perceptual guidelines are integrated into evaluation engines that provide evaluation weights for a given data-feature mapping, and hints on how that mapping might be improved. ViA begins by asking users a set of simple questions about their dataset and the analysis tasks they want to perform. Answers to these questions are used in combination with the evaluation engines to identify and intelligently pursue promising data-feature mappings. The result is an automatically-generated set of mappings that are perceptually salient, but that also respect the context of the dataset and users' preferences about how they want to visualize their data.

  7. Analogue modelling on the interaction between shallow magma intrusion and a strike-slip fault: Application on the Middle Triassic Monzoni Intrusive Complex (Dolomites, Italy)

    Science.gov (United States)

    Michail, Maria; Coltorti, Massimo; Gianolla, Piero; Riva, Alberto; Rosenau, Matthias; Bonadiman, Costanza; Galland, Olivier; Guldstrand, Frank; Thordén Haug, Øystein; Rudolf, Michael; Schmiedel, Tobias

    2017-04-01

    The southwestern part of the Dolomites in Northern Italy has undergone a short-lived Ladinian (Middle Triassic) tectono-magmatic event, forming a series of significant magmatic features. These intrusive bodies deformed and metamorphosed the Permo-Triassic carbonate sedimentary framework. In this study we focus on the tectono-magmatic evolution of the shallow shoshonitic Monzoni Intrusive Complex of this Ladinian event (ca 237 Ma), covering an area of 20 km^2. This NW-SE elongated intrusive structure (5 km length) shows an orogenic magmatic affinity which is in contrast to the tectonic regime at the time of intrusion. Strain analysis shows anorogenic transtensional displacement in accordance with the ENE-WSW extensional pattern in the central Dolomites during the Ladinian. Field interpretations led to a detailed description of the regional stratigraphic sequence and the structural features of the study area. However, the geodynamic context of this magmatism and the influence of the inherited strike-slip fault on the intrusion, are still in question. To better understand the specific natural prototype and the general mechanisms of magma emplacement in tectonically active areas, we performed analogue experiments defined by, but not limited to, first order field observations. We have conducted a systematic series of experiments in different tectonic regimes (static conditions, strike-slip, transtension). We varied the ratio of viscous to brittle stresses between magma and country rock, by injecting Newtonian fluids both of high and low viscosity (i.e. silicone oil/vegetable oil) into granular materials of varying cohesion (sand, silica flour, glass beads). The evolving surface and side view of the experiments were monitored by photogrammetric techniques for strain analyses and topographic evolution. In our case, the combination of the results from field and analogue experiments brings new insights regarding the tectonic regime, the geometry of the intrusive body, and

  8. Late Neoproterozoic layered mafic intrusion of arc-affinity in the Arabian-Nubian Shield: A case study from the Shahira layered mafic intrusion, southern Sinai, Egypt

    Energy Technology Data Exchange (ETDEWEB)

    Azer, M.K.; Obeid, M.A.; Gahalan, H.A.

    2016-07-01

    The Shahira Layered Mafic Intrusion (SLMI), which belongs to the late Neoproterozoic plutonic rocks of the Arabian-Nubian Shield, is the largest layered mafic intrusion in southern Sinai. Field relations indicate that it is younger than the surrounding metamorphic rocks and older than the post-orogenic granites. Based on variation in mineral paragenesis and chemical composition, the SLMI is distinguished into pyroxene-hornblende gabbro, hornblende gabbro and diorite lithologies. The outer zone of the mafic intrusion is characterized by fine-grained rocks (chilled margin gabbroic facies), with typical subophitic and/or microgranular textures. Different rock units from the mafic intrusion show gradational boundaries in between. They show some indications of low grade metamorphism, where primary minerals are transformed into secondary ones. Geochemically, the Shahira layered mafic intrusion is characterized by enrichment in LILE relative to HFSE (e.g. Nb, P, Zr, Ti, Y), and LREE relative to HREE [(La/Lu)n= 4.75–8.58], with subalkaline characters. It has geochemical characteristics of pre-collisional arc-type environment. The geochemical signature of the investigated gabbros indicates partial melting of mantle wedge in a volcanic-arc setting, being followed by fractional crystallization and crustal contamination. Fractional crystallization processes played a vital role during emplacement of the Shahira intrusion and evolution of its mafic and intermediate rock units. The initial magma was evolved through crystallization of hornblende which was caused by slight increasing of H2O in the magma after crystallization of liquidus olivine, pyroxene and Ca-rich plagioclase. The gabbroic rocks crystallized at pressures between 4.5 and 6.9kbar (~15–20km depth). Whereas, the diorites yielded the lowest crystallization pressure between 1.0 to 4.4Kbar (<10km depth). Temperature was estimated by several geothermometers, which yielded crystallization temperatures ranging from 835

  9. Comparison of U(VI) adsorption onto nanoscale zero-valent iron and red soil in the presence of U(VI)–CO{sub 3}/Ca–U(VI)–CO{sub 3} complexes

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Zhibin [Key Laboratory of Radioactive Geology and Exploration Technology Fundamental Science for National Defense, East China Institute of Technology, Nanchang 330013 (China); State Key Laboratory Breeding Base of Nuclear Resources and Environment (East China Institute of Technology), Ministry of Education, Nanchang 330013 (China); Chemistry, Biological and Materials Sciences Department, East China Institute of Technology, Nanchang 330013 (China); Liu, Jun [State Key Laboratory Breeding Base of Nuclear Resources and Environment (East China Institute of Technology), Ministry of Education, Nanchang 330013 (China); Cao, Xiaohong, E-mail: xhcao@ecit.cn [Key Laboratory of Radioactive Geology and Exploration Technology Fundamental Science for National Defense, East China Institute of Technology, Nanchang 330013 (China); State Key Laboratory Breeding Base of Nuclear Resources and Environment (East China Institute of Technology), Ministry of Education, Nanchang 330013 (China); Chemistry, Biological and Materials Sciences Department, East China Institute of Technology, Nanchang 330013 (China); Luo, Xuanping [Chemistry, Biological and Materials Sciences Department, East China Institute of Technology, Nanchang 330013 (China); Hua, Rong; Liu, Yan [Key Laboratory of Radioactive Geology and Exploration Technology Fundamental Science for National Defense, East China Institute of Technology, Nanchang 330013 (China); State Key Laboratory Breeding Base of Nuclear Resources and Environment (East China Institute of Technology), Ministry of Education, Nanchang 330013 (China); Chemistry, Biological and Materials Sciences Department, East China Institute of Technology, Nanchang 330013 (China); Yu, Xiaofeng; He, Likai [Chemistry, Biological and Materials Sciences Department, East China Institute of Technology, Nanchang 330013 (China); and others

    2015-12-30

    Highlights: • NZVI can be used for adsorbing U(VI)–CO{sub 3} complexes. • Use of NZVI is feasible for remediation of uranium-contaminated soils. • The mechanism of U(VI)–CO{sub 3} complexes adsorbing onto NZVI has been explained. - Abstract: The influence of U(VI)–CO{sub 3} and Ca–U(VI)–CO{sub 3} complexes on U(VI) adsorption onto red soil and nanoscale zero-valent iron (NZVI) was investigated using batch adsorption and fixed-bed column experiments to simulate the feasibility of NZVI as the reactive medium in permeable- reactive barriers (PRB) for in situ remediation of uranium-contaminated red soils. The adsorption capacity (q{sub e}) and distribution constant (K{sub d}) of NZVI and red soil decreased with increasing pH, dissolved carbonate and calcium concentrations, but the q{sub e} and K{sub d} values of NZVI were 5–10 times higher than those of red soil. The breakthrough pore volume (PV) values increased with the decrease of pH, dissolved carbonate and calcium concentration; however, the breakthrough PV values of the PRB column filled with 5% NZVI were 2.0–3.5 times higher than the 100% red soil column. The U(VI)–CO{sub 3} complexes adsorbed onto the surface of red soil/NZVI (≡SOH) to form SO–UO{sub 2}CO{sub 3}{sup −} or SO–UO{sub 2} (CO{sub 3}){sub 2}{sup 3−}. XPS and XRD analysis further confirmed the reduction of U(VI) to U(IV) and the formation of FeOOH on NZVI surfaces. The findings of this study are significant to the remediation of uranium-contaminated red soils and the consideration of practical U(VI) species in the natural environment.

  10. Study of new U(VI) and Pu(VI) coprecipitation methods for the preparation of (U,Pu)O2

    International Nuclear Information System (INIS)

    Sanoit, J. de.

    1990-01-01

    Two U(VI) and Pu(VI) coprecipitation methods have been studied, for the definition of new processes to prepare (U,Pu)O 2 mixed oxides suitable for making MoX fuels or fast breeder reactor fuels. The first system is based on the coprecipitation of a new U(VI), Pu(VI) compound; ammonium uranoplutonate, where as a second system is related to the precipitation of uranyl plutonyl monocarbonate. Experimental conditions to optimize the precipitation and the filtration steps of these two systems have been determined. After calcination under reducing conditions, the mixed oxides obtained are characterized according to different techniques: granulometry, thermogravimetry, solubility in boiling HNO 3 solutions. The properties of such oxides are excellent. The possible processes for preparing (U, Pu)O 2 using these new routes are compared with those actually exploited [fr

  11. Cr(VI) removal from aqueous solution by dried activated sludge biomass

    International Nuclear Information System (INIS)

    Wu Jun; Zhang Hua; He Pinjing; Yao Qian; Shao Liming

    2010-01-01

    Batch experiments were conducted to remove Cr(VI) from aqueous solution using activated sludge biomass. The effects of acid pretreatment of the biomass, initial pH, biomass and Cr(VI) concentrations on Cr(VI) removal efficiency were investigated. Proton consumption during the removal process and the reducing capacity of sludge biomass were studied. The results show that acid pretreatment could significantly improve Cr(VI) removal efficiency and increase Cr(VI) reducing capacity by 20.4%. Cr(VI) removal was remarkably pH-dependent; lower pH (pH = 1, 2) facilitated Cr(VI) reduction while higher pH (pH = 3, 4) favored sorption of the converted Cr(III). Lower Cr(VI) concentration as well as higher biomass concentration could accelerate Cr(VI) removal. Cr(VI) reduction was not the only reason for proton consumption in the removal process. Pseudo-second-order adsorption kinetic model could successfully simulate Cr(VI) removal except under higher pH conditions (pH = 3, 4).

  12. Behaviour of chromium(VI) in stormwater soil infiltration systems

    DEFF Research Database (Denmark)

    Cederkvist, Karin; Ingvertsen, Simon T.; Jensen, Marina B.

    2013-01-01

    mm in 2 h) and extreme (100 mm in 3 h) rain events. The objectives were to understand the behaviour of the anionic and toxic Cr(VI) in soil at neutral pH and to asses treatment efficiency towards Cr(VI). During normal rain events Cr(VI) was largely retained (more than 50, even though pH was neutral......The ability of stormwater infiltration systems to retain Cr(VI) was tested by applying a synthetic stormwater runoff solution with a neutral pH and high Cr(VI) concentrations to four intact soil columns excavated from two roadside infiltration swales in Germany. Inlet flow rates mimicked normal (10......, while under extreme rain events approximately 20% of Cr(VI) was retained. In both cases effluent concentrations of Cr(VI) would exceed the threshold value of 3.4 mu g/L if the infiltrated water were introduced to freshwater environments. More knowledge on the composition of the stormwater runoff...

  13. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  14. Floor-fractured craters on the Moon: an evidence of past intrusive magmatic activity

    Science.gov (United States)

    Thorey, C.; Michaut, C.

    2012-12-01

    Floor-fractured lunar craters (FFC's) are a class of craters modified by post impact mechanisms. They are defined by distinctive shallow, often plate-like or convex floors, wide floor moats and radial, concentric and polygonal floor-fractures, suggesting an endogenous process of modification. Two main mechanisms have been proposed to account for such observations : 1) viscous relaxation and 2) spreading of magmatic intrusions at depth below the crater. Here, we propose to test the case of magmatic intrusions. We develop a model for the dynamics of magma spreading below an elastic crust with a crater-like topography and above a rigid horizontal surface. Results show first that the lithostatic pressure increase at the crater rim prevents the intrusion from spreading horizontally giving rise to intrusion thickening and to an uplift of the crater floor. Second, the deformation of the overlying crust exerts a strong control on the intrusion shape, and hence, on the nature of the crater floor uplift. As the deformation can only occur over a minimum flexural wavelength noted Λ, the intrusion shape shows a bell-shaped geometry for crater radius smaller than 3Λ, or a flat top with smooth edges for crater radius larger than 3Λ. For given crustal elastic properties, the crust flexural wavelength increases with the intrusion depth. Therefore, for a large intrusion depth or small crater size, we observe a convex uplift of the crater floor. On the contrary, for a small intrusion depth or large crater size, the crater floor undergoes a piston-like uplift and a circular moat forms just before the rim. The depth of the moat is controlled by the thickening of the crust at the crater rim. On the contrary to viscous relaxation models, our model is thus able to reproduce most of the features of FFC's, including small-scale features. Spreading of a magmatic intrusion at depth can thus be considered as the main endogenous mechanism at the origin of the deformations observed at FFC

  15. Isolation of a star-shaped uranium(V/VI) cluster from the anaerobic photochemical reduction of uranyl(VI)

    Energy Technology Data Exchange (ETDEWEB)

    Chatelain, Lucile; White, Sarah; Scopelliti, Rosario; Mazzanti, Marinella [Ecole Polytechnique Federale de Lausanne (EPFL) (Switzerland). Inst. de Sciences et Ingenierie Chimiques

    2016-11-07

    Actinide oxo clusters are an important class of compounds due to their impact on actinide migration in the environment. The photolytic reduction of uranyl(VI) has potential application in catalysis and spent nuclear fuel reprocessing, but the intermediate species involved in this reduction have not yet been elucidated. Here we show that the photolysis of partially hydrated uranyl(VI) in anaerobic conditions leads to the reduction of uranyl(VI), and to the incorporation of the resulting U{sup V} species into the stable mixed-valent star-shaped U{sup VI}/U{sup V} oxo cluster [U(UO{sub 2}){sub 5}(μ{sub 3}-O){sub 5}(PhCOO){sub 5}(Py){sub 7}]. This cluster is only the second example of a U{sup VI}/U{sup V} cluster and the first one associating uranyl groups to a non-uranyl(V) center. The U{sup V} center in 1 is stable, while the reaction of uranyl(V) iodide with potassium benzoate leads to immediate disproportionation and formation of the U{sub 12}{sup IV}U{sub 4}{sup V}O{sub 24} cluster {[K(Py)_2]_2[K(Py)]_2[U_1_6O_2_4(PhCOO)_2_4(Py)_2]}.

  16. Influence of crystallised igneous intrusions on fault nucleation and reactivation during continental extension

    Science.gov (United States)

    Magee, Craig; McDermott, Kenneth G.; Stevenson, Carl T. E.; Jackson, Christopher A.-L.

    2014-05-01

    Continental rifting is commonly accommodated by the nucleation of normal faults, slip on pre-existing fault surfaces and/or magmatic intrusion. Because crystallised igneous intrusions are pervasive in many rift basins and are commonly more competent (i.e. higher shear strengths and Young's moduli) than the host rock, it is theoretically plausible that they locally intersect and modify the mechanical properties of pre-existing normal faults. We illustrate the influence that crystallised igneous intrusions may have on fault reactivation using a conceptual model and observations from field and subsurface datasets. Our results show that igneous rocks may initially resist failure, and promote the preferential reactivation of favourably-oriented, pre-existing faults that are not spatially-associated with solidified intrusions. Fault segments situated along strike from laterally restricted fault-intrusion intersections may similarly be reactivated. This spatial and temporal control on strain distribution may generate: (1) supra-intrusion folds in the hanging wall; (2) new dip-slip faults adjacent to the igneous body; or (3) sub-vertical, oblique-slip faults oriented parallel to the extension direction. Importantly, stress accumulation within igneous intrusions may eventually initiate failure and further localise strain. The results of our study have important implications for the structural of sedimentary basins and the subsurface migration of hydrocarbons and mineral-bearing fluids.

  17. Microbial Precipitation of Cr(III)-Hydroxide and Se(0) Nanoparticles During Anoxic Bioreduction of Cr(VI)- and Se(VI)-Contaminated Water.

    Science.gov (United States)

    Kim, Yumi; Oh, Jong-Min; Roh, Yul

    2017-04-01

    This study examined the microbial precipitations of Cr(III)-hydroxide and Se(0) nanoparticles during anoxic bioreductions of Cr(VI) and Se(VI) using metal-reducing bacteria enriched from groundwater. Metal-reducing bacteria enriched from groundwater at the Korea Atomic Energy Research Institute (KAERI) Underground Research Tunnel (KURT), Daejeon, S. Korea were used. Metal reduction and precipitation experiments with the metal-reducing bacteria were conducted using Cr(VI)- and Se(VI)-contaminated water and glucose as a carbon source under an anaerobic environment at room temperature. XRD, SEM-EDX, and TEM-EDX analyses were used to characterize the mineralogy, crystal structure, chemistry, shape, and size distribution of the precipitates. The metal-reducing bacteria reduced Cr(VI) of potassium chromate (K₂CrO₄) to Cr(III) of chromium hydroxide [Cr(OH)3], and Se(VI) of sodium selenate (Na₂SeO₄) to selenium Se(0), with changes of color and turbidity. XRD, SEM-EDX, and TEM-EDX analyses revealed that the chromium hydroxide [Cr(OH)₃] was formed extracellularly with nanoparticles of 20–30 nm in size, and elemental selenium Se(0) nanoparticles had a sphere shape of 50–250 nm in size. These results show that metal-reducing bacteria in groundwater can aid or accelerate precipitation of heavy metals such as Cr(VI) and Se(VI) via bioreduction processes under anoxic environments. These results may also be useful for the recovery of Cr and Se nanoparticles in natural environments.

  18. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  19. Time, space, and composition relations among northern Nevada intrusive rocks and their metallogenic implications

    Science.gov (United States)

    duBray, E.A.

    2007-01-01

    Northern Nevada contains ∼360 igneous intrusions subequally distributed among three age groups: middle Tertiary, Cretaceous, and Jurassic. These intrusions are dominantly granodiorite and monzogranite, although some are more mafic. Major-oxide and trace-element compositions of intrusion age groups are remarkably similar, forming compositional arrays that are continuous, overlapping, and essentially indistinguishable. Within each age group, compositional diversity is controlled by a combination of fractional crystallization and two-component mixing. Mafic intrusions represent mixing of mantle-derived magma and assimilated continental crust, whereas intermediate to felsic intrusions evolved by fractional crystallization. Several petrologic parameters suggest that the northern Nevada intrusion age groups formed in a variety of subduction-related, magmatic arc settings: Jurassic intrusions were likely formed during backarc, slab-window magmatism related to breakoff of the Mezcalera plate; Cretaceous magmatism was related to rapid, shallow subduction of the Farallon plate and consequent inboard migration of arc magmatism; and Tertiary magmatism initially swept southward into northern Nevada in response to foundering of the Farallon plate and was followed by voluminous Miocene bimodal magmatism associated with backarc continental rifting.

  20. Intrusive fathering, children's self-regulation and social skills: a mediation analysis.

    Science.gov (United States)

    Stevenson, M; Crnic, K

    2013-06-01

    Fathers have unique influences on children's development, and particularly in the development of social skills. Although father-child relationship influences on children's social competence have received increased attention in general, research on fathering in families of children with developmental delays (DD) is scant. This study examined the pathway of influence among paternal intrusive behaviour, child social skills and child self-regulatory ability, testing a model whereby child regulatory behaviour mediates relations between fathering and child social skills. Participants were 97 families of children with early identified DD enrolled in an extensive longitudinal study. Father and mother child-directed intrusiveness was coded live in naturalistic home observations at child age 4.5, child behaviour dysregulation was coded from a video-taped laboratory problem-solving task at child age 5, and child social skills were measured using independent teacher reports at child age 6. Analyses tested for mediation of the relationship between fathers' intrusiveness and child social skills by child behaviour dysregulation. Fathers' intrusiveness, controlling for mothers' intrusiveness and child behaviour problems, was related to later child decreased social skills and this relationship was mediated by child behaviour dysregulation. Intrusive fathering appears to carry unique risk for the development of social skills in children with DD. Findings are discussed as they related to theories of fatherhood and parenting in children with DD, as well as implications for intervention and future research. © 2012 The Authors. Journal of Intellectual Disability Research © 2012 John Wiley & Sons Ltd, MENCAP & IASSID.

  1. Aspects of cold intrusions over Greece during autumn

    Science.gov (United States)

    Mita, Constantina; Marinaki, Aggeliki; Zeini, Konstantina; Konstantara, Metaxia

    2010-05-01

    This study is focused on the description of atmospheric disturbances that caused intense cold intrusions over Greece during autumn for a period of 25 years (1982-2006). The study was based on data analysis from the meteorological station network of the Hellenic National Meteorological Service (HNMS) and the European Centre for Medium Range Weather Forecasts (ECMWF). Initially, the days with temperature at the isobaric surface of 850 hPa less or equal to the mean temperature for the 10-day period the day under investigation belongs to are isolated, composing a new confined data set which was further used. An event of intense cold intrusion is identified based on a subjective set of criteria, considering the temperature decrease at the level of 850 hPa and its duration. In particular, the criteria that were used to identify a cold intrusion were: temperature variation between two successive days at the isobaric level of 850 hPa being equal or greater than 50 C at least once during the event and duration of the event of at least two successive days with continuous temperature decrease. Additionally, the synoptic analysis of the atmospheric disturbances involved using weather charts from ECMWF, revealed that all cases were related to low pressure systems at the level of 500 hPa, accompanied by cold air masses. Moreover, a methodology proposed to classify the cold intrusions based on general circulation characteristics of the atmosphere, resulted in seven major categories. More than half of the events belong in two categories, originated northwest of the greater Greek area (Greece and parts of neighbouring countries), between 400 and 600 N. Further analysis indicated that the frequency of events increases from September to November and the majority of the events lasted two to three days. Additionally, the non-parametric Mann-Kendall test was used for the investigation of the statistical significance of the trends appearing in the results. The tests revealed that over

  2. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    Science.gov (United States)

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  3. Trimodal distribution of ozone and water vapor in the UT/LS during boreal summer

    Science.gov (United States)

    Dunkerton, T. J.

    2004-12-01

    The relation of ozone and water vapor in the upper troposphere and lower stratosphere (UT/LS) is strongly influenced by the off-equatorial Asian and North American monsoons in boreal summer. Both regions experience hydration, presumably as a result of deep convection. This behavior contrasts sharply with the apparent dehydrating influence of near-equatorial deep convection in boreal winter. There is also a striking difference in ozone between Asia and North America in boreal summer. Over Asia, ozone concentrations are low, evidently a result of ubiquitous deep convection and the vertical transport of ozone-poor air, while over North America, ozone concentrations are much higher. Since deep convection also occurs in the North American monsoon, it appears that the difference in ozone concentration between Asia and North America in boreal summer reflects a differing influence of the large-scale circulation in the two regions: specifically, (i) isolation of the Tibetan anticyclone versus (ii) the intrusion of filaments of ozone-rich air from the stratosphere over North America. During boreal summer, as in winter, near-equatorial concentrations of ozone and water vapor are low near the equator. The result of these geographical variations is a trimodal distribution of ozone and water-vapor correlation. Our talk reviews the observational evidence of this trimodal distribution and possible dynamical and microphysical causes, focusing primarily on the quality and possible sampling bias of satellite and aircraft measurements. A key issue is the ability of HALOE to sample areas of ubiquitous deep convection. Other issues include the vertical structure of tracer anomalies, isentropic stirring in the UT/LS, horizontal transport of biomass burning products lofted by deep convection, and connections to the moist phase of the tropical `tape recorder' signal in water vapor.

  4. The evolution of Interior Intrusion Detection Technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  5. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  6. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  7. Evaluation of of μ-controller PIR Intrusion Detector | Eludire | West ...

    African Journals Online (AJOL)

    When there is intrusion, a piezo speaker beeps and also a visual indicator with light emitting diode blinks to indicate intrusion. For security, cost effectiveness and access control to certain areas of homes, offices and industries this system is a better replacement to human surveillance needed around our valuable goods and ...

  8. Nitrate Enhanced Microbial Cr(VI) Reduction-Final Report

    Energy Technology Data Exchange (ETDEWEB)

    John F. Stolz

    2011-06-15

    A major challenge for the bioremediation of radionuclides (i.e., uranium, technetium) and metals (i.e., Cr(VI), Hg) is the co-occurrence of nitrate as it can inhibit metal transformation. Denitrification (nitrate reduction to dinitrogen gas) is considered the most important ecological process. For many metal and metalloid reducing bacteria, however, ammonia is the end product through respiratory nitrate reduction (RNRA). The focus of this work was to determine how RNRA impacts Cr(VI) transformation. The goal was to elucidate the specific mechanism(s) that limits Cr(VI) reduction in the presence of nitrate and to use this information to develop strategies that enhance Cr(VI) reduction (and thus detoxification). Our central hypothesis is that nitrate impacts the biotransformation of metals and metalloids in three ways 1) as a competitive alternative electron acceptor (inhibiting transformation), 2) as a co-metabolite (i.e., concomitant reduction, stimulating transformation), and 3) as an inducer of specific proteins and pathways involved in oxidation/reduction reactions (stimulating transformation). We have identified three model organisms, Geobacter metallireducens (mechanism 1), Sulfurospirillum barnesii, (mechasism 2), and Desulfovibrio desulfuricans (mechanisms 3). Our specific aims were to 1) investigate the role of Cr(VI) concentration on the kinetics of both growth and reduction of nitrate, nitrite, and Cr(VI) in these three organisms; 2) develop a profile of bacterial enzymes involved in nitrate transformation (e.g., oxidoreductases) using a proteomic approach; 3) investigate the function of periplasmic nitrite reductase (Nrf) as a chromate reductase; and 4) develop a strategy to maximize microbial chromium reduction in the presence of nitrate. We found that growth on nitrate by G. metallireducens was inhibited by Cr(VI). Over 240 proteins were identified by LC/MS-MS. Redox active proteins, outer membrane heavy metal efflux proteins, and chemotaxis sensory

  9. Intrusive thoughts in obsessive-compulsive disorder and eating disorder patients: a differential analysis.

    Science.gov (United States)

    García-Soriano, Gemma; Roncero, Maria; Perpiñá, Conxa; Belloch, Amparo

    2014-05-01

    The present study aims to compare the unwanted intrusions experienced by obsessive-compulsive (OCD) and eating disorder (ED) patients, their appraisals, and their control strategies and analyse which variables predict the intrusions' disruption and emotional disturbance in each group. Seventy-nine OCD and 177 ED patients completed two equivalent self-reports designed to assess OCD-related and ED-related intrusions, their dysfunctional appraisals, and associated control strategies. OCD and ED patients experienced intrusions with comparable frequency and emotional disturbance, but OCD patients experienced greater disruption. Differences appeared between groups on some appraisals and control strategies. Intolerance to uncertainty (OCD group) and thought importance (ED group) predicted their respective emotional disturbance and disruption. Additionally, control importance (OCD group) and thought-action fusion moral (OCD and ED groups) predicted their emotional disturbance. OCD and ED share the presence of intrusions; however, different variables explain why they are disruptive and emotionally disturbing. Cognitive intrusions require further investigation as a transdiagnostic variable. Copyright © 2014 John Wiley & Sons, Ltd and Eating Disorders Association.

  10. Effect of winds and waves on salt intrusion in the Pearl River estuary

    Science.gov (United States)

    Gong, Wenping; Lin, Zhongyuan; Chen, Yunzhen; Chen, Zhaoyun; Zhang, Heng

    2018-02-01

    Salt intrusion in the Pearl River estuary (PRE) is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST) modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  11. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  12. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  13. Learning the vi and Vim Editor

    CERN Document Server

    Robbins, Arnold; Hannah, Elbert

    2008-01-01

    There's nothing that hard-core Unix and Linux users are more fanatical about than their text editor. Editors are the subject of adoration and worship, or of scorn and ridicule, depending upon whether the topic of discussion is your editor or someone else's. vi has been the standard editor for close to 30 years. Popular on Unix and Linux, it has a growing following on Windows systems, too. Most experienced system administrators cite vi as their tool of choice. And since 1986, this book has been the guide for vi. However, Unix systems are not what they were 30 years ago, and neither is this

  14. Effects of heat-flow and hydrothermal fluids from volcanic intrusions on authigenic mineralization in sandstone formations

    Directory of Open Access Journals (Sweden)

    Wolela Ahmed

    2002-06-01

    Full Text Available Volcanic intrusions and hydrothermal activity have modified the diagenetic minerals. In the Ulster Basin, UK, most of the authigenic mineralization in the Permo-Triassic sandstones pre-dated tertiary volcanic intrusions. The hydrothermal fluids and heat-flow from the volcanic intrusions did not affect quartz and feldspar overgrowths. However, clay mineral-transformation, illite-smectite to illite and chlorite was documented near the volcanic intrusions. Abundant actinolite, illite, chlorite, albite and laumontite cementation of the sand grains were also documented near the volcanic intrusions. The abundance of these cementing minerals decreases away from the volcanic intrusions.In the Hartford Basin, USA, the emplacement of the volcanic intrusions took place simultaneous with sedimentation. The heat-flow from the volcanic intrusions and hydrothermal activity related to the volcanics modified the texture of authigenic minerals. Microcrystalline mosaic albite and quartz developed rather than overgrowths and crystals near the intrusions. Chlorite clumps and masses were also documented with microcrystalline mosaic albite and quartz. These features are localized near the basaltic intrusions. Laumontite is also documented near the volcanic intrusions. The reservoir characteristics of the studied sandstone formations are highly affected by the volcanic and hydrothermal fluids in the Hartford and the Ulster Basin. The porosity dropped from 27.4 to zero percent and permeability from 1350 mD to 1 mD.

  15. Chromium(VI) bioremediation by probiotics.

    Science.gov (United States)

    Younan, Soraia; Sakita, Gabriel Z; Albuquerque, Talita R; Keller, Rogéria; Bremer-Neto, Hermann

    2016-09-01

    Chromium is a common mineral in the earth's crust and can be released into the environment from anthropogenic sources. Intake of hexavalent chromium (Cr(VI)) through drinking water and food causes toxic effects, leading to serious diseases, and is a commonly reported environmental problem. Microorganisms can mitigate or prevent the toxic effects caused by heavy metals in addition to having effective resistance mechanisms to prevent cell damage and bind to these metals, sequestering them from the cell surface and removing them from the body. Species of Lactobacillus, Streptococcus, Bacillus and Bifidobacterium present in the human mouth and gut and in fermented foods have the ability to bind and detoxify some of these substances. This review address the primary topics related to Cr(VI) poisoning in animals and humans and the use of probiotics as a way to mitigate or prevent the toxic effects caused by Cr(VI). Further advances in the genetic knowledge of such microorganisms may lead to discoveries which will clarify the most active microorganisms that act as bioprotectants in bodies exposed to Cr(VI) and are an affordable option for people and animals intoxicated by the oral route. © 2016 Society of Chemical Industry. © 2016 Society of Chemical Industry.

  16. Pukala intrusion, its age and connection to hydrothermal alteration in Orivesi, southwestern Finland

    Directory of Open Access Journals (Sweden)

    Matti Talikka

    2005-01-01

    Full Text Available The Pukala intrusion is situated in the Paleoproterozoic Svecofennian domain of the Fennoscandian Shield in the contact region between the Central Finland Granitoid Complex and the Tampere Belt. The acid subvolcanic intrusion, which is in contact or close to severalaltered domains, mainly consists of porphyritic granodiorite and trondhjemite. The Pukala intrusion was emplaced into volcanic sequence in an island-arc or fore-arc setting before or during the early stages of the main regional deformation phase of the Svecofennian orogeny. On the basis of the geochemical data, the Pukala intrusion is a peraluminous volcanic-arc granitoid. After crystallisation at 1896±3 Ma, multiphase deformation and metamorphismcaused alteration, recrystallisation, and orientation of the minerals, and tilted the intrusion steeply towards south. The 1851±5 Ma U-Pb age for titanite is connected to the late stages of the Svecofennian tectonometamorphic evolution of the region. Several hydrothermally altered domains are located in the felsic and intermediate metavolcanic rocks of the Tampere Belt within less than one kilometre south of the Pukala intrusion. Alteration is divided into three basic types: partial silica alteration, chlorite-sericite±silica alteration, and sericite alteration in shear zones. The first two types probably formed during the emplacement and crystallisation of the Pukala intrusion, and the third is linked to late shearing. Intense sericitisation and comb quartz bands in the contact of theintrusion and the altered domain at Kutemajärvi suggest that the hydrothermal system was driven by the Pukala intrusion.

