Sample records for water intrusion model

  1. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)


    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  2. Calibrating a Salt Water Intrusion Model with Time-Domain Electromagnetic Data

    DEFF Research Database (Denmark)

    Herckenrath, Daan; Odlum, Nick; Nenna, Vanessa


    Salt water intrusion models are commonly used to support groundwater resource management in coastal aquifers. Concentration data used for model calibration are often sparse and limited in spatial extent. With airborne and ground-based electromagnetic surveys, electrical resistivity models can...... be obtained to provide high-resolution three-dimensional models of subsurface resistivity variations that can be related to geology and salt concentrations on a regional scale. Several previous studies have calibrated salt water intrusion models with geophysical data, but are typically limited to the use......, we perform a coupled hydrogeophysical inversion (CHI) in which we use a salt water intrusion model to interpret the geophysical data and guide the geophysical inversion. We refer to this methodology as a Coupled Hydrogeophysical Inversion-State (CHI-S), in which simulated salt concentrations...

  3. Contaminant intrusion in water distribution networks: review and proposal of an integrated model for decision making

    National Research Council Canada - National Science Library

    Islam, Nilufar; Al-Zahrani, Mohammad Abdullah M; Sadiq, Rehan; Rodriguez, Manuel J; Farahat, Ashraf


    .... Contaminant intrusion requires as much attention as source water protection or treatment plants, particularly given that at this point, water is near the final stage prior to human consumption...

  4. Intrusion detection: systems and models (United States)

    Sherif, J. S.; Dearmond, T. G.


    This paper puts forward a review of state of the art and state of the applicability of intrusion detection systems, and models. The paper also presents a classfication of literature pertaining to intrusion detection.

  5. Phytoplankton response to intrusions of slope water on the West Florida Shelf: Models and observations (United States)

    Walsh, John J.; Weisberg, Robert H.; Dieterle, Dwight A.; He, Ruoying; Darrow, Brian P.; Jolliff, Jason K.; Lester, Kristen M.; Vargo, Gabriel A.; Kirkpatrick, Gary J.; Fanning, Kent A.; Sutton, Tracey T.; Jochens, Ann E.; Biggs, Douglas C.; Nababan, Bisman; Hu, Chuanmin; Muller-Karger, Frank E.


    Previous hypotheses had suggested that upwelled intrusions of nutrient-rich Gulf of Mexico slope water onto the West Florida Shelf (WFS) led to formation of red tides of Karenia brevis. However, coupled biophysical models of (1) wind- and buoyancy-driven circulation, (2) three phytoplankton groups (diatoms, K. brevis, and microflagellates), (3) these slope water supplies of nitrate and silicate, and (4) selective grazing stress by copepods and protozoans found that diatoms won in one 1998 case of no light limitation by colored dissolved organic matter (CDOM). The diatoms lost to K. brevis during another CDOM case of the models. In the real world, field data confirmed that diatoms were indeed the dominant phytoplankton after massive upwelling in 1998, when only a small red tide of K. brevis was observed. Over a 7-month period of the CDOM-free scenario the simulated total primary production of the phytoplankton community was ˜1.8 g C m-2 d-1 along the 40-m isobath of the northern WFS, with the largest accumulation of biomass on the Florida Middle Ground (FMG). Despite such photosynthesis, these models of the WFS yielded a net source of CO2 to the atmosphere during spring and summer and suggested a small sink in the fall. With diatom losses of 90% of their daily carbon fixation to herbivores the simulation supported earlier impressions of a short, diatom-based food web on the FMG, where organic carbon content of the surficial sediments is tenfold those of the surrounding seabeds. Farther south, the simulated near-bottom pools of ammonium were highest in summer, when silicon regeneration was minimal, leading to temporary Si limitation of the diatoms. Termination of these upwelled pulses of production by diatoms and nonsiliceous microflagellates mainly resulted from nitrate exhaustion in the model, however, mimicking most del15PON observations in the field. Yet, the CDOM-free case of the models failed to replicate the observed small red tide in December 1998, tagged

  6. Water Intrusion Problems in Transit Tunnels (United States)


    This report presents the findings of five case studies in which an in-depth analysis was made of tunnel water intrusion problems in transit tunnels. Water intrusion parameters of transit systems in Atlanta, Boston, Buffalo, New York and Washington, D...

  7. Intrusion of Soil Water through Pipe Cracks (United States)

    This report describes a series of experiments conducted at U.S. EPA’s Test and Evaluation Facility in 2013-2014 to study the intrusion of contaminated soil water into a pipe crack during simulated backflow events. A test rig was used consisting of a 3’ x 3’ x 3’ acrylic soil bo...

  8. Sea Water Intrusion in Kaligawe Semarang Based on Resistivity Data (United States)

    Setyawan, Agus; Najib; Aribowo, Yoga; Trihadini, Agnis; Hastuti, Dhana; Ramdhani, Fitra; Waskito, Fajar; Febrika, Ganap; Virgiawan, Galang


    Semarang is a city on the north coast of the island of Java, Indonesia and it is lowland areas have experienced sea water intrusion. One of interesting area is Kaligawe which located at Eastern part of Semarang. Kaligawe has big population and industrial and it need water consumption. Excessive extraction of groundwater will be resulting height difference surface ground water to the surface of the sea water due to sea water intrusion. Electric resistivity method was used to detect for salt water intrusion. Dipole-dipole configuration was applied with 3 lines to get current, potential difference, and apparent resistivity from the field. 2D model has presented using Res2Dinv to get the true resistivity and the depth of each layer. A calibration of the model was conducted based on geological information. Result showed the subsurface area has 4 layers: sandstone, sandsilt, siltstone and clay. Moreover the sea water intrusion occurs in the Northwest, East and Southern part of the study area

  9. Thermal effects of water intrusion in hydrophobic nanoporous materials. (United States)

    Karbowiak, Thomas; Paulin, Christian; Ballandras, Anthony; Weber, Guy; Bellat, Jean-Pierre


    Liquid water intrusion in hydrophobic nanoporous silicalite-1, a pure siliceous zeolite, in isothermal conditions under high pressure produces an endothermic effect. After intrusion, confined water in zeolite pores is in a different state from that of the liquid bulk water. Such forced intrusion also chemically modifies the material and tends to render it slightly more hydrophilic.

  10. Physical model simulations of seawater intrusion in unconfined aquifer

    Directory of Open Access Journals (Sweden)

    Tanapol Sriapai


    Full Text Available The objective of this study is to simulate the seawater intrusion into unconfined aquifer near shoreline and to assessthe effectiveness of its controlling methods by using scaled-down physical models. The intrusion controlled methods studiedhere include fresh water injection, saltwater extraction, and subsurface barrier. The results indicate that under natural dynamicequilibrium between the recharge of fresh water and the intrusion well agree with the Ghyben-Herzberg mathematical solution.Fresh water pumping from the aquifer notably move the fresh-salt water interface toward the pumping well, depending on thepumping rates and the head differences (h between the aquifer recharge and the salt water level. The fresh water injectionmethod is more favorable than the salt water extraction and subsurface barrier method. The fresh water injection rate of about10% of the usage rate can effectively push the interface toward the shoreline, and keeping the pumping well free of salinity.

  11. Geophysical study of saline water intrusion in Lagos municipality ...

    African Journals Online (AJOL)

    The hydrogeologic importance of the Coastal Plain Sand aquifer unit in Lagos is under severe threat of continued sea water intrusion on its southern flank. This study illustrates the current extension of the sea water intrusion. It highlights the depreciation of the water resource due to over pumping at higher rate than the ...

  12. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    Spatial distribution of saline water and possible sources of intrusion into a tropical freshwater lagoon and the transitional effects on the lacustrine ichthyofaunal ... beyond the seasonal input from the two adjacent lagoons (Lagos and Mahin), salt water intrusion by subsurface flow through the barrier beach from the ocean, ...

  13. Research of Model Scale Seawater Intrusion using Geoelectric Method

    Directory of Open Access Journals (Sweden)

    Supriyadi Supriyadi


    Full Text Available A depth experience and knowledge are needed in analyzing the prediction of seawater intrusion. We report here a physical modelling for monitoring the model scale of seawater intrusion. The model used in this research is glass basin consists of two parts; soil and seawater. The intrusion of seawater into soil in the glass basin is modelled. The results of 2-D inversion by using software Res2DInv32 showed that the monitoring of seawater intrusion, in soil model scale, can be detected by using Schlumberger configuration resistivity method. The watering process of freshwater into soil caused the electric resistivity value decreased. This phenomenon can be seen from the transition of the resistivity pseudo section before and after the watering process using different cummulative volume of freshwater in different soil. After being intruded by the seawater, the measured soil resistivity is 2.22 Ωm – 5.69 Ωm which means that the soil had been intruded.

  14. Efficacy of commercial earplugs in preventing water intrusion during swimming. (United States)

    Mahboubi, Hossein; Lee, Austin; Kiumehr, Saman; Zardouz, Shawn; Shahriari, Shawhin; Djalilian, Hamid R


    To evaluate and compare the efficacy of commercially available earplugs in preventing water intrusion in healthy individuals. Experimental study. Tertiary care medical center. Ten subjects (20 ears) were assessed. After insertion of the earplugs, subjects underwent 3 standardized head-wetting protocols, including (1) surface swimming for 10 minutes, which entailed no head submersion and moderate splashing; (2) head submersion at a 90-cm depth for 20 seconds with their head upright; and (3) head submersion at a 90-cm depth with head tilted 90 degrees left and then tilted 90 degrees right for 10 seconds on each side to apply vertical pressure. Color change of a wetness indicator was used to determine water intrusion after each protocol. The same protocol was repeated for all 9 earplugs. Water intrusion was observed in 44%, 67%, and 88% of ears after surface swimming, horizontal submersion, and vertical submersion, respectively. The results revealed a significant difference in the waterproofing qualities of the various types of earplugs. The soft silicone type (Pillow Soft) earplug had the lowest rate of water penetration during all 3 protocols (P earplugs, Pillow Soft and Aquaseal, were only significant during the horizontal submersion protocol (P = .008). Water intrusion occurred even with the use of earplugs. The intrusion was more significant with horizontal or vertical head submersion. The soft silicone Pillow Soft earplug was the most effective earplug for preventing water intrusion in surface swimming.

  15. Hydrodynamic and Salinity Intrusion Model in Selangor River Estuary (United States)

    Haron, N. F.; Tahir, W.


    A multi-dimensional hydrodynamic and transport model has been used to develop the hydrodynamic and salinity intrusion model for Selangor River Estuary. Delft3D-FLOW was applied to the study area using a curvilinear, boundary fitted grid. External boundary forces included ocean water level, salinity, and stream flow. The hydrodynamic and salinity transport used for the simulation was calibrated and confirmed using data on November 2005 and from May to June 2014. A 13-day period for November 2005 data and a 6-day period of May to June 2014 data were chosen as the calibration and confirmation period because of the availability of data from the field-monitoring program conducted. From the calibration results, it shows that the model was well suited to predict the hydrodynamic and salinity intrusion characteristics of the study area.

  16. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)


    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  17. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)


    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and. February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  18. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S


    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  19. Investigation of saline water intrusions into the Curonian Lagoon (Lithuania) and two-layer flow in the Klaipeda Strait using finite element hydrodynamic model (United States)

    Zemlys, Petras; Ferrarin, Christian; Umgiesser, Georg; Gulbinskas, Saulius; Bellafiore, Debora


    This work is focused on the application of a modelling system to simulate 3-D interaction between the Curonian Lagoon and the Baltic Sea coastal waters and to reflect spatio-temporal dynamics of marine waters in the Curonian Lagoon. The model system is based on the finite element program package SHYFEM which can be used to resolve the hydrodynamic equations in lagoons, coastal seas, estuaries and lakes. The results of a one year 3-D model simulation with real weather and hydrological forcing show that the saline water intrusions from the sea through Klaipeda Strait are gradually decreasing with distance from the sea and become negligible (average annual salinity about 0.5 psu) at a distance of about 20 km to the south of Kiaules Nugara island. Analyses of the simulation results also show this area being highly heterogeneous according to the vertical salinity distribution. While in the deeper Klaipeda Strait (harbour waterway) differences in average salinity between near bottom and surface layers varies in the range 2-2.5 psu, in the rest of the Curonian Lagoon it is less than 0.1 psu. Analyses of the simulation results confirmed the presence of a two-directional flow that from time to time changes to either saline water one-directional flow to the Curonian Lagoon or fresh water one-directional flow to the sea. Two-directional flow duration decreases with a distance from sea entrance in Klaipeda Strait from around 180 days year-1 close to the sea entrance to 50 days year-1 just behind Kiaules Nugara island. One-directional outflow duration is increasing with a distance from the sea entrance from 100 to 225 days year-1. One-directional inflow duration occurs in the range 85-100 days year-1. The analysis of the ratio of buoyancy layer thickness and water depth (hb/H), and the Wedderburn number showed three main flow regimes in the strait identifying the main importance of wind action in the along-strait direction. Absence of wind or cross-strait wind regimes allow the

  20. Water intrusion in thin-skinned composite honeycomb sandwich structures (United States)

    Jackson, Wade C.; O'Brien, T. Kevin


    Thin-skinned composite honeycomb sandwich structures from the trailing edge of the U.S. Army's Apache and Chinook helicopters have been tested to ascertain their susceptibility to water intrusion as well as such intrusions' effects on impact damage and cyclic loading. Minimum-impact and fatigue conditions were determined which would create microcracks sufficiently large to allow the passage of water through the skins; damage sufficient for this to occur was for some skins undetectable under a 40X-magnification optical microscope. Flow rate was a function of moisture content, damage, applied strain, and pressure differences.

  1. Groundwater quality degradation due to salt water intrusion in ...

    African Journals Online (AJOL)

    Saltwater intrusion problems are widespread where there are over pumping of groundwater from coastal aquifers. Water samples were collected from production boreholes in Zanzibar municipality and analyzed for salinity indication parameters comprising of chloride, electrical conductivity, total dissolved salts and ...