  17. Preconcentration and in-situ photoreduction of trace selenium using TiO2 nanoparticles, followed by its determination by slurry photochemical vapor generation atomic fluorescence spectrometry

    International Nuclear Information System (INIS)

    Yang, Wulin; Wu, Li; Zhu, Xiaofan; Gao, Ying; Hou, Xiandeng; Zheng, Chengbin

    2014-01-01

    We have developed a method for the determination of trace levels of total selenium in water samples. It integrates preconcentration, in-situ photoreduction and slurry photochemical vapor generation using TiO 2 nanoparticles, and the determination of total selenium by AFS. The Se(IV) and Se(VI) species were adsorbed on a slurry of TiO 2 nanoparticles which then were exposed to UV irradiation in the presence of formic acid to form volatile selenium species. The detection limits were improved 17-fold compared to hydride generation and 56-fold compared to photochemical vapor generation, both without any preconcentration. No significant difference was found in the limits of detection (LODs) for Se(IV) and Se(VI). The LOD is as low as 0.8 ng L −1 , the precision is better than 4.5 % (at a level of 0.1 μg L −1 of selenium). The method gave good recoveries when applied to the determination of total selenium in a certified tissue reference material (DORM-3) and in spiked drinking water and wastewater samples containing high concentrations of transition and noble metal ions. It also excels by very low LODs, a significant enhancement of sample throughput, reduced reagent consumption and sample loss, and minimal interference by transition and noble metal ions. (author)

  18. Engineering evaluation of intrusion prevention strategies for single-shell tanks

    International Nuclear Information System (INIS)

    Jenkins, C.E.

    1994-01-01

    In this study, previously implemented actions to prevent liquid intrusion into out-of-service single-shell tanks (SSTs), i.e., interim isolation or partial interim isolation, are investigated and expanded to identify additional cost-effective intrusion prevention techniques that could be reasonably taken until SSTs are ready for waste retrieval. Possible precipitation, groundwater, and condensation pathways and internal tank connections that could provide possible pathways for liquids are examined. Techniques to block identified potential pathways are developed and costed to determine the potential benefit to costed trade-offs for implementing the techniques. (Note: Surveillance data show increased waste surface levels for several SSTs that indicate possible liquid intrusion despite interim isolation activities.)

  19. Cellular Neural Network-Based Methods for Distributed Network Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Kang Xie

    2015-01-01

    Full Text Available According to the problems of current distributed architecture intrusion detection systems (DIDS, a new online distributed intrusion detection model based on cellular neural network (CNN was proposed, in which discrete-time CNN (DTCNN was used as weak classifier in each local node and state-controlled CNN (SCCNN was used as global detection method, respectively. We further proposed a new method for design template parameters of SCCNN via solving Linear Matrix Inequality. Experimental results based on KDD CUP 99 dataset show its feasibility and effectiveness. Emerging evidence has indicated that this new approach is affordable to parallelism and analog very large scale integration (VLSI implementation which allows the distributed intrusion detection to be performed better.

  20. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  1. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  2. Sexually intrusive behaviour following brain injury: approaches to assessment and rehabilitation.

    Science.gov (United States)

    Bezeau, Scott C; Bogod, Nicholas M; Mateer, Catherine A

    2004-03-01

    Sexually intrusive behaviour, which may range from inappropriate commentary to rape, is often observed following a traumatic brain injury. It may represent novel behaviour patterns or an exacerbation of pre-injury personality traits, attitudes, and tendencies. Sexually intrusive behaviour poses a risk to staff and residents of residential facilities and to the community at large, and the development of a sound assessment and treatment plan for sexually intrusive behaviour is therefore very important. A comprehensive evaluation is best served by drawing on the fields of neuropsychology, forensic psychology, and cognitive rehabilitation. The paper discusses the types of brain damage that commonly lead to sexually intrusive behaviour, provides guidance for its assessment, and presents a three-stage treatment model. The importance of a multidisciplinary approach to both assessment and treatment is emphasized. Finally, a case example is provided to illustrate the problem and the possibilities for successful management.

  3. The evolution of interior intrusion detection technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combination developed when commercial sensors were unavailable and the future application of expert systems. 5 refs

  4. The evolution of interior intrusion detection technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-01-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the U.S. Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). The authors also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  5. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  6. Titanium dioxide-based DGT for measuring dissolved As(V), V(V), Sb(V), Mo(VI) and W(VI) in water

    DEFF Research Database (Denmark)

    Panther, Jared G.; Stewart, Ryan R.; Teasdale, Peter R.

    2013-01-01

    A titanium dioxide-based DGT method (Metsorb-DGT) was evaluated for the measurement of As(V), V(V), Sb(V), Mo(VI), W(VI) and dissolved reactive phosphorus (DRP) in synthetic waters. Mass vs. time DGT deployments at pH 6.06 (0.01 mol L-1 NaNO3) demonstrated linear uptake of all analytes (R2...... for deployment times >4 h (CDGT=0.27-0.72). For ferrihydrite-DGT, CDGT/CSol values in the range 0.92-1.16 were obtained for As(V), V(V) and DRP, however, Mo(VI), Sb(V) and W(VI) could not be measured to within 15% of the solution concentration (C DGT/CSol 0.02-0.83)....

  7. Numerical modeling of seawater intrusion in Zhoushuizi district of Dalian City, China

    Science.gov (United States)

    Zhao, J.; Lin, J.; Wu, J.

    2013-12-01

    A three-dimensional heterogeneous density-dependent numerical model was constructed to simulate the seawater intrusion process in coastal aquifers in Zhoushuizi Region, Dalian City. Model calibration was achieved through a prediction-correction method by adjusting the zonation and values of hydrogeologic parameters until the calculated heads and concentrations matched the observed values. Model validation results also showed that it was reasonable under current data conditions. Then the calibrated and validated model was applied to predict the dynamics and trend of seawater intrusion according to the current groundwater abstraction conditions in this study area 30 years after 2010. Prediction results showed that overall seawater intrusion in the future would be even more severe. Actually, with the growing of the population and development of the economy, the demand for ground water will be increasing continuously so that the problem of seawater intrusion may be more serious than that predicted by the modelin this study. Better strategies for reasonably governing exploitation of groundwater in the study area can be further developed by using this three-dimensional seawater intrusion model.

  8. The assessment of human intrusion into underground repositories for radioactive waste Volume 2: Appendices

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Ashton, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  9. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    International Nuclear Information System (INIS)

    Bernot, P.

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  10. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungwon Lee

    2009-05-01

    Full Text Available TheIP-based Ubiquitous Sensor Network (IP-USN is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System called RIDES (Robust Intrusion DEtection System for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  11. Effect of winds and waves on salt intrusion in the Pearl River estuary

    Directory of Open Access Journals (Sweden)

    W. Gong

    2018-02-01

    Full Text Available Salt intrusion in the Pearl River estuary (PRE is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  12. Når vi taler om 68

    DEFF Research Database (Denmark)

    Jensen, Henrik; Metz, Georg

    Når vi taler om 68 er en intellektuel samtale mellem to ligeværdige gentlemen og skallesmækkere. En essayistisk dyst om porno, RAF, Pittelkow og livsfilosofi......Når vi taler om 68 er en intellektuel samtale mellem to ligeværdige gentlemen og skallesmækkere. En essayistisk dyst om porno, RAF, Pittelkow og livsfilosofi...

  13. Treatment of Intrusive Suicidal Imagery Using Eye Movements

    Directory of Open Access Journals (Sweden)

    Jaël S. van Bentum

    2017-06-01

    Full Text Available Suicide and suicidal behavior are major public health concerns, and affect 3–9% of the population worldwide. Despite increased efforts for national suicide prevention strategies, there are still few effective interventions available for reducing suicide risk. In this article, we describe various theoretical approaches for suicide ideation and behavior, and propose to examine the possible effectiveness of a new and innovative preventive strategy. A model of suicidal intrusion (mental imagery related to suicide, also referred to as suicidal flash-forwards is presented describing one of the assumed mechanisms in the etiology of suicide and the mechanism of therapeutic change. We provide a brief rationale for an Eye Movement Dual Task (EMDT treatment for suicidal intrusions, describing techniques that can be used to target these suicidal mental images and thoughts to reduce overall behavior. Based on the available empirical evidence for the mechanisms of suicidal intrusions, this approach appears to be a promising new treatment to prevent suicidal behavior as it potentially targets one of the linking pins between suicidal ideation and suicidal actions.

  14. Numerical Continuation Methods for Intrusive Uncertainty Quantification Studies

    Energy Technology Data Exchange (ETDEWEB)

    Safta, Cosmin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Najm, Habib N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Phipps, Eric Todd [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-09-01

    Rigorous modeling of engineering systems relies on efficient propagation of uncertainty from input parameters to model outputs. In recent years, there has been substantial development of probabilistic polynomial chaos (PC) Uncertainty Quantification (UQ) methods, enabling studies in expensive computational models. One approach, termed ”intrusive”, involving reformulation of the governing equations, has been found to have superior computational performance compared to non-intrusive sampling-based methods in relevant large-scale problems, particularly in the context of emerging architectures. However, the utility of intrusive methods has been severely limited due to detrimental numerical instabilities associated with strong nonlinear physics. Previous methods for stabilizing these constructions tend to add unacceptably high computational costs, particularly in problems with many uncertain parameters. In order to address these challenges, we propose to adapt and improve numerical continuation methods for the robust time integration of intrusive PC system dynamics. We propose adaptive methods, starting with a small uncertainty for which the model has stable behavior and gradually moving to larger uncertainty where the instabilities are rampant, in a manner that provides a suitable solution.

  15. Research progress in the electrochemical synthesis of ferrate(VI)

    International Nuclear Information System (INIS)

    Macova, Zuzana; Bouzek, Karel; Hives, Jan; Sharma, Virender K.; Terryn, Raymond J.; Baum, J. Clayton

    2009-01-01

    There is renewed interest in the +6 oxidation state of iron, ferrate (VI) (Fe VI O 4 2- ), because of its potential as a benign oxidant for organic synthesis, as a chemical in developing cleaner ('greener') technology for remediation processes, and as an alternative for environment-friendly battery cathodes. This interest has led many researchers to focus their attention on the synthesis of ferrate(VI). Of the three synthesis methods, electrochemical, wet chemical and thermal, electrochemical synthesis has received the most attention due to its ease and the high purity of the product. Moreover, electrochemical processes use an electron as a so-called clean chemical, thus avoiding the use of any harmful chemicals to oxidize iron to the +6 oxidation state. This paper reviews the development of electrochemical methods to synthesize ferrate(VI). The approaches chosen by different laboratories to overcome some of the difficulties associated with the electrochemical synthesis of ferrate(VI) are summarized. Special attention is paid to parameters such as temperature, anolyte, and anode material composition. Spectroscopic work to understand the mechanism of ferrate(VI) synthesis is included. Recent advances in two new approaches, the use of an inert electrode and molten hydroxide salts, in the synthesis of ferrate(VI) are also reviewed. Progress made in the commercialization of ferrate(VI) continuous production is briefly discussed as well

  16. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  17. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  18. Prevention and analysis of hacker's intrusion

    International Nuclear Information System (INIS)

    Liu Baoxu; An Dehai; Xu Rongsheng

    2000-01-01

    The author analyzes the behavior characteristics and relevant technologies about the hacker's intrusion, and gives some corresponding solutions pertinently. To the recent events about hackers, the author gives detailed introduction and puts forward the relevant advice and valuable consideration

  19. Development of iron-based nanoparticles for Cr(VI removal from drinking water

    Directory of Open Access Journals (Sweden)

    Vourlias G.

    2013-01-01

    Full Text Available A great deal of research over recent decades has been motivated by the requirement to lower the concentration of chromium in drinking water. This study has been conducted to determine the feasibility of iron-based nanoparticles for chromium removal from contaminated water. Single Fe, Fe3O4 and binary Fe/Fe3O4 nanoparticles were grown at the 45-80 nm size range using the solar physical vapor deposition technique and tested as potential hexavalent chromium removing agents from aqueous solutions. Due to their higher electron donation ability compared to the Fe3O4 ones, single Fe nanoparticles exhibited the highest Cr(VI removal capacity of more than 3 µg/mg while maintaining a residual concentration 50 µg/L, equal to the regulation limit for drinking water. In combination to their facile and fast magnetic separation, the applicability of the studied particles in water treatment facilities should be considered.

  20. Synthesis, characterization and oxidative behaviour of dioxoruthenium(VI) complexes

    International Nuclear Information System (INIS)

    Agarwal, D.D.; Rastogi, Rachana

    1995-01-01

    Dioxoruthenium(VI) complexes are found to give low yield of epoxide but good yield of cyclohexanone. The complexes are electro active giving metal centered Ru VI /Ru V couple. Cis-stilbene gives trans epoxide and benzaldehyde. Norbornene gives exo epoxy norbornene. The selectivity for allylic oxidation is high. In the present note the synthesis of dioxoruthenium(VI) complexes and their oxidation behaviour is reported. The dioxoruthenium(VI) complexes have been stoichiometrically found to be good oxidants. (author). 21 refs., 1 tab

  1. Inhibition of bacterial U(VI) reduction by calcium

    International Nuclear Information System (INIS)

    Brooks, Scott C.; Fredrickson, Jim K.; Carroll, S. L.; Kennedy, David W.; Zachara, John M.; Plymale, Andrew E.; Kelly, S. D.; Kemner, K. M.; Fendorf, S.

    2003-01-01

    The rapid kinetics of bacterial U(VI) reduction and low solubility of uraninite (UO2,cr) make this process an attractive option for removing uranium from groundwater. Nevertheless, conditions that may promote or inhibit U(VI) reduction are not well-defined. Recent descriptions of Ca-UO2-CO3 complexes indicate that these species may dominate the aqueous speciation of U(VI) in many environments. We monitored the bacterial reduction of U(VI) in bicarbonate-buffered solution in the presence and absence of Ca. XAFS measurements confirmed the presence of a Ca-U(VI)-CO3 complex in the initial solutions containing calcium. Calcium, at millimolar concentrations (0.45-5 mM), caused a significant decrease in the rate and extent of bacterial U(VI) reduction. Both facultative (Shewanella putrefaciens strain CN32) and obligate (Desulfovibrio desulfuricans, Geobacter sulfurreducens) anaerobic bacteria were affected by the presence of calcium. Reduction of U(VI) ceased when the calculated system Eh re ached -0.046+/- 0.001 V, based on the Ca2UO2(CO3)(3) -- > UO2,cr couple. The results are consistent with the hypothesis that U is a less energetically favorable electron acceptor when the Ca-UO2-CO3 complexes are present. The results do not support Ca inhibition caused by direct interactions with the cells or with the electron donor as the reduction of fumarate or Tc(VII)O-4(-) under identical conditions was unaffected by the presence of Ca

  2. Point of net vapor generation and vapor void fraction in subcooled boiling

    International Nuclear Information System (INIS)

    Saha, P.; Zuber, N.

    1974-01-01

    An analysis is presented directed at predicting the point of net vapor generation and vapor void fraction in subcooled boiling. It is shown that the point of net vapor generation depends upon local conditions--thermal and fluid dynamic. Thus, at low mass flow rates the net vapor generation is determined by thermal conditions, whereas at high mass flow rates the phenomenon is hydrodynamically controlled. Simple criteria are derived which can be used to predict these local conditions for net vapor generation. These criteria are used to determine the vapor void fraction is subcooled boiling. Comparison between the results predicted by this analysis and experimental data presently available shows good agreement for wide range of operating conditions, fluids and geometries. (U.S.)

  3. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  4. Capability for intrusion detection at nuclear fuel sites

    International Nuclear Information System (INIS)

    1978-03-01

    A safeguards vulnerability assessment was conducted at three separate licensed nuclear processing facilities. Emphasis was placed on: (1) performance of the total intrusion detection system, and (2) vulnerability of the system to compromise by insiders. The security guards were interviewed to evaluate their effectiveness in executing their duties in accordance with the plant's security plan and to assess their knowledge regarding the operation of the security equipment. A review of the training schedule showed that the guards, along with the other plant employees, are required to periodically attend in-plant training sessions. The vulnerability assessments continued with interviews of the personnel responsible for maintaining the security equipment, with discussions of detector false alarm and maintenance problems. The second part of the vulnerability assessments was to evaluate the effectiveness of the intrusion detection systems including the interior and the perimeter sensors, CCTV surveillance devices and the exterior lighting. Two types of perimeter detectors are used at the sites, a fence disturbance sensor and an infrared barrier type detector. Infrared barrier type detectors have a higher probability of detection, especially in conjunction with dedicated CCTV cameras. The exterior lights satisfy the 0.2 footcandle illumination requirement. The interior intrusion detection systems included ultrasonic motion detectors, microwave motion detectors,balanced magnetic switches, and CCTV cameras. Entrance doors to the materials access areas and vital areas are protected with balanced magnetic switches. The interior intrusion detection systems at the three nuclear processing sites are considered satisfactory with the exception of the areas protected with ultrasonic motion detectors

  5. Magmatic sill intrusions beneath El Hierro Island following the 2011-2012 submarine eruption

    Science.gov (United States)

    Benito-Saz, María Á.; Sigmundsson, Freysteinn; Parks, Michelle M.; García-Cañada, Laura; Domínguez Cerdeña, Itahiza

    2016-04-01

    El Hierro, the most southwestern island of Canary Islands, Spain, is a volcano rising from around 3600 m above the ocean floor and up to of 1500 m above sea level. A submarine eruption occurred off the coast of El Hierro in 2011-2012, which was the only confirmed eruption in the last ~ 600 years. Activity continued after the end of the eruption with six magmatic intrusions occurring between 2012-2014. Each of these intrusions was characterized by hundreds of earthquakes and 3-19 centimeters of observed ground deformation. Ground displacements at ten continuous GPS sites were initially inverted to determine the optimal source parameters (location, geometry, volume/pressure change) that best define these intrusions from a geodetic point of view. Each intrusive period appears to be associated with the formation of a separate sill, with inferred volumes between 0.02 - 0.3 km3. SAR images from the Canadian RADARSAT-2 satellite and the Italian Space Agency COSMO-SkyMed constellation have been used to produce high-resolution detailed maps of line-of-sight displacements for each of these intrusions. These data have been combined with the continuous GPS observations and a joint inversion undertaken to gain further constraints on the optimal source parameters for each of these separate intrusive events. The recorded activity helps to understand how an oceanic intraplate volcanic island grows through repeated sill intrusions; well documented by seismic, GPS and InSAR observations in the case of the El Hierro activity.

  6. Work Zone Intrusion Report Interface Design

    Science.gov (United States)

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  7. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  8. The vapor pressure and enthalpy of vaporization of M-xylene

    International Nuclear Information System (INIS)

    Rothenberg, S.J.; Seiler, F.A.; Bechtold, W.E.; Eidson, A.F.

    1988-01-01

    We measured the vapor pressure of m-xylene over the temperature range 273 to 293 deg K with a single-sided capacitance manometer. The enthalpy of vaporization was 42.2 ± 0.1 (SE) kj/ g·mol. Combining our own data with previously published data, we recommend using the values 42.0, 40.6, and 39.1 (± 0.1) (SE) kjg·mol for the enthalpy of vaporization of m-xylene at 300, 340, and 380 deg. K, respectively, and a value for the change in heat capacity on vaporization (ΔCpdeg.) of 35 ± 3 (SE) J/g·mol·K over the temperature range studied. (author)

  9. Preliminary evaluation of solution-mining intrusion into a salt-dome repository

    International Nuclear Information System (INIS)

    1981-06-01

    This report is the product of the work of an ONWI task force to evaluate inadvertant human intrusion into a salt dome repository by solution mining. It summarizes the work in the following areas: a general review of the levels of defense that could reduce both the likelihood and potential consequences of human intrusion into a salt dome repository; evaluation of a hypothetical intrusion scenario and its consequences; recommendation for further studies. The conclusions of this task force report can be summarized as follows: (1) it is not possible at present to establish with certainty that solution mining is credible as a human-intrusion event. The likelihood of such an intrusion will depend on the effectiveness of the preventive measures; (2) an example analysis based on the realistic approach is presented in this report; it concluded that the radiological consequences are strongly dependent upon the mode of radionuclide release from the waste form, time after emplacement, package design, impurities in the host salt, the amount of a repository intercepted, the solution mining cavity form, the length of time over which solution mining occurs, the proportion of contaminated salt source for human consumption compared to other sources, and the method of salt purification for culinary purposes; (3) worst case scenarios done by other studies suggest considerable potential for exposures to man while preliminary evaluations of more realistic cases suggest significantly reduced potential consequences. Mathematical model applications to process systems, guided by more advanced assumptions about human intrusion into geomedia, will shed more light on the potential for concerns and the degree to which mitigative measures will be required

  10. New generation ion-imprinted nanocarrier for removal of Cr(VI) from wastewater

    International Nuclear Information System (INIS)

    Uygun, Murat; Feyzioğlu, Esra; Özçalışkan, Emir; Caka, Müşerref; Ergen, Aygen; Akgöl, Sinan; Denizli, Adil

    2013-01-01

    The purpose of this study was to prepare a novel ion-imprinted nanoparticle to remove Cr(VI) ions from waste water. For this, Cr(VI) ions were complexed with 2-methacryloylamido histidine (MAH) and then Cr(VI)-imprinted poly(HEMAH) nanoparticles were synthesized by surfactant-free emulsion polymerization technique. The templates, Cr(VI) ions, were removed from the nanoparticles using 0.1 M of HNO 3 solution. The specific surface area of the Cr(VI)-imprinted poly(HEMAH) nanoparticles was found to be 1,397.85 m 2 /g, and the particle size was calculated as 155.3 nm. These Cr(VI)-imprinted nanoparticles were used for the adsorption/desorption of Cr(VI) ions from its aqueous solutions. The effects of initial Cr(VI) concentration and medium pH on the Cr(VI) adsorption capacity were also studied. The maximum adsorbed amount of Cr(VI) on the imprinted nanoparticles was found to be 3,830.58 mg/g nanoparticle in pH 4.0. In order to investigate the selectivity of the imprinted nanoparticle, adsorption studies were repeated using Cr(III) ions. The selectivity results demonstrated that Cr(VI)-imprinted poly(HEMAH) nanoparticles showed high affinity for the Cr(VI) ions than Cr(III). The Cr(VI)-imprinted nanoparticles were used several times without decreasing their Cr(VI) adsorption capacities

  11. New generation ion-imprinted nanocarrier for removal of Cr(VI) from wastewater

    Science.gov (United States)

    Uygun, Murat; Feyzioğlu, Esra; Özçalışkan, Emir; Caka, Müşerref; Ergen, Aygen; Akgöl, Sinan; Denizli, Adil

    2013-08-01

    The purpose of this study was to prepare a novel ion-imprinted nanoparticle to remove Cr(VI) ions from waste water. For this, Cr(VI) ions were complexed with 2-methacryloylamido histidine (MAH) and then Cr(VI)-imprinted poly(HEMAH) nanoparticles were synthesized by surfactant-free emulsion polymerization technique. The templates, Cr(VI) ions, were removed from the nanoparticles using 0.1 M of HNO3 solution. The specific surface area of the Cr(VI)-imprinted poly(HEMAH) nanoparticles was found to be 1,397.85 m2/g, and the particle size was calculated as 155.3 nm. These Cr(VI)-imprinted nanoparticles were used for the adsorption/desorption of Cr(VI) ions from its aqueous solutions. The effects of initial Cr(VI) concentration and medium pH on the Cr(VI) adsorption capacity were also studied. The maximum adsorbed amount of Cr(VI) on the imprinted nanoparticles was found to be 3,830.58 mg/g nanoparticle in pH 4.0. In order to investigate the selectivity of the imprinted nanoparticle, adsorption studies were repeated using Cr(III) ions. The selectivity results demonstrated that Cr(VI)-imprinted poly(HEMAH) nanoparticles showed high affinity for the Cr(VI) ions than Cr(III). The Cr(VI)-imprinted nanoparticles were used several times without decreasing their Cr(VI) adsorption capacities.

  12. New generation ion-imprinted nanocarrier for removal of Cr(VI) from wastewater

    Energy Technology Data Exchange (ETDEWEB)

    Uygun, Murat, E-mail: muygun@adu.edu.tr [Adnan Menderes University, Kocarl Latin-Small-Letter-Dotless-I Vocational and Training School (Turkey); Feyzioglu, Esra; Oezcal Latin-Small-Letter-Dotless-I skan, Emir; Caka, Mueserref; Ergen, Aygen; Akgoel, Sinan [Ege University, Department of Biochemistry, Faculty of Science (Turkey); Denizli, Adil [Hacettepe University, Department of Chemistry, Faculty of Science (Turkey)

    2013-08-15

    The purpose of this study was to prepare a novel ion-imprinted nanoparticle to remove Cr(VI) ions from waste water. For this, Cr(VI) ions were complexed with 2-methacryloylamido histidine (MAH) and then Cr(VI)-imprinted poly(HEMAH) nanoparticles were synthesized by surfactant-free emulsion polymerization technique. The templates, Cr(VI) ions, were removed from the nanoparticles using 0.1 M of HNO{sub 3} solution. The specific surface area of the Cr(VI)-imprinted poly(HEMAH) nanoparticles was found to be 1,397.85 m{sup 2}/g, and the particle size was calculated as 155.3 nm. These Cr(VI)-imprinted nanoparticles were used for the adsorption/desorption of Cr(VI) ions from its aqueous solutions. The effects of initial Cr(VI) concentration and medium pH on the Cr(VI) adsorption capacity were also studied. The maximum adsorbed amount of Cr(VI) on the imprinted nanoparticles was found to be 3,830.58 mg/g nanoparticle in pH 4.0. In order to investigate the selectivity of the imprinted nanoparticle, adsorption studies were repeated using Cr(III) ions. The selectivity results demonstrated that Cr(VI)-imprinted poly(HEMAH) nanoparticles showed high affinity for the Cr(VI) ions than Cr(III). The Cr(VI)-imprinted nanoparticles were used several times without decreasing their Cr(VI) adsorption capacities.

  13. Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection

    Science.gov (United States)

    Elfers, Carsten; Horstmann, Mirko; Sohr, Karsten; Herzog, Otthein

    Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine learning techniques have been proposed. However, one critical issue is that the amount of reference data that contains serious intrusions is very sparse. In this paper we present an inference process with linear chain conditional random fields that aims to solve this problem by using domain knowledge about the alerts of different intrusion sensors represented in an ontology.

  14. ALTERATION OF U(VI)-PHASES UNDER OXIDIZING CONDITIONS

    Energy Technology Data Exchange (ETDEWEB)

    A.P. Deditius; S. Utsunomiya; R.C. Ewing

    2006-02-21

    Uranium-(VI) phases are the primary alteration products of the UO{sub 2} in spent nuclear fuel and the UO{sub 2+x}, in natural uranium deposits. The U(VI)-phases generally form sheet structures of edge-sharing UO{sub 2}{sup 2+} polyhedra. The complexity of these structures offers numerous possibilities for coupled-substitutions of trace metals and radionuclides. The incorporation of radionuclides into U(VI)-structures provides a potential barrier to their release and transport in a geologic repository that experiences oxidizing conditions. In this study, we have used natural samples of UO{sub 2+x}, to study the U(VI)-phases that form during alteration and to determine the fate of the associated trace elements.

  15. ALTERATION OF U(VI)-PHASES UNDER OXIDIZING CONDITIONS

    International Nuclear Information System (INIS)

    A.P. Deditius; S. Utsunomiya; R.C. Ewing

    2006-01-01

    Uranium-(VI) phases are the primary alteration products of the UO 2 in spent nuclear fuel and the UO 2+x , in natural uranium deposits. The U(VI)-phases generally form sheet structures of edge-sharing UO 2 2+ polyhedra. The complexity of these structures offers numerous possibilities for coupled-substitutions of trace metals and radionuclides. The incorporation of radionuclides into U(VI)-structures provides a potential barrier to their release and transport in a geologic repository that experiences oxidizing conditions. In this study, we have used natural samples of UO 2+x , to study the U(VI)-phases that form during alteration and to determine the fate of the associated trace elements

  16. Computer Game Play Reduces Intrusive Memories of Experimental Trauma via Reconsolidation-Update Mechanisms.

    Science.gov (United States)

    James, Ella L; Bonsall, Michael B; Hoppitt, Laura; Tunbridge, Elizabeth M; Geddes, John R; Milton, Amy L; Holmes, Emily A

    2015-08-01

    Memory of a traumatic event becomes consolidated within hours. Intrusive memories can then flash back repeatedly into the mind's eye and cause distress. We investigated whether reconsolidation-the process during which memories become malleable when recalled-can be blocked using a cognitive task and whether such an approach can reduce these unbidden intrusions. We predicted that reconsolidation of a reactivated visual memory of experimental trauma could be disrupted by engaging in a visuospatial task that would compete for visual working memory resources. We showed that intrusive memories were virtually abolished by playing the computer game Tetris following a memory-reactivation task 24 hr after initial exposure to experimental trauma. Furthermore, both memory reactivation and playing Tetris were required to reduce subsequent intrusions (Experiment 2), consistent with reconsolidation-update mechanisms. A simple, noninvasive cognitive-task procedure administered after emotional memory has already consolidated (i.e., > 24 hours after exposure to experimental trauma) may prevent the recurrence of intrusive memories of those emotional events. © The Author(s) 2015.

  17. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  18. Magmatic Diversity of the Wehrlitic Intrusions in the Oceanic Lower Crust of the Northern Oman Ophiolite

    Science.gov (United States)

    Kaneko, R.; Adachi, Y.; Miyashita, S.

    2014-12-01

    The Oman ophiolite extends along the east coast of Oman, and is the world's largest and best-preserved slice of obducted oceanic lithosphere. The magmatic history of this ophiolite is complex and is generally regarded as having occurred in three stages (MOR magmatism, subduction magmatism and intraplate magmatism). Wehrlitic intrusions constitute an important element of oceanic lower crust of the ophiolite, and numerous intrusions cut gabbro units in the northern Salahi block of this ophiolite. In this study area, we identified two different types of wehrlitic intrusions. One type of the intrusions mainly consists of dunite, plagioclase (Pl) wehrlite and mela-olivine (Ol) gabbro, in which the crystallization sequence is Ol followed by the contemporaneous crystallization of Pl and clinopyroxene (Cpx). This type is called "ordinary" wehrlitic intrusions and has similar mineral compositions to host gabbros (Adachi and Miyashita 2003; Kaneko et al. 2014). Another type of the intrusions is a single intrusion that crops out in an area 250 m × 150 m along Wadi Salahi. This intrusion consists of Pl-free "true" wehrlite, in which the crystallization sequence is Ol and then Cpx. The forsterite contents (Fo%) of Ol from the "ordinary" wehrlitic intrusions and "true" wehrlitic intrusions have ranges of 90.8-87.0 (NiO = 0.36-0.13 wt%) and 84.7 (NiO = 0.31 wt%), respectively. Cr numbers (Cr#) of Cr-spinel from the "true" wehrlitic intrusions show higher Cr# value of 0.85 than those of the "ordinary" wehrlitic intrusions (0.48-0.64). But the former is characterized by very high Fe3+ values (YFe3+ = 0.49-0.68). Kaneko et al. (2014) showed that the "ordinary" ubiquitous type has similar features to MOR magmatism and the depleted type in the Fizh block (Adachi and Miyashita 2003) links to subduction magmatism. These types are distinguished by their mineral chemistries (TiO2 and Na2O contents of Cpx). The TiO2 and Na2O contents of Cpx from the "true" wehrlitic intrusions have 0

  19. Environmental data processor of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Rogers, M.S.

    1977-06-01

    A data acquisition system oriented specifically toward collection and processing of various meteorological and environmental parameters has been designed around a National Semiconductor IMP-16 microprocessor, This system, called the Environmental Data Processor (EDP), was developed specifically for use with the Adaptive Intrusion Data System (AIDS) in a perimeter intrusion alarm evaluation, although its design is sufficiently general to permit use elsewhere. This report describes in general detail the design of the EDP and its interaction with other AIDS components

  20. Cultural syndromes and age moderate the emotional impact of illness intrusiveness in rheumatoid arthritis.

    Science.gov (United States)

    Devins, Gerald M; Gupta, Anita; Cameron, Jill; Woodend, Kirsten; Mah, Kenneth; Gladman, Dafna

    2009-02-01

    The authors investigated cultural syndromes (multidimensional vectors comprising culturally based attitudes, values, and beliefs) and age as moderators of the emotional impact of illness intrusiveness--illness-induced lifestyle disruptions--in rheumatoid arthritis (RA) and examined illness intrusiveness effects in total and separately for three life domains (relationships and personal development, intimacy, and instrumental). People with RA (n = 105) completed the Illness Intrusiveness Ratings, Individualism-Collectivism, and Center for Epidemiologic Studies--Depression scales in a one-on-one interview. Controlling for disease and background characteristics, the association between illness intrusiveness (total score and the Relationships and Personal Development subscale) and distress was inverse when young adults with RA endorsed high horizontal individualism. Illness intrusiveness into intimacy was associated with increased distress, and this intensified when respondents endorsed high vertical individualism, horizontal collectivism, vertical collectivism, or low horizontal individualism. The negative emotional impact of illness intrusiveness into intimacy diminished with increasing age. Given an aging and increasingly pluralistic society, diversity can no longer be ignored in addressing the psychosocial impact of chronic, disabling disease.