  2. A new intrusion prevention model using planning knowledge graph (United States)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong


    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  3. A Review of Vapor Intrusion Models (United States)

    Yao, Yijun; Suuberg, Eric M.


    A complete vapor intrusion (VI) model, describing vapor entry of volatile organic chemicals (VOCs) into buildings located on contaminated sites, generally consists of two main parts-one describing vapor transport in the soil and the other its entry into the building. Modeling the soil vapor transport part involves either analytically or numerically solving the equations of vapor advection and diffusion in the subsurface. Contaminant biodegradation must often also be included in this simulation, and can increase the difficulty of obtaining a solution, especially when explicitly considering coupled oxygen transport and consumption. The models of contaminant building entry pathway are often coupled to calculations of indoor air contaminant concentration, and both are influenced by building construction and operational features. The description of entry pathway involves consideration of building foundation characteristics, while calculation of indoor air contaminant levels requires characterization of building enclosed space and air exchange within this. This review summarizes existing VI models, and discusses the limits of current screening tools commonly used in this field. PMID:23360069

  4. Salt Water Intrusion in a Three-dimensional Groundwater System in The Netherlands: a Numerical Study

    NARCIS (Netherlands)

    Oude Essink, Gualbert


    Salt water intrusion is investigated in a coastal groundwater system in the northern part of the province Noord-Holland, The Netherlands. Density dependent groundwater flow is modeled in three-dimensions withMOCDENS3D. This computer code is a version of MOC3D (Konikow et al., 1996) that has been

  5. Offshore Stratigraphic Controls on Salt-Water Intrusion in Los Angeles Area Coastal Aquifers (United States)

    Edwards, B. D.; Ponti, D. J.; Ehman, K. D.; Tinsley, J. C.; Reichard, E. G.


    Ground water is a major component of the water supply for the ~10 million residents of Los Angeles County. Ground water pumping, linked to population growth since the early 1900's, caused water levels to decline, reversed seaward hydraulic gradients in some coastal aquifers, and resulted in salt water intrusion. United States Geological Survey geologists and hydrologists are working cooperatively with local water agencies to (1) understand and model the process of salt-water intrusion in this siliciclastic, structurally complex basin, and (2) identify potential pathways for the salt-water intrusion. We collected over 2000 trackline-km of single- and multi-channel intermediate- and high-resolution seismic-reflection profiles (60 to 5000 Hz) from the Los Angeles/Long Beach Harbor complex and the adjacent San Pedro shelf to develop a 3-dimensional stratigraphic model of the coastal aquifer system. These data define stratal geometries, paleo-channels, and fault traces in the offshore that are potential pathways of salt-water intrusion. The offshore seismic-reflection profiles correlate with onshore geophysical and borehole data collected from four nearby drill sites that were cored continuously to depths ranging to 400 meters. These core holes provide detailed 1-dimensional reference sections that furnish stratigraphic, age, and facies control for the seismic-reflection profiles. The coastal aquifer system is described using sequence stratigraphic concepts as units deposited during eustatic sea level fluctuations during the Pleistocene to Recent. Seismic-reflection profiles identify sequence boundaries, and hence aquifer and aquitard units, by the truncation and onlap of reflectors. If and where the sequences crop out on the sea floor provides a potential pathway for intrusion. The youngest unit, the Gaspur aquifer, is intruded with salt water and consists of at least two flat-lying sequences, each marked by basal gravelly sands deposited by the ancestral Los Angeles

  6. Predicting the salt water intrusion in the Shatt al-Arab estuary using an analytical approach (United States)

    Abdullah, Ali D.; Gisen, Jacqueline I. A.; van der Zaag, Pieter; Savenije, Hubert H. G.; Karim, Usama F. A.; Masih, Ilyas; Popescu, Ioana


    Longitudinal and vertical salinity measurements are used in this study to predict the extent of inland seawater intrusion in a deltaic river estuary. A predictive model is constructed to apply to the specific tidal, seasonal, and discharge variability and geometric characteristics of the Shatt al-Arab River (SAR) situated along the border of Iraq and Iran. Reliable hydrologic simulation of salinity dynamics and seawater intrusion was lacking prior to this study. Tidal excursion is simulated analytically using a 1-D analytical salt intrusion model with recently updated equations for tidal mixing. The model was applied under different river conditions to analyse the seasonal variability of salinity distribution during wet and dry periods near spring and neap tides between March 2014 and January 2015. A good fit is possible with this model between computed and observed salinity distribution. Estimating water abstractions along the estuary improves the performance of the equations, especially at low flows and with a well-calibrated dispersion-excursion relationship of the updated equations. Salt intrusion lengths given the current data varied from 38 to 65 km during the year of observation. With extremely low river discharge, which is highly likely there, we predict a much further distance of 92 km. These new predictions demonstrate that the SAR, already plagued with extreme salinity, may face deteriorating water quality levels in the near future, requiring prompt interventions.

  7. SVM Intrusion Detection Model Based on Compressed Sampling

    Directory of Open Access Journals (Sweden)

    Shanxiong Chen


    Full Text Available Intrusion detection needs to deal with a large amount of data; particularly, the technology of network intrusion detection has to detect all of network data. Massive data processing is the bottleneck of network software and hardware equipment in intrusion detection. If we can reduce the data dimension in the stage of data sampling and directly obtain the feature information of network data, efficiency of detection can be improved greatly. In the paper, we present a SVM intrusion detection model based on compressive sampling. We use compressed sampling method in the compressed sensing theory to implement feature compression for network data flow so that we can gain refined sparse representation. After that SVM is used to classify the compression results. This method can realize detection of network anomaly behavior quickly without reducing the classification accuracy.

  8. Salt intrusion study in Cochin estuary - Using empirical models

    Digital Repository Service at National Institute of Oceanography (India)

    Jacob, B.; Revichandran, C.; NaveenKumar, K.R.

    been applied to the Cochin estuary in the present study to identify the most suitable model for predicting the salt intrusion length. Comparison of the obtained results indicate that the model of Van der Burgh (1972) is the most suitable empirical model...

  9. Optimal sensor placement for detecting organophosphate intrusions into water distribution systems. (United States)

    Ohar, Ziv; Lahav, Ori; Ostfeld, Avi


    Placement of water quality sensors in a water distribution system is a common approach for minimizing contamination intrusion risks. This study incorporates detailed chemistry of organophosphate contaminations into the problem of sensor placement and links quantitative measures of the affected population as a result of such intrusions. The suggested methodology utilizes the stoichiometry and kinetics of the reactions between organophosphate contaminants and free chlorine for predicting the number of affected consumers. This is accomplished through linking a multi-species water quality model and a statistical dose-response model. Three organophosphates (chlorpyrifos, malathion, and parathion) are tested as possible contaminants. Their corresponding by-products were modeled and accounted for in the affected consumers impact calculations. The methodology incorporates a series of randomly generated intrusion events linked to a genetic algorithm for minimizing the contaminants impact through a sensors system. Three example applications are explored for demonstrating the model capabilities through base runs and sensitivity analyses. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. Numerical modelling of seawater intrusion in Shenzhen (China ...

    Indian Academy of Sciences (India)

    2Key Laboratory of Groundwater Resources and Environment, Ministry of Education, College of Environment and Resources, Jilin University, .... model based on the variable density flow approach and successfully applied to a field case in ... to prevent or mitigate seawater intrusion. We have performed a 3D model to ...

  11. Numerical and physical modeling of cutoff walls against saltwater intrusion (United States)

    Crestani, Elena; Camporese, Matteo; Salandin, Paolo


    Seawater intrusion is a relevant problem for many communities living in small islands, where the amount of fresh water available for human consumption depends on the delicate equilibrium between the natural groundwater recharge from rainfall and the surrounding sea. However, it can represent a significant issue also for coastal regions where groundwater is extracted for water supply: an excessive extraction to meet growing demands for drinking water and irrigation purposes leads to a decrease of seaward flows of fresh water and consequently to an increase of seawater intrusion into coastal aquifers. Cutoff walls represent one of the possible strategies that can be adopted to reduce seawater intrusion into coastal aquifers and to limit the inland progression of the saltwater wedge. In this study, on the basis of several preliminary simulations developed by the SUTRA code, a cutoff wall occluding 70% of the aquifer depth is designed for a physical experiment, whose setup details are reported as follows. The physical model represents the terminal part of a coastal aquifer and consists of a flume 500 cm long, 30 cm wide and 60 cm high, filled for an height of 49 cm with glass beads with a d50 of 0.6 mm and a uniformity coefficient d60/d10 1.5. The resulting porous medium is homogeneous, with porosity of about 0.37 and hydraulic conductivity of about 1.3 10-3 m/s. Upstream from the sandbox, a tank filled by freshwater provides recharge for the aquifer. The downstream tank simulates the sea and red food dye is added to the saltwater to easily visualize the salt wedge. The volume of the downstream tank is about five times the upstream one, and, due to the small filtration discharge, minimizing salt concentration variations due to the incoming freshwater flow. The hydraulic gradient during the tests is constant, due to the fixed water level in the tanks. Water levels and discharged flow rate are continuously monitored. The cutoff wall was realized with sodium bentonite

  12. A study on the intrusion model by physical modeling

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jung Yul; Kim, Yoo Sung; Hyun, Hye Ja [Korea Inst. of Geology Mining and Materials, Taejon (Korea, Republic of)


    In physical modeling, the actual phenomena of seismic wave propagation are directly measured like field survey and furthermore the structure and physical properties of subsurface can be known. So the measured datasets from physical modeling can be very desirable as input data to test the efficiency of various inversion algorithms. An underground structure formed by intrusion, which can be often seen in seismic section for oil exploration, is investigated by physical modeling. The model is characterized by various types of layer boundaries with steep dip angle. Therefore, this physical modeling data are very available not only to interpret seismic sections for oil exploration as a case history, but also to develop data processing techniques and estimate the capability of software such as migration, full waveform inversion. (author). 5 refs., 18 figs.

  13. Enteric virus infection risk from intrusion of sewage into a drinking water distribution network. (United States)

    Teunis, P F M; Xu, M; Fleming, K K; Yang, J; Moe, C L; Lechevallier, M W


    Contaminants from the soil surrounding drinking water distribution systems are thought to not enter the drinking water when sufficient internal pressure is maintained. Pressure transients may cause short intervals of negative pressure, and the soil near drinking water pipes often contains fecal material due to the proximity of sewage lines, so that a pressure event may cause intrusion of pathogens. This paper presents a risk model for predicting intrusion and dilution of viruses and their transport to consumers. Random entry and dilution of virus was simulated by embedding the hydraulic model into a Monte Carlo simulation. Special attention was given to adjusting for the coincidence of virus presence and use of tap water, as independently occurring short-term events within the longer interval that the virus is predicted to travel in any branch of the distribution system. The probability that a consumer drinks water contaminated with virus is small, but when this happens the virus concentration tends to be high and the risk of infection may be considerable. The spatial distribution of infection risk is highly heterogeneous. The presence of a chlorine residual reduces the infection risk.

  14. Energetic behavior of the pure silica ITQ-12 (ITW) zeolite under high pressure water intrusion. (United States)

    Khay, Ismail; Tzanis, Lydie; Daou, T Jean; Nouali, Habiba; Ryzhikov, Andrey; Patarin, Joël


    Experimental water intrusion-extrusion isotherms were obtained at room temperature on pure silica ITW-type zeolites (ITQ-12 zeosil). The water intrusion is obtained by applying a high hydraulic pressure corresponding to the intrusion step. When the pressure is released, the water extrusion occurs at a similar pressure to that of the intrusion one. Therefore, the "ITW zeosil-water" system behaves like a spring and the phenomenon is reproducible over several cycles. Several characterization techniques have been performed before and after water intrusion-extrusion experiments in order to reveal the presence or the lack of defects after such experiments. Structural modifications at the long range order cannot be observed by XRD analysis after three water intrusion-extrusion cycles. However, solid state NMR spectroscopy provides evidence of the presence of Q3 groups revealing the breaking of some siloxane bridges after the intrusion step. The "ITW zeosil-water" system can restore 100% of the stored energy corresponding to about 8 J g(-1).

  15. Comparison of empirical models with intensively observed data for prediction of salt intrusion in the Sumjin River estuary, Korea

    Directory of Open Access Journals (Sweden)

    D. C. Shaha


    Full Text Available Performance of empirical models has been compared with extensively observed data to determine the most suitable model for prediction of salt intrusion in the Sumjin River estuary, Korea. Intensive measurements of salt intrusion were taken at high and low waters during both spring and neap tide in each season from August 2004 to April 2007. The stratification parameter varied with the distance along the estuary, tidal period and freshwater discharge, indicating that the Sumjin River estuary experiences a transition from partially- or well-mixed during spring tide to stratified during neap tide. The salt intrusion length at high water varied from 13.4 km in summer 2005 to 25.6 km in autumn 2006. The salt intrusion mostly depends on the freshwater discharge rather than spring-neap tidal oscillation. Analysis of three years observed salinity data indicates that the scale of the salt intrusion length in the Sumjin River estuary is proportional to the river discharge to the −1/5 power. Four empirical models have been applied to the Sumjin River estuary to explore the most suitable model for prediction of the salt intrusion length. Comparative results show that the Nguyen and Savenije (2006 model, developed under both partially- and well-mixed estuaries, performs best of all models studied (relative error of 4.6%. The model was also applied under stratified neap tide conditions, with a relative error of 5.2%, implying applicability of this model under stratified conditions as well.

  16. Variable-density numerical modeling of seawater intrusion in coastal aquifer with well-developed conduits (United States)

    Xu, Z.; Hu, B. X.