  1. Expert judgement on inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Hora, S.C.; von Winterfeldt, D.; Trauth, K.M.

    1991-12-01

    Four expert-judgment teams have developed analyses delineating possible future societies in the next 10,000 years in the vicinity of the Waste Isolation Pilot Plant (WIPP). Expert-judgment analysis was used to address the question of future societies because neither experimentation, observation, nor modeling can resolve such uncertainties. Each of the four, four-member teams, comprised of individuals with expertise in the physical, social, or political sciences, developed detailed qualitative assessments of possible future societies. These assessments include detailed discussions of the underlying physical and societal factors that would influence society and the likely modes of human-intrusion at the WIPP, as well as the probabilities of intrusion. Technological development, population growth, economic development, conservation of information, persistence of government control, and mitigation of danger from nuclear waste were the factors the teams believed to be most important. Likely modes of human-intrusion were categorized as excavation, disposal/storage, tunneling, drilling, and offsite activities. Each team also developed quantitative assessments by providing probabilities of various alternative futures, of inadvertent human intrusion, and in some cases, of particular modes of intrusion. The information created throughout this study will be used in conjunction with other types of information, including experimental data, calculations from physical principles and computer models, and perhaps other judgments, as input to ''performance assessment.'' The more qualitative results of this study will be used as input to another expert panel considering markers to deter inadvertent human intrusion at the WIPP

  2. Oxidation of trimethoprim by ferrate(VI): kinetics, products, and antibacterial activity.

    Science.gov (United States)

    Anquandah, George A K; Sharma, Virender K; Knight, D Andrew; Batchu, Sudha Rani; Gardinali, Piero R

    2011-12-15

    Kinetics, stoichiometry, and products of the oxidation of trimethoprim (TMP), one of the most commonly detected antibacterial agents in surface waters and municipal wastewaters, by ferrate(VI) (Fe(VI)) were determined. The pH dependent second-order rate constants of the reactions of Fe(VI) with TMP were examined using acid-base properties of Fe(VI) and TMP. The kinetics of reactions of diaminopyrimidine (DAP) and trimethoxytoluene (TMT) with Fe(VI) were also determined to understand the reactivity of Fe(VI) with TMP. Oxidation products of the reactions of Fe(VI) with TMP and DAP were identified by liquid chromatography-tandem mass spectrometry (LC-MS/MS). Reaction pathways of oxidation of TMP by Fe(VI) are proposed to demonstrate the cleavage of the TMP molecule to ultimately result in 3,4,5,-trimethoxybenzaldehyde and 2,4-dinitropyrimidine as among the final identified products. The oxidized products mixture exhibited no antibacterial activity against E. coli after complete consumption of TMP. Removal of TMP in the secondary effluent by Fe(VI) was achieved.

  3. Intrusion detection techniques for plant-wide network in a nuclear power plant

    International Nuclear Information System (INIS)

    Rajasekhar, P.; Shrikhande, S.V.; Biswas, B.B.; Patil, R.K.

    2012-01-01

    Nuclear power plants have a lot of critical data to be sent to the operator workstations. A plant wide integrated communication network, with high throughput, determinism and redundancy, is required between the workstations and the field. Switched Ethernet network is a promising prospect for such an integrated communication network. But for such an integrated system, intrusion is a major issue. Hence the network should have an intrusion detection system to make the network data secure and enhance the network availability. Intrusion detection is the process of monitoring the events occurring in a network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of network security policies, acceptable user policies, or standard security practices. This paper states the various intrusion detection techniques and approaches which are applicable for analysis of a plant wide network. (author)

  4. Social Set Visualizer (SoSeVi) II

    DEFF Research Database (Denmark)

    Flesch, Benjamin; Vatrapu, Ravi

    2016-01-01

    This paper reports the second iteration of the Social Set Visualizer (SoSeVi), a set theoretical visual analytics dashboard of big social data. In order to further demonstrate its usefulness in large-scale visual analytics tasks of individual and collective behavior of actors in social networks......, the current iteration of the Social Set Visualizer (SoSeVi) in version II builds on recent advancements in visualizing set intersections. The development of the SoSeVi dashboard involved cutting-edge open source visual analytics libraries (D3.js) and creation of new visualizations such as of actor mobility...

  5. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    Sulfide intrusion in seagrasses represents a global threat to seagrasses and thereby an important parameter in resilience of seagrass ecosystems. In contrast seegrasses colonize and grow in hostile sediments, where they are constantly exposed to invasion of toxic gaseous sulfide. Remarkably little...... strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis, tracing sulfur compounds combined with ecosystem parameters we found different spatial, intraspecific and interspecific strategies to cope with sulfidic sediments. 1...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  6. Radiological risks due to intrusion into a deep bedrock repository

    International Nuclear Information System (INIS)

    Nordlinder, S.; Bergstroem, U.; Edlund, O.

    1999-01-01

    The Swedish concept for disposal of high-level waste is a deep (500 m) bedrock repository (SFL) protected by multiple barriers that isolate the waste from the environment for such a long time that the physical decay will cause a substantial reduction of the radioactivity. The aim of concentration and isolation of high-level waste is to reduce the radiation risk. Intrusion in the repository may introduce a small residual risk to individuals. A risk analysis was performed comprising dose assessment and probabilities of occurrence. Intrusions may be considered to take place either due to conscious actions or by actions without any knowledge about the repository. For conscious intrusion it may be assumed that there will be enough knowledge to manage the radiation situation in a professional manner. Several reasons for making inadvertent intrusion are possible. Independently of the purpose, the most probable initial way of coming into contact with the radioactive material is by deep drilling. Examples of causes for drilling could be general scientific purposes or exploitation of geothermal energy. Dose assessments were made for intrusion due to inclined drilling directly into a canister, and drilling near an initially malfunctioning canister from which radionuclides have leaked into the groundwater. For the former case, external pathways were considered due to exposure from a core of the canister with fuel and contaminated bore dust. The most common drilling method is with water flushing for removal of bore dust, which will not cause any substantial transfer of radionuclides to air. For the second case, it was assumed that there was a well in the vicinity. The only pathway considered was therefore consumption of water because it dominates the exposure. The highest dose rates to man were, as expected, obtained by drilling into the canister. Dose rates decrease with time after closure. During the first time the relatively short-lived radionuclides Cs-137 and Sr-90 give

  7. Sill intrusion in volcanic calderas: implications for vent opening probability

    Science.gov (United States)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    Calderas show peculiar behaviors with remarkable dynamic processes, which do not often culminate in eruptions. Observations and studies conducted in recent decades have shown that the most common cause of unrest in the calderas is due to magma intrusion; in particular, the intrusion of sills at shallow depths. Monogenic cones, with large areal dispersion, are quite common in the calderas, suggesting that the susceptibility analysis based on geological features, is not strictly suitable for estimating the vent opening probability in calderas. In general, the opening of a new eruptive vent can be regarded as a rock failure process. The stress field in the rocks that surrounds and tops the magmatic reservoirs plays an important role in causing the rock failure and creating the path that magma can follow towards the surface. In this conceptual framework, we approach the problem of getting clues about the probability of vent opening in volcanic calderas through the study of the stress field produced by the intrusion of magma, in particular, by the intrusion of a sill. We simulate the intrusion of a sill free to expand radially, with shape and dimensions which vary with time. The intrusion process is controlled by the elastic response of the rock plate above the sill, which bends because of the intrusion, and by gravity, that drives the magma towards the zones where the thickness of the sill is smaller. We calculated the stress field in the plate rock above the sill. We found that at the bottom of the rock plate above the sill the maximum intensity of tensile stress is concentrated at the front of the sill and spreads radially with it, over time. For this reason, we think that the front of the spreading sill is prone to open for eruptive vents. Even in the central area of the sill the intensity of stress is relatively high, but at the base of the rock plate stress is compressive. Under isothermal conditions, the stress soon reaches its maximum value (time interval

  8. Fremtidens lavenergibyggeri - kan vi gøre som vi plejer?

    DEFF Research Database (Denmark)

    Larsen, Tine Steen

    2011-01-01

    Stramninger af kravene til energiforbruget i vores boliger medfører stor fokus på energiberegningen, men erfaringer fra lavenergiboliger opført i dag viser, at vi, for at sikre succes for fremtidens boliger, også skal inddrage dokumentation af indeklimaet og forbedre samarbejdet mellem arkitekter...

  9. The vapor pressure and enthalpy of vaporization of M-xylene

    Energy Technology Data Exchange (ETDEWEB)

    Rothenberg, S J; Seiler, F A; Bechtold, W E; Eidson, A F

    1988-12-01

    We measured the vapor pressure of m-xylene over the temperature range 273 to 293 deg K with a single-sided capacitance manometer. The enthalpy of vaporization was 42.2 {+-} 0.1 (SE) kj/ g{center_dot}mol. Combining our own data with previously published data, we recommend using the values 42.0, 40.6, and 39.1 ({+-} 0.1) (SE) kjg{center_dot}mol for the enthalpy of vaporization of m-xylene at 300, 340, and 380 deg. K, respectively, and a value for the change in heat capacity on vaporization ({delta}Cpdeg.) of 35 {+-} 3 (SE) J/g{center_dot}mol{center_dot}K over the temperature range studied. (author)

  10. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  11. THE PALEOPROTEROZOIC IMANDRA-VARZUGA RIFTING STRUCTURE (KOLA PENINSULA: INTRUSIVE MAGMATISM AND MINERAGENY

    Directory of Open Access Journals (Sweden)

    V. V. Chashchin

    2014-01-01

    Full Text Available The article provides data on the structure of the Paleoproterozoic intercontinental Imandra-Varzuga rifting structure (IVS and compositions of intrusive formations typical of the early stage of the IVS development and associated mineral resources. IVS is located in the central part of the Kola region. Its length is about 350 km, and its width varies from 10 km at the flanks to 50 km in the central part. IVS contains an association of the sedimentary-volcanic, intrusive and dyke complexes. It is a part of a large igneous Paleoproterozoic province of the Fennoscandian Shield spreading for a huge area (about 1 million km2, which probably reflects the settings of the head part of the mantle plume. Two age groups of layered intrusions were associated with the initial stage of the IVS development. The layered intrusions of the Fedorovo-Pansky and Monchegorsk complexes (about 2.50 Ga are confined to the northern flank and the western closure of IVS, while intrusions of the Imandra complex (about 2.45 Ga are located at the southern flank of IVS. Intrusions of older complexes are composed of rock series from dunite to gabbro and anorthosites (Monchegorsk complex and from orthopyroxenite to gabbro and anorthosites (Fedorovo-Pansky complex. Some intrusions of this complexes reveal features of multiphase ones. The younger Imandra complex intrusions (about 2.45 Ga are stratified from orthopyroxenite to ferrogabbro. Their important feature is comagmatical connection with volcanites. All the intrusive complexes have the boninite-like mantle origin enriched by lithophyle components. Rocks of these two complexеs with different age have specific geochemical characteristics. In the rocks of the Monchegorsk and Fedorovo-Pansky complexes, the accumulation of REE clearly depends on the basicity of the rocks, the spectrum of REE is non-fractionated and ‘flat’, and the Eu positive anomaly is slightly manifested. In the rocks of the Imandra complex, the level of

  12. Facebook intrusion, fear of missing out, narcissism, and life satisfaction: A cross-sectional study.

    Science.gov (United States)

    Błachnio, Agata; Przepiórka, Aneta

    2018-01-01

    Facebook is one of the most popular social networking sites. The present paper examines the relations between fear of missing out, narcissism, Facebook intrusion, and life satisfaction. We hypothesized that the fear of missing out and narcissism would play a significant role in Facebook intrusion. The participants in the study were 360 Polish users of Facebook. We administered the Facebook Intrusion Scale, the Fear of Missing Out Scale, the Narcissistic Personality Inventory, and the Satisfaction with Life Scale. The results showed that a high level of fear of missing out and high narcissism are predictors of Facebook intrusion, while a low level of fear of missing out and high narcissism are related to satisfaction with life. Our findings provide a more comprehensive picture of the predictors of Facebook intrusion and reveal interesting patterns. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. An armored-cable-based fiber Bragg grating sensor array for perimeter fence intrusion detection

    Science.gov (United States)

    Hao, Jianzhong; Dong, Bo; Varghese, Paulose; Phua, Jiliang; Foo, Siang Fook

    2012-01-01

    In this paper, an armored-cable-based optical fiber Bragg grating (FBG) sensor array, for perimeter fence intrusion detection, is demonstrated and some of the field trial results are reported. The field trial was conducted at a critical local installation in Singapore in December 2010. The sensor array was put through a series of both simulated and live intrusion scenarios to test the stability and suitability of operation in the local environmental conditions and to determine its capabilities in detecting and reporting these intrusions accurately to the control station. Such a sensor array can provide perimeter intrusion detection with fine granularity and preset pin-pointing accuracy. The various types of intrusions included aided or unaided climbs, tampering and cutting of the fence, etc. The unique sensor packaging structure provides high sensitivity, crush resistance and protection against rodents. It is also capable of resolving nuisance events such as rain, birds sitting on the fence or seismic vibrations. These sensors are extremely sensitive with a response time of a few seconds. They can be customized for a desired spatial resolution and pre-determined sensitivity. Furthermore, it is easy to cascade a series of such sensors to monitor and detect intrusion events over a long stretch of fence line. Such sensors can be applied to real-time intrusion detection for perimeter security, pipeline security and communications link security.

  14. Chromium(VI) generation in vadose zone soils and alluvial sediments of the southwestern Sacramento Valley, California: A potential source of geogenic Cr(VI) to groundwater

    International Nuclear Information System (INIS)

    Mills, Christopher T.; Morrison, Jean M.; Goldhaber, Martin B.; Ellefsen, Karl J.

    2011-01-01

    Highlights: → Southern Sacramento Valley soil and sediment has abundant naturally-occurring Cr(III). → Cr(III) resides mainly in chromite but some is associated with clays and Fe oxides. → Cr(VI) is mostly absent in surface soil but ubiquitous in deeper soil and sediment. → Cr(VI) increased linearly with time during lab soil incubations with no additions. → Cation exchange processes resulted in greater Cr(VI) generation rates. - Abstract: Concentrations of geogenic Cr(VI) in groundwater that exceed the World Health Organization's maximum contaminant level for drinking water (50 μg L -1 ) occur in several locations globally. The major mechanism for mobilization of this Cr(VI) at these sites is the weathering of Cr(III) from ultramafic rocks and its subsequent oxidation on Mn oxides. This process may be occurring in the southern Sacramento Valley of California where Cr(VI) concentrations in groundwater can approach or exceed 50 μg L -1 . To characterize Cr geochemistry in the area, samples from several soil auger cores (approximately 4 m deep) and drill cores (approximately 25 m deep) were analyzed for total concentrations of 44 major, minor and trace elements, Cr associated with labile Mn and Fe oxides, and Cr(VI). Total concentrations of Cr in these samples ranged from 140 to 2220 mg per kg soil. Between 9 and 70 mg per kg soil was released by selective extractions that target Fe oxides, but essentially no Cr was associated with the abundant reactive Mn oxides (up to ∼1000 mg hydroxylamine-reducible Mn per kg soil was present). Both borehole magnetic susceptibility surveys performed at some of the drill core sites and relative differences between Cr released in a 4-acid digestion versus total Cr (lithium metaborate fusion digestion) suggest that the majority of total Cr in the samples is present in refractory chromite minerals transported from ultramafic exposures in the Coast Range Mountains. Chromium(VI) in the samples studied ranged from 0 to 42

  15. Chromium(VI) generation in vadose zone soils and alluvial sediments of the southwestern Sacramento Valley, California: A potential source of geogenic Cr(VI) to groundwater

    Energy Technology Data Exchange (ETDEWEB)

    Mills, Christopher T., E-mail: cmills@usgs.gov [United States Geological Survey, Crustal Geophysics and Geochemistry Science Center, Denver Federal Center, MS 964D, Denver, CO 80225 (United States); Morrison, Jean M.; Goldhaber, Martin B.; Ellefsen, Karl J. [United States Geological Survey, Crustal Geophysics and Geochemistry Science Center, Denver Federal Center, MS 964D, Denver, CO 80225 (United States)

    2011-08-15

    Highlights: > Southern Sacramento Valley soil and sediment has abundant naturally-occurring Cr(III). > Cr(III) resides mainly in chromite but some is associated with clays and Fe oxides. > Cr(VI) is mostly absent in surface soil but ubiquitous in deeper soil and sediment. > Cr(VI) increased linearly with time during lab soil incubations with no additions. > Cation exchange processes resulted in greater Cr(VI) generation rates. - Abstract: Concentrations of geogenic Cr(VI) in groundwater that exceed the World Health Organization's maximum contaminant level for drinking water (50 {mu}g L{sup -1}) occur in several locations globally. The major mechanism for mobilization of this Cr(VI) at these sites is the weathering of Cr(III) from ultramafic rocks and its subsequent oxidation on Mn oxides. This process may be occurring in the southern Sacramento Valley of California where Cr(VI) concentrations in groundwater can approach or exceed 50 {mu}g L{sup -1}. To characterize Cr geochemistry in the area, samples from several soil auger cores (approximately 4 m deep) and drill cores (approximately 25 m deep) were analyzed for total concentrations of 44 major, minor and trace elements, Cr associated with labile Mn and Fe oxides, and Cr(VI). Total concentrations of Cr in these samples ranged from 140 to 2220 mg per kg soil. Between 9 and 70 mg per kg soil was released by selective extractions that target Fe oxides, but essentially no Cr was associated with the abundant reactive Mn oxides (up to {approx}1000 mg hydroxylamine-reducible Mn per kg soil was present). Both borehole magnetic susceptibility surveys performed at some of the drill core sites and relative differences between Cr released in a 4-acid digestion versus total Cr (lithium metaborate fusion digestion) suggest that the majority of total Cr in the samples is present in refractory chromite minerals transported from ultramafic exposures in the Coast Range Mountains. Chromium(VI) in the samples studied ranged

  16. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments....

  17. Working group 4B - human intrusion: Design/performance requirements

    International Nuclear Information System (INIS)

    Channell, J.

    1993-01-01

    There is no summary of the progress made by working group 4B (Human Intrusion: Design/performance Requirements) during the Electric Power Research Institute's EPRI Workshop on the technical basis of EPA HLW Disposal Criteria, March 1993. This group was to discuss the waste disposal standard, 40 CFR Part 191, in terms of the design and performance requirements of human intrusion. Instead, because there were so few members, they combined with working group 4A and studied the three-tier approach to evaluating postclosure performance

  18. Data mining approach to web application intrusions detection

    Science.gov (United States)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  19. AdaBoost-based algorithm for network intrusion detection.

    Science.gov (United States)

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  20. Mental Imagery and Posttraumatic Stress Disorder: a neuroimaging and experimental psychopathology approach to intrusive memories of trauma

    Directory of Open Access Journals (Sweden)

    Ian A Clark

    2015-07-01

    Full Text Available This hypothesis and theory paper presents a pragmatic framework to help bridge the clinical presentation and neuroscience of intrusive memories following psychological trauma. Intrusive memories are a hallmark symptom of Posttraumatic Stress Disorder. However, key questions, including those involving aetiology remain. In particular, we know little about the brain mechanisms involved in why only some moments of the trauma return as intrusive memories while others do not. We first present an overview of the patient experience of intrusive memories and the neuroimaging studies that have investigated intrusive memories in PTSD patients. Next, one mechanism of how to model intrusive memories in the laboratory, the trauma film paradigm, is examined. In particular, we focus on studies combining the trauma film paradigm with neuroimaging. Stemming from the clinical presentation and our current understanding of the processes involved in intrusive memories, we propose a framework in which an intrusive memory comprises five component parts; autobiographical (trauma memory, involuntary recall, negative emotions, attention hijacking and mental imagery. Each component part is considered in turn, both behaviourally and from a brain imaging perspective. A mapping of these five components onto our understanding of the brain is described. Unanswered questions that exist in our understanding of intrusive memories are considered using the proposed framework. Overall, we suggest that mental imagery is key to bridging the experience, memory and intrusive recollection of the traumatic event. Further, we suggest that by considering the brain mechanisms involved in the component parts of an intrusive memory, in particular mental imagery, we may be able to aid the development of a firmer bridge between patients’ experiences of intrusive memories and the clinical neuroscience behind them.

  1. A 5-year follow-up case of multiple intrusive luxative injuries

    Directory of Open Access Journals (Sweden)

    Seema Thakur

    2012-01-01

    Full Text Available Introduction: Traumatic intrusive luxation is one of the most severe forms of dental injuries, usually affecting the maxillary incisors. The consequence of such an occurrence is a high risk of healing complications such as pulp necrosis, external inflammatory resorption, and external replacement resorption (ankylosis. Case Report: This report presents a case of severe intrusive luxation of multiple anterior teeth in an 11-year-old girl. The teeth were repositioned successfully by endodontic and orthodontic management. The case was monitored for 5 years. Discussion: Depending on the severity of the injury, different clinical approaches for treatment of intrusive luxation may be used. Despite the variety of treatment modalities, rehabilitation of intruded teeth is always a challenge and a multidisciplinary approach is important to achieve a successful result. In this case, intruded teeth were endodontically treated with multiple calcium hydroxide dressings and repositioned orthodontically. The follow-up of such cases is very important as the repair process after intrusion is complex. After 5 years, no clinical or radiographic pathology was detected.

  2. Modelling biological Cr(VI) reduction in aquifer microcosm column systems.

    Science.gov (United States)

    Molokwane, Pulane E; Chirwa, Evans M N

    2013-01-01

    Several chrome processing facilities in South Africa release hexavalent chromium (Cr(VI)) into groundwater resources. Pump-and-treat remediation processes have been implemented at some of the sites but have not been successful in reducing contamination levels. The current study is aimed at developing an environmentally friendly, cost-effective and self-sustained biological method to curb the spread of chromium at the contaminated sites. An indigenous Cr(VI)-reducing mixed culture of bacteria was demonstrated to reduce high levels of Cr(VI) in laboratory samples. The effect of Cr(VI) on the removal rate was evaluated at concentrations up to 400 mg/L. Following the detailed evaluation of fundamental processes for biological Cr(VI) reduction, a predictive model for Cr(VI) breakthrough through aquifer microcosm reactors was developed. The reaction rate in batch followed non-competitive rate kinetics with a Cr(VI) inhibition threshold concentration of approximately 99 mg/L. This study evaluates the application of the kinetic parameters determined in the batch reactors to the continuous flow process. The model developed from advection-reaction rate kinetics in a porous media fitted best the effluent Cr(VI) concentration. The model was also used to elucidate the logistic nature of biomass growth in the reactor systems.

  3. Diverse functions of myosin VI elucidated by an isoform-specific α-helix domain.

    Science.gov (United States)

    Wollscheid, Hans-Peter; Biancospino, Matteo; He, Fahu; Magistrati, Elisa; Molteni, Erika; Lupia, Michela; Soffientini, Paolo; Rottner, Klemens; Cavallaro, Ugo; Pozzoli, Uberto; Mapelli, Marina; Walters, Kylie J; Polo, Simona

    2016-04-01

    Myosin VI functions in endocytosis and cell motility. Alternative splicing of myosin VI mRNA generates two distinct isoform types, myosin VI(short) and myosin VI(long), which differ in the C-terminal region. Their physiological and pathological roles remain unknown. Here we identified an isoform-specific regulatory helix, named the α2-linker, that defines specific conformations and hence determines the target selectivity of human myosin VI. The presence of the α2-linker structurally defines a new clathrin-binding domain that is unique to myosin VI(long) and masks the known RRL interaction motif. This finding is relevant to ovarian cancer, in which alternative myosin VI splicing is aberrantly regulated, and exon skipping dictates cell addiction to myosin VI(short) in tumor-cell migration. The RRL interactor optineurin contributes to this process by selectively binding myosin VI(short). Thus, the α2-linker acts like a molecular switch that assigns myosin VI to distinct endocytic (myosin VI(long)) or migratory (myosin VI(short)) functional roles.

  4. A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing

    DEFF Research Database (Denmark)

    Wang, Yu; Xie, Lin; Li, Wenjuan

    2017-01-01

    Nowadays, cyber threats (e.g., intrusions) are distributed across various networks with the dispersed networking resources. Intrusion detection systems (IDSs) have already become an essential solution to defend against a large amount of attacks. With the development of cloud computing, a modern IDS...

  5. Geochemical characteristics and tectonic setting of the Tuerkubantao mafic-ultramafic intrusion in West Junggar, Xinjiang, China

    Directory of Open Access Journals (Sweden)

    Yufeng Deng

    2015-03-01

    Full Text Available Mineral chemistry, whole-rock major oxide, and trace element compositions have been determined for the Tuerkubantao mafic-ultramafic intrusion, in order to understand the early Paleozoic tectonic evolution of the West Junggar orogenic belt at the southern margin of the Central Asian orogenic belt. The Tuerkubantao mafic-ultramafic intrusion is a well-differentiated complex comprising peridotite, olivine pyroxenite, gabbro, and diorite. The ultramafic rocks are mostly seen in the central part of the intrusion and surrounded by mafic rocks. The Tuerkubantao intrusive rocks are characterized by enrichment of large ion lithophile elements and depleted high field strength elements relative to N-MORB. In addition, the Tuerkubantao intrusion displays relatively low Th/U and Nb/U (1.13–2.98 and 2.53–7.02, respectively and high La/Nb and Ba/Nb (1.15–4.19 and 37.7–79.82, respectively. These features indicate that the primary magma of the intrusion was derived from partial melting of a previously metasomatized mantle source in a subduction setting. The trace element patterns of peridotites, gabbros, and diorite in the Tuerkubantao intrusion have sub-parallel trends, suggesting that the different rock types are related to each other by differentiation of the same primary magma. The intrusive contact between peridotite and gabbro clearly suggest that the Tuerkubantao is not a fragment of an ophiolite. However, the Tuerkubantao intrusion displays many similarities with Alaskan-type mafic-ultramafic intrusions along major sutures of Phanerozoic orogenic belts. Common features include their geodynamic setting, internal lithological zoning, and geochemistry. The striking similarities indicate that the middle Devonian Tuerkubantao intrusion likely formed in a subduction-related setting similar to that of the Alaskan-type intrusions. In combination with the Devonian magmatism and porphyry mineralization, we propose that subduction of the oceanic slab has

  6. The assessment of human intrusion into underground repositories for radioactive waste Volume 1: Main report

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Asthon, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  7. EU-project AEROJET. Non-intrusive measurements of aircraft engine exhaust emissions

    Energy Technology Data Exchange (ETDEWEB)

    Schaefer, K.; Heland, J. [Fraunhofer-Inst. fuer Atmosphaerische Umweltforschung (IFU), Garmisch-Partenkirchen (Germany); Burrows, R. [Rolls-Royce Ltd. (United Kingdom). Engine Support Lab.; Bernard, M. [AUXITROL, S.A. (France). Aerospace Equipment Div.; Bishop, G. [British Aerospace (United Kingdom). Sowerby Research Centre; Lindermeir, E. [Deutsche Forschungsanstalt fuer Luft- und Raumfahrt e. V. (DLR), Bonn (Germany). Inst. fuer Optoelektronik; Lister, D.H. [Defence and Research Agency, Hants (United Kingdom). Propulsion and Development Dept.; Wiesen, P. [Bergische Univ. Wuppertal (Gesamthochshule) (Germany); Hilton, M. [University of Reading (United Kingdom). Dept. of Physics

    1997-12-31

    The main goal of the AEROJET programme is to demonstrate the equivalence of remote measurement techniques to conventional extractive methods for both gaseous and particulate measurements. The different remote measurement techniques are compared and calibrated. A demonstrator measurement system for exhaust gases, temperature and particulates including data-analysis software is regarded as result of this project. Non-intrusive measurements are the method of choice within the AEROJET project promising to avoid the disadvantages of the gas sampling techniques which are currently used. Different ground based non-intrusive measurement methods are demonstrated during a final evaluation phase. Several non-intrusive techniques are compared with conventional gas sampling and analysis techniques. (R.P.) 3 refs.

  8. EU-project AEROJET. Non-intrusive measurements of aircraft engine exhaust emissions

    Energy Technology Data Exchange (ETDEWEB)

    Schaefer, K; Heland, J [Fraunhofer-Inst. fuer Atmosphaerische Umweltforschung (IFU), Garmisch-Partenkirchen (Germany); Burrows, R [Rolls-Royce Ltd. (United Kingdom). Engine Support Lab.; Bernard, M [AUXITROL, S.A. (France). Aerospace Equipment Div.; Bishop, G [British Aerospace (United Kingdom). Sowerby Research Centre; Lindermeir, E [Deutsche Forschungsanstalt fuer Luft- und Raumfahrt e. V. (DLR), Bonn (Germany). Inst. fuer Optoelektronik; Lister, D H [Defence and Research Agency, Hants (United Kingdom). Propulsion and Development Dept.; Wiesen, P [Bergische Univ. Wuppertal (Gesamthochshule) (Germany); Hilton, M [University of Reading (United Kingdom). Dept. of Physics

    1998-12-31

    The main goal of the AEROJET programme is to demonstrate the equivalence of remote measurement techniques to conventional extractive methods for both gaseous and particulate measurements. The different remote measurement techniques are compared and calibrated. A demonstrator measurement system for exhaust gases, temperature and particulates including data-analysis software is regarded as result of this project. Non-intrusive measurements are the method of choice within the AEROJET project promising to avoid the disadvantages of the gas sampling techniques which are currently used. Different ground based non-intrusive measurement methods are demonstrated during a final evaluation phase. Several non-intrusive techniques are compared with conventional gas sampling and analysis techniques. (R.P.) 3 refs.

  9. Data Mining for Intrusion Detection

    Science.gov (United States)

    Singhal, Anoop; Jajodia, Sushil

    Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This chapter discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested.

  10. The reduction of Np(VI) and Pu(VI) by organic chelating agents

    International Nuclear Information System (INIS)

    Reed, D.T.; Aase, S.B.; Banaszak, J.E.

    1998-01-01

    The reduction of NpO 2+ and PuO 2 2+ by oxalate. citrate, and ethylenediaminetetraacetic acid (EDTA) was investigated in low ionic strength media and brines. This was done to help establish the stability of the An(VI) oxidation state in the presence of organic complexants. The stability of the An(VI) oxidation state depended on the pH and relative strength of the various oxidation state-specific complexes. At low ionic strength and pH 6, NpO 2 O 2+ was rapidly reduced to form NpO 2 + organic complexes. At longer times, Np(IV) organic complexes were observed in the presence of citrate. PuO 2 2+ was predominantly reduced to Pu 4+ , resulting in the formation of organic complexes or polymeric/hydrolytic precipitates. The relative rates of reduction to the An(V) complex were EDTA > citrate > oxalate. Subsequent reduction to An(IV) complexes, however, occurred in the following order: citrate > EDTA > oxalate because of the stability of the An(V)-EDTA complex. The presence of organic complexants led to the rapid reduction of NpO 2 2+ and PuO 2 P 2+ in G-seep brine at pHs 5 and 7. At pHs 8 and 10 in ERDA-6 brine, carbonate and hydrolytic complexes predominated and slowed down or prevented the reduction of An(VI) by the organics present

  11. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  12. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.

    Science.gov (United States)

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  13. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  14. Illness intrusiveness among survivors of autologous blood and marrow transplantation.

    Science.gov (United States)

    Schimmer, A D; Elliott, M E; Abbey, S E; Raiz, L; Keating, A; Beanlands, H J; McCay, E; Messner, H A; Lipton, J H; Devins, G M

    2001-12-15

    Illness-induced disruptions to lifestyles, activities, and interests (i.e., illness intrusiveness) compromise subjective well-being. The authors measured illness intrusiveness in autologous blood and bone marrow transplantation (ABMT) survivors and compared the results with survivors of solid organ transplants. Forty-four of 64 consecutive ABMT survivors referred to the University of Toronto ABMT long-term follow-up clinic completed the Illness Intrusiveness Ratings Scale (IIRS), the Affect Balance Scale (ABS), the Atkinson Life Happiness Rating (ATKLH), the Beck Hopelessness Scale (BHS), and the Center for Epidemiologic Studies Depression (CES-D) Scale. Mean time from ABMT to evaluation was 4.6 +/- 2.8 years. All patients were in remission or had stable disease at the time of evaluation. Autologous blood and bone marrow transplantation patients' IIRS scores were compared with scores reported by recipients of kidney (n = 357), liver (n = 150), lung (n = 77), and heart (n = 60) transplants. Mean IIRS score for the 44 ABMT patients was 37.2 +/- 17 (maximum possible score, 91; minimum possible score, 13). Higher IIRS scores correlated with lower scores on the ABS (r = -0.54; P work, financial situation, and active recreation. Despite achieving a remission after ABMT, patients continue to experience illness intrusiveness compromising subjective well-being. Copyright 2001 American Cancer Society.

  15. Strontium isotopic geochemistry of intrusive rocks, Puerto Rico, Greater Antilles

    International Nuclear Information System (INIS)

    Jones, L.M.; Kesler, S.E.

    1980-01-01

    The strontium isotope geochemistry is given for three Puerto Rican intrusive rocks: the granodioritic Morovis and San Lorenzo plutons and the Rio Blanco stock of quartz dioritic composition. The average calculated initial 87 Sr/ 86 Sr ratios are 0.70370, 0.70355 and 0.70408, respectively. In addition, the San Lorenzo data establish a whole-rock isochron of 71 +- 2 m.y., which agrees with the previously reported K-Ar age of 73 m.y. Similarity of most of the intrusive rocks in the Greater Antilles with respect to their strontium isotopic geochemistry regardless of their major element composition indicates that intrusive magmas with a wide range of composition can be derived from a single source material. The most likely source material, in view of the available isotopic data, is the mantle wedge overlying the subduction zone. (orig.)

  16. Contribution to the study of the redox couple Np(VI)/Np(V) in the presence of uranium(VI) in solutions of nitric acid and nitrous acid; Contribution a l'etude du comportement redox du couple Np(VI)/Np(V) en presence d'uranium VI dans les solutions constituees d'acide nitrique et d'acide nitreux

    Energy Technology Data Exchange (ETDEWEB)

    Arpigny, S. [CEA Marcoule, Dept. de Radiochimie et Procedes, DRP, 30 (France)

    2001-07-01

    The redox behavior of the Np(VI)/Np(V) couple was the subject of a spectrometric study of the Np(VI) reduction reaction in nitric acid solutions (4 to 5 M) containing variable concentrations (1.5 to 3.5 x 10{sup -3} M) of nitrous acid. A low nitrous acid concentration and a high nitric acid concentration were found to favor the stabilization of Np(VI). The stoichiometric coefficients of nitrous acid and nitric acid in the Np(VI) reduction reaction were determined thermodynamically, although only the reaction order with respect to HNO{sub 2} could be calculated from a kinetic analysis. Adding nitrate ions to a HNO{sub 3}/HNO{sub 2} solution enhanced the stability of neptunium at oxidation state +VI, but also increased the reduction rate. When uranium(VI) was added to the HNO{sub 3}/HNO{sub 2} solutions, the total quantity of neptunium at oxidation state +V (either free or as a Np(V)-U(VI) complex) remained practically unchanged, as did the Np(VI) reduction rate. The electrochemical behavior of the Np(VI)/Np(V) couple was investigated in a weak acidic medium by voltammetry with an ultra-micro-electrode (UME). The oxidation wave limiting current variation was a linear function of the Np(V) concentration when a gold UME was used, but not with a platinum UME; the reduction wave limiting current variation versus the Np(V) concentration was linear with either gold or platinum UMEs. The presence of the Np(V)-U(VI) complex in the neptunium solutions was characterized by a shift in the normal apparent potential of the Np(VI)/Np(V) couple toward anodic potentials consistent with the previously determined values of the complexation constants. (author)

  17. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  18. Lower crustal intrusions beneath the southern Baikal Rift Zone

    DEFF Research Database (Denmark)

    Nielsen, Christoffer; Thybo, Hans

    2009-01-01

    centre. The BEST (Baikal Explosion Seismic Transect) project acquired a 360-km long, deep seismic, refraction/wide-angle reflection profile in 2002 across southern Lake Baikal. The data from this project is used for identification of large-scale crustal structures and modelling of the seismic velocities....../s and 7.9 km/s. We interpret this feature as resulting from mafic to ultra-mafic intrusions in the form of sills. Petrological interpretation of the velocity values suggests that the intrusions are sorted by fractional crystallization into plagioclase-rich low-velocity layers and pyroxene- and olivine...

  19. Individual differences in spatial configuration learning predict the occurrence of intrusive memories.

    Science.gov (United States)

    Meyer, Thomas; Smeets, Tom; Giesbrecht, Timo; Quaedflieg, Conny W E M; Girardelli, Marta M; Mackay, Georgina R N; Merckelbach, Harald

    2013-03-01

    The dual-representation model of posttraumatic stress disorder (PTSD; Brewin, Gregory, Lipton, & Burgess, Psychological Review, 117, 210-232 2010) argues that intrusions occur when people fail to construct context-based representations during adverse experiences. The present study tested a specific prediction flowing from this model. In particular, we investigated whether the efficiency of temporal-lobe-based spatial configuration learning would account for individual differences in intrusive experiences and physiological reactivity in the laboratory. Participants (N = 82) completed the contextual cuing paradigm, which assesses spatial configuration learning that is believed to depend on associative encoding in the parahippocampus. They were then shown a trauma film. Afterward, startle responses were quantified during presentation of trauma reminder pictures versus unrelated neutral and emotional pictures. PTSD symptoms were recorded in the week following participation. Better configuration learning performance was associated with fewer perceptual intrusions, r = -.33, p .46) and had no direct effect on intrusion-related distress and overall PTSD symptoms, rs > -.12, ps > .29. However, configuration learning performance tended to be associated with reduced physiological responses to unrelated negative images, r = -.20, p = .07. Thus, while spatial configuration learning appears to be unrelated to affective responding to trauma reminders, our overall findings support the idea that the context-based memory system helps to reduce intrusions.

  20. Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

    OpenAIRE

    Jingyu Wang; xuefeng Zheng; Dengliang Luo

    2011-01-01

    Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources and reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. In order to address the problem of intrusion tolerance of cloud computing platform and sensitive data in...

  1. Formation of thick stratiform Fe-Ti oxide layers in layered intrusion and frequent replenishment of fractionated mafic magma: Evidence from the Panzhihua intrusion, SW China

    Science.gov (United States)

    Song, Xie-Yan; Qi, Hua-Wen; Hu, Rui-Zhong; Chen, Lie-Meng; Yu, Song-Yue; Zhang, Jia-Fei

    2013-03-01

    Panzhihua intrusion is one of the largest layered intrusions that hosts huge stratiform Fe-Ti oxide layers in the central part of the Emeishan large igneous province, SW China. Up to 60 m thick stratiform massive Fe-Ti oxide layers containing 85 modal% of magnetite and ilmenite and overlying magnetite gabbro compose cyclic units of the Lower Zone of the intrusion. The cyclic units of the Middle Zone consist of magnetite gabbro and overlying gabbro. In these cyclic units, contents of Fe2O3(t), TiO2 and Cr and Fe3+/Ti4+ ratio of the rocks decrease upward, Cr content of magnetite and forsterite percentage of olivine decrease as well. The Upper Zone consists of apatite gabbro characterized by enrichment of incompatible elements (e.g., 12-18 ppm La, 20-28 ppm Y) and increasing of Fe3+/Ti4+ ratio (from 1.3 to 2.3) upward. These features indicate that the Panzhihua intrusion was repeatedly recharged by more primitive magma and evolved magmas had been extracted. Calculations using MELTS indicate that extensive fractionation of olivine and clinopyroxene in deep level resulted in increasing Fe and Ti contents in the magma. When these Fe-Ti-enriched magmas were emplaced along the base of the Panzhihua intrusion, Fe-Ti oxides became an early crystallization phase, leading to a residual magma of lower density. We propose that the unusually thick stratiform Fe-Ti oxide layers resulted from coupling of gravity settling and sorting of the crystallized Fe-Ti oxides from Fe-Ti-enriched magmas and frequent magma replenishment along the floor of the magma chamber.

  2. Chromium(VI) generation in vadose zone soils and alluvial sediments of the southwestern Sacramento Valley, California: a potential source of geogenic Cr(VI) to groundwater

    Science.gov (United States)

    Mills, Christopher T.; Morrison, Jean M.; Goldhaber, Martin B.; Ellefsen, Karl J.

    2011-01-01

    Concentrations of geogenic Cr(VI) in groundwater that exceed the World Health Organization’s maximum contaminant level for drinking water (50 μg L−1) occur in several locations globally. The major mechanism for mobilization of this Cr(VI) at these sites is the weathering of Cr(III) from ultramafic rocks and its subsequent oxidation on Mn oxides. This process may be occurring in the southern Sacramento Valley of California where Cr(VI) concentrations in groundwater can approach or exceed 50 μg L−1. To characterize Cr geochemistry in the area, samples from several soil auger cores (approximately 4 m deep) and drill cores (approximately 25 m deep) were analyzed for total concentrations of 44 major, minor and trace elements, Cr associated with labile Mn and Fe oxides, and Cr(VI). Total concentrations of Cr in these samples ranged from 140 to 2220 mg per kg soil. Between 9 and 70 mg per kg soil was released by selective extractions that target Fe oxides, but essentially no Cr was associated with the abundant reactive Mn oxides (up to ~1000 mg hydroxylamine-reducible Mn per kg soil was present). Both borehole magnetic susceptibility surveys performed at some of the drill core sites and relative differences between Cr released in a 4-acid digestion versus total Cr (lithium metaborate fusion digestion) suggest that the majority of total Cr in the samples is present in refractory chromite minerals transported from ultramafic exposures in the Coast Range Mountains. Chromium(VI) in the samples studied ranged from 0 to 42 μg kg−1, representing a minute fraction of total Cr. Chromium(VI) content was typically below detection in surface soils (top 10 cm) where soil organic matter was high, and increased with increasing depth in the soil auger cores as organic matter decreased. Maximum concentrations of Cr(VI) were up to 3 times greater in the deeper drill core samples than the shallow auger cores. Although Cr(VI) in these vadose zone soils and sediments was only a

  3. Intrusive Images in Psychological Disorders

    Science.gov (United States)

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  4. Vi behøver innovation

    DEFF Research Database (Denmark)

    McAloone, Tim C.

    2007-01-01

    -Produktion og Maskiner. Innovation og bæredygtighed er to områder som vi i Skandinavien giver meget stor opmærksomhed for at kunne vedligeholde vores globale konkurrencekraft og stærke velfærdssamfund. Gennem årene har mange brancher bidraget til skabelsen af vidensbaserede innovationer, og det faktum, at de......Analyse: Vi behøver innovation En ny miljøbølge ruller, og danske virksomheder bør ride med Af Tim McAloone, fredag 02. feb 2007 kl. 04:50 Tim McAloone Lektor og ph.d. ved Institut for mekanik, energi og konstruktion ved DTU. Tim McAloone skriver fremover jævnligt kommentarer i Ingeniøren...... skandinaviske lande er relativt små, har ledt til en interessant evne til at etablere og derefter samarbejde inden for tætte netværk, som strækker sig over både faglige og geografiske grænser. Samtidig har vi set miljøhensyn vinde og tabe samfundsmæssig og industriel opmærksomhed på en nærmest periodisk basis...

  5. Thermodynamic analysis of Cr(VI) extraction using TOPO impregnated membranes

    Energy Technology Data Exchange (ETDEWEB)

    Praveen, Prashant; Loh, Kai-Chee, E-mail: chelohkc@nus.edu.sg

    2016-08-15

    Highlights: • Cr(VI) extraction by extractant impregnated membranes (EIM) was investigated. • EIM exhibited high extraction efficiency, mass transfer rate and stability. • Mass transfer mechanism was proposed based on kinetics and equilibrium data. • Uptake of Cr(VI) by EIMs was endothermic and spontaneous. • Cr(VI) extraction by EIMs was dominated by physical interactions. - Abstract: Solid/liquid extraction of Cr(VI) was accomplished using trioctylphosphine oxide impregnated polypropylene hollow fiber membranes. Extraction of 100–500 mg/L Cr(VI) by the extractant impregnated membranes (EIM) was characterized by high uptake rate and capacity, and equilibrium was attained within 45 min of contact. Extraction equilibrium was pH-dependent (at an optimal pH 2), whereas stripping using 0.2 M sodium hydroxide yielded the highest recovery of 98% within 60 min. The distribution coefficient was independent of initial Cr(VI) concentration, and the linear distribution equilibrium isotherm could be modeled using Freundlich isotherm. The mass transfer kinetics of Cr(VI) was examined using pseudo-second-order and intraparticle diffusion models and a mass transfer mechanism was deduced. The distribution coefficient increased with temperature, which indicated endothermic nature of the reaction. Enthalpy and entropy change during Cr(VI) extraction were positive and varied in the range of 37–49 kJ/mol and 114–155 J/mol, respectively. The free energy change was negative, confirming the feasibility and spontaneity of the mass transfer process. Results obtained suggest that EIMs are efficient and sustainable for extraction of Cr(VI) from wastewater.

  6. High temperature measurement of water vapor absorption

    Science.gov (United States)

    Keefer, Dennis; Lewis, J. W. L.; Eskridge, Richard

    1985-01-01

    An investigation was undertaken to measure the absorption coefficient, at a wavelength of 10.6 microns, for mixtures of water vapor and a diluent gas at high temperature and pressure. The experimental concept was to create the desired conditions of temperature and pressure in a laser absorption wave, similar to that which would be created in a laser propulsion system. A simplified numerical model was developed to predict the characteristics of the absorption wave and to estimate the laser intensity threshold for initiation. A non-intrusive method for temperature measurement utilizing optical laser-beam deflection (OLD) and optical spark breakdown produced by an excimer laser, was thoroughly investigated and found suitable for the non-equilibrium conditions expected in the wave. Experiments were performed to verify the temperature measurement technique, to screen possible materials for surface initiation of the laser absorption wave and to attempt to initiate an absorption wave using the 1.5 kW carbon dioxide laser. The OLD technique was proven for air and for argon, but spark breakdown could not be produced in helium. It was not possible to initiate a laser absorption wave in mixtures of water and helium or water and argon using the 1.5 kW laser, a result which was consistent with the model prediction.

  7. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    International Nuclear Information System (INIS)

    P. Bernot

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  8. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  9. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  10. Enthalpy of vaporization and vapor pressure of whiskey lactone and menthalactone by correlation gas chromatography

    International Nuclear Information System (INIS)

    Simmons, Daniel; Chickos, James

    2017-01-01

    Highlights: • The vapor pressure and vaporization enthalpies of cis and trans-whiskey lactone have been evaluated. • Enthalpies of vaporization and vapor pressures of (+)-isomintlactone and (−)-mintlactone were also evaluated. • The sublimation enthalpy and corresponding vapor pressure of (+) -isomintlactone at T = 298.15 K is estimated. - Abstract: Enthalpies of vaporization at T = 298.15 K of cis and trans-whiskey lactone have been evaluated by correlation gas chromatography to be (68.4 ± 1.7) kJ·mol −1 and (67.5 ± 1.7) kJ·mol −1 , respectively. The enthalpies of vaporization of isomintlactone and mintlactone also evaluated by correlation gas chromatography have been found to have vaporization enthalpies of (74.2 ± 1.8) kJ·mol −1 and (73.2 ± 1.8) kJ·mol −1 respectively. The vapor pressures for cis and trans-whiskey lactone at T = 298.15 K have been evaluated as (1.5 ± 0.09) Pa and (2.0 ± 0.1) Pa using vapor pressures of a series of lactones as standards. Vapor pressures for isomintlactone and mintlactone were evaluated as (0.26 ± 0.012) Pa and (0.33 ± 0.02) Pa, respectively. Fusion and sublimation enthalpies for (+)-isomintlactone as well as the vapor pressure of the solid have been estimated.

  11. Influence of Calcium on Microbial Reduction of Solid Phase Uranium (VI)

    International Nuclear Information System (INIS)

    Liu, Chongxuan; Jeon, Byong-Hun; Zachara, John M.; Wang, Zheming

    2007-01-01

    The effect of calcium on microbial reduction of a solid phase U(VI), sodium boltwoodite (NaUO2SiO3OH · 1.5H2O), was evaluated in a culture of a dissimilatory metal-reducing bacterium (DMRB), Shewanella oneidensis strain MR-1. Batch experiments were performed in a non-growth bicarbonate medium with lactate as electron donor at pH 7 buffered with PIPES. Calcium increased both the rate and extent of Na-boltwoodite dissolution by increasing its solubility through the formation of a ternary aqueous calcium-uranyl-carbonate species. The ternary species, however, decreased the rates of microbial reduction of aqueous U(VI). Laser-induced fluorescence spectroscopy (LIFS) and transmission electron microscopy (TEM) revealed that microbial reduction of solid phase U(VI) is a sequentially coupled process of Na-boltwoodite dissolution, U(VI) aqueous speciation, and microbial reduction of dissolved U(VI) to U(IV) that accumulated on bacterial surfaces/periplasm. The overall rates of microbial reduction of solid phase U(VI) can be described by the coupled rates of dissolution and microbial reduction that were both influenced by calcium. The results demonstrated that dissolved U(VI) concentration during microbial reduction was a complex function of solid phase U(VI) dissolution kinetics, aqueous U(VI) speciation, and microbial activity

  12. A simple Cr(VI)–S(IV)–O{sub 2} system for rapid and simultaneous reduction of Cr(VI) and oxidative degradation of organic pollutants

    Energy Technology Data Exchange (ETDEWEB)

    Yuan, Yanan; Yang, Shaojie [Department of Environmental Science, Hubei Key Lab of Biomass Resource Chemistry and Environmental Biotechnology, School of Resources and Environmental Science, Wuhan University, 430079 (China); Zhou, Danna, E-mail: zdncug@163.com [Faculty of Material Science and Chemistry, China University of Geosciences, Wuhan 430074 (China); Wu, Feng [Department of Environmental Science, Hubei Key Lab of Biomass Resource Chemistry and Environmental Biotechnology, School of Resources and Environmental Science, Wuhan University, 430079 (China)

    2016-04-15

    Highlights: • Rapid and simultaneous reduction of Cr(VI) and degradation of organic pollutants occur. • Oxysulfur radicals generated in Cr(VI)–S(IV)–O{sub 2} system oxidize the organic pollutants. • Acidic pH facilitates the reactions from both directions of reduction and oxidation. • Degradation potential of aromatic amines depends on the substituted groups. • Cr(VI)–S(IV)–O{sub 2} system is promising for “waste control by waste”. - Abstract: Hexavalent chromium (Cr(VI)), a heavy-metal contaminant, can be easily reduced to less toxic trivalent chromium (Cr(III)) by sulfite ions (S(IV)). However, S(IV) has not drawn as much attention as the ferrous ion has. We report herein a novel Cr(VI)–S(IV)–O{sub 2} system containing sulfite ions that rapidly and simultaneously reduces Cr(VI) and oxidize organic pollutants in the presence of oxygen in aqueous solutions. This Cr(VI)–S(IV)-O{sub 2} system contains the initiator Cr(VI), the reductant S(IV), and the oxidant O{sub 2}, which produce oxysulfur radicals (mainly SO{sub 4}·{sup −} and SO{sub 5}·{sup −}) and hydroxyl radicals (OH·). The Cr(VI)/S(IV) molar ratio, pH, and oxygen content play important roles in the entire reaction system. Acidic conditions (pH 3.0) facilitated degradation of organic compounds and reduction of Cr(VI) as well. In addition, experiments of rapid degradation of several kinds of organic pollutants such as azo dye (acid orange 7, AO7), aniline, phenol, bisphenol A etc were also conducted. Preliminary results show that the removal rates of the analogs of phenols or aromatic amines in this Cr(VI)–S(IV)–O{sub 2} system have a relationship with the electronic parameters (Hammett constant, σ) of the substituted groups. Thus, the Cr(VI)–S(IV)–O{sub 2} system, provides an excellent strategy of “waste control by waste” for removing multiple industrial contaminants.

  13. Fracturing of doleritic intrusions and associated contact zones: Implications for fluid flow in volcanic basins

    Science.gov (United States)

    Senger, Kim; Buckley, Simon J.; Chevallier, Luc; Fagereng, Åke; Galland, Olivier; Kurz, Tobias H.; Ogata, Kei; Planke, Sverre; Tveranger, Jan

    2015-02-01

    Igneous intrusions act as both carriers and barriers to subsurface fluid flow and are therefore expected to significantly influence the distribution and migration of groundwater and hydrocarbons in volcanic basins. Given the low matrix permeability of igneous rocks, the effective permeability in- and around intrusions is intimately linked to the characteristics of their associated fracture networks. Natural fracturing is caused by numerous processes including magma cooling, thermal contraction, magma emplacement and mechanical disturbance of the host rock. Fracturing may be locally enhanced along intrusion-host rock interfaces, at dyke-sill junctions, or at the base of curving sills, thereby potentially enhancing permeability associated with these features. In order to improve our understanding of fractures associated with intrusive bodies emplaced in sedimentary host rocks, we have investigated a series of outcrops from the Karoo Basin of the Eastern Cape province of South Africa, where the siliciclastic Burgersdorp Formation has been intruded by various intrusions (thin dykes, mid-sized sheet intrusions and thick sills) belonging to the Karoo dolerite. We present a quantified analysis of fracturing in- and around these igneous intrusions based on five outcrops at three individual study sites, utilizing a combination of field data, high-resolution lidar virtual outcrop models and image processing. Our results show a significant difference between the three sites in terms of fracture orientation. The observed differences can be attributed to contrasting intrusion geometries, outcrop geometry (for lidar data) and tectonic setting. Two main fracture sets were identified in the dolerite at two of the sites, oriented parallel and perpendicular to the contact respectively. Fracture spacing was consistent between the three sites, and exhibits a higher degree of variation in the dolerites compared to the host rock. At one of the study sites, fracture frequency in the

  14. Intrusive Images in Psychological Disorders

    OpenAIRE

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in th...

  15. 77 FR 64399 - Order of Succession for HUD Region VI

    Science.gov (United States)

    2012-10-19

    ... Region VI AGENCY: Office of Field Policy and Management, HUD. ACTION: Notice of Order of Succession... its Field Offices (Region VI). This Order of Succession supersedes all previous Orders of Succession for HUD Region VI. DATES: Effective Date: October 9, 2012. FOR FURTHER INFORMATION CONTACT: Lawrence D...

  16. Extraction behavior of uranium(VI) with polyurethane foam

    International Nuclear Information System (INIS)

    Tingchia Huang; Donghwang Chen; Muchang Shieh; Chingtsven Huang

    1992-01-01

    The extraction of uranium(VI) from aqueous solution with polyether-based polyurethane (PU) foam was studied. The effects of the kinds and concentrations of nitrate salts, uranium(VI) concentration, temperature, nitric acid concentration, pH, the content of poly(ethylene oxide) in the polyurethane foam, and the ratio of PU foam weight and solution volume on the extraction of uranium(VI) were investigated. The interferences of fluoride and carbonate ions on the extraction of uranium(VI) were also examined, and methods to overcome both interferences were suggested. It was found that no uranium was extracted in the absence of a nitrate salting-out agent, and the extraction behaviors of uranium(IV) with polyurethane foam could be explained in terms of an etherlike solvent extraction mechanism. In addition, the percentage extraction of a multiple stage was also estimated theoretically

  17. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    Science.gov (United States)

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation

    Directory of Open Access Journals (Sweden)

    Basant Subba

    2016-06-01

    Full Text Available Present Intrusion Detection Systems (IDSs for MANETs require continuous monitoring which leads to rapid depletion of a node's battery life. To address this issue, we propose a new IDS scheme comprising a novel cluster leader election process and a hybrid IDS. The cluster leader election process uses the Vickrey–Clarke–Groves mechanism to elect the cluster leader which provides the intrusion detection service. The hybrid IDS comprises a threshold based lightweight module and a powerful anomaly based heavyweight module. Initially, only the lightweight module is activated. The decision to activate the heavyweight module is taken by modeling the intrusion detection process as an incomplete information non-cooperative game between the elected leader node and the potential malicious node. Simulation results show that the proposed scheme significantly reduces the IDS traffic and overall power consumption in addition to maintaining a high detection rate and accuracy.

  19. Experiences of marijuana-vaporizer users.

    Science.gov (United States)

    Malouff, John M; Rooke, Sally E; Copeland, Jan

    2014-01-01

    Using a marijuana vaporizer may have potential harm-reduction advantages on smoking marijuana, in that the user does not inhale smoke. Little research has been published on use of vaporizers. In the first study of individuals using a vaporizer on their own initiative, 96 adults anonymously answered questions about their experiences with a vaporizer and their use of marijuana with tobacco. Users identified 4 advantages to using a vaporizer over smoking marijuana: perceived health benefits, better taste, no smoke smell, and more effect from the same amount of marijuana. Users identified 2 disadvantages: inconvenience of setup and cleaning and the time it takes to get the device operating for each use. Only 2 individuals combined tobacco in the vaporizer mix, whereas 15 combined tobacco with marijuana when they smoked marijuana. Almost all participants intended to continue using a vaporizer. Vaporizers seem to have appeal to marijuana users, who perceive them as having harm-reduction and other benefits. Vaporizers are worthy of experimental research evaluating health-related effects of using them.

  20. Effective use of surface-water management to control saltwater intrusion

    Science.gov (United States)

    Hughes, J. D.; White, J.

    2012-12-01

    The Biscayne aquifer in southeast Florida is susceptible to saltwater intrusion and inundation from rising sea-level as a result of high groundwater withdrawal rates and low topographic relief. Groundwater levels in the Biscayne aquifer are managed by an extensive canal system that is designed to control flooding, supply recharge to municipal well fields, and control saltwater intrusion. We present results from an integrated surface-water/groundwater model of a portion of the Biscayne aquifer to evaluate the ability of the existing managed surface-water control network to control saltwater intrusion. Surface-water stage and flow are simulated using a hydrodynamic model that solves the diffusive-wave approximation of the depth-integrated shallow surface-water equations. Variable-density groundwater flow and fluid density are solved using the Oberbeck--Boussinesq approximation of the three-dimensional variable-density groundwater flow equation and a sharp interface approximation, respectively. The surface-water and variable-density groundwater domains are implicitly coupled during each Picard iteration. The Biscayne aquifer is discretized into a multi-layer model having a 500-m square horizontal grid spacing. All primary and secondary surface-water features in the active model domain are discretized into segments using the 500-m square horizontal grid. A 15-year period of time is simulated and the model includes 66 operable surface-water control structures, 127 municipal production wells, and spatially-distributed daily internal and external hydrologic stresses. Numerical results indicate that the existing surface-water system can be effectively used in many locations to control saltwater intrusion in the Biscayne aquifer resulting from increases in groundwater withdrawals or sea-level rise expected to occur over the next 25 years. In other locations, numerical results indicate surface-water control structures and/or operations may need to be modified to control

  1. Vi-CRM 197 as a new conjugate vaccine against Salmonella Typhi.

    Science.gov (United States)

    Micoli, F; Rondini, S; Pisoni, I; Proietti, D; Berti, F; Costantino, P; Rappuoli, R; Szu, S; Saul, A; Martin, L B

    2011-01-17

    An efficacious, low cost vaccine against typhoid fever, especially for young children, would make a major impact on disease burden in developing countries. The virulence capsular polysaccharide of Salmonella Typhi (Vi) coupled to recombinant mutant Pseudomonas aeruginosa exoprotein A (Vi-rEPA) has been shown to be highly efficacious. We investigated the use of carrier proteins included in infant vaccines, standardized the conjugation process and developed key assays required for routine lot release at production scale. Vi from a BSL1 organism, Citrobacter freundii, strain WR7011, was used as an alternative to Vi from S. Typhi. We showed that Vi conjugated to CRM(197), a non-toxic mutant of diphtheria toxin, widely used in commercial vaccines, was produced at high yield. Vi-CRM(197) proved immunogenic in animal studies, even without adjuvant. Thus, Vi-CRM(197) appears to be a suitable candidate for the development of a commercially viable, effective typhoid vaccine for developing countries. Copyright © 2010 Elsevier Ltd. All rights reserved.

  2. The adsorption ability of Cr(VI) on sawdust–polyaniline nanocomposite

    International Nuclear Information System (INIS)

    Binh Phan, Thi; Que Do, Ngoc; Thanh Thuy Mai, Thi

    2010-01-01

    The results of this study of sawdust–polyaniline nanocomposite synthesized by a chemical method for Cr(VI) treatment in the environment are presented. Cr(VI) adsorption on a composite was determined by colorimetry. The results showed that sawdust–polyaniline composite synthesized with an aniline:sawdust ratio equal to 0.5 had an adsorption degree of 21.4 mg g −1 and adsorbed nearly 99% of the Cr(VI) after 2 h. The composite could be used for the adsorption of Cr(VI) from waste water. The Cr(VI) adsorption ability of the composite slightly depends on the pH value of the medium. The adsorption is fast during the first half hour and then the rate decreases

  3. Testing of ENDF/B-VI data for shielding applications

    International Nuclear Information System (INIS)

    Ingersoll, D.T.

    1995-01-01

    Version VI of the U.S. Evaluated Nuclear Data File (END/B-VI) was released for open distribution in 1990 after an extensive multiyear, multilaboratory evaluation effort coordinated by the Cross Section Evaluation Working Group (CSEWG). More than 75 of the 320 evaluations contained in the library are new for Version VI, including many relatively important nuclides and many with substantial changes to the cross-section data. Also, several important changes were made to the basic data formats for Version VI to permit better representation of the data and to allow additional types of data. Although these format changes yielded improved evaluations, they hindered processing of the data for use in applications codes and delayed the timely integral testing of the data. It has been only during the past year that significant integral testing of END/B-VI data has been achieved. The results and conclusions from some of these efforts are summarized in the following paragraphs

  4. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring.

    Science.gov (United States)

    Alcalá, José M; Ureña, Jesús; Hernández, Álvaro; Gualda, David

    2017-02-11

    The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN) are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs), which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN) prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM), is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people' demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented.

  5. A Simulation-Optimization Model for Seawater Intrusion Management at Pingtung Coastal Area, Taiwan

    Directory of Open Access Journals (Sweden)

    Po-Syun Huang

    2018-02-01

    Full Text Available The coastal regions of Pingtung Plain in southern Taiwan rely on groundwater as their main source of fresh water for aquaculture, agriculture, domestic, and industrial sectors. The availability of fresh groundwater is threatened by unsustainable groundwater extraction and the over-pumpage leads to the serious problem of seawater intrusion. It is desired to find appropriate management strategies to control groundwater salinity and mitigate seawater intrusion. In this study, a simulation–optimization model has been presented to solve the problem of seawater intrusion along the coastal aquifers in Pingtung Plain and the objective is using injection well barriers and minimizing the total injection rate based on the pre-determined locations of injection barriers. The SEAWAT code is used to simulate the process of seawater intrusion and the surrogate model of artificial neural networks (ANNs is used to approximate the seawater intrusion (SWI numerical model to increase the computational efficiency during the optimization process. The heuristic optimization scheme of differential evolution (DE algorithm is selected to identify the global optimal management solution. Two different management scenarios, one is the injection barriers located along the coast and the other is the injection barrier located at the inland, are considered and the optimized results show that the deployment of injection barriers at the inland is more effective to reduce total dissolved solids (TDS concentrations and mitigate seawater intrusion than that along the coast. The computational time can be reduced by more than 98% when using ANNs to replace the numerical model and the DE algorithm has been confirmed as a robust optimization scheme to solve groundwater management problems. The proposed framework can identify the most reliable management strategies and provide a reference tool for decision making with regard to seawater intrusion remediation.