    Karst aquifer is an important drinking water supply for nearly 25% of the world's population. Well-developed subground conduit systems usually can be found in a well-developed karst aquifer, as a dual permeability system. Hydraulic characteristics of non-laminar flow in conduits could be significantly different from darcian flow in porous medium; therefore, hybrid model and different governing equations are necessary in numerical modeling of karst hydrogeology. On the other hand, seawater intrusion has been observed and studied for several decades, also become a worldwidely problem due to groundwater over-pumping and rising sea level. The density difference between freshwater and seawater is recognized as the major factor governing the movements of two fluids in coastal aquifer. Several models have been developed to simulate groundwater flow in karst aquifer, but hardly describe seawater intrusion through the conduits without coupling variable density flow and solute transport. In this study, a numerical SEAWAT model has been developed to simulate variable density flow and transport in heterogeneous karst aquifer. High-density seawater is verified to intrude further inland through high permeability conduit network rather than porous medium. The numerical model also predicts the effect of different cases on seawater intrusion in coastal karst aquifer, such as rising sea level, tide stages and freshwater discharge effects. A series of local and global uncertainty analysis have been taken to evaluate the sensitivity of hydraulic conductivity, porosity, groundwater pumping, sea level, salinity and dispersivity. Heterogeneous conduit and porous medium hydraulic characteristics play an important role in groundwater flow and solute transport simulation. Meanwhile, another hybrid model VDFST-CFP model is currently under development to couple turbulent conduit flow and variable density groundwater flow in porous media, which provides a new method and better description in

  17. Social Perception of Public Water Supply Network and Groundwater Quality in an Urban Setting Facing Saltwater Intrusion and Water Shortages. (United States)

    Alameddine, Ibrahim; Jawhari, Gheeda; El-Fadel, Mutasem


    Perceptions developed by consumers regarding the quality of water reaching their household can affect the ultimate use of the water. This study identified key factors influencing consumers' perception of water quality in a highly urbanized coastal city, experiencing chronic water shortages, overexploitation of groundwater, and accelerated saltwater intrusion. Household surveys were administered to residents to capture views and perceptions of consumed water. Concomitantly, groundwater and tap water samples were collected and analyzed at each residence for comparison with perceptions. People's rating of groundwater quality was found to correlate to the measured water quality both in the dry and wet seasons. In contrast, perceptions regarding the water quality of the public water supply network did not show any correlation with the measured tap water quality indicators. Logistic regression models developed to predict perception based on salient variables indicated that age, apartment ownership, and levels of total dissolved solids play a significant role in shaping perceptions regarding groundwater quality. Perceptions concerning the water quality of the public water supply network appeared to be independent of the measured total dissolved solids levels at the tap but correlated to those measured in the wells. The study highlights misconceptions that can arise as a result of uncontrolled cross-connections of groundwater to the public supply network water and the development of misaligned perceptions based on prior consumption patterns, water shortages, and a rapidly salinizing groundwater aquifer.

  18. Social Perception of Public Water Supply Network and Groundwater Quality in an Urban Setting Facing Saltwater Intrusion and Water Shortages (United States)

    Alameddine, Ibrahim; Jawhari, Gheeda; El-Fadel, Mutasem


    Perceptions developed by consumers regarding the quality of water reaching their household can affect the ultimate use of the water. This study identified key factors influencing consumers' perception of water quality in a highly urbanized coastal city, experiencing chronic water shortages, overexploitation of groundwater, and accelerated saltwater intrusion. Household surveys were administered to residents to capture views and perceptions of consumed water. Concomitantly, groundwater and tap water samples were collected and analyzed at each residence for comparison with perceptions. People's rating of groundwater quality was found to correlate to the measured water quality both in the dry and wet seasons. In contrast, perceptions regarding the water quality of the public water supply network did not show any correlation with the measured tap water quality indicators. Logistic regression models developed to predict perception based on salient variables indicated that age, apartment ownership, and levels of total dissolved solids play a significant role in shaping perceptions regarding groundwater quality. Perceptions concerning the water quality of the public water supply network appeared to be independent of the measured total dissolved solids levels at the tap but correlated to those measured in the wells. The study highlights misconceptions that can arise as a result of uncontrolled cross-connections of groundwater to the public supply network water and the development of misaligned perceptions based on prior consumption patterns, water shortages, and a rapidly salinizing groundwater aquifer.

  19. The Gulf of Aden Intermediate Water Intrusion Regulates the Southern Red Sea Summer Phytoplankton Blooms

    KAUST Repository

    Dreano, Denis


    Knowledge on large-scale biological processes in the southern Red Sea is relatively limited, primarily due to the scarce in situ, and satellite-derived chlorophyll-a (Chl-a) datasets. During summer, adverse atmospheric conditions in the southern Red Sea (haze and clouds) have long severely limited the retrieval of satellite ocean colour observations. Recently, a new merged ocean colour product developed by the European Space Agency (ESA)-the Ocean Color Climate Change Initiative (OC-CCI)-has substantially improved the southern Red Sea coverage of Chl-a, allowing the discovery of unexpected intense summer blooms. Here we provide the first detailed description of their spatiotemporal distribution and report the mechanisms regulating them. During summer, the monsoon-driven wind reversal modifies the circulation dynamics at the Bab-el-Mandeb strait, leading to a subsurface influx of colder, fresher, nutrient-rich water from the Indian Ocean. Using satellite observations, model simulation outputs, and in situ datasets, we track the pathway of this intrusion into the extensive shallow areas and coral reef complexes along the basin\\'s shores. We also provide statistical evidence that the subsurface intrusion plays a key role in the development of the southern Red Sea phytoplankton blooms.

  20. Occurrence of ground water and potential for seawater intrusion, Island County, Washington (United States)

    Jones, M.A.


    The data from a study of groundwater availability and quality in Island County, Washington, are presented. Increased groundwater withdrawals associated with the population increase in Island County have caused concern about groundwater availability and potential seawater intrusion. The most widely used aquifer lies near sea level. Locally, available data indicate that one or more water-bearing zones lie above the sea-level aquifer. Pumpage in 1979 was about 1.67 billion gallons, about 90% of which was pumped from the sea-level aquifer. Most large producing wells in the county have pumping water levels near or below sea level, so that if pumping continues for a long enough time, seawater intrusion would result. Chloride concentrations in water samples taken in July 1978, April 1980 and August 1980 indicate that seawater intrusion is occurring in northeastern and southern Camano Island and in central Whidbey island. (USGS)

  1. A multi-compartment mass transfer model applied to building vapor intrusion (United States)

    Murphy, Brian L.; Chan, Wanyu R.


    We develop a systematic approach to model steady-state advective and diffusive fluxes, as well as phase changes, between multi-media environmental compartments. The approach results in four simple rules for constructing mass transfer coefficients. Results are analogous to electrical circuit theory with resistors, including variable resistors or potentiometers, in parallel and series. This general approach lends itself particularly well to vapor intrusion calculations where there are multi-media compartments involving groundwater, soil, and air. In addition to showing that the model reduces to the well-known Johnson & Ettinger model in limiting cases, we illustrate its simplicity and ease of use with several examples: (1) an example of how multiple partition coefficients collapse into a single partition coefficient illustrated by a three-phase problem involving tar, water, and air, (2) determination of when the presence of a basement significantly lowers first floor exposures, and (3) addition of diffusion in the saturated zone to the model to investigate whether the resistance associated with this compartment can be neglected. We conclude that if the water table is truly steady, this resistance would be very significant. Therefore, a vapor intrusion model that neglects both water table fluctuations and diffusion in groundwater is ignoring important physical phenomena.

  2. A model for anomaly classification in intrusion detection systems (United States)

    Ferreira, V. O.; Galhardi, V. V.; Gonçalves, L. B. L.; Silva, R. C.; Cansian, A. M.


    Intrusion Detection Systems (IDS) are traditionally divided into two types according to the detection methods they employ, namely (i) misuse detection and (ii) anomaly detection. Anomaly detection has been widely used and its main advantage is the ability to detect new attacks. However, the analysis of anomalies generated can become expensive, since they often have no clear information about the malicious events they represent. In this context, this paper presents a model for automated classification of alerts generated by an anomaly based IDS. The main goal is either the classification of the detected anomalies in well-defined taxonomies of attacks or to identify whether it is a false positive misclassified by the IDS. Some common attacks to computer networks were considered and we achieved important results that can equip security analysts with best resources for their analyses.

  3. Stratigraphic Controls on Seawater Intrusion, and Implications for Ground-Water Management, Dominguez Gap Area of Los Angeles, California (United States)

    Siade, A. J.; Nishikawa, T.; Reichard, E. G.


    Development of ground water in coastal Los Angeles in the 20th century led to extensive water-level declines and associated seawater intrusion. The U.S. Geological Survey (USGS) has developed a solute-transport model to quantitatively test the hydraulic implications of a sequence-stratigraphic model and to assess the possible effects of alternative management strategies. The transport modeling was conducted using SUTRA, a finite-element, density-dependent, ground-water flow and solute-transport model. The SUTRA configuration for this case is two dimensional and considers flow and transport along an approximate flow line extending from the Pacific Ocean through the Dominguez Gap area of coastal Los Angeles. The lithologic representation is based on a stratigraphic cross section developed by Ponti and others (2007) The transient-state simulation period is from 1850 to 2004. Trial-and-error model calibration was conducted using the measured water levels and chloride (Cl) concentrations at nine wells along the cross section. The results from the calibrated model indicate that faulting can provide the main pathway for downward transport of seawater by juxtaposing low permeability layers with high permeability layers; prior stratigraphic models for the region did not recognize this fault system. Three 20- year management scenarios were considered: (1) status quo, that is, no change in water-management strategies; (2) installation of a slurry wall; and (3) raising inland water levels through increased injection or decreased pumpage. Scenario 1 resulted in increasing Cl concentrations. Scenario 2 slowed Cl migration; however, this did not reverse seawater intrusion. Scenario 3 reversed seawater intrusion, but there remained Cl in the deeper regions that will be removed only by dilution over time.

  4. Economic impacts of urban flooding in South Florida: Potential consequences of managing groundwater to prevent salt water intrusion. (United States)

    Czajkowski, Jeffrey; Engel, Vic; Martinez, Chris; Mirchi, Ali; Watkins, David; Sukop, Michael C; Hughes, Joseph D


    High-value urban zones in coastal South Florida are considered particularly vulnerable to salt water intrusion into the groundwater-based, public water supplies caused by sea level rise (SLR) in combination with the low topography, existing high water table, and permeable karst substrate. Managers in the region closely regulate water depths in the extensive South Florida canal network to control closely coupled groundwater levels and thereby reduce the risk of saltwater intrusion into the karst aquifer. Potential SLR adaptation strategies developed by local managers suggest canal and groundwater levels may have to be increased over time to prevent the increased salt water intrusion risk to groundwater resources. However, higher canal and groundwater levels cause the loss of unsaturated zone storage and lead to an increased risk of inland flooding when the recharge from rainfall exceeds the capacity of the unsaturated zone to absorb it and the water table reaches the surface. Consequently, higher canal and groundwater levels are also associated with increased risk of economic losses, especially during the annual wet seasons. To help water managers and urban planners in this region better understand this trade-off, this study models the relationships between flood insurance claims and groundwater levels in Miami-Dade County. Via regression analyses, we relate the incurred number of monthly flood claims in 16 Miami-Dade County watersheds to monthly groundwater levels over the period from 1996 to 2010. We utilize these estimated statistical relationships to further illustrate various monthly flood loss scenarios that could plausibly result, thereby providing an economic quantification of a "too much water" trade-off. Importantly, this understanding is the first of its kind in South Florida and is exceedingly useful for regional-scale hydro-economic optimization models analyzing trade-offs associated with high water levels. Copyright © 2017 Elsevier B.V. All rights

  5. Distributed intrusion detection system based on grid security model (United States)

    Su, Jie; Liu, Yahui


    Grid computing has developed rapidly with the development of network technology and it can solve the problem of large-scale complex computing by sharing large-scale computing resource. In grid environment, we can realize a distributed and load balance intrusion detection system. This paper first discusses the security mechanism in grid computing and the function of PKI/CA in the grid security system, then gives the application of grid computing character in the distributed intrusion detection system (IDS) based on Artificial Immune System. Finally, it gives a distributed intrusion detection system based on grid security system that can reduce the processing delay and assure the detection rates.

  6. Acoustic monitoring of terrorist intrusion in a drinking water network

    NARCIS (Netherlands)

    Quesson, B.A.J.; Sheldon-Robert, M.K.; Vloerbergh, I.N.; Vreeburg, J.H.G.


    In collaboration with Kiwa Water Research, TNO (Netherlands Organisation for Applied Scientific Research) has investigated the possibilities to detect and classify aberrant sounds in water networks, using acoustic sensors. Amongst the sources of such sounds are pumps, drills, mechanical impacts,

  7. Analysing monthly sectorial water use and its influence on salt intrusion induced water shortage in urbanized deltas

    NARCIS (Netherlands)

    Yao, Mingtian; Yan, Dan; Kabat, Pavel; Huang, Heqing; Hutjes, Ronald W.A.; Werners, Saskia E.


    Urbanizing delta regions face seasonal water shortages induced by rising salt intrusion. Decreasing river discharge is readily listed as the major cause of water shortage events. Yet, observations of river discharge often fail to support this attribution. Evidence of the association between

  8. Impact of the Three Gorges Dam, the South-North Water Transfer Project and water abstractions on the duration and intensity of salt intrusions in the Yangtze River estuary (United States)

    Webber, M.; Li, M. T.; Chen, J.; Finlayson, B.; Chen, D.; Chen, Z. Y.; Wang, M.; Barnett, J.


    This paper assesses the impacts of the Three Gorges Dam, the South-North Water Transfer Project and other water abstractions on the probability of long-duration salt intrusions into the Yangtze River estuary. Studies of intrusions of saltwater into estuaries are typically constrained by both the short duration of discharge records and the paucity of observations of discharge and salinity. Thus, studies of intrusions of saltwater into estuaries typically seek to identify the conditions under which these intrusions occur, using detailed observations for periods of 20-60 days. The paper therefore first demonstrates a method by which to identify the conditions under which intense intrusions of long-duration occur and then applies that method to analyse the effect of the three projects. The paper constructs a model of the relationship between salinity and discharge and then employs Monte Carlo simulation methods to reconstruct the probability of observing intrusions of differing intensities and durations in relation to discharge. The model predicts that the duration of intrusions with chlorinity ≥ 250 mg L-1 (or ≥ 400 or 500 mg L-1) increases as the number of consecutive days with discharge ≤ 12 000 m3 s-1 (or ≤ 8000 m3 s-1 increases. The model predicts that in 1950-2014, the number of consecutive days with chlorinity ≥ 250 mg L-1 averaged 21.34 yr-1; if the three projects operate according to their normal rules, that average would rise to 41.20 yr-1. For a randomly selected year of discharge history from the period 1950-2014, under normal operating rules for these projects the probability of an intrusion rises from 0.25 (for 30-day intrusions) or 0.05 (for 60-day intrusions) to 0.57 or 0.28, respectively.