  6. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  7. Photoreduction of chromium(VI) in the presence of algae, Chlorella vulgaris

    International Nuclear Information System (INIS)

    Deng Lin; Wang Hongli; Deng Nansheng

    2006-01-01

    In this thesis, the photochemical reduction of hexavalent chromium Cr(VI) in the presence of algae, Chlorella vulgaris, was investigated under the irradiation of metal halide lamps (λ=365nm, 250W). The affecting factors of photochemical reduction were studied in detail, such as exposure time, initial Cr(VI) concentration, initial algae concentration and pH. The rate of Cr(VI) photochemical reduction increased with algae concentration increasing, exposure time increasing, initial Cr(VI) concentration decreasing and the decrease of pH. When pH increased to 6, the rate of Cr(VI) photochemical reduction nearly vanished. When initial Cr(VI) concentration ranged from 0.4 to 1.0mgL -1 and initial algae concentration ranged from ABS algae (the absorbency of algae)=0.025 to ABS algae =0.180, According to the results of kinetic analyses, the kinetic equation of Cr(VI) photochemical reduction in aqueous solution with algae under 250W metal halide lamps was V 0 =kC 0 0.1718 A algae 0.5235 (C 0 was initial concentration of Cr(VI); A algae was initial concentration of algae) under the condition of pH 4

  8. Respon Konsumen pada Mobile Advergames: Intrusiveness dan Irritation

    Directory of Open Access Journals (Sweden)

    Sony Kusumasondjaja

    2016-12-01

    Full Text Available Abstract. Increasing adoption of mobile advergames to deliver marketing messages has not been followed by empirical findings to support its effectiveness. This research attempts to examine the effect of mobile advergames intrusiveness on consumer irritation, attitudes, and purchase intention. This investigation on mobile advergame effectiveness was based on the increasing use of mobile media to deliver marketing messages to consumers from different demographic background. Conceptual framework was developed based on Advertising Avoidance Theory. For data collection, self-administered survey was conducted by adopting purposive sampling involving 213 respondents residing in Surabaya who have had experience in playing mobile game as respondents. Results indicate that intrusiveness positively affects consumer irritation. Consumer irritation negatively affects attitude towards the mobile advergames and attitude towards the advertised product. The better the consumer attitude towards the mobile advergames, the more positive the attitude towards the advertised product. Moreover, the more positive the attitude towards the advertised product, the greater the consumer intention to purchase. Interestingly, consumer attitude toward the mobile advergames has insignificant influence on purchase intention. Findings of the study offer significant contribution to marketing practices using mobile advergames as media placement in their advertising strategy. Keywords: intrusiveness, irritation, mobile advergames, attitude, advertising

  9. Importance of c-Type cytochromes for U(VI reduction by Geobacter sulfurreducens

    Directory of Open Access Journals (Sweden)

    Leang Ching

    2007-03-01

    Full Text Available Abstract Background In order to study the mechanism of U(VI reduction, the effect of deleting c-type cytochrome genes on the capacity of Geobacter sulfurreducens to reduce U(VI with acetate serving as the electron donor was investigated. Results The ability of several c-type cytochrome deficient mutants to reduce U(VI was lower than that of the wild type strain. Elimination of two confirmed outer membrane cytochromes and two putative outer membrane cytochromes significantly decreased (ca. 50–60% the ability of G. sulfurreducens to reduce U(VI. Involvement in U(VI reduction did not appear to be a general property of outer membrane cytochromes, as elimination of two other confirmed outer membrane cytochromes, OmcB and OmcC, had very little impact on U(VI reduction. Among the periplasmic cytochromes, only MacA, proposed to transfer electrons from the inner membrane to the periplasm, appeared to play a significant role in U(VI reduction. A subpopulation of both wild type and U(VI reduction-impaired cells, 24–30%, accumulated amorphous uranium in the periplasm. Comparison of uranium-accumulating cells demonstrated a similar amount of periplasmic uranium accumulation in U(VI reduction-impaired and wild type G. sulfurreducens. Assessment of the ability of the various suspensions to reduce Fe(III revealed no correlation between the impact of cytochrome deletion on U(VI reduction and reduction of Fe(III hydroxide and chelated Fe(III. Conclusion This study indicates that c-type cytochromes are involved in U(VI reduction by Geobacter sulfurreducens. The data provide new evidence for extracellular uranium reduction by G. sulfurreducens but do not rule out the possibility of periplasmic uranium reduction. Occurrence of U(VI reduction at the cell surface is supported by the significant impact of elimination of outer membrane cytochromes on U(VI reduction and the lack of correlation between periplasmic uranium accumulation and the capacity for uranium

  10. Cr(III) reactivity and foot dermatitis in Cr(VI) positive patients

    DEFF Research Database (Denmark)

    Hansen, Malene Barré; Menné, Torkil; Johansen, Jeanne Duus

    2006-01-01

    Chromium allergy has become synonymous with Cr(VI) allergy. However, real exposure to chromium from leather products may include both Cr(III) and Cr(VI). In this study, we investigate the reactivity to both Cr(VI) and Cr(III) in consecutive patients to analyse the relation between foot eczema/leather...... to Cr(III). The increased risk was not due to a higher degree of sensitivity to Cr(VI). Leather was reported most frequently as the suspected cause of chromium dermatitis (54%). However, Cr(VI) allergics having foot eczema and positive or doubtful Cr(III) reactions often had positive reactions to other...

  11. An experimental study on the sorption of U(VI) onto granite

    International Nuclear Information System (INIS)

    Baik, Min Hoon; Hahn, Pil Soo

    2002-01-01

    The sorption of U(VI) on a domestic granite is studied as a function of experimental conditions such as contact time, solution-solid ratio, ionic strength, and pH using a batch procedure. The distribution coefficients, K d 's, of U(VI) are about 1-100mL/g depending on the experimental conditions. The sorption of U(VI) onto granite particles is greatly dependent upon the contact time, solution-solid ratio, and pH, but very little is dependent on the ionic strength. It is noticed that an U(VI)-carbonato ternary surface complex can be formed in the neutral range of pH. In the alkaline range of pH above 7, U(VI) sorption onto granite particles is greatly decreased due to the formation of anionic U(VI)-carbonato aqueous complexes

  12. The effect of destination linked feature selection in real-time network intrusion detection

    CSIR Research Space (South Africa)

    Mzila, P

    2013-07-01

    Full Text Available techniques in the network intrusion detection system (NIDS) is the feature selection technique. The ability of NIDS to accurately identify intrusion from the network traffic relies heavily on feature selection, which describes the pattern of the network...

  13. Simultaneous Cr(VI) bio-reduction and methane production by anaerobic granular sludge.

    Science.gov (United States)

    Hu, Qian; Sun, Jiaji; Sun, Dezhi; Tian, Lan; Ji, Yanan; Qiu, Bin

    2018-08-01

    Wastewater containing toxic hexavalent chromium (Cr(VI)) were treated with well-organized anaerobic granular sludge in this study. Results showed that the anaerobic granular sludge rapidly removed Cr(VI), and 2000 µg·L -1 Cr(VI) was completely eliminated within 6 min, which was much faster than the reported duration of removal by reported artificial materials. Sucrose added as a carbon source acted as an initial electron donor to reduce Cr(VI) to Cr(III). This process was considered as the main mechanism of Cr(VI) removal. Methane production by anaerobic granular sludge was improved by the addition of Cr(VI) at a concentration lower than 500 µg·L -1 . Anaerobic granular sludge had a well-organized structure, which presented good resistance against toxic Cr(VI). Trichoccus accelerated the degradation of organic substances to generate acetates with a low Cr(VI) concentration, thereby enhancing methane production by acetotrophic methanogens. Copyright © 2018 Elsevier Ltd. All rights reserved.

  14. Re-examination of immune response and estimation of anti-Vi IgG protective threshold against typhoid fever-based on the efficacy trial of Vi conjugate in young children.

    Science.gov (United States)

    Szu, Shousun C; Klugman, Keith P; Hunt, Steven

    2014-04-25

    The capsular polysaccharide of Salmonella enterica serovar Typhi, Vi antigen, is an essential virulence factor and a protective antigen. Similar to other polysaccharide vaccines, the protective action of Vi, both to the polysaccharide alone or when presented as a conjugate, is mediated by serum IgG Vi antibodies. The evaluation of Vi capsular polysaccharide based vaccines to prevent typhoid fever would be significantly facilitated by the identification of a "protective level" of serum antibodies to Vi antigen. The protective level of anti-Vi IgG against typhoid fever was derived from the protective efficacy and immune response of a Vi-rEPA conjugate vaccine efficacy trial. The estimation was derived by two methods: correlation of the percent efficacy and the antibody distribution profile in the vaccine group at a given period of observation, and use of the relative ratio of anti-Vi IgG levels between the vaccine and placebo groups greater or equal to the Relative Risk of typhoid fever used in the efficacy determination. Both methods predicted a similar range of a minimum protective level of anti-Vi IgG between 1.4 and 2.0μg/ml (short term threshold). When applying a protective threshold of 10μg/ml at 6 months post immunization, an IgG level in excess of 1.4μg/ml was achieved by 90% of children at 46 months post immunization, consistent with an 89% level of protection over the duration of the study. We thus suggest that the proportion of children with Vi IgG>10μg/ml (long term threshold) 6 months after immunization may reflect the proportion protected over at least a 4 year period. The current assignment of an anti-Vi IgG protective level may be of value when evaluating vaccine performance of future Vi conjugate vaccines. Published by Elsevier Ltd.

  15. Smart container UWB sensor system for situational awareness of intrusion alarms

    Science.gov (United States)

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.; Leach, Jr., Richard R.; Vigars, Mark L.

    2013-06-11

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability may also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system

  16. Factors affecting the adsorption of chromium (VI) on activated carbon

    Energy Technology Data Exchange (ETDEWEB)

    Yavuz, R.; Orbak, I.; Karatepe, N. [Istanbul Technical University, Istanbul (Turkey)

    2006-09-15

    The aim of this investigation was to determine the adsorption behavior of chromium (VI) on two different activated carbon samples produced from Tuncbilek lignite. The effects of the initial chromium (VI) concentration (250-1000 mg/L), temperature (297-323 K) and pH (2.0-9.5) on adsorption were investigated systematically. The effectiveness of the parameters on chromium adsorption was found to be in the order of pH, the initial Cr(VI) concentration and the temperature. Increasing the pH from 2.0 to 9.5 caused a decrease in adsorption. However, the adsorption was increased by increasing the initial Cr(VI) concentration and temperature. The multilinear mathematical model was also developed to predict the Cr(VI) adsorption on activated carbon samples within the experimental conditions.

  17. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    Science.gov (United States)

    Ganapathy, S.; Yogesh, P.; Kannan, A.

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. PMID:23056036

  18. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    Science.gov (United States)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  19. Analytical applications of N-phenyl-n-butyro hydroxamic and N-p-tolyl-n-butyro hydroxamic acids towards chromium (VI), copper (II), iron (III) and uranium (VI)

    International Nuclear Information System (INIS)

    Elkhadir, A. Y. F.

    2001-05-01

    Two aliphatic hydroxamic acids were prepared; N-phenyl-n-butyro hydroxamic acid and N-p-tolyl-n-butyro hydroxamic acid, by the reaction of β-phenylhydroxylamine and p-tolyl hydroxylamine with n-butyryl chloride. The acids were identified by: their melting points, characteristic reactions with acidic solutions of vanadium (V) and iron (III), infrared spectroscopy, nitrogen content and molecular weight determination. The extractability of these acids towards Cr (VI), Cu (II), Fe (III) and U (VI) were investigated at different pH values and molar acid concentrations. N-phenyl-n- butyro hydroxamic acid has a maximum extraction (98.80%) for Cr (VI) at 4 M H 2 SO 4 , (83.25%) for Cu (II) at pH 6, (99.17%) for Fe (III) at pH 5 and (99.76%) at 4 M HNO 3 for U (VI) respectively. N-p-tolyl-n-butyro hydroxamic acid has a maximum extraction (98.40%) for Cr (VI)at 4 M H 2 SO 4 , (81.30%) for Cu (II) at pH 6, (92.80%) for Fe (III) at pH 5 and (99.64%) for U (VI) at 4 M HNO 3 , respectively. The ratios of the metal to ligands were determined by job method (continuous variation method) and were found to be 1:2 for Cr (VI) and U (VI). (Author)

  20. Analytical applications of N-phenyl-n-butyro hydroxamic and N-p-tolyl-n-butyro hydroxamic acids towards chromium (VI), copper (II), iron (III) and uranium (VI)

    Energy Technology Data Exchange (ETDEWEB)

    Elkhadir, A Y. F. [Department of Chemistry, Faculty of Science, University of Khartoum, Khartoum (Sudan)

    2001-05-01

    Two aliphatic hydroxamic acids were prepared; N-phenyl-n-butyro hydroxamic acid and N-p-tolyl-n-butyro hydroxamic acid, by the reaction of {beta}-phenylhydroxylamine and p-tolyl hydroxylamine with n-butyryl chloride. The acids were identified by: their melting points, characteristic reactions with acidic solutions of vanadium (V) and iron (III), infrared spectroscopy, nitrogen content and molecular weight determination. The extractability of these acids towards Cr (VI), Cu (II), Fe (III) and U (VI) were investigated at different pH values and molar acid concentrations. N-phenyl-n- butyro hydroxamic acid has a maximum extraction (98.80%) for Cr (VI) at 4 M H{sub 2}SO{sub 4}, (83.25%) for Cu (II) at pH 6, (99.17%) for Fe (III) at pH 5 and (99.76%) at 4 M HNO{sub 3} for U (VI) respectively. N-p-tolyl-n-butyro hydroxamic acid has a maximum extraction (98.40%) for Cr (VI)at 4 M H{sub 2} SO{sub 4}, (81.30%) for Cu (II) at pH 6, (92.80%) for Fe (III) at pH 5 and (99.64%) for U (VI) at 4 M HNO{sub 3}, respectively. The ratios of the metal to ligands were determined by job method (continuous variation method) and were found to be 1:2 for Cr (VI) and U (VI). (Author)

  1. Photoreduction of chromium(VI) in the presence of algae, Chlorella vulgaris

    Energy Technology Data Exchange (ETDEWEB)

    Deng Lin [School of Resources and Environmental Science, Wuhan University, Wuhan 430072 (China); Wang Hongli [School of Resources and Environmental Science, Wuhan University, Wuhan 430072 (China); Deng Nansheng [School of Resources and Environmental Science, Wuhan University, Wuhan 430072 (China)]. E-mail: nsdengwhu@163.com

    2006-11-16

    In this thesis, the photochemical reduction of hexavalent chromium Cr(VI) in the presence of algae, Chlorella vulgaris, was investigated under the irradiation of metal halide lamps ({lambda}=365nm, 250W). The affecting factors of photochemical reduction were studied in detail, such as exposure time, initial Cr(VI) concentration, initial algae concentration and pH. The rate of Cr(VI) photochemical reduction increased with algae concentration increasing, exposure time increasing, initial Cr(VI) concentration decreasing and the decrease of pH. When pH increased to 6, the rate of Cr(VI) photochemical reduction nearly vanished. When initial Cr(VI) concentration ranged from 0.4 to 1.0mgL{sup -1} and initial algae concentration ranged from ABS{sub algae} (the absorbency of algae)=0.025 to ABS{sub algae}=0.180, According to the results of kinetic analyses, the kinetic equation of Cr(VI) photochemical reduction in aqueous solution with algae under 250W metal halide lamps was V{sub 0}=kC{sub 0}{sup 0.1718}A{sub algae}{sup 0.5235} (C{sub 0} was initial concentration of Cr(VI); A{sub algae} was initial concentration of algae) under the condition of pH 4.

  2. Waste Tank Vapor Project: Tank vapor database development

    International Nuclear Information System (INIS)

    Seesing, P.R.; Birn, M.B.; Manke, K.L.

    1994-09-01

    The objective of the Tank Vapor Database (TVD) Development task in FY 1994 was to create a database to store, retrieve, and analyze data collected from the vapor phase of Hanford waste tanks. The data needed to be accessible over the Hanford Local Area Network to users at both Westinghouse Hanford Company (WHC) and Pacific Northwest Laboratory (PNL). The data were restricted to results published in cleared reports from the laboratories analyzing vapor samples. Emphasis was placed on ease of access and flexibility of data formatting and reporting mechanisms. Because of time and budget constraints, a Rapid Application Development strategy was adopted by the database development team. An extensive data modeling exercise was conducted to determine the scope of information contained in the database. a A SUN Sparcstation 1000 was procured as the database file server. A multi-user relational database management system, Sybase reg-sign, was chosen to provide the basic data storage and retrieval capabilities. Two packages were chosen for the user interface to the database: DataPrism reg-sign and Business Objects trademark. A prototype database was constructed to provide the Waste Tank Vapor Project's Toxicology task with summarized and detailed information presented at Vapor Conference 4 by WHC, PNL, Oak Ridge National Laboratory, and Oregon Graduate Institute. The prototype was used to develop a list of reported compounds, and the range of values for compounds reported by the analytical laboratories using different sample containers and analysis methodologies. The prototype allowed a panel of toxicology experts to identify carcinogens and compounds whose concentrations were within the reach of regulatory limits. The database and user documentation was made available for general access in September 1994

  3. The vapor pressures of explosives

    Energy Technology Data Exchange (ETDEWEB)

    Ewing, Robert G.; Waltman, Melanie J.; Atkinson, David A.; Grate, Jay W.; Hotchkiss, Peter

    2013-01-05

    The vapor pressures of many explosive compounds are extremely low and thus determining accurate values proves difficult. Many researchers, using a variety of methods, have measured and reported the vapor pressures of explosives compounds at single temperatures, or as a function of temperature using vapor pressure equations. There are large variations in reported vapor pressures for many of these compounds, and some errors exist within individual papers. This article provides a review of explosive vapor pressures and describes the methods used to determine them. We have compiled primary vapor pressure relationships traceable to the original citations and include the temperature ranges for which they have been determined. Corrected values are reported as needed and described in the text. In addition, after critically examining the available data, we calculate and tabulate vapor pressures at 25 °C.

  4. Time to face it! Facebook intrusion and the implications for romantic jealousy and relationship satisfaction.

    Science.gov (United States)

    Elphinston, Rachel A; Noller, Patricia

    2011-11-01

    Young people's exposure to social network sites such as Facebook is increasing, along with the potential for such use to complicate romantic relationships. Yet, little is known about the overlaps between the online and offline worlds. We extended previous research by investigating the links between Facebook intrusion, jealousy in romantic relationships, and relationship outcomes in a sample of undergraduates currently in a romantic relationship. A Facebook Intrusion Questionnaire was developed based on key features of technological (behavioral) addictions. An eight-item Facebook Intrusion Questionnaire with a single-factor structure was supported; internal consistency was high. Facebook intrusion was linked to relationship dissatisfaction, via jealous cognitions and surveillance behaviors. The results highlight the possibility of high levels of Facebook intrusion spilling over into romantic relationships, resulting in problems such as jealousy and dissatisfaction. The results have implications for romantic relationships and for Facebook users in general.

  5. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  6. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  7. Maternal intrusiveness, family financial means, and anxiety across childhood in a large multiphase sample of community youth

    Science.gov (United States)

    Cooper-Vince, Christine E.; Pincus, Donna B.; Comer, Jonathan S.

    2013-01-01

    Intrusive parenting has been positively associated with child anxiety, although examinations of this relationship to date have been largely confined to middle to upper middle class families and have rarely used longitudinal designs. With several leading interventions for child anxiety emphasizing the reduction of parental intrusiveness, it is critical to determine whether the links between parental intrusiveness and child anxiety broadly apply to families of all financial means, and whether parental intrusiveness prospectively predicts the development of child anxiety. This study employed latent growth curve analysis to evaluate the interactive effects of maternal intrusiveness and financial means on the developmental trajectory of child anxiety from 1st grade to age 15 in 1,121 children (50.7% male) and their parents from the NICHD SECCYD. The overall model was found to provide good fit, revealing that early maternal intrusiveness and financial means did not impact individual trajectories of change in child anxiety, which were stable from 1st to 5th grade, and then decrease from 5th grade to age 15. Cross-sectional analyses also examined whether family financial means moderated contemporaneous relationships between maternal intrusiveness and child anxiety in 3rd and 5th grades. The relationship between maternal intrusiveness and child anxiety was moderated by family financial means for 1st graders, with stronger links found among children of lower family financial means, but not for 3rd and 5th graders. Neither maternal intrusiveness nor financial means in 1st grade predicted subsequent changes in anxiety across childhood. Findings help elucidate for whom and when maternal intrusiveness has the greatest link with child anxiety and can inform targeted treatment efforts. PMID:23929005

  8. CoQ10 Deficiency May Indicate Mitochondrial Dysfunction in Cr(VI Toxicity

    Directory of Open Access Journals (Sweden)

    Xiali Zhong

    2017-04-01

    Full Text Available To investigate the toxic mechanism of hexavalent chromium Cr(VI and search for an antidote for Cr(VI-induced cytotoxicity, a study of mitochondrial dysfunction induced by Cr(VI and cell survival by recovering mitochondrial function was performed. In the present study, we found that the gene expression of electron transfer flavoprotein dehydrogenase (ETFDH was strongly downregulated by Cr(VI exposure. The levels of coenzyme 10 (CoQ10 and mitochondrial biogenesis presented by mitochondrial mass and mitochondrial DNA copy number were also significantly reduced after Cr(VI exposure. The subsequent, Cr(VI-induced mitochondrial damage and apoptosis were characterized by reactive oxygen species (ROS accumulation, caspase-3 and caspase-9 activation, decreased superoxide dismutase (SOD and ATP production, increased methane dicarboxylic aldehyde (MDA content, mitochondrial membrane depolarization and mitochondrial permeability transition pore (MPTP opening, increased Ca2+ levels, Cyt c release, decreased Bcl-2 expression, and significantly elevated Bax expression. The Cr(VI-induced deleterious changes were attenuated by pretreatment with CoQ10 in L-02 hepatocytes. These data suggest that Cr(VI induces CoQ10 deficiency in L-02 hepatocytes, indicating that this deficiency may be a biomarker of mitochondrial dysfunction in Cr(VI poisoning and that exogenous administration of CoQ10 may restore mitochondrial function and protect the liver from Cr(VI exposure.

  9. As duas naturezas de Lévi-Strauss

    Directory of Open Access Journals (Sweden)

    Philippe Descola

    2011-11-01

    Full Text Available Aborda-se aqui a complexidade do status do par conceitual natureza e cultura no pensamento de Lévi-Strauss. Ao mesmo tempo ferramenta de análise, cena filosófica dos primórdios e antinomia a superar, revisita-se os diferentes usos e significados na obra de Lévi-Strauss do conceito de natureza e sua relação com o de cultura. Mostra-se como é possível reconhecer na obra de Lévi-Strauss dois conceitos de natureza: por um lado, uma natureza que se opõe à cultura num programa científico formulado em termos classicamente dualistas e, por outro, uma teoria do conhecimento decididamente monista que considera o espírito como parte e produto desse mesmo mundo. Argumenta-se que se o dualismo entre cultura e natureza fundou o pensamento estruturalista de Lévi-Strauss, é na própria obra deste que encontramos os argumentos e meios de superá-lo. A vocação do estruturalismo na antropologia de hoje, no entanto, é de ir mais longe neste caminho do que foi o próprio fundador.

  10. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  11. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  12. Procedure for plutonium determination using Pu(VI) spectra

    International Nuclear Information System (INIS)

    Walker, L.F.; Temer, D.J.; Jackson, D.D.

    1996-01-01

    This document describes a simple spectrophotometric method for determining total plutonium in nitric acid solutions based on the spectrum of Pu(VI). Plutonium samples in nitric acid are oxidized to Pu(VI) with Ce(IV) and the net absorbance at the 830 nm peak is measured

  13. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  14. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  15. On emulation-based network intrusion detection systems

    NARCIS (Netherlands)

    Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; Etalle, S.; Stavrou, A.; Bos, H.; Portokalidis, G.

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity.

  16. Pre-Stressor Interference Control and Intrusive Memories

    NARCIS (Netherlands)

    Verwoerd, J.; Wessel, I.; De Jong, P.J.; Nieuwenhuis, Maurice; Huntjens, R.J.C.

    Although intrusive imagery is a common response in the aftermath of a stressful or traumatic event, only a minority of trauma victims show persistent re-experiencing and related psychopathology. Individual differences in pre-trauma executive control possibly play a critical role. Therefore, this

  17. How Intrusion Detection Can Improve Software Decoy Applications

    National Research Council Canada - National Science Library

    Monteiro, Valter

    2003-01-01

    This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack...

  18. Building blocks for ionic liquids: Vapor pressures and vaporization enthalpies of 1-(n-alkyl)-imidazoles

    International Nuclear Information System (INIS)

    Emel'yanenko, Vladimir N.; Portnova, Svetlana V.; Verevkin, Sergey P.; Skrzypczak, Andrzej; Schubert, Thomas

    2011-01-01

    Highlights: → We measured vapor pressures of the 1-(n-alkyl)-imidazoles by transpiration method. → Variations on the alkyl chain length n were C 3 , C 5 -C 7 , and C 9 -C 10 . → Enthalpies of vaporization were derived from (p, T) dependencies. → Enthalpies of vaporization at 298.15 K were linear dependent on the chain length. - Abstract: Vapor pressures of the linear 1-(n-alkyl)-imidazoles with the alkyl chain C 3 , C 5 -C 7 , and C 9 -C 10 have been measured by the transpiration method. The molar enthalpies of vaporization Δ l g H m of these compounds were derived from the temperature dependencies of vapor pressures. A linear correlation of enthalpies of vaporization Δ l g H m (298.15 K) of the 1-(n-alkyl)-imidazoles with the chain length has been found.

  19. Perceptual processing during trauma, priming and the development of intrusive memories

    Science.gov (United States)

    Sündermann, Oliver; Hauschildt, Marit; Ehlers, Anke

    2013-01-01

    Background Intrusive reexperiencing in posttraumatic stress disorder (PTSD) is commonly triggered by stimuli with perceptual similarity to those present during the trauma. Information processing theories suggest that perceptual processing during the trauma and enhanced perceptual priming contribute to the easy triggering of intrusive memories by these cues. Methods Healthy volunteers (N = 51) watched neutral and trauma picture stories on a computer screen. Neutral objects that were unrelated to the content of the stories briefly appeared in the interval between the pictures. Dissociation and data-driven processing (as indicators of perceptual processing) and state anxiety during the stories were assessed with self-report questionnaires. After filler tasks, participants completed a blurred object identification task to assess priming and a recognition memory task. Intrusive memories were assessed with telephone interviews 2 weeks and 3 months later. Results Neutral objects were more strongly primed if they occurred in the context of trauma stories than if they occurred during neutral stories, although the effect size was only moderate (ηp2=.08) and only significant when trauma stories were presented first. Regardless of story order, enhanced perceptual priming predicted intrusive memories at 2-week follow-up (N = 51), but not at 3 months (n = 40). Data-driven processing, dissociation and anxiety increases during the trauma stories also predicted intrusive memories. Enhanced perceptual priming and data-driven processing were associated with lower verbal intelligence. Limitations It is unclear to what extent these findings generalize to real-life traumatic events and whether they are specific to negative emotional events. Conclusions The results provide some support for the role of perceptual processing and perceptual priming in reexperiencing symptoms. PMID:23207970

  20. Synthesis of surface Cr (VI)-imprinted magnetic nanoparticles for selective dispersive solid-phase extraction and determination of Cr (VI) in water samples.

    Science.gov (United States)

    Qi, Xue; Gao, Shuang; Ding, Guosheng; Tang, An-Na

    2017-01-01

    A facile, rapid and selective magnetic dispersed solid-phase extraction (dSPE) method for the extraction and enrichment of Cr (VI) prior to flame atomic absorption spectrometry (AAS) was introduced. For highly selective and efficient extraction, magnetic Cr (VI)-imprinted nanoparticles (Fe 3 O 4 @ Cr (VI) IIPs) were prepared by hyphenating surface ion-imprinted with sol-gel techniques. In the preparation process, chromate (Cr(VI)) was used as the template ion; vinylimidazole and 3-aminopropyltriethoxysilane were selected as organic functional monomer and co-monomer respectively. Another reagent, methacryloxypropyltrimethoxysilane was adopted as coupling agent to form the stable covalent bonding between organic and inorganic phases. The effects of various parameters on the extraction efficiency, such as pH of sample solution, the amount of adsorbent, extraction time, the type and concentration of eluent were systematically investigated. Furthermore, the thermodynamic and kinetic properties of the adsorption process were studied to explore the internal adsorption mechanism. Under optimized conditions, the preconcentration factor, limit of detection and linear range of the established dSPE-AAS method for Cr (VI) were found to be 98, 0.29μgL -1 and 4-140μgL -1 , respectively. The developed method was also successfully applied to the analysis of Cr (VI) in different water samples with satisfactory results, proving its reliability and feasibility in real sample analysis. Copyright © 2016 Elsevier B.V. All rights reserved.

  1. Assessing Human Activity in Elderly People Using Non-Intrusive Load Monitoring

    Directory of Open Access Journals (Sweden)

    José M. Alcalá

    2017-02-01

    Full Text Available The ageing of the population, and their increasing wish of living independently, are motivating the development of welfare and healthcare models. Existing approaches based on the direct heath-monitoring using body sensor networks (BSN are precise and accurate. Nonetheless, their intrusiveness causes non-acceptance. New approaches seek the indirect monitoring through monitoring activities of daily living (ADLs, which proves to be a suitable solution. ADL monitoring systems use many heterogeneous sensors, are less intrusive, and are less expensive than BSN, however, the deployment and maintenance of wireless sensor networks (WSN prevent them from a widespread acceptance. In this work, a novel technique to monitor the human activity, based on non-intrusive load monitoring (NILM, is presented. The proposal uses only smart meter data, which leads to minimum intrusiveness and a potential massive deployment at minimal cost. This could be the key to develop sustainable healthcare models for smart homes, capable of complying with the elderly people’ demands. This study also uses the Dempster-Shafer theory to provide a daily score of normality with regard to the regular behavior. This approach has been evaluated using real datasets and, additionally, a benchmarking against a Gaussian mixture model approach is presented.

  2. Vapor pressure and enthalpy of vaporization of oil of catnip by correlation gas chromatography

    International Nuclear Information System (INIS)

    Simmons, Daniel; Gobble, Chase; Chickos, James

    2016-01-01

    Highlights: • Vaporization enthalpies of the nepetalactones from oil of catnip have been evaluated. • Vapor pressures from T = (298.15 to 350) K have been evaluated. • Oil of catnip has a vapor pressure similar to DEET at T = 298.15 K. - Abstract: The vaporization enthalpy and vapor pressure of the two nepetalactones found in Nepeta cataria have been evaluated by correlation gas chromatography. Vaporization enthalpies at T = 298.15 K of {(68.0 ± 1.9) and (69.4 ± 1.9)} kJ ⋅ mol"−"1 have been derived for the minor diastereomer, (4aS,7S,7aS)-nepetalactone, and major one, (4aS,7S,7aR)-nepetalactone, respectively. Vapor pressures also at T = 298.15 K of p = (1.2 ± 0.04) Pa and (0.91 ± 0.03) Pa have been evaluated for the minor and the major stereoisomer. In addition to being of interest because of the remarkable effect it has on various felids, oil of catnip is also quite effective in repelling mosquitoes, comparable to diethyl-m-toluamide (DEET). The vapor pressures evaluated in this work suggest that the two stereoisomers have similar volatility to DEET at ambient temperatures.

  3. Internet use, Facebook intrusion, and depression: Results of a cross-sectional study.

    Science.gov (United States)

    Błachnio, A; Przepiórka, A; Pantic, I

    2015-09-01

    Facebook has become a very popular social networking platform today, particularly among adolescents and young adults, profoundly changing the way they communicate and interact. However, some reports have indicated that excessive Facebook use might have detrimental effects on mental health and be associated with certain psychological problems. Because previous findings on the relationship between Facebook addiction and depression were not unambiguous, further investigation was required. The main objective of our study was to examine the potential associations between Internet use, depression, and Facebook intrusion. A total of 672 Facebook users took part in the cross-sectional study. The Facebook Intrusion Questionnaire and the Center for Epidemiologic Studies Depression Scale were used. For collecting the data, the snowball sampling procedure was used. We showed that depression can be a predictor of Facebook intrusion. Our results provides additional evidence that daily Internet use time in minutes, gender, and age are also predictors of Facebook intrusion: that Facebook intrusion can be predicted by being male, young age, and an extensive number of minutes spent online. On the basis of this study, it is possible to conclude that there are certain demographic - variables, such as age, gender, or time spent online - that may help in outlining the profile of a user who may be in danger of becoming addicted to Facebook. This piece of knowledge may serve for prevention purposes. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  4. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  5. The Sonju Lake layered intrusion, northeast Minnesota: Internal structure and emplacement history inferred from magnetic fabrics

    Science.gov (United States)

    Maes, S.M.; Tikoff, B.; Ferre, E.C.; Brown, P.E.; Miller, J.D.

    2007-01-01

    The Sonju Lake intrusion (SLI), in northeastern Minnesota, is a layered mafic complex of Keweenawan age (1096.1 ?? 0.8 Ma) related to the Midcontinent rift. The cumulate paragenesis of the intrusion is recognized as broadly similar to the Skaergaard intrusion, a classic example of closed-system differentiation of a tholeiitic mafic magma. The SLI represents nearly closed-system differentiation through bottom-up fractional crystallization. Geochemical studies have identified the presence of a stratabound, 50-100 m thick zone anomalously enriched in Au + PGE. Similar to the PGE reefs of the Skaergaard intrusion, this PGE-enriched zone is hosted within oxide gabbro cumulates, about two-third of the way up from the base of the intrusion. We present a petrofabric study using the anisotropy of magnetic susceptibility (AMS) to investigate the emplacement and flow patterns within the Sonju Lake intrusion. Petrographic and electron microprobe studies, combined with AMS and hysteresis measurements indicate the primary source of the magnetic signal is pseudo-single domain (PSD) magnetite or titanomagnetite. Low field AMS was measured at 32 sites within the Sonju Lake intrusion, which provided information about primary igneous fabrics. The magnetic fabrics in the layered series of the Sonju Lake intrusion are consistent with sub-horizontal to inclined emplacement of the intrusion and show evidence that the cumulate layers were deposited in a dynamic environment. Well-aligned magnetic lineations, consistently plunging shallowly toward the southwest, indicate the source of the magma is a vertical sill-like feeder, presumably located beneath the Finland granite. The Finland granite acted as a density trap for the Sonju Lake magmas, forcing lateral flow of magma to the northeast. The strongly oblate magnetic shape fabrics indicate the shallowly dipping planar fabrics were enhanced by compaction of the crystal mush. ?? 2007 Elsevier B.V. All rights reserved.