  9. A quantitative investigation on sea water intrusions and its related remediation strategy in the Penghu Island, Taiwan (United States)

    Lee, Jhe-Wei; Chou, Ssu-Yu; Lo, Wei-Cheng


    Penghu islands is one of Taiwan's three major volcanic group, with basalt from cooled lava forming major rocks of each island. This research was undertaken to investigate the current stage of groundwater hydrology, usage, and salinization in Penghu. We evaluated, in qualitative and quantitative manners, the potential causes of groundwater salinization based on our test results, which provides useful information to build the geological model for numerical studies in Penghu. We applied MODFLOW and its sub-mode MT3DMS to simulate the groundwater level and seawater intrusion in Penghu, and proposed the remediation strategy for groundwater resource protection. According to the information collected as well as the results obtained, there are three issues of groundwater salinization that should be well addressed in Penghu. The first is to characterize the mechanism of groundwater salinization in confine and unconfined aquifers, respectively; the second is to identify the attribute of groundwater salinization; the third is to delineate the spatial distribution of the groundwater control zone and the area of groundwater salinization. These issues were solved through two different aspects in this research: field investigation and groundwater modeling. In the field investigation, we sampled 15 wells three times to examine groundwater quality. Our analysis indicated that the potential causes for groundwater salinization can be essentially categorized into three parts: (1) seawater intrusion, (2) the existence of residual ancient brine water, and (3) the calcium ion and magnesium ion released from stratum. To obtain better understanding of the interchange between rain and groundwater, we also performed hydrogen and oxygen isotopic analysis additionally, which is beneficial to assess the recharge source of the groundwater subarea. In reference to remediation strategy, recharge into aquifer is not recommended since there is no sufficient surface water storage, and therefore a

  10. Groundwater Modeling in Coastal Arid Regions Under the Influence of Marine Saltwater Intrusion (United States)

    Walther, Marc; Kolditz, Olaf; Grundmann, Jens; Liedl, Rudolf


    The optimization of an aquifer's "safe yield", especially within agriculturally used regions, is one of the fundamental tasks for nowaday's groundwater management. Due to the limited water ressources in arid regions, conflict of interests arise that need to be evaluated using scenario analysis and multicriterial optimization approaches. In the context of the government-financed research project "International Water Research Alliance Saxony" (IWAS), the groundwater quality for near-coastal, agriculturally used areas is investigated under the influence of marine saltwater intrusion. Within the near-coastal areas of the study region, i.e. the Batinah plains of Northern Oman, an increasing agricultural development could be observed during the recent decades. Simultaneously, a constant lowering of the groundwater table was registered, which is primarily due to the uncontrolled and unsupervised mining of the aquifers for the local agricultural irrigation. Intensively decreased groundwater levels, however, cause an inversion of the hydraulic gradient which is naturally aligned towards the coast. This, in turn,leads to an intrusion of marine saltwater flowing inland, endangering the productivity of farms near the coast. Utilizing the modeling software package OpenGeoSys, which has been developed and constantly enhanced by the Department of Environmental Informatics at the Helmholtz Centre for Environmental Research Leipzig (UFZ; Kolditz et al., 2008), a three-dimensional, density-dependent model including groundwater flow and mass transport is currently being built up. The model, comprehending three selected coastal wadis of interest, shall be used to investigate different management scenarios. The main focus of the groundwater modelling are the optimization of well positions and pumping schemes as well as the coupling with a surface runoff model, which is also used for the determination of the groundwater recharge due to wadi runoff downstream of retention dams. Based on

  11. Malvinas-slope water intrusions on the northern Patagonia continental shelf

    Directory of Open Access Journals (Sweden)

    A. R. Piola


    Full Text Available The Patagonia continental shelf located off southeastern South America is bounded offshore by the Malvinas Current, which extends northward from northern Drake Passage (~55° S to nearly 38° S. The transition between relatively warm-fresh shelf waters and Subantarctic Waters from the western boundary current is characterized by a thermohaline front extending nearly 2500 km. We use satellite derived sea surface temperature, and chlorophyll-a data combined with hydrographic and surface drifter data to document the intrusions of slope waters onto the continental shelf near 41° S. These intrusions create vertically coherent localized negative temperature and positive salinity anomalies extending onshore about 150 km from the shelf break. The region is associated with a center of action of the first mode of non-seasonal sea surface temperature variability and also relatively high chlorophyll-a variability, suggesting that the intrusions are important in promoting the local development of phytoplankton. The generation of slope water penetrations at this location may be triggered by the inshore excursion of the 100 m isobath, which appears to steer the Malvinas Current waters over the outer shelf.

  12. Geophysical study of saline water intrusion in Lagos municipality

    African Journals Online (AJOL)


    were obtained at Ikoyi, Dolphin, Victoria Island and Lekki. The geo-section generated for the axis is presented in Figure 6 while the interpretation summary is presented in Table 3. Within the axis, the delineated sand units are saline water saturated to depths varying between 118 and 196 m in Apapa and Ajah, respectively.

  13. Effects of sea-level rise on salt water intrusion near a coastal well field in southeastern Florida (United States)

    Langevin, Christian D.; Zygnerski, Michael


    A variable-density groundwater flow and dispersive solute transport model was developed for the shallow coastal aquifer system near a municipal supply well field in southeastern Florida. The model was calibrated for a 105-year period (1900 to 2005). An analysis with the model suggests that well-field withdrawals were the dominant cause of salt water intrusion near the well field, and that historical sea-level rise, which is similar to lower-bound projections of future sea-level rise, exacerbated the extent of salt water intrusion. Average 2005 hydrologic conditions were used for 100-year sensitivity simulations aimed at quantifying the effect of projected rises in sea level on fresh coastal groundwater resources near the well field. Use of average 2005 hydrologic conditions and a constant sea level result in total dissolved solids (TDS) concentration of the well field exceeding drinking water standards after 70 years. When sea-level rise is included in the simulations, drinking water standards are exceeded 10 to 21 years earlier, depending on the specified rate of sea-level rise.

  14. Managing risks from virus intrusion into water distribution systems due to pressure transients. (United States)

    Yang, Jian; LeChevallier, Mark W; Teunis, Peter F M; Xu, Minhua


    Low or negative pressure transients in water distribution systems, caused by unexpected events (e.g. power outages) or routine operation/maintenance activities, are usually brief and thus are rarely monitored or alarmed. Previous studies have shown connections between negative pressure events in water distribution systems and potential public health consequences. Using a quantitative microbial risk assessment (QMRA) model previously developed, various factors driving the risk of viral infection from intrusion were evaluated, including virus concentrations external to the distribution system, maintenance of a disinfectant residual, leak orifice sizes, the duration and the number of nodes drawing negative pressures. The most sensitive factors were the duration and the number of nodes drawing negative pressures, indicating that mitigation practices should be targeted to alleviate the severity of low/negative pressure transients. Maintaining a free chlorine residual of 0.2 mg/L or above is the last defense against the risk of viral infection due to negative pressure transients. Maintaining a chloramine residual did not appear to significantly reduce the risk. The effectiveness of ensuring separation distances from sewer mains to reduce the risk of infection may be system-specific. Leak detection/repair and cross-connection control should be prioritized in areas vulnerable to negative pressure transients.

  15. An Excel Macro to Plot the HFE-Diagram to Identify Sea Water Intrusion Phases. (United States)

    Giménez-Forcada, Elena; Sánchez San Román, F Javier


    A hydrochemical facies evolution diagram (HFE-D) is a multirectangular diagram, which is a useful tool in the interpretation of sea water intrusion processes. This method note describes a simple method for generating an HFE-D plot using the spreadsheet software package, Microsoft Excel. The code was applied to groundwater from the alluvial coastal plain of Grosseto (Tuscany, Italy), which is characterized by a complex salinization process in which sea water mixes with sulfate or bicarbonate recharge water. © 2014, National GroundWater Association.

  16. How Significant is the Slope of the Sea-side Boundary for Modelling Seawater Intrusion in Coastal Aquifers? (United States)

    Walther, Marc; Graf, Thomas; Kolditz, Olaf; Lield, Rudolf; Post, Vincent


    A large number of people live in coastal areas using the available water resources, which in (semi-)arid regions are often taken from groundwater resources as the only sufficient source. Compared to surface water, these usually provide a safe water supply due to the remediation and retention capabilities of the subsurface, their high yield, and potentially longer term stability. With a water withdrawal from a coastal aquifer, coastal water management, however, has to ensure that seawater intrusion is retained in order to keep the water salinity at an acceptable level for all water users (e.g. agriculture, industry, households). Besides monitoring of water levels and saline intrusion, it has become a common practice to use numerical modeling for evaluating the coastal water resources and projecting future scenarios. When applying a model, it is necessary for the simplifications implied during the conceptualization of the setup to include the relevant processes (here variable-density flow and mass transport) and sensitive parameters (for a steady state commonly hydraulic conductivity, density ratio, dispersivity). Additionally, the model's boundary conditions are essential to the simulation results. In order to reduce the number of elements, and thus, the computational burden, one simplification that is made in most regional scale saltwater intrusion applications, is to represent the sea-side boundary with a vertical geometry, contrary to the natural conditions, that usually show a very shallow decent of the interface between the aquifer and the open seawater. We use the scientific open-source modeling toolbox OpenGeoSys [1] to quantify the influence of this simplification on the saline intrusion, submarine groundwater discharge, and groundwater residence times. Using an ensemble of different shelf shapes for a steady state setup, we identified a significant dependency of saline intrusion length on the geometric parameters of the sea-side boundary. Results show that

  17. An Agent Based Intrusion Detection Model for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. M. Reshmi


    Full Text Available Intrusion detection has over the last few years, assumed paramount importance within the broad realm of network security, more so in case of wireless mobile ad hoc networks. The inherently vulnerable characteristics of wireless mobile ad hoc networks make them susceptible to attacks in-spite of some security measures, and it may be too late before any counter action can take effect. As such, there is a need to complement traditional security mechanisms with efficient intrusion detection and response systems. This paper proposes an agent-based model to address the aspect of intrusion detection in cluster based mobile wireless ad hoc network environment. The model comprises of a set of static and mobile agents, which are used to detect intrusions, respond to intrusions, and distribute selected and aggregated intrusion information to all other nodes in the network in an intelligent manner. The model is simulated to test its operation effectiveness by considering the performance parameters such as, detection rate, false positives, agent overheads, and intrusion information distribution time. Agent based approach facilitates flexible and adaptable security services. Also, it supports component based software engineering components such as maintainability, reachability, reusability, adaptability, flexibility, and customization.

  18. Intrusion detection system episteme

    National Research Council Canada - National Science Library

    Daniel Mihályi; Valerie Novitzká; Martina Ľaľová


    .... We deal with a simplified model of an intrusion detection system. We model an intrusion detection system as a coalgebra and construct its Kripke model of coalgebraic modal linear logic using powerset endofunctor...

  19. Forecast, observation and modelling of a deep stratospheric intrusion event over Europe

    Directory of Open Access Journals (Sweden)

    P. Zanis


    Full Text Available A wide range of measurements was carried out in central and southeastern Europe within the framework of the EU project STACCATO (Influence of Stratosphere-Troposphere Exchange in a Changing Climate on Atmospheric Transport and Oxidation Capacity with the principle goal to create a comprehensive data set on stratospheric air intrusions into the troposphere along a rather frequently observed pathway over central Europe from the North Sea to the Mediterranean Sea. The measurements were based on predictions by suitable quasi-operational trajectory calculations using ECMWF forecast data. A predicted deep Stratosphere to Troposphere Transport (STT event, encountered during the STACCATO period on 20-21 June 2001, was followed by the measurements network almost from its inception. Observations provide evidence that the intrusion affected large parts of central and southeastern Europe. Especially, the ozone lidar observations on 20-21 June 2001 at Garmisch-Partenkirchen, Germany captured the evolution of two marked tongues of high ozone with the first one descending to nearly 2 km, thus providing an excellent data set for model intercomparisons and validation. In addition, for the first time to our knowledge concurrent surface measurements of the cosmogenic radionuclides 10Be and 7Be and their ratio 10Be/7Be are presented together as stratospheric tracers in a case study of a stratospheric intrusion. The ozone tracer columns calculated with the FLEXPART model were found to be in good agreement with water vapour satellite images, capturing the evolution of the observed dry streamers of stratospheric origin. Furthermore, the time-height cross section of ozone tracer simulated with FLEXPART over Garmisch-Partenkirchen captures many details of the evolution of the two observed high-ozone filaments measured with the IFU lidar, thus demonstrating the considerable progress in model simulations. Finally, the modelled ozone (operationally available since October

  20. Evolutionary process of saline-water intrusion in Holocene and Late Pleistocene groundwater in southern Laizhou Bay. (United States)

    Liu, Sen; Tang, Zhonghua; Gao, Maosheng; Hou, Guohua


    Saline water intrusion is one of the most serious groundwater problems in southern Laizhou Bay. In this study, formation of groundwater with different qualities and saline water intrusion were analyzed using hydrochemical and stable isotopic methods, and the Hydrochemical Facies Evolution Diagram (HFE-Diagram). The results demonstrate that the structure of the sedimentary layer in this area is the dominant controlling factor of groundwater distribution. From the south (land) to the north (sea), the hydrochemical distribution presents a regular changing pattern following the order: HCO3-Na·Mg and HCO3·Cl-Mg·Ca (fresh water), HCO3·Cl-Na·Mg (brackish water), Cl-Na·Mg (saline water), Cl-Na (saline water) and Cl·HCO3-Na (brackish water). Hydrochemical data show that saline water and brine are not the result of evaporation or the concentration of seawater. Brackish water and saline water with low mineralization in Holocene groundwater are formed by the mixing of fresh water and highly mineralized saline water, dissolution of evaporates by meteoric water, and water/salt interaction. And the saline water formed through dissolution of evaporates in Holocene and Late Pleistocene groundwater. Isotopic results reveal that the main recharge of saline water in Holocene groundwater and Late Pleistocene groundwater is a combination of the meteoric water and lateral recharge from rivers. Saline water intrusion was found to follow a wedge-shaped intrusion pattern. Significant variations in Cl(-) and Na(+)indicate saline intrusion in the southern area. The degree of saline water intrusion in Holocene groundwater was found to be more serious than that in Late Pleistocene groundwater. Hydrochemical data and HFE-Diagram show that there is an intrusion process in Holocene groundwater. In this process, it is accepted the fresh water recharge, such as meteoric water and lateral recharge from rivers. In Late Pleistocene groundwater, it presents a simple intrusion process from saline

  1. Detection of Dry Intrusion on Water Vapor Images Over Central Europe - June 2010 TO September 2011 (United States)

    Novotny, J.; Dejmal, K.; Hudec, F.; Kolar, P.


    The knowledge of evaluation of the intensity of cyclogenesis which could be connected with the weather having a significant impact on Earth's surface is quite useful. If, as one of the basic assumptions, the existence of connection between dry intrusions, dry bands, tropopause height and warm dark areas distribution on water vapor images (WV images) is considered, it is possible to set up a method of detecting dry intrusions on searching and tracking areas with higher brightness temperature compared with the surrounding environment. This paper covers the period between June 2010 and September 2011 over Central Europe. The ISIS method (Instrument de Suivi dans I'Imagerie satellitaire), originally developed for detection of cold cloud tops, was used as an initial ideological point. Subsequently, this method was modified by Michel and Bouttier for usage on WV images. Some of the applied criteria and parameters were chosen with reference to the results published by Michel and Bouttier as well as by Novotny. The procedure can be divided into two steps: detection of warm areas and their tracking. Cases of detection of areas not evidently connected with dry intrusions can be solved by filtering off based on the connection between detected warm areas to the cyclonic side of jet streams and significant lowering of the tropopause.

  2. A modeling study of saltwater intrusion in the Andarax delta area using multiple data sources

    DEFF Research Database (Denmark)

    Antonsson, Arni Valur; Engesgaard, Peter Knudegaard; Jorreto, Sara

    context. The validity of a conceptual model is determined by different factors, where both data quantity and quality is of crucial importance. Often, when dealing with saltwater intrusion, data is limited. Therefore, using different sources (and types) of data can be beneficial and increase...... reaching saltwater intrusion in the area. Furthermore, the geological information obtained from these boreholes laid a foundation for a new hydrogeological conceptual model of the area, which we aim to assess in this simulation study.Appraisal of the conceptual model of the Andarax delta area is conducted...... using different types of data that have been gathered and analyzed; these include measurements of hydraulic head, salinity (EC), geochemistry and electrical resistivity. The approach here has been to construct a saltwater intrusion model of the area with the aim of obtaining a model that is reasonably...

  3. Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network

    DEFF Research Database (Denmark)

    Isah, Abdullahi

    The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria.......The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria....

  4. Contextualising Water Use in Residential Settings: A Survey of Non-Intrusive Techniques and Approaches

    Directory of Open Access Journals (Sweden)

    Davide Carboni


    Full Text Available Water monitoring in households is important to ensure the sustainability of fresh water reserves on our planet. It provides stakeholders with the statistics required to formulate optimal strategies in residential water management. However, this should not be prohibitive and appliance-level water monitoring cannot practically be achieved by deploying sensors on every faucet or water-consuming device of interest due to the higher hardware costs and complexity, not to mention the risk of accidental leakages that can derive from the extra plumbing needed. Machine learning and data mining techniques are promising techniques to analyse monitored data to obtain non-intrusive water usage disaggregation. This is because they can discern water usage from the aggregated data acquired from a single point of observation. This paper provides an overview of water usage disaggregation systems and related techniques adopted for water event classification. The state-of-the art of algorithms and testbeds used for fixture recognition are reviewed and a discussion on the prominent challenges and future research are also included.

  5. Modelling The Environmental Impact of Controlling Saline Intrusion In The Mekong River Delta, Vietnam (United States)

    Lehmann, E.; Gowing, J.; Payton, R.

    The delta at the mouth of the Mekong River extends over 50,000 km2 in Vietnam and Cambodia. It is a highly productive environment both for rice and fish, but conflicts arise between their water quality demands. In this paper we focus on an investigation of this conflict in the Ca Mau peninsula, which lies entirely within Vietnam at the southern tip of the delta. The study area is a highly modified environment in which the natural mangrove veg- etation has been removed and a complex network of natural and man-made channels has been created. In an attempt to manage salinity intrusion into this environment, a number of tidal sluices have been constructed in recent years leading to progressive expansion of the area suitable for intensification of rice production. However, this has also led to negative impact on fish and shrimp production due to the change from brackish to fresh water conditions. The impact of this change is further exacerbated by the existence throughout a large part of the Ca Mau peninsula of acid sulphate soils. These are old marine sediments which are sulphur rich and have the potential to release sulphuric acid once they be- come oxidised. This has serious implications for productivity of rice fields and also for severe impacts on the aquatic environment. This paper reports an interdisciplinary investigation of the environmental impact of these changes. We identify the sources of acidity, which include rice fields, shrimp ponds and excavated channel sediments. We add different water quality modules to an existing hydraulic and transport model to allow simulation of temporal and spatial variation of water quality within the study area. We show a special interest on the water exchange between the fields and the canals as the area suffers from floods and dry spells.

  6. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For


    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili...

  7. Compilation of gas intrusion measurements, variations, and consequence modeling for SPR caverns.

    Energy Technology Data Exchange (ETDEWEB)

    Hinkebein, Thomas E.


    The intrusion of gas into oils stored within the SPR has been examined. When oil is stored in domal salts, gases intrude into the stored oil from the surrounding salt. Aspects of the mechanism of gas intrusion have been examined. In all cases, this gas intrusion results in increases in the oil vapor pressure. Data that have been gathered from 1993 to August 2002 are presented to show the resultant increases in bubble-point pressure on a cavern-by-cavern as well as on a stream basis. The measurement techniques are presented with particular emphasis on the TVP 95. Data analysis methods are presented to show the methods required to obtain recombined cavern oil compositions. Gas-oil ratios are also computed from the data and are presented on a cavern-by-cavern and stream basis. The observed increases in bubble-point pressure and gas-oil ratio are further statistically analyzed to allow data interpretation. Emissions plume modeling is used to determine adherence to state air regulations. Gas intrusion is observed to be variable among the sites and within each dome. Gas intrusions at Bryan Mound and Big Hill have resulted in the largest increases in bubble-point pressure for the Strategic Petroleum Reserve (SPR). The streams at Bayou Choctaw and West Hackberry show minimal bubble-point pressure increases. Emissions plume modeling, using the state mandated ISCST code, of oil storage tanks showed that virtually no gas may be released when H2S standards are considered. DOE plans to scavenge H2S to comply with the very tight standards on this gas. With the assumption of scavenging, benzene releases become the next most controlling factor. Model results show that a GOR of 0.6 SCF/BBL may be emissions that are within standards. Employing the benzene gas release standard will significantly improve oil deliverability. New plume modeling using the computational fluid dynamics code, FLUENT, is addressing limitations of the state mandated ISCST model.

  8. Improving Accuracy of Intrusion Detection Model Using PCA and optimized SVM

    Directory of Open Access Journals (Sweden)

    Sumaiya Thaseen Ikram


    Full Text Available Intrusion detection is very essential for providing security to different network domains and is mostly used for locating and tracing the intruders. There are many problems with traditional intrusion detection models (IDS such as low detection capability against unknown network attack, high false alarm rate and insufficient analysis capability. Hence the major scope of the research in this domain is to develop an intrusion detection model with improved accuracy and reduced training time. This paper proposes a hybrid intrusiondetection model by integrating the principal component analysis (PCA and support vector machine (SVM. The novelty of the paper is the optimization of kernel parameters of the SVM classifier using automatic parameter selection technique. This technique optimizes the punishment factor (C and kernel parameter gamma (γ, thereby improving the accuracy of the classifier and reducing the training and testing time. The experimental results obtained on the NSL KDD and gurekddcup dataset show that the proposed technique performs better with higher accuracy, faster convergence speed and better generalization. Minimum resources are consumed as the classifier input requires reduced feature set for optimum classification. A comparative analysis of hybrid models with the proposed model is also performed.

  9. Prototype of Intrusion Detection Model using UML 5.0 and Forward Engineering

    Directory of Open Access Journals (Sweden)

    Muthaiyan MADIAJAGAN,


    Full Text Available In this paper we are using UML (Unified Modeling Language which is the blueprint language between the programmers, analysts, and designer’s for easy representation of pictures or diagrammatic notation with some textual data. Here we are using UML 5.0 to show “prototype of the Intrusion Detection Model” and by explaining it by combining various parts by drawing various UML diagrams such as Use cases and Activity diagrams and Class Diagram using which we show forward engineering using the class diagram of the IDM( Intrusion Detection Model. IDM is a device or software that works on detecting malicious activities by unauthorized users that can cause breach to the security policy within a network.

  10. Accurate Modeling of The Siemens S7 SCADA Protocol For Intrusion Detection And Digital Forensic

    Directory of Open Access Journals (Sweden)

    Amit Kleinmann


    Full Text Available The Siemens S7 protocol is commonly used in SCADA systems for communications between a Human Machine Interface (HMI and the Programmable Logic Controllers (PLCs. This paper presents a model-based Intrusion Detection Systems (IDS designed for S7 networks. The approach is based on the key observation that S7 traffic to and from a specific PLC is highly periodic; as a result, each HMI-PLC channel can be modeled using its own unique Deterministic Finite Automaton (DFA. The resulting DFA-based IDS is very sensitive and is able to flag anomalies such as a message appearing out of its position in the normal sequence or a message referring to a single unexpected bit. The intrusion detection approach was evaluated on traffic from two production systems. Despite its high sensitivity, the system had a very low false positive rate - over 99.82% of the traffic was identified as normal.

  11. Geophysical and Seawater intrusion models to distinguish Modern and Palaeo salinity in the Central Godvari Delta, Andhra Pradesh, India (United States)

    Lagudu, S.; Nandan, M. J.; Durgaprasad, M.; Gurunadha Rao, V. V. S.


    Central Godavari Delta is located in the East coast of Andhra Pradesh along Bay of Bengal. Ample surface water is made available for irrigation and aqua culture through well distributed canals drawn from Godavari River since last 150 years. Groundwater in the area is highly saline though the groundwater levels are very shallow ranging from 1 to 3 m below ground level. Integrated Electrical Resistivity Tomograms (ERT), hydrochemical (pH, TDS, Ca2+, Mg2+, K+, F-, Cl-, SO42-, NO3-, HCO3- and CO3-), isotopic (Br- and δ18O ) and density dependant solute tranport (SEAWAT) modelling studies have been carried out for four years (2006, 2007, 2014 and 2015) to identify the salinity sources and to understand the possible extent of seawater intrusion. The integration of all these data sets revealed that coarse grained sands exhibits resistivity of 4-20 Ωm forming the surface layer, clay layer exhibits soils saturated with sea water. Clay with fine sand occurs as the third layer with a resistivity of 1- 4 Ωm. The different mixing models ((TDS vs. (Na2++ K+) and (Ca2++Mg2+), (Na+-Cl- ) vs. Ca2++Mg2+-HCO3--SO42-)) and ionic ratios ( Na2+/Cl-, SO42-/Cl-, Mg2+/Ca2+, Mg2+/Cl- and Cl-/Br) and δ18O does not reflect any modern seawater signatures. These models indicated that salinity in the shallow wells is due to dissolution of evaporitic minerals and ion exchange processes. In the pumping wells the salinity is due to upconing of entrapped sea water that belongs to Palaeo origin and wells located near the coast and mudflats is due to physical mixing of marine water. The estimated regional groundwater balance using SEAWAT model indicate significant amount of submarine groundwater discharge as outfall to the Bay of Bengal. Assuming observed hydrological conditions, no considerable advance in seawater intrusion would be expected into the delta region.

  12. A Novel Algorithm for Intrusion Detection Based on RASL Model Checking

    Directory of Open Access Journals (Sweden)

    Weijun Zhu


    Full Text Available The interval temporal logic (ITL model checking (MC technique enhances the power of intrusion detection systems (IDSs to detect concurrent attacks due to the strong expressive power of ITL. However, an ITL formula suffers from difficulty in the description of the time constraints between different actions in the same attack. To address this problem, we formalize a novel real-time interval temporal logic—real-time attack signature logic (RASL. Based on such a new logic, we put forward a RASL model checking algorithm. Furthermore, we use RASL formulas to describe attack signatures and employ discrete timed automata to create an audit log. As a result, RASL model checking algorithm can be used to automatically verify whether the automata satisfy the formulas, that is, whether the audit log coincides with the attack signatures. The simulation experiments show that the new approach effectively enhances the detection power of the MC-based intrusion detection methods for a number of telnet attacks, p-trace attacks, and the other sixteen types of attacks. And these experiments indicate that the new algorithm can find several types of real-time attacks, whereas the existing MC-based intrusion detection approaches cannot do that.

  13. Stochastic Optimization for an Analytical Model of Saltwater Intrusion in Coastal Aquifers (United States)

    Stratis, Paris N.; Karatzas, George P.; Papadopoulou, Elena P.; Zakynthinaki, Maria S.; Saridakis, Yiannis G.