  6. Context-aware local Intrusion Detection in SCADA systems : a testbed and two showcases

    NARCIS (Netherlands)

    Chromik, Justyna Joanna; Haverkort, Boudewijn R.H.M.; Remke, Anne Katharina Ingrid; Pilch, Carina; Brackmann, Pascal; Duhme, Christof; Everinghoff, Franziska; Giberlein, Artur; Teodorowicz, Thomas; Wieland, Julian

    2017-01-01

    This paper illustrates the use of a testbed that we have developed for context-aware local intrusion detection. This testbed is based on the co-simulation framework Mosaik and allows for the validation of local intrusion detection mechanisms at field stations in power distribution networks. For two

  7. THE GEOMORPHOLOGIC FEATURES OF INTRUSIVE MAGMATIC STRUCTURES FROM BÂRGĂU MOUNTAINS (EASTERN CARPATHIANS, ROMANIA

    Directory of Open Access Journals (Sweden)

    Ioan Bâca

    2016-08-01

    Full Text Available Igneous intrusive structures from Bârgău Mountains belong to the group of central Neogene volcanic chain of the Eastern Carpathians of Romania. The evolution of the relief developed on these structures are three main stages: the stage of injection of structures (Pannonian, the stage of uncovering of igneous intrusive bodies from Oligo-Miocene sedimentary cover (Pliocene, and the stage of subaerial modeling of magmatic bodies (Pliocene-current.In those circumstances, the geodiversity of intrusive magmatic structures from Bârgău Mountains is represented by several types of landforms such as: polycyclic landforms (erosional levels, structural landforms (the configuration of igneous intrusive structures, petrographic landforms (andesites, lithological contact, fluvial landforms (valleys, slopes, ridges, periglacial landforms (cryogenic and crionival landforms, biogenic and anthropogenic landforms. This study highlights certain features of the landforms modeled on igneous intrusive bodies with the aim of developing some strategy for tourism recovery by local and county authorities.

  8. Geophysics and geochemistry techniques in seawater intrusion monitoring and mapping at Kerpan, Kedah

    International Nuclear Information System (INIS)

    Bashillah Baharuddin; Nazrul Hizam Yusoff; Abdul Rahim Samsudin

    2002-01-01

    Lately, groundwater contamination has become a public concern. Seawater intrusion is not a new issue, and only it started to magnetize attention from lots of parties since at also a contributor to groundwater contamination. Therefore a study about seawater intrusion is carried out and the selected area is Kerpan, Kedah. This information is useful particularly in agriculture because any contamination that cause by chlorine (seawater) intrusion can affect crops production. For Kerpan Project, two modernized electric resistivity survey instruments, the Terrameter SAS 4000 and SAS 300C are used which provide image profiles. This profiles have the capability to access a comprehensive geological interpretation by examine subsurface electric characteristics such as resistivity, permittivity and chargeability (John, 1997). At Kerpan, Kedah a study about salinity in canals was also carried out to monitor if there is any seawater intrusion that can get through the canals. The study was done since that the canals are directly to the sea. Instrument for this study is STD 12-plus. (Author)

  9. Intrusion recognition for optic fiber vibration sensor based on the selective attention mechanism

    Science.gov (United States)

    Xu, Haiyan; Xie, Yingjuan; Li, Min; Zhang, Zhuo; Zhang, Xuewu

    2017-11-01

    Distributed fiber-optic vibration sensors receive extensive investigation and play a significant role in the sensor panorama. A fiber optic perimeter detection system based on all-fiber interferometric sensor is proposed, through the back-end analysis, processing and intelligent identification, which can distinguish effects of different intrusion activities. In this paper, an intrusion recognition based on the auditory selective attention mechanism is proposed. Firstly, considering the time-frequency of vibration, the spectrogram is calculated. Secondly, imitating the selective attention mechanism, the color, direction and brightness map of the spectrogram is computed. Based on these maps, the feature matrix is formed after normalization. The system could recognize the intrusion activities occurred along the perimeter sensors. Experiment results show that the proposed method for the perimeter is able to differentiate intrusion signals from ambient noises. What's more, the recognition rate of the system is improved while deduced the false alarm rate, the approach is proved by large practical experiment and project.

  10. Modelling Cr(VI) removal by a combined carbon-activated sludge system

    International Nuclear Information System (INIS)

    Orozco, A. Micaela Ferro; Contreras, Edgardo M.; Zaritzky, Noemi E.

    2008-01-01

    The combined carbon-activated sludge process has been proposed as an alternative to protect the biomass against toxic substances in wastewaters; however, the information about the effect of powdered-activated carbon (PAC) addition in activated sludge reactors for the treatment of wastewaters containing Cr(VI) is limited. The objectives of the present study were: (a) to evaluate the removal of hexavalent chromium by (i) activated sludge microorganisms in aerobic batch reactors, (ii) powdered-activated carbon, and (iii) the combined action of powdered-activated carbon and biomass; (b) to propose mathematical models that interpret the experimental results. Different Cr(VI) removal systems were tested: (S1) biomass (activated sludge), (S2) PAC, and (S3) the combined activated carbon-biomass system. A Monod-based mathematical model was used to describe the kinetics of Cr(VI) removal in the system S1. A first-order kinetics with respect to Cr(VI) and PAC respectively, was proposed to model the removal of Cr(VI) in the system S2. Cr(VI) removal in the combined carbon-biomass system (S3) was faster than both Cr(VI) removal using PAC or activated sludge individually. Results showed that the removal of Cr(VI) using the activated carbon-biomass system (S3) was adequately described by combining the kinetic equations proposed for the systems S1 and S2

  11. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    spatiotemporal relations to form complex events which model the intrusion patterns. ... Wireless sensor networks; complex event processing; event stream; ...... of the 2006 ACM SIGMOD International Conference on Management of Data, 407– ...

  12. A CMOS rail-to-rail linear VI-converter

    NARCIS (Netherlands)

    Vervoort, P.P.; Vervoort, P.P.; Wassenaar, R.F.

    1995-01-01

    A linear CMOS VI-converter operating in strong inversion with a common-mode input range from the negative to the positive supply rail is presented. The circuit consists of three linear VI-converters based on the difference of squares principle. Two of these perform the actual V to I conversion,

  13. Ternary uranium(VI) carbonato humate complex studied by cryo-TRLFS

    International Nuclear Information System (INIS)

    Steudtner, R.; Sachs, S.; Schmeide, K.; Brendler, V.; Bernhard, G.

    2011-01-01

    The complex formation of U(VI) with humic acid (HA) in the presence of carbonate was studied by time-resolved laser-induced fluorescence spectroscopy at low temperature (cryo-TRLFS) at pH 8.5. In the presence of HA, a decrease of the luminescence intensity of U(VI) and no shift of the emission band maxima in comparison to the luminescence spectrum of the UO 2 (CO 3 ) 3 4- complex, the dominating U(VI) species under the applied experimental conditions in the absence of HA, was observed. The formation of a ternary U(VI) carbonato humate complex of the type UO 2 (CO 3 ) 2 HA(II) 4- starting from UO 2 (CO 3 ) 3 4- was concluded from the luminescence data. For this complex a complex stability constant of log K=2.83 ± 0.17 was determined. Slope analysis resulted in a slope of 1.12 ± 0.11, which verifies the postulated complexation reaction. The results agree very well with literature data. Speciation calculations show that the formation of the ternary U(VI) carbonato humate complex can significantly influence the U(VI) speciation under environmental conditions. (orig.)

  14. THE SURPRISINGLY CONSTANT STRENGTH OF O VI ABSORBERS OVER COSMIC TIME

    International Nuclear Information System (INIS)

    Fox, Andrew J.

    2011-01-01

    O VI absorption is observed in a wide range of astrophysical environments, including the local interstellar medium, the disk and halo of the Milky Way, high-velocity clouds, the Magellanic Clouds, starburst galaxies, the intergalactic medium (IGM), damped Lyα systems, and gamma-ray-burst host galaxies. Here, a new compilation of 775 O VI absorbers drawn from the literature is presented, all observed at high resolution (instrumental FWHM ≤ 20 km s -1 ) and covering the redshift range z = 0-3. In galactic environments [log N(H I) ∼> 20], the mean O VI column density is shown to be insensitive to metallicity, taking a value log N(O VI) ∼ 14.5 for galaxies covering the range -1.6 ∼ 4 K) clouds and hot (∼10 6 K) plasma, although many such layers would have to be intersected by a typical galaxy-halo sight line to build up the characteristic galactic N(O VI). The alternative, widely used model of single-phase photoionization for intergalactic O VI is ruled out by kinematic evidence in the majority of IGM O VI components at low and high redshift.

  15. Reduction of trace quantities of chromium(VI by strong acids

    Directory of Open Access Journals (Sweden)

    Pezzin Sérgio H

    2004-01-01

    Full Text Available The chemical behavior of Cr(VI at low concentrations (10-4 to 10-7 mol L-1 in several strong acids was studied using high specific activity 51Cr(VI as a tracer. The speciation of the products from these systems was carried out by ion exchange chromatography with stepwise elution. The results show that trace quantities of Cr(VI, monitored by means of radiochromium (51Cr, are reduced in the presence of mineral acids such as perchloric, hydrochloric, hydrofluoric, sulfuric, nitric and trifluoromethanesulfonic acids, even in the absence of conventional reducing agents, producing different measureable Cr(III species, depending on the acid anion. Detailed studies of the reduction of low concentrations of Cr(VI with nitric acid have shown that the relative rate of reduction increases as the concentration of the acid increases or as the concentration of the Cr(VI decreases.

  16. Estudio de inmunogenicidad de la vacuna antitifoídica cubana de polisacárido Vi vax-TyVi® en ratones

    Directory of Open Access Journals (Sweden)

    Juan Carlos Ramírez

    2006-08-01

    Full Text Available Salmonella enterica serovar Typhi es un microorganismo que provoca más de 16 millones de casos de fiebre tifoidea con aproximadamente 600 000 muertes al año en todo el mundo. Dentro de las vacunas antitifoídicas la de polisacárido capsular Vi ha encontrado, gracias a sus incuestionables ventajas, una gran aceptación entre productores y consumidores. El presente trabajo aborda el estudio de inmunogenicidad de la vacuna antitifoídica cubana de polisacárido Vi vax-TyViâ en ratones. El estudio estuvo conformado por un grupo control no inoculado y un segundo grupo que recibió 0,05 mL de la vacuna por vía intramuscular. Se tomaron muestras de sangre a los -3, 7, 14, 21, 28, 42, 56 y 84 días. La actividad de anticuerpos IgG antipolisacárido Vi de los sueros individuales fue determinada por ELISA. Los datos fueron analizados por grupo y por sexo y se calculó el porcentaje de seroconversión, considerándose respondedor aquel animal que al menos aumentara en cuatro veces su título inicial. La respuesta de anticuerpos inducida por la vacuna mostró un aumento notable de los títulos de IgG antipolisacárido Vi en el grupo vacunado (100% de seroconversión, mientras que el grupo control no incrementó sus niveles mínimos iniciales (0% de respondedores. Aunque más dispersa, la respuesta de anticuerpos antiVi fue significativamente mayor en las hembras que en los machos.

  17. Vapor pressures and vaporization enthalpy of (−) α-bisabolol and (dl) menthol by correlation gas chromatography

    International Nuclear Information System (INIS)

    Keating, Leasa; Harris, Harold H.; Chickos, James S.

    2017-01-01

    Highlights: • The vaporization enthalpy and vapor pressure of (−) α-bisabolol and (dl)-menthol have been measured as a function of temperature. • Vapor pressures, vaporization enthalpies and boiling temperatures have been compared to available literature data. • Vapor pressures of (l)-menthol are compared to (dl)-menthol. - Abstract: The vapor pressures and vaporization enthalpies of (−) α-bisabolol and (dl)-menthol, two GRAS chemicals (generally recognized as safe) are evaluated by correlation gas chromatography using a series of saturated primary alcohols as standards. Vaporization enthalpies of (96.6 ± 2.4) and (74.2 ± 2.8) kJ mol −1 and vapor pressures of p/Pa = (0.020 ± 0.003) and (4.5 ± 0.44) were evaluated at T = 298.15 K for (−) α-bisabolol and (dl)-menthol, respectively, and compared to literature values. The vapor pressures of both compounds from T = (298.15 to 500) K have been derived from correlations using vapor pressures of a series of 1-alkanols and corresponding gas chromatographic retention times at 10 K intervals. The results were fit to a second order polynomial. Calculated normal boiling temperatures of T B = (574.8 and 492.7) K are calculated for (−) α-bisabolol and (dl)-menthol, respectively. A normal boiling temperature of T B = (485.2, and 489.7) K has previously been reported for (dl)-menthol. Vapor pressures for both (l)-menthol and (dl)-menthol from a previous study and (dl)-menthol from this study are compared with literature values.

  18. Melting temperature, vapor density, and vapor pressure of molybdenum pentafluoride

    Energy Technology Data Exchange (ETDEWEB)

    Krause, Jr, R F; Douglas, T B [National Bureau of Standards, Washington, D.C. (USA). Inst. for Materials Research

    1977-12-01

    A sample of MoF/sub 5/ was prepared by reaction of MoF/sub 6/(g) and Mo(c). Melting curves of temperature against time established the melting temperature at zero impurity to be 318.85 K, the enthalpy of fusion to be 6.1 kJ mol/sup -1/ (+ - 5 per cent), and the cryoscopic impurity of the sample to be 0.15 mole per cent. In the presence of MoF/sub 6/(g) which was added to suppress disproportionation, the vapor density of MoF/sub 5/ over the liquid was measured by the transpiration method at 343, 363, and 383 K, the total MoF/sub 5/ that evaporated being determined by permanganate titration. The total vapor pressure of MoF/sub 5/ oligomers over the liquid was measured by a simple static method at 373 and 392 K, while melting temperatures were taken alternately to monitor possible contamination of the sample. Although the vapor pressures were adjusted for disproportionation, solution of MoF/sub 6/ in MoF/sub 5/ (1), and wall adsorption of MoF/sub 6/ their percentage uncertainty is probably several times that of the vapor densities. A combination of the two properties indicates the average extent of association of the saturated vapor to be near 2, which is the value for the dimer species (MoF/sub 5/)/sub 2/.

  19. Synthesis, structure and properties of oxo- and dioxochloride complexes of molybdenum(VI) and tungsten(VI) with 8-oxyquinoline

    International Nuclear Information System (INIS)

    Abramenko, V.L.; Sergienko, V.S.; Egorova, O.A.

    2005-01-01

    Complexes of oxo- and dioxochlorides of molybdenum(VI) and tungsten(VI) with 8-oxyquinoline of molecular and intracomplex type are synthesized and studied by the method of IR spectroscopy. The complexes have octahedral structure. It is proposed that 8-oxyquinoline in molecular complexes is coordinated by central atom through nitrogen atom of heterocycle, but in intracomplex compounds - through heterocyclic nitrogen atom and oxygen atom of deprotonated OH-group. Thermal stability of the complexes is studied [ru

  20. Biological intrusion of low-level-waste trench covers

    Science.gov (United States)

    Hakonson, T. E.; Gladney, E. S.

    The long-term integrity of low-level waste shallow land burialsites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. The need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatment is demonstrated. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and sil overburden depth.

  1. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  2. Wave Induced Saline Intrusion in Sea Outfalls

    DEFF Research Database (Denmark)

    Larsen, Torben; Burrows, Richard

    1989-01-01

    Experimental and numerical studies have shown that the influence of wave increases the tendency of saline intrusion in multi-riser sea outfalls. The flow field in the diffusor under such unsteady and inhomogeneous circumstances is in general very complex, but when sufficient wave energy is dissip...

  3. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  4. Quantifying Cr(VI) Production and Export from Serpentine Soil of the California Coast Range.

    Science.gov (United States)

    McClain, Cynthia N; Fendorf, Scott; Webb, Samuel M; Maher, Kate

    2017-01-03

    Hexavalent chromium (Cr(VI)) is generated in serpentine soils and exported to surface and groundwaters at levels above health-based drinking water standards. Although Cr(VI) concentrations are elevated in serpentine soil pore water, few studies have reported field evidence documenting Cr(VI) production rates and fluxes that govern Cr(VI) transport from soil to water sources. We report Cr speciation (i) in four serpentine soil depth profiles derived from the California Coast Range serpentinite belt and (ii) in local surface waters. Within soils, we detected Cr(VI) in the same horizons where Cr(III)-minerals are colocated with biogenic Mn(III/IV)-oxides, suggesting Cr(VI) generation through oxidation by Mn-oxides. Water-extractable Cr(VI) concentrations increase with depth constituting a 7.8 to 12 kg/km 2 reservoir of Cr(VI) in soil. Here, Cr(VI) is produced at a rate of 0.3 to 4.8 kg Cr(VI)/km 2 /yr and subsequently flushed from soil during water infiltration, exporting 0.01 to 3.9 kg Cr(VI)/km 2 /yr at concentrations ranging from 25 to 172 μg/L. Although soil-derived Cr(VI) is leached from soil at concentrations exceeding 10 μg/L, due to reduction and dilution during transport to streams, Cr(VI) levels measured in local surface waters largely remain below California's drinking water limit.

  5. Chromium (VI) biosorption properties of multiple resistant bacteria isolated from industrial sewerage.

    Science.gov (United States)

    Oyetibo, Ganiyu Oladunjoye; Ilori, Matthew Olusoji; Obayori, Oluwafemi Sunday; Amund, Olukayode Oladipo

    2013-08-01

    Chromium (VI) [Cr (VI)] biosorption by four resistant autochthonous bacterial strains was investigated to determine their potential for use in sustainable marine water-pollution control. Maximum exchange between Cr (VI) ions and protons on the cells surfaces were at 30-35 °C, pH 2.0 and 350-450 mg/L. The bacterial strains effectively removed 79.0-90.5 % Cr (VI) ions from solution. Furthermore, 85.3-93.0 % of Cr (VI) ions were regenerated from the biomasses, and 83.4-91.7 % of the metal was adsorbed when the biomasses was reused. Langmuir isotherm performed better than Freundlich isotherm, depicting that Cr (VI) affinity was in the sequence Rhodococcus sp. AL03Ni > Burkholderia cepacia AL96Co > Corynebacterium kutscheri FL108Hg > Pseudomonas aeruginosa CA207Ni. Biosorption isotherms confirmed that Rhodococcus sp. AL03Ni was a better biosorbent with a maximum uptake of 107.46 mg of Cr (VI) per g (dry weight) of biomass. The results highlight the high potential of the organisms for bacteria-based detoxification of Cr (VI) via biosorption.

  6. R-22 vapor explosions

    International Nuclear Information System (INIS)

    Anderson, R.P.; Armstrong, D.R.

    1977-01-01

    Previous experimental and theoretical studies of R-22 vapor explosions are reviewed. Results from two experimental investigations of vapor explosions in a medium scale R-22/water system are reported. Measurements following the drop of an unrestrained mass of R-22 into a water tank demonstrated the existence of two types of interaction behavior. Release of a constrained mass of R-22 beneath the surface of a water tank improved the visual resolution of the system thus allowing identification of two interaction mechansims: at low water temperatures, R-22/water contact would produce immediate violent boiling; at high water temperatures a vapor film formed around its R-22 as it was released, explosions were generated by a surface wave which initiated at a single location and propagated along the vapor film as a shock wave. A new vapor explosion model is proposed, it suggests explosions are the result of a sequence of three independent steps: an initial mixing phase, a trigger and growth phase, and a mature phase where a propagating shock wave accelerates the two liquids into a collapsing vapor layer causing a high velocity impact which finely fragments and intermixes the two liquids

  7. Full distributed fiber optical sensor for intrusion detection in application to buried pipelines

    Science.gov (United States)

    Gao, Jianzhong; Jiang, Zhuangde; Zhao, Yulong; Zhu, Li; Zhao, Guoxian

    2005-11-01

    Based on the microbend effect of optical fiber, a distributed sensor for real-time continuous monitoring of intrusion in application to buried pipelines is proposed. The sensing element is a long cable with a special structure made up of an elastic polymer wire, an optical fiber, and a metal wire. The damage point is located with an embedded optical time domain reflectometry (OTDR) instrument. The intrusion types can be indicated by the amplitude of output voltage. Experimental results show that the detection system can alarm adequately under abnormal load and can locate the intrusion point within 22.4 m for distance of 3.023 km.

  8. Distributed fiber optic moisture intrusion sensing system

    Science.gov (United States)

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  9. Multilayer Statistical Intrusion Detection in Wireless Networks

    Science.gov (United States)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  10. Medication Adherence using Non-intrusive Wearable Sensors

    Directory of Open Access Journals (Sweden)

    T. H. Lim

    2017-12-01

    Full Text Available Activity recognition approaches have been applied in home ambient systems to monitor the status and well- being of occupant especially for home care systems. With the advancement of embedded wireless sensing devices, various applications have been proposed to monitor user´s activities and maintain a healthy lifestyle. In this paper, we propose and evaluate a Smart Medication Alert and Treatment Electronic Systems (SmartMATES using a non-intrusive wearable activity recognition sensing system to monitor and alert an user for missing medication prescription. Two sensors are used to collect data from the accelerometer and radio transceiver. Based on the data collected, SmartMATES processes the data and generate a model for the various actions including taking medication. We have evaluated the SmartMATES on 9 participants. The results show that the SmartMATES can identify and prevent missing dosage in a less intrusive way than existing mobile application and traditional approaches.

  11. Nuclear waste disposal facility intrusion: an archeologist's perspective

    International Nuclear Information System (INIS)

    Virginia, C.; Christie, L.

    1981-01-01

    A scenario is presented for the intrusion of a shallow land burial site by archeologists from a future generation. A description is given for the potential widespread exposure and contamination of populations by recovered artifacts

  12. A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Wenchao Li

    2014-01-01

    abnormal nodes from normal nodes by observing their abnormal behaviors, and we analyse parameter selection and error rate of the intrusion detection system. The paper elaborates on the design and implementation of the detection system. This system has achieved efficient, rapid intrusion detection by improving the wireless ad hoc on-demand distance vector routing protocol (Ad hoc On-Demand Distance the Vector Routing, AODV. Finally, the test results show that: the system has high detection accuracy and speed, in accordance with the requirement of wireless sensor network intrusion detection.

  13. Mucopolysaccharidosis VI

    Directory of Open Access Journals (Sweden)

    Harmatz Paul

    2010-04-01

    Full Text Available Abstract Mucopolysaccharidosis VI (MPS VI is a lysosomal storage disease with progressive multisystem involvement, associated with a deficiency of arylsulfatase B leading to the accumulation of dermatan sulfate. Birth prevalence is between 1 in 43,261 and 1 in 1,505,160 live births. The disorder shows a wide spectrum of symptoms from slowly to rapidly progressing forms. The characteristic skeletal dysplasia includes short stature, dysostosis multiplex and degenerative joint disease. Rapidly progressing forms may have onset from birth, elevated urinary glycosaminoglycans (generally >100 μg/mg creatinine, severe dysostosis multiplex, short stature, and death before the 2nd or 3rd decades. A more slowly progressing form has been described as having later onset, mildly elevated glycosaminoglycans (generally ARSB gene, located in chromosome 5 (5q13-5q14. Over 130 ARSB mutations have been reported, causing absent or reduced arylsulfatase B (N-acetylgalactosamine 4-sulfatase activity and interrupted dermatan sulfate and chondroitin sulfate degradation. Diagnosis generally requires evidence of clinical phenotype, arylsulfatase B enzyme activity ®, clinical management was limited to supportive care and hematopoietic stem cell transplantation. Galsulfase is now widely available and is a specific therapy providing improved endurance with an acceptable safety profile. Prognosis is variable depending on the age of onset, rate of disease progression, age at initiation of ERT and on the quality of the medical care provided.

  14. Integrated Cr(VI) removal using constructed wetlands and composting.

    Science.gov (United States)

    Sultana, Mar-Yam; Chowdhury, Abu Khayer Md Muktadirul Bari; Michailides, Michail K; Akratos, Christos S; Tekerlekopoulou, Athanasia G; Vayenas, Dimitrios V

    2015-01-08

    The present work was conducted to study integrated chromium removal from aqueous solutions in horizontal subsurface (HSF) constructed wetlands. Two pilot-scale HSF constructed wetlands (CWs) units were built and operated. One unit was planted with common reeds (Phragmites australis) and one was kept unplanted. Influent concentrations of Cr(VI) ranged from 0.5 to 10mg/L. The effect of temperature and hydraulic residence time (8-0.5 days) on Cr(VI) removal were studied. Temperature was proved to affect Cr(VI) removal in both units. In the planted unit maximum Cr(VI) removal efficiencies of 100% were recorded at HRT's of 1 day with Cr(VI) concentrations of 5, 2.5 and 1mg/L, while a significantly lower removal rate was recorded in the unplanted unit. Harvested reed biomass from the CWs was co-composted with olive mill wastes. The final product had excellent physicochemical characteristics (C/N: 14.1-14.7, germination index (GI): 145-157%, Cr: 8-10mg/kg dry mass), fulfills EU requirements and can be used as a fertilizer in organic farming. Copyright © 2014 Elsevier B.V. All rights reserved.

  15. Retention of U(VI) onto silica in presence of model organic molecules

    International Nuclear Information System (INIS)

    Pham, T.T.H.; Mercier-Bion, F.; Drot, R.; Lagarde, G.; Simoni, E.; Lambert, J.

    2008-01-01

    It is well-known that the organic matter influences the retention of ions onto mineral surfaces. However, the major part of concerned studies implies humic substances and complex solids. Another approach for identifying the sorption mechanisms is possible by studying simpler solids than those present in natural medium. So, silica is chosen as mineral surface because of its abundance in soils and of the presence of Si-O groups in clayey minerals. Uranium (VI) is selected as cation. Simple organic molecules like acetic (one carboxylic group) and oxalic (two carboxylic functions) acids are considered as models of the natural organic matter for understanding their role in the retention of U(VI) onto powders and slides of silica. Binary (organics/silica, U(VI)/silica) and ternary systems (organics/silica/U(VI)) are studied by complementary approaches. Sorption edges as function of pH are obtained by liquid scintillation methods and capillary electrophoresis. Different spectroscopic techniques are used to deduce the interactions between the organic matter and U(VI) sorbed onto the silica whose: Time-Resolved Laser induced Fluorescence Spectroscopy (TRLFS), X-ray Photoelectron Spectroscopy (XPS), Nuclear Microprobe Analysis (NMA). The results of the effect of these model organic molecules onto the U(VI) retention showed a good agreement between the different techniques. Concerning the acetic acid, there are not differences in the sorption percentages of uranyl (see the figure). All these results indicate that the uranyl-acetate complexes stay in the aqueous solution rather than sorbing onto the silica. On the contrary, oxalic acid influences the sorption of U(VI) onto the silica surface. The sorption percentage of U(VI) in the ternary system (oxalic acid/silica/U(VI)) is lower than the binary system (U(VI)/silica) (see the figure). So, the presence of oxalic acid decreases the sorption of U(VI) onto the silica surface. (authors)

  16. Coplanar capacitance sensors for detecting water intrusion in composite structures

    International Nuclear Information System (INIS)

    Nassr, Amr A; El-Dakhakhni, Wael W; Ahmed, Wael H

    2008-01-01

    Composite materials are becoming more affordable and widely used for retrofitting, rehabilitating and repairing reinforced concrete structures designed and constructed under older specifications. However, the mechanical properties and long-term durability of composite materials may degrade severely in the presence of water intrusion. This study presents a new non-destructive evaluation (NDE) technique for detecting the water intrusion in composite structures by evaluating the dielectric properties of different composite system constituent materials. The variation in the dielectric signatures was employed to design a coplanar capacitance sensor with high sensitivity to detect such defects. An analytical model was used to study the effect of the sensor geometry on the output signal and to optimize sensor design. A finite element model was developed to validate analytical results and to evaluate other sensor design-related parameters. Experimental testing of a concrete specimen wrapped with composite laminate and containing a series of pre-induced water intrusion defects was conducted in order to validate the concept of the new technique. Experimental data showed excellent agreement with the finite element model predictions and confirmed sensor performance

  17. An Automata Based Intrusion Detection Method for Internet of Things

    Directory of Open Access Journals (Sweden)

    Yulong Fu

    2017-01-01

    Full Text Available Internet of Things (IoT transforms network communication to Machine-to-Machine (M2M basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.

  18. Experimental Monitoring of Cr(VI) Bio-reduction Using Electrochemical Geophysics

    International Nuclear Information System (INIS)

    Birsen Canan; Gary R. Olhoeft; William A. Smith

    2007-01-01

    Many Department of Energy (DOE) sites are contaminated with highly carcinogenic hexavalent chromium (Cr(VI)). In this research, we explore the feasibility of applying complex resistivity to the detection and monitoring of microbially-induced reduction of hexavalent chromium (Cr(VI)) to a less toxic form (Cr(III)). We hope to measure the change in ionic concentration that occurs during this reduction reaction. This form of reduction promises to be an attractive alternative to more expensive remedial treatment methods. The specific goal of this research is to define the minimum and maximum concentration of the chemical and biological compounds in contaminated samples for which the Cr(VI) - Cr(III) reduction processes could be detected via complex resistivity. There are three sets of experiments, each comprised of three sample columns. The first experiment compares three concentrations of Cr(VI) at the same bacterial cell concentration. The second experiment establishes background samples with, and without, Cr(VI) and bacterial cells. The third experiment examines the influence of three different bacterial cell counts on the same concentration of Cr(VI). A polarization relaxation mechanism was observed between 10 and 50 Hz. The polarization mechanism, unfortunately, was not unique to bio-chemically active samples. Spectral analysis of complex resistivity data, however, showed that the frequency where the phase minimum occurred was not constant for bio-chemically active samples throughout the experiment. A significant shifts in phase minima occurred between 10 to 20 Hz from the initiation to completion of Cr(VI) reduction. This phenomena was quantified using the Cole-Cole model and the Marquardt-Levenberg nonlinear least square minimization method. The data suggests that the relaxation time and the time constant of this relaxation are the Cole-Cole parameters most sensitive to changes in biologically-induced reduction of Cr(VI)

  19. Paisaje del viñedo: patrimonio y recurso

    Directory of Open Access Journals (Sweden)

    Luis Vicente Elías

    2008-01-01

    Full Text Available La propuesta de que el paisaje del viñedo sea el complemento a la visita a la bodega, siendo esta el eje del turismo del vino, es el objetivo de este trabajo. Repasando los conceptos variables de patrimonio, llegamos al paisaje del viñedo como recurso, formando parte del patrimonio natural. Pero este no se puede desvincular de los otros aspectos patrimoniales, por lo que la cultura tradicional es el soporte de la tipología de paisaje que queremos proponer y que va contrastar con los nuevos paisajes del viñedo que surgen de las recientes técnicas en los cultivos y de la actual vitivicultura, emparejada con una moderna “cultura del vino”. El análisis de las diversas normativas, que salvaguardan el paisaje y la comprobación del escaso valor legal del paisaje del viñedo, es otro puntal de este trabajo que trata de unir paisaje con cultura tradicional como recursos del Turismo del Vino, integrados en las Rutas del Vino.

  20. Simulation of sea water intrusion in coastal aquifers

    Indian Academy of Sciences (India)

    dependent miscible flow and transport modelling approach for simulation of seawater intrusion in coastal aquifers. A nonlinear optimization-based simulation methodology was used in this study. Various steady state simulations are performed for a ...

  1. Piezoelectric trace vapor calibrator

    International Nuclear Information System (INIS)

    Verkouteren, R. Michael; Gillen, Greg; Taylor, David W.

    2006-01-01

    The design and performance of a vapor generator for calibration and testing of trace chemical sensors are described. The device utilizes piezoelectric ink-jet nozzles to dispense and vaporize precisely known amounts of analyte solutions as monodisperse droplets onto a hot ceramic surface, where the generated vapors are mixed with air before exiting the device. Injected droplets are monitored by microscope with strobed illumination, and the reproducibility of droplet volumes is optimized by adjustment of piezoelectric wave form parameters. Complete vaporization of the droplets occurs only across a 10 deg. C window within the transition boiling regime of the solvent, and the minimum and maximum rates of trace analyte that may be injected and evaporated are determined by thermodynamic principles and empirical observations of droplet formation and stability. By varying solution concentrations, droplet injection rates, air flow, and the number of active nozzles, the system is designed to deliver--on demand--continuous vapor concentrations across more than six orders of magnitude (nominally 290 fg/l to 1.05 μg/l). Vapor pulses containing femtogram to microgram quantities of analyte may also be generated. Calibrated ranges of three explosive vapors at ng/l levels were generated by the device and directly measured by ion mobility spectrometry (IMS). These data demonstrate expected linear trends within the limited working range of the IMS detector and also exhibit subtle nonlinear behavior from the IMS measurement process

  2. Evaluation of intrusion sensors and video assessment in areas of restricted passage

    International Nuclear Information System (INIS)

    Hoover, C.E.; Ringler, C.E.

    1996-04-01

    This report discusses an evaluation of intrusion sensors and video assessment in areas of restricted passage. The discussion focuses on applications of sensors and video assessment in suspended ceilings and air ducts. It also includes current and proposed requirements for intrusion detection and assessment. Detection and nuisance alarm characteristics of selected sensors as well as assessment capabilities of low-cost board cameras were included in the evaluation

  3. Delineation and Diagnostic Criteria of Oral-Facial-Digital Syndrome Type VI

    Directory of Open Access Journals (Sweden)

    Poretti Andrea

    2012-01-01

    Full Text Available Abstract Oral-Facial-Digital Syndrome type VI (OFD VI represents a rare phenotypic subtype of Joubert syndrome and related disorders (JSRD. In the original report polydactyly, oral findings, intellectual disability, and absence of the cerebellar vermis at post-mortem characterized the syndrome. Subsequently, the molar tooth sign (MTS has been found in patients with OFD VI, prompting the inclusion of OFD VI in JSRD. We studied the clinical, neurodevelopmental, neuroimaging, and genetic findings in a cohort of 16 patients with OFD VI. We derived the following inclusion criteria from the literature: 1 MTS and one oral finding and polydactyly, or 2 MTS and more than one typical oral finding. The OFD VI neuroimaging pattern was found to be more severe than in other JSRD subgroups and includes severe hypoplasia of the cerebellar vermis, hypoplastic and dysplastic cerebellar hemispheres, marked enlargement of the posterior fossa, increased retrocerebellar collection of cerebrospinal fluid, abnormal brainstem, and frequently supratentorial abnormalities that occasionally include characteristic hypothalamic hamartomas. Additionally, two new JSRD neuroimaging findings (ascending superior cerebellar peduncles and fused thalami have been identified. Tongue hamartomas, additional frenula, upper lip notch, and mesoaxial polydactyly are specific findings in OFD VI, while cleft lip/palate and other types of polydactyly of hands and feet are not specific. Involvement of other organs may include ocular findings, particularly colobomas. The majority of the patients have absent motor development and profound cognitive impairment. In OFD VI, normal cognitive functions are possible, but exceptional. Sequencing of known JSRD genes in most patients failed to detect pathogenetic mutations, therefore the genetic basis of OFD VI remains unknown. Compared with other JSRD subgroups, the neurological findings and impairment of motor development and cognitive functions in OFD

  4. Root resorption after orthodontic intrusion and extrusion:.

    NARCIS (Netherlands)

    Han, G.; Huang, S.; Hoff, J.W. Von den; Zeng, X.; Kuijpers-Jagtman, A.M.

    2005-01-01

    The aim of this investigation was to compare root resorption in the same individual after application of continuous intrusive and extrusive forces. In nine patients (mean age 15.3 years), the maxillary first premolars were randomly intruded or extruded with a continuous force of 100 cN for eight

  5. Externalizing symptoms, effortful control, and intrusive parenting: A test of bidirectional longitudinal relations during early childhood.

    Science.gov (United States)

    Eisenberg, Nancy; Taylor, Zoe E; Widaman, Keith F; Spinrad, Tracy L

    2015-11-01

    At approximately 30, 42, and 54 months of age (N = 231), the relations among children's externalizing symptoms, intrusive maternal parenting, and children's effortful control (EC) were examined. Both intrusive parenting and low EC have been related to psychopathology, but children's externalizing problems and low EC might affect the quality of parenting and one another. Mothers' intrusive behavior with their children was assessed with observations, children's EC was measured with mothers' and caregivers' reports, and children's externalizing symptoms were assessed with mothers', fathers', and caregivers' reports. In a structural equation panel model, bidirectional relations between intrusive parenting and EC were found: EC at 30 and 42 months predicted low levels of intrusive parenting a year later, controlling for prior levels of parenting and vice versa. Moreover, high levels of children's externalizing problems at both 30 and 42 months negatively predicted EC a year later, controlling for prior levels of EC. Although externalizing problems positively predicted high EC over time, this appeared to be a suppression effect because these variables had a strong negative pattern in the zero-order correlations. Moreover, when controlling for the stability of intrusive parenting, EC, and externalizing (all exhibited significant stability across time) and the aforementioned cross-lagged predictive paths, EC and externalizing problems were still negatively related within the 54-month assessment. The findings are consistent with the view that children's externalizing behavior undermines their EC and contributes to intrusive mothering and that relations between intrusive parenting and EC are bidirectional across time. Thus, interventions that focus on modifying children's externalizing problems (as well as the quality of parenting) might affect the quality of parenting they receive and, hence, subsequent problems with adjustment.

  6. New approach in modeling Cr(VI) sorption onto biomass from metal binary mixtures solutions

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Chang [College of Environmental Science and Engineering, Anhui Normal University, South Jiuhua Road, 189, 241002 Wuhu (China); Chemical Engineering Department, Escola Politècnica Superior, Universitat de Girona, Ma Aurèlia Capmany, 61, 17071 Girona (Spain); Fiol, Núria [Chemical Engineering Department, Escola Politècnica Superior, Universitat de Girona, Ma Aurèlia Capmany, 61, 17071 Girona (Spain); Villaescusa, Isabel, E-mail: Isabel.Villaescusa@udg.edu [Chemical Engineering Department, Escola Politècnica Superior, Universitat de Girona, Ma Aurèlia Capmany, 61, 17071 Girona (Spain); Poch, Jordi [Applied Mathematics Department, Escola Politècnica Superior, Universitat de Girona, Ma Aurèlia Capmany, 61, 17071 Girona (Spain)

    2016-01-15

    In the last decades Cr(VI) sorption equilibrium and kinetic studies have been carried out using several types of biomasses. However there are few researchers that consider all the simultaneous processes that take place during Cr(VI) sorption (i.e., sorption/reduction of Cr(VI) and simultaneous formation and binding of reduced Cr(III)) when formulating a model that describes the overall sorption process. On the other hand Cr(VI) scarcely exists alone in wastewaters, it is usually found in mixtures with divalent metals. Therefore, the simultaneous removal of Cr(VI) and divalent metals in binary mixtures and the interactive mechanism governing Cr(VI) elimination have gained more and more attention. In the present work, kinetics of Cr(VI) sorption onto exhausted coffee from Cr(VI)–Cu(II) binary mixtures has been studied in a stirred batch reactor. A model including Cr(VI) sorption and reduction, Cr(III) sorption and the effect of the presence of Cu(II) in these processes has been developed and validated. This study constitutes an important advance in modeling Cr(VI) sorption kinetics especially when chromium sorption is in part based on the sorbent capacity of reducing hexavalent chromium and a metal cation is present in the binary mixture. - Highlights: • A kinetic model including Cr(VI) reduction, Cr(VI) and Cr(III) sorption/desorption • Synergistic effect of Cu(II) on Cr(VI) elimination included in the model • Model validation by checking it against independent sets of data.

  7. New approach in modeling Cr(VI) sorption onto biomass from metal binary mixtures solutions

    International Nuclear Information System (INIS)

    Liu, Chang; Fiol, Núria; Villaescusa, Isabel; Poch, Jordi

    2016-01-01

    In the last decades Cr(VI) sorption equilibrium and kinetic studies have been carried out using several types of biomasses. However there are few researchers that consider all the simultaneous processes that take place during Cr(VI) sorption (i.e., sorption/reduction of Cr(VI) and simultaneous formation and binding of reduced Cr(III)) when formulating a model that describes the overall sorption process. On the other hand Cr(VI) scarcely exists alone in wastewaters, it is usually found in mixtures with divalent metals. Therefore, the simultaneous removal of Cr(VI) and divalent metals in binary mixtures and the interactive mechanism governing Cr(VI) elimination have gained more and more attention. In the present work, kinetics of Cr(VI) sorption onto exhausted coffee from Cr(VI)–Cu(II) binary mixtures has been studied in a stirred batch reactor. A model including Cr(VI) sorption and reduction, Cr(III) sorption and the effect of the presence of Cu(II) in these processes has been developed and validated. This study constitutes an important advance in modeling Cr(VI) sorption kinetics especially when chromium sorption is in part based on the sorbent capacity of reducing hexavalent chromium and a metal cation is present in the binary mixture. - Highlights: • A kinetic model including Cr(VI) reduction, Cr(VI) and Cr(III) sorption/desorption • Synergistic effect of Cu(II) on Cr(VI) elimination included in the model • Model validation by checking it against independent sets of data

  8. Cr(VI) retention and transport through Fe(III)-coated natural zeolite

    Energy Technology Data Exchange (ETDEWEB)

    Du, Gaoxiang [School of Materials Science and Technology, China University of Geosciences, Beijing 100083 (China); Li, Zhaohui, E-mail: li@uwp.edu [School of Materials Science and Technology, China University of Geosciences, Beijing 100083 (China); Geosciences Department, University of Wisconsin-Parkside, Kenosha, WI 53144 (United States); Department of Earth Sciences, National Cheng Kung University, 1 University Road, Tainan 70101, Taiwan (China); Liao, Libing [School of Materials Science and Technology, China University of Geosciences, Beijing 100083 (China); Hanson, Renee; Leick, Samantha; Hoeppner, Nicole [Geosciences Department, University of Wisconsin-Parkside, Kenosha, WI 53144 (United States); Jiang, Wei-Teh [Department of Earth Sciences, National Cheng Kung University, 1 University Road, Tainan 70101, Taiwan (China)

    2012-06-30

    Graphical abstract: Breakthrough curves of Cr(VI) from columns packed with raw zeolite (a) and Fe(III)-zeolite (b). The solid line in (b) is the HYDRUS-1D fit to the observed data with adsorption term only, while the dashed line in (b) includes a reduction term in the HYDRUS-1D fit. Highlights: Black-Right-Pointing-Pointer Zeolite modified with Fe(III) could be used for adsorption and retention of Cr(VI). Black-Right-Pointing-Pointer The Fe present on zeolite was in an amorphous Fe(OH){sub 3} form. Black-Right-Pointing-Pointer A Cr(VI) adsorption capacity of 82 mg/kg was found on Fe(III)-zeolite. Black-Right-Pointing-Pointer A Cr(VI) retardation factor of 3 or 5 was determined from column and batch studies. - Abstract: Cr(VI) is a group A chemical based on the weight of evidence of carcinogenicity. Its transport and retention in soils and groundwater have been studied extensively. Zeolite is a major component in deposits originated from volcanic ash and tuff after alteration. In this study, zeolite aggregates with the particle size of 1.4-2.4 mm were preloaded with Fe(III). The influence of present Fe(III) on Cr(VI) retention by and transport through zeolite was studied under batch and column experiments. The added Fe(III) resulted in an enhanced Cr(VI) retention by the zeolite with a capacity of 82 mg/kg. The Cr(VI) adsorption on Fe(III)-zeolite followed a pseudo-second order kinetically and the Freundlich adsorption isotherm thermodynamically. Fitting the column experimental data to HYDRUS-1D resulted in a retardation factor of 3 in comparison to 5 calculated from batch tests at an initial Cr(VI) concentration of 3 mg/L. The results from this study showed that enhanced adsorption and retention of Cr(VI) may happen in soils derived from volcanic ash and tuff that contains significant amounts of zeolite with extensive Fe(III) coating.

  9. Simultaneous Treatment of Agro-Industrial and Industrial Wastewaters: Case Studies of Cr(VI/Second Cheese Whey and Cr(VI/Winery Effluents

    Directory of Open Access Journals (Sweden)

    Triantafyllos I. Tatoulis

    2018-03-01

    Full Text Available Hexavalent chromium (Cr(VI was co-treated either with second cheese whey (SCW or winery effluents (WE using pilot-scale biological trickling filters in series under different operating conditions. Two pilot-scale filters in series using plastic support media were used in each case. The first filter (i.e., Cr-SCW-filter or Cr-WE-filter aimed at Cr(VI reduction and the partial removal of dissolved chemical oxygen demand (d-COD from SCW or WE and was inoculated with indigenous microorganisms originating from industrial sludge. The second filter in series (i.e., SCW-filter or WE-filter aimed at further d-COD removal and was inoculated with indigenous microorganisms that were isolated from SCW or WE. Various Cr(VI (5–100 mg L−1 and SCW or WE (d-COD, 1000–25,000 mg L−1 feed concentrations were tested. Based on the experimental results, the sequencing batch reactor operating mode with recirculation of 0.5 L min−1 proved very efficient since it led to complete Cr(VI reduction in the first filter in series and achieved high Cr(VI reduction rates (up to 36 and 43 mg L−1 d−1, for SCW and WW, respectively. Percentage d-COD removal for SCW and WE in the first filter was rather low, ranging from 14 to 42.5% and from 4 to 29% in the Cr-SCW-filter and Cr-WE-filter, respectively. However, the addition of the second filter in series enhanced total d-COD removal to above 97% and 90.5% for SCW and WE, respectively. The above results indicate that agro-industrial wastewater could be used as a carbon source for Cr(VI reduction, while the use of two trickling filters in series could effectively treat both industrial and agro-industrial wastewaters with very low installation and operational costs.

  10. Unsaturated zone moisture and vapor movement induced by temperature variations in asphalt barrier field lysimeters

    International Nuclear Information System (INIS)

    Holford, D.J.; Fayer, M.J.

    1990-08-01

    Protective barriers are being considered for use at the Hanford Site to enhance the isolation of radioactive wastes from water, plant, and animal intrusion. Lysimeters were constructed to evaluate the performance of asphalt barrier formulations under natural environmental conditions. These lysimeters were constructed of 1.7-m lengths of PVC pipe that have a diameter of 30 cm. The lysimeters were filled with layers of gravel, coarse sand, and asphalt. The sand and gravel placed under the asphalt barrier were wet when installed. TOUGH was used to conduct simulations to assess the effect of temperature variations on moisture and vapor movement beneath the asphalt layer in field test lysimeters. All variables in TOUGH were converted to double precision so that simulations could be run on a Sun-4 UNIX workstation. A radially symmetric grid was used to simulate the lysimeter. 8 refs., 9 figs

  11. Multi-User Low Intrusive Occupancy Detection

    Directory of Open Access Journals (Sweden)

    Azkario Rizky Pratama

    2018-03-01

    Full Text Available Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS of BLE (Bluetooth Low Energy nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach.

  12. Ternary uranium(VI) carbonato humate complex studied by cryo-TRLFS

    Energy Technology Data Exchange (ETDEWEB)

    Steudtner, R.; Sachs, S.; Schmeide, K.; Brendler, V.; Bernhard, G. [Helmholtz-Zentrum Dresden-Rossendorf, Dresden (Germany). Inst. of Radiochemistry

    2011-07-01

    The complex formation of U(VI) with humic acid (HA) in the presence of carbonate was studied by time-resolved laser-induced fluorescence spectroscopy at low temperature (cryo-TRLFS) at pH 8.5. In the presence of HA, a decrease of the luminescence intensity of U(VI) and no shift of the emission band maxima in comparison to the luminescence spectrum of the UO{sub 2}(CO{sub 3}){sub 3}{sup 4-} complex, the dominating U(VI) species under the applied experimental conditions in the absence of HA, was observed. The formation of a ternary U(VI) carbonato humate complex of the type UO{sub 2}(CO{sub 3}){sub 2}HA(II){sup 4-} starting from UO{sub 2}(CO{sub 3}){sub 3}{sup 4-} was concluded from the luminescence data. For this complex a complex stability constant of log K=2.83 {+-} 0.17 was determined. Slope analysis resulted in a slope of 1.12 {+-} 0.11, which verifies the postulated complexation reaction. The results agree very well with literature data. Speciation calculations show that the formation of the ternary U(VI) carbonato humate complex can significantly influence the U(VI) speciation under environmental conditions. (orig.)

  13. Recovery of uranium (VI) from low level aqueous radioactive waste

    International Nuclear Information System (INIS)

    Kulshrestha, Mukul

    1996-01-01

    Investigation was undertaken to evaluate the uranium (VI) removal and recovery potential of a naturally occurring, nonviable macrofungus, Ganoderma Lucidum from the simulated low level aqueous nuclear waste. These low level waste waters discharged from nuclear mine tailings and nuclear power reactors have a typical U(VI) concentration of 10-100 mg/L. It is possible to recover this uranium economically with the advent of biosorption as a viable technology. Extensive laboratory studies have revealed Ganoderma Lucidum to be a potential biosorbent with a specific uptake of 2.75 mg/g at an equilibrium U(VI) concentration of 10 mg/L at pH 4.5. To recover the sorbed U(VI), the studies indicated 0.2N Na 2 CO 3 to be an effective elutant. The kinetics of U(VI) desorption from loaded Ganoderma Lucidum with 0.2N Na 2 CO 3 as elutant, was found to be rapid with more than 75% recovery occurring in the first five minutes, the specific metal release rate being 0.102 mg/g/min. The equilibrium data fitted to a linearised Freundlich plot and exhibited a near 100% recovery of sorbed U(VI), clearly revealing a cost-effective method of recovery of precious uranium from low level wastewater. (author). 7 refs., 3 figs., 1 tab

  14. Ant colony induced decision trees for intrusion detection

    CSIR Research Space (South Africa)

    Botes, FH

    2017-06-01

    Full Text Available platform. Intrusion Detection Systems (IDS) analyse network traffic to identify suspicious patterns with the intention to compromise the system. Practitioners train classifiers to classify the data within different categories e.g. malicious or normal...

  15. Free to love? The role of intrusive parenting for young adult children's romantic relationship quality.

    Science.gov (United States)

    Parise, Miriam; Manzi, Claudia; Donato, Silvia; Iafrate, Raffaella

    2017-01-01

    Intrusive parenting is a form of boundary disturbance in the parent-child relationship which has been consistently associated with children's maladjustment. The present study examines the role of intrusive parenting for young adult children's romantic relationship quality. Relying on data from a two-wave longitudinal study among young couples in transition to marriage in Italy, we investigated the link between young adults' perceived intrusive parenting and change in their romantic relationship quality from 6 months before marriage to 18 months after marriage, as well as the mediating role of change in the capacity to include the partner in the self. Data were analyzed using actor-partner interdependence modeling. Perceived intrusive parenting negatively predicted change in inclusion of the other in the self and change in romantic relationship quality for both partners. For females, change in their capacity of inclusion of the other in the self fully mediated the association between their perceived intrusive parenting and change in their own and partner's relationship quality. Limitations and implications for practice are discussed.

  16. Novel Quantum Dot Gate FETs and Nonvolatile Memories Using Lattice-Matched II-VI Gate Insulators

    Science.gov (United States)

    Jain, F. C.; Suarez, E.; Gogna, M.; Alamoody, F.; Butkiewicus, D.; Hohner, R.; Liaskas, T.; Karmakar, S.; Chan, P.-Y.; Miller, B.; Chandy, J.; Heller, E.

    2009-08-01

    This paper presents the successful use of ZnS/ZnMgS and other II-VI layers (lattice-matched or pseudomorphic) as high- k gate dielectrics in the fabrication of quantum dot (QD) gate Si field-effect transistors (FETs) and nonvolatile memory structures. Quantum dot gate FETs and nonvolatile memories have been fabricated in two basic configurations: (1) monodispersed cladded Ge nanocrystals (e.g., GeO x -cladded-Ge quantum dots) site-specifically self-assembled over the lattice-matched ZnMgS gate insulator in the channel region, and (2) ZnTe-ZnMgTe quantum dots formed by self-organization, using metalorganic chemical vapor-phase deposition (MOCVD), on ZnS-ZnMgS gate insulator layers grown epitaxially on Si substrates. Self-assembled GeO x -cladded Ge QD gate FETs, exhibiting three-state behavior, are also described. Preliminary results on InGaAs-on-InP FETs, using ZnMgSeTe/ZnSe gate insulator layers, are presented.

  17. Fuel vapor pressure (FVAPRS)

    International Nuclear Information System (INIS)

    Mason, R.E.

    1979-04-01

    A subcode (FVAPRS) is described which calculates fuel vapor pressure. This subcode was developed as part of the fuel rod behavior modeling task performed at EG and G Idaho, Inc. The fuel vapor pressure subcode (FVAPRS), is presented and a discussion of literature data, steady state and transient fuel vapor pressure equations and estimates of the standard error of estimate to be expected with the FVAPRS subcode are included

  18. Evolution of Th and U whole-rock contents in the Ilimaussaq intrusion

    International Nuclear Information System (INIS)

    Bailey, J.C.; Rose-Hansen, J.; Soerensen, H.

    1981-01-01

    Thorium and uranium values of a large collction of representative samples taken from all rock types of the Ilimaussaq alkaline intrusion, South Greenland, are presented. The values are largely obtained by laboratory gamma-ray spectrometric (GRS) analysis. The results are discussed in relation to current knowledge and ideas on the petrologic evolution of the Ilimaussaq intrusion. It is concluded that (1) Rocks from the Ilimaussaq alkaline intrusion evolve to extremely high Th and U contents; (2) The evolution is characterised by appearance of low-Th/U cumulates due to the appearance of low-Th/U eudialyte as a liquidus phase; (3) Fractionation of the observed cumulus assemblages fails to explain all features of the Th-U evolution; (4) Losses of mobile fluids, rich in Th/U, occur in the final stages. (BP)

  19. Solvent impregnated resin for isolation of U(VI) from industrial wastes

    International Nuclear Information System (INIS)

    Karve, M.; Rajgor, R.V.

    2008-01-01

    A solid-phase extraction method based upon impregnation of Cyanex 302 (bis(2,4,4- trimethylpentyl)mono-thio-phosphinic acid) on Amberlite XAD-2 resin is proposed for isolation of U(VI) from uranmicrolite ore tailing samples and industrial effluent samples. U(VI) was sorbed from nitric acid media on the solvent-impregnated resin (SIR) and was recovered completely with 1.0 M HCl. Based upon sorption behavior of U(VI) with Cyanex 302, it was quantitatively sorbed on the SIR in a dynamic method, while the other metal ions were not sorbed by the modified resin. The preparation of impregnated resin is simple, based upon physical interaction of the extractant and solid support, has good sorption capacity for U(VI), and is also reliable for detection of traces of U(VI). (authors)

  20. Active Low Intrusion Hybrid Monitor for Wireless Sensor Networks.

    Science.gov (United States)

    Navia, Marlon; Campelo, Jose C; Bonastre, Alberto; Ors, Rafael; Capella, Juan V; Serrano, Juan J

    2015-09-18

    Several systems have been proposed to monitor wireless sensor networks (WSN). These systems may be active (causing a high degree of intrusion) or passive (low observability inside the nodes). This paper presents the implementation of an active hybrid (hardware and software) monitor with low intrusion. It is based on the addition to the sensor node of a monitor node (hardware part) which, through a standard interface, is able to receive the monitoring information sent by a piece of software executed in the sensor node. The intrusion on time, code, and energy caused in the sensor nodes by the monitor is evaluated as a function of data size and the interface used. Then different interfaces, commonly available in sensor nodes, are evaluated: serial transmission (USART), serial peripheral interface (SPI), and parallel. The proposed hybrid monitor provides highly detailed information, barely disturbed by the measurement tool (interference), about the behavior of the WSN that may be used to evaluate many properties such as performance, dependability, security, etc. Monitor nodes are self-powered and may be removed after the monitoring campaign to be reused in other campaigns and/or WSNs. No other hardware-independent monitoring platforms with such low interference have been found in the literature.

  1. A model for the dynamics of crater-centered intrusion: Application to lunar floor-fractured craters

    Science.gov (United States)

    Thorey, Clément; Michaut, Chloé

    2014-01-01

    Lunar floor-fractured craters are a class of craters modified by post-impact mechanisms. They are defined by distinctive shallow floors that are convex or plate-like, sometimes with a wide floor moat bordering the wall region. Radial, concentric, and polygonal floor fractures suggest an endogenous process of modification. Two mechanisms have been proposed to account for such deformations: viscous relaxation and spreading of a magma intrusion at depth below the crater. To test the second assumption and bring more constraints on the intrusion process, we develop a model for the dynamics of magma spreading below an elastic overlying layer with a crater-like topography. As predicted in earlier more qualitative studies, the increase in lithostatic pressure at the crater wall zone prevents the intrusion from spreading laterally, leading to the thickening of the intrusion. Additionally, our model shows that the final crater floor appearance after the uplift, which can be convex or flat, with or without a circular moat bordering the wall zone, depends on the elastic thickness of the layer overlying the intrusion and on the crater size. Our model provides a simple formula to derive the elastic thickness of the overlying layer hence a minimum estimate for the intrusion depth. Finally, our model suggests that crust redistribution by cratering must have controlled magma ascent below most of these craters.

  2. Cr (VI) remediation by indigenous bacteria in soils contaminated by chromium-containing slag

    International Nuclear Information System (INIS)

    Chai Liyuan; Huang Shunhong; Yang Zhihui; Peng Bing; Huang Yan; Chen Yuehui

    2009-01-01

    Hexavalent chromium (Cr) is a toxic element causing serious environmental threat. Recently, more and more attention is paid to the bio-remediation of Cr (VI) in the contaminated soils. Cr (VI) remediation by indigenous bacteria in soils contaminated by chromium-containing slag at a steel-alloy factory in Hunan Province, China, was investigated in the present study. The results showed that when sufficient nutrients were amended into the contaminated soils, total Cr (VI) concentration declined from the initial value of 462.8 to 10 mg kg -1 at 10 days and the removal rate was 97.8%. Water soluble Cr (VI) decreased from the initial concentration of 383.8 to 1.7 mg kg -1 . Exchangeable Cr (VI) and carbonates-bound Cr (VI) were removed by 92.6% and 82.4%, respectively. Meanwhile, four Cr (VI) resistant bacterial strains were isolated from the soil under the chromium-containing slag. Only one strain showed a high ability for Cr (VI) reduction in liquid culture. This strain was identified as Pannonibacter phragmitetus sp. by gene sequencing of 16S rRNA. X-ray photoelectron spectroscope (XPS) analysis indicated that Cr (VI) was reduced into trivalent chromium. The results suggest that indigenous bacterial strains have potential application for Cr (VI) remediation in the soils contaminated by chromium-containing slag.

  3. Impact of water quality parameters on the sorption of U(VI) onto hematite

    International Nuclear Information System (INIS)

    Zhao Donglin; Wang Xianbiao; Yang Shitong; Guo Zhiqiang; Sheng Guodong

    2012-01-01

    In this study, the sorption of U(VI) from aqueous solution on hematite was studied as a function of various water quality parameters such as contact time, pH, ionic strength, soil humic acid (HA) or fulvic acid (FA), solid content and temperature by using a batch technique. The results demonstrated that the sorption of U(VI) was strongly dependent on ionic strength at pH 6.0 and the sorption was mainly dominated by inner-sphere surface complexation. The presence of HA/FA increases U(VI) sorption at low pH, whereas decreases U(VI) sorption at high pH. The thermodynamic parameters (ΔH 0 , ΔS 0 , and ΔG 0 ) were calculated from the temperature dependent sorption isotherms, and the results suggested that U(VI) sorption was a spontaneous and endothermic process. The results might be important for the application of hematite in U(VI) pollution management. Highlights: ► The sorption of U(VI) was strongly dependent on ionic strength at pH 6.0. ► A positive effect of HA/FA on U(VI) sorption was found at low pH, whereas a negative effect was observed at high pH. ► U(VI) sorption was a spontaneous and endothermic process. ► The results are quite important for the application of hematite in U(VI) pollution management.

  4. Electrochemical processes for the environmental remediation of toxic Cr(VI): A review

    International Nuclear Information System (INIS)

    Jin, Wei; Du, Hao; Zheng, Shili; Zhang, Yi

    2016-01-01

    Highlights: • Recent advances in electrochemical technologies for practical Cr(VI) treatment applications was reviewed. • The mechanism and performance of electrocoagulation, electrochemical reduction, electrodialysis, electro-electrodialysis and electrodeionization were discussed and compared. • The remained challenges and future perspectives were commented. - Abstract: Hexavalent chromium Cr(VI) is extremely toxic and classified as one of the 17 chemicals posing the greatest threat to humans. Large amounts of Cr(VI) compounds are directly or indirectly discharged into the environment, therefore considerable efforts have been made to control the Cr(VI) concentration below the recommended level. It has been demonstrated that electrochemical technique is one of the most efficient and environmental benign approach for the Cr(VI) removal. This review aims at recent advances in electrochemical technology for practical Cr(VI) treatment applications. By using the “clean reagent” of electron, Cr(VI) can be completely eliminated or separated via different electrochemical techniques such as electrocoagulation, electrochemical reduction, electrodialysis, electro-electrodialysis and electrodeionization. Besides, the mechanism and performance of different strategies are commented and compared. The treatment process is largely dependent on variables such as pH, electrode materials, cell configuration and techniques integration. Furthermore, the remained limitation and challenges for the electrochemical Cr(VI) remediation are also discussed.

  5. Biological intrusion of low-level-waste trench covers

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Gladney, E.S.

    1981-01-01

    The long-term integrity of low-level waste shallow land burial sites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. Past research on low-level waste shallow land burial methods has emphasized physical (i.e., water infiltration, soil erosion) and chemical (radionuclide leaching) processes that can cause waste site failure and subsequent radionuclide transport. The purpose of this paper is to demonstrate the need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatments. Plants and animals not only can transport radionuclides to the ground surface via root systems and soil excavated from the cover profile by animal burrowing activities, but they modify physical and chemical processes within the cover profile by changing the water infiltration rates, soil erosion rates and chemical composition of the soil. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and soil overburden depth. The rate of biological intrusion through the various barrier materials is being evaluated through the use of activatable stable tracers

  6. Bulk solubility and speciation of plutonium(VI) in phosphate-containing solutions

    International Nuclear Information System (INIS)

    Weger, H.T.; Okajima, S.; Cunnane, J.C.; Reed, D.T.

    1992-01-01

    The solubility and speciation of Pu(VI) with phosphate as a function of pH was investigated to determine the ability of phosphate to act as an actinide getter. The general properties were first investigated and are reported here with the goal of performing more quantitative experiments in the future. Solubility was approached from oversaturation at initial pH = 4, 10 and 13.4. Absorption spectra were recorded, the solution filtered and the filtrate counted. Absorption spectra were obtained at varying phosphate concentrations and at pH of 2.7 to 11.9. The effect of complexation on the 833 mn Pu(VI) band was characterized. Evidence for three phosphate complexes was obtained for pH -5 to 10 -6 M Pu(VI) was measured in the filtrate at pH ≤ 10 that were passed through a 50 mn filter. Pu(VI) complexes with phosphate over hydroxide at pH ≤ 11.6, but at pH ≥ 11.9, only hydrolyzed Pu(VI) was detected. At pH = 12, the concentration of Pu(VI) was as high as 10 -4 M

  7. Bacillus lichenformis γ-glutamyl exopolymer: Physicochemical characterization and U(VI) interaction

    International Nuclear Information System (INIS)

    He, L.M.; Neu, M.P.; Vanderberg, L.A.

    2000-01-01

    Complexation by microbially produced exopolymers may significantly impact the environmental mobility and toxicity of metals. This study focused on the conformational structure of the bacterial exopolymer, γ-D-poly(glutamic acid) and its interactions with U(VI) examined using ATR-FTIR spectroscopy. Solution pH, polymer concentration, and ionic strength affected the conformation of the exopolymer, and U(VI) binding was monitored. At low pH, low concentration, or low ionic strength, this exopolymer exists in an α-helical conformation, while at high pH, concentration, or ionic strength the exopolymer exhibits a β-sheet structure. The change in exopolymer conformation is likely to influence the number and nature of exposed surface functional groups, sites most responsible for metal complexation. The authors found the polyglutamate capsule binds U(VI) in a binuclear, bidentate fashion; in contrast the glutamate monomer forms a mononuclear, bidentate complex with U(VI). The apparent polynuclear binding of U(VI) may induce β-sheet structure formation provided the U(VI) Concentration is sufficiently high

  8. Intrusive images and voluntary memory for affective pictures: contextualization and dual-task interference.

    Science.gov (United States)

    Krans, Julie; Langner, Oliver; Reinecke, Andrea; Pearson, David G

    2013-12-01

    The present study addressed the role of context information and dual-task interference during the encoding of negative pictures on intrusion development and voluntary recall. Healthy participants were shown negative pictures with or without context information. Pictures were either viewed alone or concurrently with a visuospatial or verbal task. Participants reported their intrusive images of the pictures in a diary. At follow-up, perceptual and contextual memory was tested. Participants in the context group reported more intrusive images and perceptual voluntary memory than participants in the no context group. No effects of the concurrent tasks were found on intrusive image frequency, but perceptual and contextual memory was affected according to the cognitive load of the task. The analogue method cannot be generalized to real-life trauma and the secondary tasks may differ in cognitive load. The findings challenge a dual memory model of PTSD but support an account in which retrieval strategy, rather than encoding processes, accounts for the experience of involuntary versus voluntary recall. Copyright © 2013 Elsevier Ltd. All rights reserved.