    The present study implements a stochastic optimization technique to optimally manage freshwater pumping from coastal aquifers. Our simulations utilize the well-known sharp interface model for saltwater intrusion in coastal aquifers together with its known analytical solution. The objective is to maximize the total volume of freshwater pumped by the wells from the aquifer while, at the same time, protecting the aquifer from saltwater intrusion. In the direction of dealing with this problem in real time, the ALOPEX stochastic optimization method is used, to optimize the pumping rates of the wells, coupled with a penalty-based strategy that keeps the saltwater front at a safe distance from the wells. Several numerical optimization results, that simulate a known real aquifer case, are presented. The results explore the computational performance of the chosen stochastic optimization method as well as its abilities to manage freshwater pumping in real aquifer environments. PMID:27689362

  14. Stochastic Optimization for an Analytical Model of Saltwater Intrusion in Coastal Aquifers. (United States)

    Stratis, Paris N; Karatzas, George P; Papadopoulou, Elena P; Zakynthinaki, Maria S; Saridakis, Yiannis G

    The present study implements a stochastic optimization technique to optimally manage freshwater pumping from coastal aquifers. Our simulations utilize the well-known sharp interface model for saltwater intrusion in coastal aquifers together with its known analytical solution. The objective is to maximize the total volume of freshwater pumped by the wells from the aquifer while, at the same time, protecting the aquifer from saltwater intrusion. In the direction of dealing with this problem in real time, the ALOPEX stochastic optimization method is used, to optimize the pumping rates of the wells, coupled with a penalty-based strategy that keeps the saltwater front at a safe distance from the wells. Several numerical optimization results, that simulate a known real aquifer case, are presented. The results explore the computational performance of the chosen stochastic optimization method as well as its abilities to manage freshwater pumping in real aquifer environments.

  15. Acute effects of alcohol on intrusive memory development and viewpoint dependence in spatial memory support a dual representation model. (United States)

    Bisby, James A; King, John A; Brewin, Chris R; Burgess, Neil; Curran, H Valerie


    A dual representation model of intrusive memory proposes that personally experienced events give rise to two types of representation: an image-based, egocentric representation based on sensory-perceptual features; and a more abstract, allocentric representation that incorporates spatiotemporal context. The model proposes that intrusions reflect involuntary reactivation of egocentric representations in the absence of a corresponding allocentric representation. We tested the model by investigating the effect of alcohol on intrusive memories and, concurrently, on egocentric and allocentric spatial memory. With a double-blind independent group design participants were administered alcohol (.4 or .8 g/kg) or placebo. A virtual environment was used to present objects and test recognition memory from the same viewpoint as presentation (tapping egocentric memory) or a shifted viewpoint (tapping allocentric memory). Participants were also exposed to a trauma video and required to detail intrusive memories for 7 days, after which explicit memory was assessed. There was a selective impairment of shifted-view recognition after the low dose of alcohol, whereas the high dose induced a global impairment in same-view and shifted-view conditions. Alcohol showed a dose-dependent inverted "U"-shaped effect on intrusions, with only the low dose increasing the number of intrusions, replicating previous work. When same-view recognition was intact, decrements in shifted-view recognition were associated with increases in intrusions. The differential effect of alcohol on intrusive memories and on same/shifted-view recognition support a dual representation model in which intrusions might reflect an imbalance between two types of memory representation. These findings highlight important clinical implications, given alcohol's involvement in real-life trauma. Copyright 2010 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.

  16. Forced intrusion of water and aqueous solutions in microporous materials: from fundamental thermodynamics to energy storage devices. (United States)

    Fraux, Guillaume; Coudert, François-Xavier; Boutin, Anne; Fuchs, Alain H


    We review the high pressure forced intrusion studies of water in hydrophobic microporous materials such as zeolites and MOFs, a field of research that has emerged some 15 years ago and is now very active. Many of these studies are aimed at investigating the possibility of using these systems as energy storage devices. A series of all-silica zeolites (zeosil) frameworks were found suitable for reversible energy storage because of their stability with respect to hydrolysis after several water intrusion-extrusion cycles. Several microporous hydrophobic zeolite imidazolate frameworks (ZIFs) also happen to be quite stable and resistant towards hydrolysis and thus seem very promising for energy storage applications. Replacing pure water by electrolyte aqueous solutions enables to increase the stored energy by a factor close to 3, on account of the high pressure shift of the intrusion transition. In addition to the fact that aqueous solutions and microporous silica materials are environmental friendly, these systems are thus becoming increasingly interesting for the design of new energy storage devices. This review also addresses the theoretical approaches and molecular simulations performed in order to better understand the experimental behavior of nano-confined water. Molecular simulation studies showed that water condensation takes place through a genuine first-order phase transition, provided that the interconnected pores structure is 3-dimensional and sufficiently open. In an extreme confinement situations such as in ferrierite zeosil, condensation seem to take place through a continuous supercritical crossing from a diluted to a dense fluid, on account of the fact that the first-order transition line is shifted to higher pressure, and the confined water critical point is correlatively shifted to lower temperature. These molecular simulation studies suggest that the most important features of the intrusion/extrusion process can be understood in terms of equilibrium

  17. An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network. (United States)

    Sun, Xuemei; Yan, Bo; Zhang, Xinzhong; Rong, Chuitian


    Considering wireless sensor network characteristics, this paper combines anomaly and mis-use detection and proposes an integrated detection model of cluster-based wireless sensor network, aiming at enhancing detection rate and reducing false rate. Adaboost algorithm with hierarchical structures is used for anomaly detection of sensor nodes, cluster-head nodes and Sink nodes. Cultural-Algorithm and Artificial-Fish-Swarm-Algorithm optimized Back Propagation is applied to mis-use detection of Sink node. Plenty of simulation demonstrates that this integrated model has a strong performance of intrusion detection.

  18. An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network (United States)

    Sun, Xuemei; Yan, Bo; Zhang, Xinzhong; Rong, Chuitian


    Considering wireless sensor network characteristics, this paper combines anomaly and mis-use detection and proposes an integrated detection model of cluster-based wireless sensor network, aiming at enhancing detection rate and reducing false rate. Adaboost algorithm with hierarchical structures is used for anomaly detection of sensor nodes, cluster-head nodes and Sink nodes. Cultural-Algorithm and Artificial-Fish–Swarm-Algorithm optimized Back Propagation is applied to mis-use detection of Sink node. Plenty of simulation demonstrates that this integrated model has a strong performance of intrusion detection. PMID:26447696

  19. Intrusion detection model using fusion of chi-square feature selection and multi class SVM

    Directory of Open Access Journals (Sweden)

    Ikram Sumaiya Thaseen


    Full Text Available Intrusion detection is a promising area of research in the domain of security with the rapid development of internet in everyday life. Many intrusion detection systems (IDS employ a sole classifier algorithm for classifying network traffic as normal or abnormal. Due to the large amount of data, these sole classifier models fail to achieve a high attack detection rate with reduced false alarm rate. However by applying dimensionality reduction, data can be efficiently reduced to an optimal set of attributes without loss of information and then classified accurately using a multi class modeling technique for identifying the different network attacks. In this paper, we propose an intrusion detection model using chi-square feature selection and multi class support vector machine (SVM. A parameter tuning technique is adopted for optimization of Radial Basis Function kernel parameter namely gamma represented by ‘ϒ’ and over fitting constant ‘C’. These are the two important parameters required for the SVM model. The main idea behind this model is to construct a multi class SVM which has not been adopted for IDS so far to decrease the training and testing time and increase the individual classification accuracy of the network attacks. The investigational results on NSL-KDD dataset which is an enhanced version of KDDCup 1999 dataset shows that our proposed approach results in a better detection rate and reduced false alarm rate. An experimentation on the computational time required for training and testing is also carried out for usage in time critical applications.

  20. On-line detection of Escherichia coli intrusion in a pilot-scale drinking water distribution system. (United States)

    Ikonen, Jenni; Pitkänen, Tarja; Kosse, Pascal; Ciszek, Robert; Kolehmainen, Mikko; Miettinen, Ilkka T


    Improvements in microbial drinking water quality monitoring are needed for the better control of drinking water distribution systems and for public health protection. Conventional water quality monitoring programmes are not always able to detect a microbial contamination of drinking water. In the drinking water production chain, in addition to the vulnerability of source waters, the distribution networks are prone to contamination. In this study, a pilot-scale drinking-water distribution network with an on-line monitoring system was utilized for detecting bacterial intrusion. During the experimental Escherichia coli intrusions, the contaminant was measured by applying a set of on-line sensors for electric conductivity (EC), pH, temperature (T), turbidity, UV-absorbance at 254 nm (UVAS SC) and with a device for particle counting. Monitored parameters were compared with the measured E. coli counts using the integral calculations of the detected peaks. EC measurement gave the strongest signal compared with the measured baseline during the E. coli intrusion. Integral calculations showed that the peaks in the EC, pH, T, turbidity and UVAS SC data were detected corresponding to the time predicted. However, the pH and temperature peaks detected were barely above the measured baseline and could easily be mixed with the background noise. The results indicate that on-line monitoring can be utilized for the rapid detection of microbial contaminants in the drinking water distribution system although the peak interpretation has to be performed carefully to avoid being mixed up with normal variations in the measurement data. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. Consequences of CO2-rich water intrusion into the Critical Zone (United States)

    Gal, Frédérick; Lions, Julie


    From a geochemical point of view, the sensitivity of the Critical Zone to hazards is not only linked to its proximity to the surface. It may also be linked to - albeit less common - intrusion of upward migrating fluids. One of the hazard scenarios to observe these pathways in surface environments is the occurrence of CO2-rich fluid leakage from deeper horizons and especially leakage from reservoir in the case of underground storage such as Carbon Storage applications. Much effort is done to prevent this risk but it necessary to consider the mitigation of this leak to insure safe storage. Numerous active or planned CO2 storage sites belong to large sedimentary basins. In that perspective, a CO2 injection has been performed in a multi-layered - carbonated aquifer (Beauce aquifer) from the Paris basin as this basin has been considered for such applications. The aquifer mineralogy of the targeted site is dominated by calcite (95 to 98%) with traces of quartz and clay minerals. Around 10,000 liters of CO2 were injected at 50 m depth during a series of gaseous pulsed injections for 5 days. After 3 days of incubation in the aquifer, the groundwater was pumped during 5 days allowing the recovery of 140 m3 of backward water. Physico-chemical parameters, major and trace elements concentrations and dissolved CO2 concentrations were monitored to evaluate water-rock interactions occurring within the aquifer and impacts onto water quality. Main changes that were observed during the CO2 release are in good agreement with results from previous experiments performed worldwide. A strong decrease of the pH value (2 units), a rise of the electrical conductivity (2 fold) and changes in the redox conditions (from oxidising to less oxidising) are monitored few hours after the initiation of the pumping. The dissolution of CO2 induces a drop of pH that favours water-rock interaction processes. The kinetic of reactions appears to be dominated by the dissolution of carbonate, mainly calcite

  2. Assessing the public health risk of microbial intrusion events in distribution systems: conceptual model, available data, and challenges. (United States)

    Besner, Marie-Claude; Prévost, Michèle; Regli, Stig


    Low and negative pressure events in drinking water distribution systems have the potential to result in intrusion of pathogenic microorganisms if an external source of contamination is present (e.g., nearby leaking sewer main) and there is a pathway for contaminant entry (e.g., leaks in drinking water main). While the public health risk associated with such events is not well understood, quantitative microbial risk assessment can be used to estimate such risk. A conceptual model is provided and the state of knowledge, current assumptions, and challenges associated with the conceptual model parameters are presented. This review provides a characterization of the causes, magnitudes, durations and frequencies of low/negative pressure events; pathways for pathogen entry; pathogen occurrence in external sources of contamination; volumes of water that may enter through the different pathways; fate and transport of pathogens from the pathways of entry to customer taps; pathogen exposure to populations consuming the drinking water; and risk associated with pathogen exposure. Copyright © 2010 Elsevier Ltd. All rights reserved.

  3. The trauma film paradigm as an experimental psychopathology model of psychological trauma: intrusive memories and beyond. (United States)

    James, Ella L; Lau-Zhu, Alex; Clark, Ian A; Visser, Renée M; Hagenaars, Muriel A; Holmes, Emily A


    A better understanding of psychological trauma is fundamental to clinical psychology. Following traumatic event(s), a clinically significant number of people develop symptoms, including those of Acute Stress Disorder and/or Post Traumatic Stress Disorder. The trauma film paradigm offers an experimental psychopathology model to study both exposure and reactions to psychological trauma, including the hallmark symptom of intrusive memories. We reviewed 74 articles that have used this paradigm since the earliest review (Holmes & Bourne, 2008) until July 2014. Highlighting the different stages of trauma processing, i.e. pre-, peri- and post-trauma, the studies are divided according to manipulations before, during and after film viewing, for experimental as well as correlational designs. While the majority of studies focussed on the frequency of intrusive memories, other reactions to trauma were also modelled. We discuss the strengths and weaknesses of the trauma film paradigm as an experimental psychopathology model of trauma, consider ethical issues, and suggest future directions. By understanding the basic mechanisms underlying trauma symptom development, we can begin to translate findings from the laboratory to the clinic, test innovative science-driven interventions, and in the future reduce the debilitating effects of psychopathology following stressful and/or traumatic events. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.

  4. The geographical conditions of intensity of salty waters intrusions to coastal lakes on Polish Southern Baltic coast (United States)

    Cieslinski, R.


    Lakes situated on the coast of the southern Baltic function in different conditions than those in which typically inland reservoirs occur. They are situated in the contact zone of two environments: land and sea. These reservoirs together with their direct catchments form specific hydrographic arrangement, in which the course of physical, chemical and biological processes depends on the fact which of these two environments exerts a stronger influence at a given moment. This is important as the lakes situated in the shore zone of the southern Baltic are not exposed to phenomena caused by constant tides, as it is the case in open seas (Ataie-Ashtiani et al., 1999), but only to extreme hydrometeorological conditions, which lead to the formation of the phenomenon of intrusions of sea waters and of damming the free outflow of potamic waters (Demirel, 2004; Cieśliński, Drwal, 2005). What should also be remembered are the local hydrographic, hydrological and morphometric conditions. As a result of intrusions, in the waters of coastal lakes, apart from inland waters there are also waters of sea origin. The proportions of these genetically distinct waters are variable and differ in individual lakes (Grassi, Netti, 2000; Drwal, Cieśliński, 2007). Despite the difference in the causal factor triggering the phenomenon of salt water intrusions, the effect is usually the same as that observed, for instance, in lakes and lagoons of seas with tides (Ishitobi et al., 1999; De Louw, Oude Essink, 2001) and poorly flushed lagoon (Hsing-Juh et al., 2006) or estuaries (Uncles et al., 2002), though the scale of qualitative changes is greater in the case of open seas than in half-closed and closed seas. The status of the research carried out so far enables proposing a hypothesis that chlorides concentrations, as the best indicators for establishing the occurrence of the phenomenon of intrusions, depend not only on the meteorological factor but in some of the lakes on various

  5. Numerical model investigation for potential methane explosion and benzene vapor intrusion associated with high-ethanol blend releases. (United States)

    Ma, Jie; Luo, Hong; Devaull, George E; Rixey, William G; Alvarez, Pedro J J


    Ethanol-blended fuel releases usually stimulate methanogenesis in the subsurface, which could pose an explosion risk if methane accumulates in a confined space above the ground where ignitable conditions exist. Ethanol-derived methane may also increase the vapor intrusion potential of toxic fuel hydrocarbons by stimulating the depletion of oxygen by methanotrophs, and thus inhibiting aerobic biodegradation of hydrocarbon vapors. To assess these processes, a three-dimensional numerical vapor intrusion model was used to simulate the degradation, migration, and intrusion pathway of methane and benzene under different site conditions. Simulations show that methane is unlikely to build up to pose an explosion hazard (5% v/v) if diffusion is the only mass transport mechanism through the deeper vadose zone. However, if methanogenic activity near the source zone is sufficiently high to cause advective gas transport, then the methane indoor concentration may exceed the flammable threshold under simulated conditions. During subsurface migration, methane biodegradation could consume soil oxygen that would otherwise be available to support hydrocarbon degradation, and increase the vapor intrusion potential for benzene. Vapor intrusion would also be exacerbated if methanogenic activity results in sufficiently high pressure to cause advective gas transport in the unsaturated zone. Overall, our simulations show that current approaches to manage the vapor intrusion risk for conventional fuel released might need to be modified when dealing with some high ethanol blend fuel (i.e., E20 up to E95) releases.

  6. Dyke intrusion model for the 1989 seismovolcanic activity off Ito, central Japan (United States)

    Okada, Yoshimitsu; Yamamoto, Eiji


    A dislocation model is developed and employed to interpret the seismovolcanic activity associated with an active earthquake swarm in the region. The continuous tilt change associated with the swarm activity and the lack of coeruption tilt change are considered, as is the swarm distribution, in constructing the model. Two tensile faults represent the magma intrusions, and a right-lateral reverse fault corresponds to the largest earthquake. A significant portion of the available data can be simulated with the model, including dilatometer and tilt data, laser distance measurements, and traditional distance and leveling surveys. Magma appears in the soft sedimentary layers and creates a lava dome as a result of the shear fault intersecting with the tensile fault, and a related instability causes a magma-phreatic explosion. The model is consistent with the tectonic activity in the region which is related to the bending of the Phillipine Sea plate.

  7. Joint Hydrogeophysical Inversion: State Estimation for Seawater Intrusion Models in 3D

    CERN Document Server

    Steklova, K


    Seawater intrusion (SWI) is a complex process, where 3D modeling is often necessary in order to monitor and manage the affected aquifers. Here, we present a synthetic study to test a joint hydrogeophysical inversion approach aimed at solving the inverse problem of estimating initial and current saltwater distribution. First, we use a 3D groundwater model for variable density flow based on discretized flow and solute mass balance equations. In addition to the groundwater model, a 3D geophysical model was developed for direct current resistivity imaging and inversion. The objective function of the coupled problem consists of data misfit and regularization terms as well as a coupling term that relates groundwater and geophysical states. We present a novel approach to solve the inverse problem using an Alternating Direction Method of Multipliers (ADMM) to minimize this coupled objective function. The sensitivities are derived analytically for the discretized system of equations, which allows us to efficiently com...


    Directory of Open Access Journals (Sweden)

    J. Novotny


    Full Text Available The knowledge of evaluation of the intensity of cyclogenesis which could be connected with the weather having a significant impact on Earth’s surface is quite useful. If, as one of the basic assumptions, the existence of connection between dry intrusions, dry bands, tropopause height and warm dark areas distribution on water vapor images (WV images is considered, it is possible to set up a method of detecting dry intrusions on searching and tracking areas with higher brightness temperature compared with the surrounding environment. This paper covers the period between June 2010 and September 2011 over Central Europe. The ISIS method (Instrument de Suivi dans I’Imagerie satellitaire, originally developed for detection of cold cloud tops, was used as an initial ideological point. Subsequently, this method was modified by Michel and Bouttier for usage on WV images. Some of the applied criteria and parameters were chosen with reference to the results published by Michel and Bouttier as well as by Novotny. The procedure can be divided into two steps: detection of warm areas and their tracking. Cases of detection of areas not evidently connected with dry intrusions can be solved by filtering off based on the connection between detected warm areas to the cyclonic side of jet streams and significant lowering of the tropopause.

  9. 3D modeling of a dolerite intrusion from the photogrammetric and geophysical data integration. (United States)

    Duarte, João; Machadinho, Ana; Figueiredo, Fernando; Mira, Maria


    The aims of this study is create a methodology based on the integration of data obtained from various available technologies, which allow a credible and complete evaluation of rock masses. In this particular case of a dolerite intrusion, which deployed an exploration of aggregates and belongs to the Jobasaltos - Extracção e Britagem. S.A.. Dolerite intrusion is situated in the volcanic complex of Serra de Todo-o-Mundo, Casais Gaiola, intruded in Jurassic sandstones. The integration of the surface and subsurface mapping, obtained by technology UAVs (Drone) and geophysical surveys (Electromagnetic Method - TEM 48 FAST), allows the construction of 2D and 3D models of the study local. The combination of the 3D point clouds produced from two distinct processes, modeling of photogrammetric and geophysical data, will be the basis for the construction of a single model of set. The rock masses in an integral perspective being visible their development above the surface and subsurface. The presentation of 2D and 3D models will give a perspective of structures, fracturation, lithology and their spatial correlations contributing to a better local knowledge, as well as its potential for the intended purpose. From these local models it will be possible to characterize and quantify the geological structures. These models will have its importance as a tool to assist in the analysis and drafting of regional models. The qualitative improvement in geological/structural modeling, seeks to reduce the value of characterization/cost ratio, in phase of prospecting, improving the investment/benefit ratio. This methodology helps to assess more accurately the economic viability of the projects.

  10. The effect of sea-water intrusion due to the large scale construction in a coastal region (United States)

    Hyun, S.; Jin, S.; Woo, N. C.; Lee, J.; Lee, H.; Kim, Y.


    This study was carried out for estimating the seawater intrusion at the disturbed aquifer by a large scale construction when building a power plant in a coastal region, located in southeastern part of the Korean peninsula. Groundwater sampling and vertical profiling of electrical conductivity(EC) for 8 monitoring wells were carried. EC profiling results shows that maximum EC for PW-5, 6 and 7 is over 40 mS/cm, for PZ-1, 3, 4 and 8 is 18.76, 4.46, 26.16, 21.42 mS/cm and for PZ-2 is 0.79 mS/cm,respectively. Chemical composition of water samples shows that water types of Na-Cl for PZ-5, 6, and 7 (excavated and backfilled area), Na-Cl-SO4 for PZ-4 and PZ-8, Na-Ca-Mg-Cl for PZ-1, Ca-Na-SO4-Cl for PZ-2, and Mg-Ca-Na-SO4 for PZ-3. In addition, the bivariate plot of SO4/Cl(meq ratios) and SO4(mmol/L) indicates that PZ-4, 5, 6, 7 and 8 appear to be seawater, PZ-1 is located at mixing zone between freshwater and seawater, and PZ-2 is freshwater. However, based on the high SO42- level and (HCO3-/Sum anions} ratio less than 0.8, groundwater at PZ-3 seems to show the gypsum dissolution. The gypsum dissolution was attributed to the effect of sea-water intrusion on ageing of lean concrete that was used for backfill around the PZ-3. Key words : large scale construction, EC profiling, hydrochemistry, sea-water intrusion, concrete ageing Acknowledgement This study has been carried out under the Nuclear R&D Program [No. 2010-0001070] supported by the Ministry of Education, Science and Technology, Republic of Korea.

  11. Effects of seasonal change and seawater intrusion on water quality for drinking and irrigation purposes, in coastal aquifers of Dar es Salaam, Tanzania (United States)

    Sappa, Giuseppe; Ergul, Sibel; Ferranti, Flavia; Sweya, Lukuba Ngalya; Luciani, Giulia


    Groundwater is the major source to meet domestic, industrial and agricultural needs in the city of Dar es Salaam, Tanzania. However, population growth, increasing urbanization, industrialization and tourism, and climatic changes have caused an intensive exploitation of groundwater resources leading the aquifers become more vulnerable to seawater intrusion. The aim of this study is to examine the variations of groundwater chemistry (as resulting from natural and anthropogenic inputs) depending on seasonal changes, in order to evaluate water quality for drinking and irrigation purposes. Physical and chemical data come from the analysis of groundwater samples, collected from 72 wells, used for the evaluation of water quality parameters, during a year of monitoring. Pattern diagrams, geochemical modeling techniques and Principal Component Analysis (PCA) have been used to identify the main factors influencing groundwater composition. Based on the hydrochemistry, the groundwater was classified into three types: (a) Na-Cl, (b) Ca-Cl, (c) mixed Ca-Na-HCO3-Cl (d) mixed Ca-Mg-Cl-SO4. The geochemical modeling results show that groundwater chemistry is mainly influenced by evaporation process, as it is suggested by the increase of Na and Cl ions concentrations. According to irrigation water quality assessment diagrams of USDA, most water samples from dry and rainy seasons, distributed in category C2-S1, C3-S1, C3-S2, C4-S2 highlighting medium to very high salinity hazard and low to medium sodium content class. PCA evidenced the role of seawater intrusion, evaporation process and anthropogenic pollution (i.e. high NO3 levels due to agricultural activities), as the major factors that influenced the water chemistry, and hence the water quality. Based on Pearson correlation matrix, the presence of high correlations (>0.8) among Na, Cl, Mg and SO4, in association with EC, were interpreted as the seawater intrusion effects. In this area groundwater quality is generally low, and

  12. Predictive uncertainty analysis of a saltwater intrusion model using null-space Monte Carlo (United States)

    Herckenrath, Daan; Langevin, Christian D.; Doherty, John


    Because of the extensive computational burden and perhaps a lack of awareness of existing methods, rigorous uncertainty analyses are rarely conducted for variable-density flow and transport models. For this reason, a recently developed null-space Monte Carlo (NSMC) method for quantifying prediction uncertainty was tested for a synthetic saltwater intrusion model patterned after the Henry problem. Saltwater intrusion caused by a reduction in fresh groundwater discharge was simulated for 1000 randomly generated hydraulic conductivity distributions, representing a mildly heterogeneous aquifer. From these 1000 simulations, the hydraulic conductivity distribution giving rise to the most extreme case of saltwater intrusion was selected and was assumed to represent the "true" system. Head and salinity values from this true model were then extracted and used as observations for subsequent model calibration. Random noise was added to the observations to approximate realistic field conditions. The NSMC method was used to calculate 1000 calibration-constrained parameter fields. If the dimensionality of the solution space was set appropriately, the estimated uncertainty range from the NSMC analysis encompassed the truth. Several variants of the method were implemented to investigate their effect on the efficiency of the NSMC method. Reducing the dimensionality of the null-space for the processing of the random parameter sets did not result in any significant gains in efficiency and compromised the ability of the NSMC method to encompass the true prediction value. The addition of intrapilot point heterogeneity to the NSMC process was also tested. According to a variogram comparison, this provided the same scale of heterogeneity that was used to generate the truth. However, incorporation of intrapilot point variability did not make a noticeable difference to the uncertainty of the prediction. With this higher level of heterogeneity, however, the computational burden of

  13. Non-intrusive gesture recognition system combining with face detection based on Hidden Markov Model (United States)

    Jin, Jing; Wang, Yuanqing; Xu, Liujing; Cao, Liqun; Han, Lei; Zhou, Biye; Li, Minggao


    A non-intrusive gesture recognition human-machine interaction system is proposed in this paper. In order to solve the hand positioning problem which is a difficulty in current algorithms, face detection is used for the pre-processing to narrow the search area and find user's hand quickly and accurately. Hidden Markov Model (HMM) is used for gesture recognition. A certain number of basic gesture units are trained as HMM models. At the same time, an improved 8-direction feature vector is proposed and used to quantify characteristics in order to improve the detection accuracy. The proposed system can be applied in interaction equipments without special training for users, such as household interactive television

  14. Non-intrusive low-rank separated approximation of high-dimensional stochastic models

    KAUST Repository

    Doostan, Alireza


    This work proposes a sampling-based (non-intrusive) approach within the context of low-. rank separated representations to tackle the issue of curse-of-dimensionality associated with the solution of models, e.g., PDEs/ODEs, with high-dimensional random inputs. Under some conditions discussed in details, the number of random realizations of the solution, required for a successful approximation, grows linearly with respect to the number of random inputs. The construction of the separated representation is achieved via a regularized alternating least-squares regression, together with an error indicator to estimate model parameters. The computational complexity of such a construction is quadratic in the number of random inputs. The performance of the method is investigated through its application to three numerical examples including two ODE problems with high-dimensional random inputs. © 2013 Elsevier B.V.