  9. QOS and Control-Theoretic Techniques for Intrusion Tolerance

    National Research Council Canada - National Science Library

    Ye, Nong

    2004-01-01

    ...), even in the face of intrusions. This report examines two host-based resources, a router and a web server, and presents simulated models of modifications that can be made to these resources to make them QoS-capable...

  10. Innovative methods to reduce salt water intrusion in harbours

    Science.gov (United States)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  11. Selectivity enhancement of phosphate based functional polymeric gels towards Uranium(VI) using ion imprinting

    International Nuclear Information System (INIS)

    Chappa, Sankararao; Agarwal, Chhavi; Pandey, A.K.

    2015-01-01

    The imprinting of gel containing polymer chains of ethylene glycol methacrylate phosphate (EGMP) for U(VI) ions were carried out. The U(VI) imprinting has been carried out in pure EGMP and in EGMP: poly(ethylene glycol) methacrylate (PEGMA) = 1:9 composition. Complexation of the monomer with template (U(VI)) followed by polymerization have been used to imprint the U(VI) onto the polymer chains. The comparison of uptake studies of U(VI) and Pu(IV) at 3 M HNO 3 shows increased selectivity of U(VI) relative to Pu(IV) for both the gel compositions. The less uptake of U(VI) for imprinted EGMP:PEGMA gel relative to pure imprinted EGMP gel at tracer level can be possibly due to the requirement of two EGMP units in the vicinity for U(VI) complexation. (author)

  12. Clinical evaluation of complete solo surgery with the "ViKY®" robotic laparoscope manipulator.

    Science.gov (United States)

    Takahashi, Masahiro; Takahashi, Masanori; Nishinari, Naoto; Matsuya, Hideki; Tosha, Tsutomu; Minagawa, Yukihiro; Shimooki, Osamu; Abe, Tadashi

    2017-02-01

    Advancement in both surgical technique and medical equipment has enabled solo surgery. ViKY ® Endoscope Positioning System (ViKY ® ) is a robotic system that remotely controls an endoscope and provides direct vision control to the surgeon. Here, we report our experience with ViKY ® -assisted solo surgery. We retrospectively examined 25 cases of solo surgery TAPP with ViKY ® . ViKY ® was setup by the surgeon alone, and the setup duration was determined as the time at which the side rail was positioned and that when the endoscope was installed. For assessing the control unit, the number of false movements was counted. We compared the operative results between ViKY ® -assisted solo surgery TAPP and the conventional method with an assistant. The average time to set up ViKY ® was 7.9 min. The average number of commands for ViKY ® during surgery was 98.3, and the average number of errors and no response of control unit was 7.9. The mean duration of surgery was 136 min for the ViKY ® group, including the setup time, and 117 min for the conventional method. No case required an assistant during the operation. There was also no difference between the two groups with regard to postoperative complications and the rate of recurrence. ViKY ® proved reliable in recognizing orders with very few failures, and the operations were performed safely and were comparable to the conventional operations with assistants. Solo surgery with ViKY ® was beneficial in this clinical evaluation.

  13. Wireless sensing without sensors—an experimental study of motion/intrusion detection using RF irregularity

    International Nuclear Information System (INIS)

    Lee, Pius W Q; Tan, Hwee-Pink; Seah, Winston K G; Yao, Zexi

    2010-01-01

    Motion and intrusion detection are often cited as wireless sensor network (WSN) applications with typical configurations comprising clusters of wireless nodes equipped with motion sensors to detect human motion. Currently, WSN performance is subjected to several constraints, namely radio irregularity and finite on-board computation/energy resources. Radio irregularity in radio frequency (RF) propagation rises to a higher level in the presence of human activity due to the absorption effect of the human body. In this paper, we investigate the feasibility of monitoring RF transmission for the purpose of intrusion detection through experimentation. With empirical data obtained from the Crossbow TelosB platform in several different environments, the impact of human activity on the signal strength of RF signals in a WSN is evaluated. We then propose a novel approach to intrusion detection by turning a constraint in WSN, namely radio irregularity, into an advantage for the purpose of intrusion detection, using signal fluctuations to detect the presence of human activity within the WSN. Unlike RF fingerprinting, the 'intruders' here neither transmit nor receive any RF signals. By enabling existing wireless infrastructures to serve as intrusion detectors instead of deploying numerous costly sensors, this approach shows great promise for providing novel solutions

  14. Type D personality, stress coping strategies and self-efficacy as predictors of Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Czuczwar, Stanisław Jerzy

    2017-07-01

    Recently, Facebook has become one of the most popular social networking sites. People use it more and more often. A number of studies have recently addressed the issue of excessive Facebook use, showing this phenomenon to be a spreading problem. The main aim of the present study was to examine whether Type D personality, self-efficacy and coping strategies are related to Facebook intrusion. The participants were 882 students of Polish universities, all of them Facebook users (72% women, mean age: 22.25 years, SD =2.06). We used the Facebook Intrusion Questionnaire, the Facebook Intensity Scale, the General Self-Efficacy Scale, the Coping Inventory for Stressful Situations, and the Type D Scale. We applied the pen-and-paper procedure. Our results indicate that emotion-oriented and avoidance-oriented strategies of coping in stressful situations are predictors of Facebook intrusion and Facebook intensity. The relations between both Facebook intrusion and intensity and social inhibition are significant only when emotion-oriented coping strategy is controlled. The knowledge of whether coping strategies in stressful situations, such as focus on emotions or avoidance, are related to Facebook intrusion might be useful for clinical purposes. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.

  15. Prediction of changes due to mandibular autorotation following miniplate-anchored intrusion of maxillary posterior teeth in open bite cases.

    Science.gov (United States)

    Kassem, Hassan E; Marzouk, Eiman S

    2018-05-14

    Prediction of the treatment outcome of various orthodontic procedures is an essential part of treatment planning. Using skeletal anchorage for intrusion of posterior teeth is a relatively novel procedure for the treatment of anterior open bite in long-faced subjects. Data were analyzed from lateral cephalometric radiographs of a cohort of 28 open bite adult subjects treated with intrusion of the maxillary posterior segment with zygomatic miniplate anchorage. Mean ratios and regression equations were calculated for selected variables before and after intrusion. Relative to molar intrusion, there was approximately 100% vertical change of the hard and soft tissue mention and 80% horizontal change of the hard and soft tissue pogonion. The overbite deepened two folds with 60% increase in overjet. The lower lip moved forward about 80% of the molar intrusion. Hard tissue pogonion and mention showed the strongest correlations with molar intrusion. There was a general agreement between regression equations and mean ratios at 3 mm molar intrusion. This study attempted to provide the clinician with a tool to predict the changes in key treatment variables following skeletally anchored maxillary molar intrusion and autorotation of the mandible.

  16. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against

  17. Potential for saltwater intrusion into the lower Tamiami aquifer near Bonita Springs, southwestern Florida

    Science.gov (United States)

    Shoemaker, W. Barclay; Edwards, K. Michelle

    2003-01-01

    A study was conducted to examine the potential for saltwater intrusion into the lower Tamiami aquifer beneath Bonita Springs in southwestern Florida. Field data were collected, and constant- and variable-density ground-water flow simulations were performed that: (1) spatially quantified modern and seasonal stresses, (2) identified potential mechanisms of saltwater intrusion, and (3) estimated the potential extent of saltwater intrusion for the area of concern. MODFLOW and the inverse modeling routine UCODE were used to spatially quantify modern and seasonal stresses by calibrating a constant-density ground-water flow model to field data collected in 1996. The model was calibrated by assuming hydraulic conductivity parameters were accurate and by estimating unmonitored ground-water pumpage and potential evapotranspiration with UCODE. Uncertainty in these estimated parameters was quantified with 95-percent confidence intervals. These confidence intervals indicate more uncertainty (or less reliability) in the estimates of unmonitored ground-water pumpage than estimates of pan-evaporation multipliers, because of the nature and distribution of observations used during calibration. Comparison of simulated water levels, streamflows, and net recharge with field data suggests the model is a good representation of field conditions. Potential mechanisms of saltwater intrusion into the lower Tamiami aquifer include: (1) lateral inland movement of the freshwater-saltwater interface from the southwestern coast of Florida; (2) upward leakage from deeper saline water-bearing zones through natural upwelling and upconing, both of which could occur as diffuse upward flow through semiconfining layers, conduit flow through karst features, or pipe flow through leaky artesian wells; (3) downward leakage of saltwater from surface-water channels; and (4) movement of unflushed pockets of relict seawater. Of the many potential mechanisms of saltwater intrusion, field data and variable

  18. Working memory and inhibitory control across the life span: Intrusion errors in the Reading Span Test.

    Science.gov (United States)

    Robert, Christelle; Borella, Erika; Fagot, Delphine; Lecerf, Thierry; de Ribaupierre, Anik

    2009-04-01

    The aim of this study was to examine to what extent inhibitory control and working memory capacity are related across the life span. Intrusion errors committed by children and younger and older adults were investigated in two versions of the Reading Span Test. In Experiment 1, a mixed Reading Span Test with items of various list lengths was administered. Older adults and children recalled fewer correct words and produced more intrusions than did young adults. Also, age-related differences were found in the type of intrusions committed. In Experiment 2, an adaptive Reading Span Test was administered, in which the list length of items was adapted to each individual's working memory capacity. Age groups differed neither on correct recall nor on the rate of intrusions, but they differed on the type of intrusions. Altogether, these findings indicate that the availability of attentional resources influences the efficiency of inhibition across the life span.

  19. cis-dioxomolybdenum(VI)-(ONO)

    Indian Academy of Sciences (India)

    Various ONO type Schiff base ligands L(H)2 used for the preparation of ... and derivatives.6–33 Depending on the method of prepa- ration .... HCl. Scheme 6. Synthesis of a Mo(VI) Schiff base complexe by selective inversion at C–1 carbon of a ...

  20. Multi-crystalline II-VI based multijunction solar cells and modules

    Science.gov (United States)

    Hardin, Brian E.; Connor, Stephen T.; Groves, James R.; Peters, Craig H.

    2015-06-30

    Multi-crystalline group II-VI solar cells and methods for fabrication of same are disclosed herein. A multi-crystalline group II-VI solar cell includes a first photovoltaic sub-cell comprising silicon, a tunnel junction, and a multi-crystalline second photovoltaic sub-cell. A plurality of the multi-crystalline group II-VI solar cells can be interconnected to form low cost, high throughput flat panel, low light concentration, and/or medium light concentration photovoltaic modules or devices.

  1. Vapor generation methods for explosives detection research

    Energy Technology Data Exchange (ETDEWEB)

    Grate, Jay W.; Ewing, Robert G.; Atkinson, David A.

    2012-12-01

    The generation of calibrated vapor samples of explosives compounds remains a challenge due to the low vapor pressures of the explosives, adsorption of explosives on container and tubing walls, and the requirement to manage (typically) multiple temperature zones as the vapor is generated, diluted, and delivered. Methods that have been described to generate vapors can be classified as continuous or pulsed flow vapor generators. Vapor sources for continuous flow generators are typically explosives compounds supported on a solid support, or compounds contained in a permeation or diffusion device. Sources are held at elevated isothermal temperatures. Similar sources can be used for pulsed vapor generators; however, pulsed systems may also use injection of solutions onto heated surfaces with generation of both solvent and explosives vapors, transient peaks from a gas chromatograph, or vapors generated by s programmed thermal desorption. This article reviews vapor generator approaches with emphasis on the method of generating the vapors and on practical aspects of vapor dilution and handling. In addition, a gas chromatographic system with two ovens that is configurable with up to four heating ropes is proposed that could serve as a single integrated platform for explosives vapor generation and device testing. Issues related to standards, calibration, and safety are also discussed.

  2. Repeated magmatic intrusions at El Hierro Island following the 2011-2012 submarine eruption

    Science.gov (United States)

    Benito-Saz, Maria A.; Parks, Michelle M.; Sigmundsson, Freysteinn; Hooper, Andrew; García-Cañada, Laura

    2017-09-01

    After more than 200 years of quiescence, in July 2011 an intense seismic swarm was detected beneath the center of El Hierro Island (Canary Islands), culminating on 10 October 2011 in a submarine eruption, 2 km off the southern coast. Although the eruption officially ended on 5 March 2012, magmatic activity continued in the area. From June 2012 to March 2014, six earthquake swarms, indicative of magmatic intrusions, were detected underneath the island. We have studied these post-eruption intrusive events using GPS and InSAR techniques to characterize the ground surface deformation produced by each of these intrusions, and to determine the optimal source parameters (geometry, location, depth, volume change). Source inversions provide insight into the depth of the intrusions ( 11-16 km) and the volume change associated with each of them (between 0.02 and 0.13 km3). During this period, > 20 cm of uplift was detected in the central-western part of the island, corresponding to approximately 0.32-0.38 km3 of magma intruded beneath the volcano. We suggest that these intrusions result from deep magma migrating from the mantle, trapped at the mantle/lower crust discontinuity in the form of sill-like bodies. This study, using joint inversion of GPS and InSAR data in a post-eruption period, provides important insight into the characteristics of the magmatic plumbing system of El Hierro, an oceanic intraplate volcanic island.

  3. The relationship between loss of parents in the holocaust, intrusive memories, and distress among child survivors.

    Science.gov (United States)

    Letzter-Pouw, Sonia; Werner, Perla

    2012-04-01

    The prevalence of intrusive memories of the Holocaust and their relationship to distress was examined among 272 child survivors in Israel. Using attachment theory as a conceptual framework, the authors also examined the effects of type of experience and loss of parents in the Holocaust, psychological resources, other life events, and sociodemographic characteristics on distress and symptomatic behavior. Eighty five percent of the participants reported suffering from intrusive memories. Structural equation modeling showed that survivors who lost one or both parents in the Holocaust suffered more distress because of more intrusive memories. These findings suggest that intrusive memories may be part of unfinished mourning processes related to the loss of parents in the Holocaust. © 2012 American Orthopsychiatric Association.

  4. Notes on saltwater intrusion and trace element distribution in Metro Manila groundwaters

    International Nuclear Information System (INIS)

    Santos, G. Jr.; Ramos, A.F.; Fernandez, L.G.; Almoneda, R.V.; Garcia, T.Y.; Cruz, C.C.; Petrache, C.A.; Andal, T.T.; Alcantara, E.

    1989-01-01

    Preliminary analyses of waters for uranium and other trace elements from deepwells operated by the Metropolitan Waterworks and Sewerage System (MWSS) in Metro Manila were performed. Uranium, which ranged from 0.2 ppb to 6 ppb, was correlated with saltwater intrusion. Values >=0.8 ppb for uranium were considered indicative of saline water intrusion in the aquifers. Saline water intrusions in Malabon, Navotas, Paranaque, Las Pinas, Bacoor, Imus, Kawit, Pasig, Antipolo, San Mateo, Taguig, Cainta, Taytay, Alabang and Muntinlupa were noted. Most of these areas were also identified by MWSS as being affected by saltwater intrusion. Tritium values ranged from 0 (below detection limits) to 44 tritium units. Except for one well in Muntinlupa, all the values obtained were below the lower limit of detection of 30.83 T.U. Mercury contents in six well locations had values above the maximum limit set by the National Standards for Drinking Water. Four wells exceeded the permissible level for manganese while two wells had iron concentrations greater than the National Standards. Other trace element concentrations such as Cr, Pb, Zn, Co and Ni either did not exceed their permissible levels or were not included in the National Standards. (Auth.). 6 refs.; 1 tab.; 3 figs

  5. Acoustic emission intrusion detector

    International Nuclear Information System (INIS)

    Carver, D.W.; Whittaker, J.W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal

  6. 24 CFR 972.115 - Relationship between required conversions and HOPE VI developments.

    Science.gov (United States)

    2010-04-01

    ... conversions and HOPE VI developments. 972.115 Section 972.115 Housing and Urban Development Regulations... Relationship between required conversions and HOPE VI developments. HUD actions to approve or deny proposed HOPE VI revitalization plans must be consistent with the requirements of this subpart. Developments...

  7. Enhanced Cr(VI) removal by polyethylenimine- and phosphorus-codoped hierarchical porous carbons.

    Science.gov (United States)

    Chen, Shixia; Wang, Jun; Wu, Zeliang; Deng, Qiang; Tu, Wenfeng; Dai, Guiping; Zeng, Zheling; Deng, Shuguang

    2018-08-01

    The amino- and phosphorus-codoped (N,P-codoped) porous carbons derived from oil-tea shells were facilely fabricated through a combination of phosphoric acid (H 3 PO 4 ) activation and amino (polyethylenimine, PEI) modification method. The as-synthesized carbon adsorbents were systematically characterized and evaluated for Cr(VI) removal in aqueous solutions. The relationship between adsorbent properties and adsorption behaviors was illustrated. Moreover, the influences of contact time, initial Cr(VI) concentration, pH, coexisting anions and temperature were also investigated. The adsorption behavior of Cr(VI) could be perfectly described by the pseudo-second-order kinetic model and Sips adsorption model. The maximum adsorption capacity of Cr(VI) on the carbon adsorbents synthesized in this work was 355.0 mg/g, and this excellent Cr(VI) capacity could be sustained with other coexisting anions. In addition to high surface area and suitable pore size distribution, the high Cr(VI) removal capacity is induced by rich heteroatoms incorporation and the Cr(VI) removal mechanism was clearly illustrated. Furthermore, the continuous column breakthrough experiment on obtained N,P-codoped carbon was conducted and well fitted by the Thomas model. This work revealed that PEI modification and P-containing groups could significantly enhance Cr(VI) adsorption capacity and make these N,P-codoped biomass-derived carbons potent adsorbents in practical water treatment applications. Copyright © 2018 Elsevier Inc. All rights reserved.

  8. The vaporization enthalpy and vapor pressure of S (+)-methamphetamine at T = 298.15 K by correlation gas chromatography

    International Nuclear Information System (INIS)

    Thornton, Melissa; Gobble, Chase; Chickos, James

    2014-01-01

    Highlights: • The vaporization enthalpy of (d)-methamphetamine was measured. • The vapor pressure of (d)-methamphetamine as a function of temperature was evaluated. • The vapor pressure of 4-benzylpiperidine as a function of temperature was evaluated. - Abstract: The vaporization enthalpy and vapor pressure of S (+)-methamphetamine is evaluated by correlation-gas chromatography. A vaporization enthalpy of (58.7 ± 4.3) kJ · mol −1 and a vapor pressure, p = (38 ± 9) Pa has been obtained using a variety of secondary aliphatic amines as standards. In addition, equations describing the vapor pressure temperature dependence are provided for standards and S (+)-methamphetamine covering the temperature range from T = 298.15 K to the boiling temperature. Boiling temperatures are reproduced within an interval of 8 K or less

  9. Observation and particle simulation of vaporized W, Mo, and Be in PISCES-B plasma for vapor-shielding studies

    Directory of Open Access Journals (Sweden)

    K. Ibano

    2017-08-01

    Full Text Available Interactions of Tungsten (W, Molybdenum (Mo, and Beryllium (Be vapors with a steady-state plasma were studied by the PISCES-B liner plasma experiments as well as Particle-In-Cell (PIC simulations for the understanding of vapor-shielding phenomena. Effective cooling of the plasma by laser-generated Be vapor was observed in PISCES-B. On the other hand, no apparent cooling was observed for W and Mo vapors. The PIC simulation explains these experimental observations of the difference between low-Z and high-Z vapors. Decrease of electron temperature due to the vapor ejection was observed in case of a simulation of the Be vapor. As for the W vapor, it was found that the plasma cooling is localized only near the wall at a higher electron density plasma (∼1019m−3. On the other hand, the appreciable plasma cooling can be observed in a lower density plasma (∼1018m−3 for the W vapor.

  10. A combined wet chemistry and EXAFS study of U(VI) uptake by cementitious materials

    International Nuclear Information System (INIS)

    Wieland, E.; Harfouche, M.; Tits, J.; Kunz, D.; Daehn, R.; Fujita, T.; Tsukamoto, M.

    2006-01-01

    The sorption behaviour and speciation of U(VI) in cementitious systems was investigated by a combination of wet chemistry experiments and synchrotron-based X-ray absorption spectroscopy (XAS) measurements. Radiotracer studies using 233 U were carried out on hardened cement paste (HCP) and calcium silicate hydrates (C-S-H), which are the major constituents of HCP, to determine the uptake kinetics and sorption isotherms. C-S-H phases were synthesized using different methods for solid phase preparation, which enabled us to study the U(VI) uptake by different types of C-S-H phases and a wide range of Ca/Si compositions, and to distinguish U(VI) sorption on the surface of C-S-H from U(VI) incorporation into the structure. XAS measurements were performed using U(VI) loaded HCP and C-S-H materials (sorption and co-precipitation samples) to gain structural information on the U(VI) speciation in these systems, i.e., the type and number of neighbouring atoms, and bond distances. Examples of studies that have utilized XAS to characterize U(VI) speciation in cementitious systems are still rare, and to the best of our knowledge, detailed XAS investigations of the U(VI)/C-S-H system are lacking. The results obtained from the combined use of wet chemical and spectroscopic techniques allow mechanistic models of the immobilization process to be proposed for cementitious waste forms containing low and high U(VI) inventories. In the latter case U(VI) immobilization is controlled by a solubility-limiting process with the U(VI) mineral predominantly formed under the conditions prevailing in cementitious systems. At low U(VI) concentrations, however, U(VI) appears to be predominantly bound onto C-S-H phases. The coordination environment of U(VI) taken up by C-S-H was found to resemble that of U(VI) in uranophane. A mechanistic understanding of the U(VI) binding by cementitious materials will allow more detailed and scientifically well founded predictions of the retention of

  11. Contribution of extracellular polymeric substances from Shewanella sp. HRCR-1 biofilms to U(VI) immobilization.

    Science.gov (United States)

    Cao, Bin; Ahmed, Bulbul; Kennedy, David W; Wang, Zheming; Shi, Liang; Marshall, Matthew J; Fredrickson, Jim K; Isern, Nancy G; Majors, Paul D; Beyenal, Haluk

    2011-07-01

    The goal of this study was to quantify the contribution of extracellular polymeric substances (EPS) to U(VI) immobilization by Shewanella sp. HRCR-1. Through comparison of U(VI) immobilization using cells with bound EPS (bEPS) and cells with minimal EPS, we show that (i) bEPS from Shewanella sp. HRCR-1 biofilms contribute significantly to U(VI) immobilization, especially at low initial U(VI) concentrations, through both sorption and reduction; (ii) bEPS can be considered a functional extension of the cells for U(VI) immobilization and they likely play more important roles at lower initial U(VI) concentrations; and (iii) the U(VI) reduction efficiency is dependent upon the initial U(VI) concentration and decreases at lower concentrations. To quantify the relative contributions of sorption and reduction to U(VI) immobilization by EPS fractions, we isolated loosely associated EPS (laEPS) and bEPS from Shewanella sp. HRCR-1 biofilms grown in a hollow fiber membrane biofilm reactor and tested their reactivity with U(VI). We found that, when reduced, the isolated cell-free EPS fractions could reduce U(VI). Polysaccharides in the EPS likely contributed to U(VI) sorption and dominated the reactivity of laEPS, while redox active components (e.g., outer membrane c-type cytochromes), especially in bEPS, possibly facilitated U(VI) reduction.

  12. Sorption of chromium (VI) by Mg/Fe hydrotalcite type compunds

    Energy Technology Data Exchange (ETDEWEB)

    García-Sosa, I., E-mail: irma.garcia@inin.gob.mx; Cabral-Prieto, A., E-mail: agustin.cabral@inin.gob.mx [Instituto Nacional de Investigaciones Nucleares, Departamento de Química (Mexico); Nava, N., E-mail: tnava@imp.mx; Navarrete, J. [Instituto Mexicano del Petróleo (Mexico); Olguín, M. T., E-mail: teresa.olguin@inin.gob.mx [Instituto Nacional de Investigaciones Nucleares, Departamento de Química (Mexico); Escobar, Luis, E-mail: luis.escobar@inin.gob.mx [Instituto Nacional de Investigaciones Nucleares, Departamento de Física (Mexico); López-Castañares, R., E-mail: rlc@anuies.mx; Olea-Cardoso, O., E-mail: olc@anuies.mx [Universidad Autónoma del Edo. de México, Facultad de Química (Mexico)

    2015-06-15

    The synthesis by co-precipitation and characterization by X-ray diffraction, Raman and Mössbauer spectroscopies of Mg-Fe-hydrotalcite compounds, and their sorption capacities for Cr(VI) in aqueous media were carried out. The average sorption capacity of Cr(VI) for the non-thermal treated samples was of 6.2 mg/g. The ferrihydrite was omnipresent in all prepared hydrotalcite samples. A brief discussion is made on the role of both the hydrotalcite and ferrihydrite for removing such amount of Cr(VI)

  13. Uranium(VI) retention on quartz and kaolinite. Experiments and modelling

    International Nuclear Information System (INIS)

    Mignot, G.

    2001-01-01

    The behaviour of uranium in the geosphere is an important issue for safety performance assessment of nuclear waste repositories, or in the context of contaminated sites due to mining activity related to nuclear field. Under aerobic conditions, the fate of uranium is mainly governed by the ability of minerals to sorb U(VI) aqueous species. Hence, a thorough understanding of U(VI) sorption processes on minerals is required to provide a valuable prediction of U(VI) migration in the environment. In this study, we performed sorption/desorption experiments of U(VI) on quartz and kaolinite, for systems favouring the formation in solution (i) of UO 2 2+ and monomeric hydrolysis products or (ii) of di-/tri-meric uranyl aqueous species, and / or U(VI)-colloids or UO 2 (OH) 2 precipitates, or (iii) of uranyl-carbonate complexes. Particular attention was paid to determine the surface characteristics of the solids and their modification due to dissolution/precipitation processes during experiments. A double layer surface complexation model was applied to our experimental data in order to derive surface complexation equilibria and intrinsic constants which allow a valuable description of U(VI) retention over a wide range of pH, ionic strength, initial concentration of uranium [0.1-10μM] and solid - solution equilibration time. U(VI) sorption on quartz was successfully modeled by using two sets of adsorption equilibria, assuming (i) the formation of the surface complexes SiOUO 2 + , SiOUO 2 OH and SiO(UO 2 ) 3 (OH) 5 , or (ii) the formation of the mono-dentate complex SiO(UO 2 ) 3 (OH) 5 and of the bidentate complex (SiO) 2 UO 2 . Assumptions on the density of each type of surface sites of kaolinite and on their acid-base properties were made from potentiometric titrations of kaolinite suspensions. We proposed on such a basis a set of surface complexation equilibria which accounts for U(VI) uptake on kaolinite over a wide range of chemical conditions, with aluminol edge sites as

  14. Intrusion resistant underground structure (IRUS) - safety assessment and licensing

    International Nuclear Information System (INIS)

    Lange, B. A.

    1997-01-01

    This paper describes the safety goals, human exposure scenarios and critical groups, the syvac-nsure performance assessment code, groundwater pathway safety results, and inadvertent human intrusion of the IRUS. 2 tabs

  15. A Nuisance Alarm Data System for evaluation of intrusion detectors

    International Nuclear Information System (INIS)

    Ream, W.K.

    1990-01-01

    A Nuisance Alarm Data System (NADS) was developed to gather long-term background alarm data on exterior intrusion detectors as part of their evaluation. Since nuisance alarms play an important part in the selection of intrusion detectors for use at Department of Energy (DOE) facilities, an economical and reliable way to monitor and record these alarms was needed. NADS consists of an IBM personal computer and printer along with other commercial units to communicate with the detectors, to gather weather data, and to record video for assessment. Each alarm, its assessment, and the weather conditions occurring at alarm time are placed into a data base that is used in the evaluation of the detector. The operating software is written in Turbo Pascal for easy maintenance and modification. A portable system, based on the NADS design, has been built and shipped to other DOE locations to do on-site alarm monitoring. This has been valuable for the comparison of different detectors in the on-site environment and for testing new detectors when the appropriate conditions do not exist or cannot be simulated at the Exterior Intrusion Detection Testbed

  16. Testing a 1-D Analytical Salt Intrusion Model and the Predictive Equation in Malaysian Estuaries

    Science.gov (United States)

    Gisen, Jacqueline Isabella; Savenije, Hubert H. G.

    2013-04-01

    Little is known about the salt intrusion behaviour in Malaysian estuaries. Study on this topic sometimes requires large amounts of data especially if a 2-D or 3-D numerical models are used for analysis. In poor data environments, 1-D analytical models are more appropriate. For this reason, a fully analytical 1-D salt intrusion model, based on the theory of Savenije in 2005, was tested in three Malaysian estuaries (Bernam, Selangor and Muar) because it is simple and requires minimal data. In order to achieve that, site surveys were conducted in these estuaries during the dry season (June-August) at spring tide by moving boat technique. Data of cross-sections, water levels and salinity were collected, and then analysed with the salt intrusion model. This paper demonstrates a good fit between the simulated and observed salinity distribution for all three estuaries. Additionally, the calibrated Van der Burgh's coefficient K, Dispersion coefficient D0, and salt intrusion length L, for the estuaries also displayed a reasonable correlations with those calculated from the predictive equations. This indicates that not only is the salt intrusion model valid for the case studies in Malaysia but also the predictive model. Furthermore, the results from this study describe the current state of the estuaries with which the Malaysian water authority in Malaysia can make decisions on limiting water abstraction or dredging. Keywords: salt intrusion, Malaysian estuaries, discharge, predictive model, dispersion

  17. The Torres del Paine intrusion as a model for a shallow magma chamber

    Science.gov (United States)

    Baumgartner, Lukas; Bodner, Robert; Leuthold, Julien; Muntener, Othmar; Putlitz, Benita; Vennemann, Torsten

    2014-05-01

    The shallow magmatic Torres del Paine Intrusive Complex (TPIC) belongs to a series of sub-volcanic and plutonic igneous bodies in Southern Chile and Argentina. This trench-parallel belt is located in a transitional position between the Patagonia Batholith in the West, and the alkaline Cenozoic plateau lavas in the East. While volumetrically small amounts of magmatism started around 28 my ago in the Torres del Paine area, and a second period occurred between 17-16 Ma, it peaked with the TPIC 12.59-12.43 Ma ago. The spectacular cliffs of the Torres del Paine National park provide a unique opportunity to study the evolution of a very shallow magma chamber and the interaction with its host rocks. Intrusion depth can be estimated based on contact metamorphic assemblages and granite solidus thermobarometry to 750±250 bars, corresponding to an intrusion depth of ca. 3km, ca. 500m above the base of the intrusion. Hornblende thermobarometry in mafic rocks agrees well with these estimates (Leuthold et al., 2014). The TPIC is composed of a granitic laccolith emplaced over 90ka (Michel et al., 2008) in 3 major, several 100m thick sheets, forming an overall thickness of nearly 2 km. Contacts are sharp between sheets, with the oldest sheet on the top and the youngest on the bottom (Michel et al., 2008). The granitic laccolith is under-plated by a ca. 400m thick mafic laccolith, built up over ca. 50ka (Leuthold et al. 2012), constructed from the bottom up. Granitic and mafic sheets are themselves composed of multiple metric to decametric pulses, mostly with ductile contacts between them, resulting in outcrop patterns resembling braided stream sediments. The contact of the TPIC with the Cretaceous flysch sediments document intrusion mechanism. Pre-existing sub-horizontal fold axes are rotated in the roof of the TPIC, clearly demonstrating ballooning of the roof; no ballooning was observed in the footwall of the intrusion. Extension during ballooning of the roof is indicated by

  18. strong>Hvad skal vi med en hjerne?strong>

    DEFF Research Database (Denmark)

    Hermansen, Judy

    2009-01-01

    neurologen Antonio Damasio, at sikre vores overlevelse og velbefindende (i nævnte rækkefølge). Vi ved, at der findes såkaldte belønningsstrukturer i hjernen på både dyr og mennesker, som aktiverer følelser af velbehag, når vi gør "det rigtige", dvs. noget der er godt for os. Men hvordan de mere konkret...

  19. Approaches in anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, S.; Di Pietro, R.; Mancini, L.V.

    2008-01-01

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  20. Approaches in Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at