  15. Ensemble regression model-based anomaly detection for cyber-physical intrusion detection in smart grids

    DEFF Research Database (Denmark)

    Kosek, Anna Magdalena; Gehrke, Oliver


    , distributed production. Many of these DERs can be accessed and controlled remotely, posing a cybersecurity risk. This paper investigates an intrusion detection system which evaluates the DER operation in order to discover unauthorized control actions. The proposed anomaly detection method is based......The shift from centralised large production to distributed energy production has several consequences for current power system operation. The replacement of large power plants by growing numbers of distributed energy resources (DERs) increases the dependency of the power system on small scale...... on an ensemble of non-linear artificial neural network DER models which detect and evaluate anomalies in DER operation. The proposed method is validated against measurement data which yields a precision of 0.947 and an accuracy of 0.976. This improves the precision and accuracy of a classic model-based anomaly...

  16. A Universal High-Performance Correlation Analysis Detection Model and Algorithm for Network Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Hongliang Zhu


    Full Text Available In big data era, the single detection techniques have already not met the demand of complex network attacks and advanced persistent threats, but there is no uniform standard to make different correlation analysis detection be performed efficiently and accurately. In this paper, we put forward a universal correlation analysis detection model and algorithm by introducing state transition diagram. Based on analyzing and comparing the current correlation detection modes, we formalize the correlation patterns and propose a framework according to data packet timing and behavior qualities and then design a new universal algorithm to implement the method. Finally, experiment, which sets up a lightweight intrusion detection system using KDD1999 dataset, shows that the correlation detection model and algorithm can improve the performance and guarantee high detection rates.

  17. Numerical modeling and sensitivity analysis of seawater intrusion in a dual-permeability coastal karst aquifer with conduit networks

    Directory of Open Access Journals (Sweden)

    Z. Xu


    Full Text Available Long-distance seawater intrusion has been widely observed through the subsurface conduit system in coastal karst aquifers as a source of groundwater contaminant. In this study, seawater intrusion in a dual-permeability karst aquifer with conduit networks is studied by the two-dimensional density-dependent flow and transport SEAWAT model. Local and global sensitivity analyses are used to evaluate the impacts of boundary conditions and hydrological characteristics on modeling seawater intrusion in a karst aquifer, including hydraulic conductivity, effective porosity, specific storage, and dispersivity of the conduit network and of the porous medium. The local sensitivity analysis evaluates the parameters' sensitivities for modeling seawater intrusion, specifically in the Woodville Karst Plain (WKP. A more comprehensive interpretation of parameter sensitivities, including the nonlinear relationship between simulations and parameters, and/or parameter interactions, is addressed in the global sensitivity analysis. The conduit parameters and boundary conditions are important to the simulations in the porous medium because of the dynamical exchanges between the two systems. The sensitivity study indicates that salinity and head simulations in the karst features, such as the conduit system and submarine springs, are critical for understanding seawater intrusion in a coastal karst aquifer. The evaluation of hydraulic conductivity sensitivity in the continuum SEAWAT model may be biased since the conduit flow velocity is not accurately calculated by Darcy's equation as a function of head difference and hydraulic conductivity. In addition, dispersivity is no longer an important parameter in an advection-dominated karst aquifer with a conduit system, compared to the sensitivity results in a porous medium aquifer. In the end, the extents of seawater intrusion are quantitatively evaluated and measured under different scenarios with the variabilities of

  18. Numerical modeling and sensitivity analysis of seawater intrusion in a dual-permeability coastal karst aquifer with conduit networks (United States)

    Xu, Zexuan; Hu, Bill X.; Ye, Ming


    Long-distance seawater intrusion has been widely observed through the subsurface conduit system in coastal karst aquifers as a source of groundwater contaminant. In this study, seawater intrusion in a dual-permeability karst aquifer with conduit networks is studied by the two-dimensional density-dependent flow and transport SEAWAT model. Local and global sensitivity analyses are used to evaluate the impacts of boundary conditions and hydrological characteristics on modeling seawater intrusion in a karst aquifer, including hydraulic conductivity, effective porosity, specific storage, and dispersivity of the conduit network and of the porous medium. The local sensitivity analysis evaluates the parameters' sensitivities for modeling seawater intrusion, specifically in the Woodville Karst Plain (WKP). A more comprehensive interpretation of parameter sensitivities, including the nonlinear relationship between simulations and parameters, and/or parameter interactions, is addressed in the global sensitivity analysis. The conduit parameters and boundary conditions are important to the simulations in the porous medium because of the dynamical exchanges between the two systems. The sensitivity study indicates that salinity and head simulations in the karst features, such as the conduit system and submarine springs, are critical for understanding seawater intrusion in a coastal karst aquifer. The evaluation of hydraulic conductivity sensitivity in the continuum SEAWAT model may be biased since the conduit flow velocity is not accurately calculated by Darcy's equation as a function of head difference and hydraulic conductivity. In addition, dispersivity is no longer an important parameter in an advection-dominated karst aquifer with a conduit system, compared to the sensitivity results in a porous medium aquifer. In the end, the extents of seawater intrusion are quantitatively evaluated and measured under different scenarios with the variabilities of important parameters

  19. Development of a complex groundwater model to assess the relation among groundwater resource exploitation, seawater intrusion and land subsidence (United States)

    Hsi Ting, Fang; Yih Chi, Tan; Chen, Jhong Bing


    The land subsidence, which is usually irreversible, in Taiwan Pintung Plain occurred due to groundwater overexploitation. Many of the land subsidence areas in Taiwan are located in coastal area. It could not only result in homeland loss, but also vulnerability to flooding because the function of drainage system and sea wall are weakened for the lowered ground surface. Groundwater salinization and seawater intrusion could happen more easily as well. This research focuses on grasping the trend of environmental change due to the damage and impact from inappropriate development of aquaculture in the last decades. The main task is developing the artificial neural networks (ANNs) and complex numerical model for conjunctive use of surface and groundwater which is composed of a few modules such as land use, land subsidence, contamination transportation and etc. An approach based on self-organizing map (SOM) is proposed to delineate groundwater recharge zones. Several topics will be studied such as coupling of surface water and groundwater modeling, assessing the benefit of improving groundwater resources by recharge, identifying the improper usage of groundwater resources, and investigating the effect of over-pumping on land subsidence in different depth. In addition, a complete plan for managing both the flooding and water resources will be instituted by scheming non-engineering adaptation strategies for homeland planning, ex. controlling pumping behavior in area vulnerable to land subsidence and increasing groundwater recharge.

  20. Residential Demand Response Behaviour Modeling applied to Cyber-physical Intrusion Detection

    DEFF Research Database (Denmark)

    Heussen, Kai; Tyge, Emil; Kosek, Anna Magdalena


    be identified and how the characterization can be updated continuously. Finally, we propose an approach to apply this behaviour characterization to the identification of anomalous and potentially malicious behaviour modifications as part of a cyber-physical intrusion detection mechanism.......A real-time demand response system can be viewed as a cyber-physical system, with physical systems dependent on cyber infrastructure for coordination and control, which may be vulnerable to cyber-attacks. The time domain dynamic behaviour of individual residential demand responses is governed...... by a mix of physical system parameters, exogenous influences, user behaviour and preferences, which can be characterized by unstructured models such as a time-varying finite impulse response. In this study, which is based on field data, it is shown how this characteristic response behaviours can...

  1. Heat exchange modeling in a multilayered karst aquifer affected by seawater intrusion

    Directory of Open Access Journals (Sweden)

    Luca Vettorello


    Full Text Available A Feflow thermohaline model has been implemented in order to study borehole heat exchangers (BHEs activity in a coastal aquifer in the South of Italy (Province of Lecce, Puglia Region. The modeled closed-loop system consists of two double u-pipe heat exchangers, installed in 200 meters deep boreholes. The main purpose of numerical modeling was to forecast thermal plume extension in groundwater after a long period of heat exchange, calculating temperature trends in observation points during a 10 years transport simulation. The complex geological structure, including calcarenites, fractured limestones and a deep karst aquifer, has been translated into a multilayered model, with a depth-related parameter distribution, assigning different values of hydraulic, thermal and chemical properties to each layer. In particular saltwater concentration has been taken into account, considering the influence of seawater intrusion on the heat transport density-dependent model. Parameters assignment was based on experimental datasets collected during initial field investigations, including thermal characterization of soil samples and GRTs, together with historical hydrogeological and hydrochemical measures and previous groundwater surveys. After model structure configuration and aquifers parameterization, a sensitivity analysis on porosity and heat dispersivity has been conducted, to evaluate their influence on thermal transport phenomena with a multiple scenarios approach, considering in particular the uncertainty related to secondary porosity in karst systems. Feflow simulation represented the first step in environmental compatibility evaluation for the BHE plant, waiting for the necessary model calibration with groundwater temperature monitoring trends.

  2. Water intrusions and particle signatures in the Black Sea: a Biogeochemical-Argo float investigation (United States)

    Stanev, Emil Vassilev; Grayek, Sebastian; Claustre, Hervé; Schmechtig, Chaterine; Poteau, Antoine


    Continuous observations during 3 years with a vertical resolution of 1 dbar from two Bio-Argo floats in the Black Sea that were equipped with oxygen optodes, chlorophyll fluorometers, and backscattering sensors are analyzed. The particle backscattering coefficient, b bp provides a proxy for the concentration of suspended particles. The observations clearly identify thermal and b bp intrusions down to 700-800 m in the Bosporus inflow area. In this area, b bp is more than five times larger than elsewhere, which could indicate bacterial abundance and possible biological involvement in the precipitation of Mn-containing particles. The b bp anomalies become much shallower than the temperature anomalies with increasing distance to the east of the strait. Their maxima are located between the onset of the suboxic zone and the upper part of the anoxic layer. Unlike well-known intrusions that are caused by inflow, open ocean intrusions are shallower and often characterized by multiple layers of backscatter maxima with thicknesses of only 15-20 m. The ratio between backscattering coefficients measured at two wavelengths, which gives a proxy for particle size, shows that the relative amount of larger size particles in the anoxic layer increases with depth. The particle concentrations and their size distribution display different vertical variability, which indicates the complex transformation of biological matter. The lower concentration of particles and lower chlorophyll-a during the extremely warm 2016 reveals an overall positive correlation between the two properties. The trends in the particle backscattering coefficient in the suboxic zone during 2013-2016 could indirectly reveal a biogeochemical response to temperature changes.

  3. An immunological approach to intrusion detection


    Watkins, A.


    This paper presents an examination of intrusion detection schemes. It discusses\\ud traditional views of intrusion detection, and examines the more novel, but perhaps more\\ud effective, approach to intrusion detection as modeled on the human immune system. The\\ud discussion looks at some of the implications raised by intrusion detection research for\\ud information security in general.

  4. Improved image of intrusive bodies at Newberry Volcano, Oregon, based on 3D gravity modelling

    Energy Technology Data Exchange (ETDEWEB)

    Bonneville, Alain H.; Cladouhos, Trenton; Rose, Kelly K.; Schultz, Adam; Strickland, Christopher E.; Urquhart, Scott


    Beneath Newberry Volcano is one of the largest geothermal heat reservoirs in the western United States and it has been extensively studied for the last 40 years. Several magmatic intrusions have been recognized at depths between 2.5 and 8 km and some of them identified as suitable targets for enhanced geothermal energy and tested during two previous EGS campaigns. These subsurface structures have been intersected by three deep wells and imaged by various geophysical methods including seismic tomography and magnetotellurics. Although three high quality gravity surveys were completed between 2006 and 2010 as part of various projects, a complete synthesis and interpretation of the gravity data has not yet been performed. Regional gravity data also exist in the vicinity of the Newberry volcano and have been added to these surveys to constitute a dataset with a total of 1418 gravity measurements. When coupled with existing geologic and geophysical data and models, this new gravity dataset provides important constraints on the depth and contours of the magmatic bodies previously identified by other methods and thus greatly contributing to facilitate any future drilling and stimulation works. Using the initial structures discovered by seismic tomography, inversion of gravity data has been performed. Shape, density values and depths of various bodies were allowed to vary and three main bodies have been identified. Densities of the middle and lower intrusive bodies (~2.6-2.7 g/cm3) are consistent with rhyolite, basalt or granites. Modeled density of the near-surface caldera body match that of a low density tephra material and the density of the shallow ring structures contained in the upper kilometer correspond to that of welded tuff or low-density rhyolites. Modeled bodies are in reality a composite of thin layers; however, average densities of the modeled gravity bodies are in good agreement with the density log obtained in one well located on the western flank (well 55

  5. Global assessment of coastal aquifer state and its vulnerability respect to Sea Water Intrusion. Application to several Mediterranean Coastal Aquifers. (United States)

    Baena, Leticia; Pulido-Velazquez, David; Renau-Pruñonosa, Arianna; Morell, Ignacio


    In this research we propose a method for a global assessment of coastal aquifer state and its vulnerability to Sea Water Intrusion (SWI). It is based on two indices, the MART index, which summarize the global significance of the SWI phenomenon, and the L_GALDIT for a lumped assessment of the vulnerability to SWI. Both of them can be useful as a tool to assess coastal groundwater bodies in risk of not achieving good status in accordance with the Water Framework Directive (WFD, 2000) and to identify possible management alternative to reduce existing impacts. They can be obtained even from a reduced number of data (in the MART case only depend on the geometry and available aquifer state data) with simple calculations, which have been implemented in a general GIS tool that can be easily applied to other case studies. The MART index in an aquifer is related with the total mass of chloride in the aquifer due to sea water intrusion and can be obtained by simple linear operations of volume and concentrations that can be deduced from a schematic conceptual cross-section approach (orthogonal to the shore line) defined to summarize the intrusion volume in the aquifer. At a certain historical time, this representative aquifer cross-section can be defined in a systhematic way from the aquifer geometry, the specific yield, and the hydraulic head and chloride concentration fields that can be deduced from the available information by using appropriate interpolation methods. Following the proposed procedure we will finally obtain a summary of the historical significance of the SWI in an aquifer at different spatial resolution: 3D salinity concentration maps, 2D representative conceptual cross-section of intrusion and the MART lumped significance index. The historical evolution of the MART can be employed to perform a global assessment of the resilience and trends of global significance of the SWI in an aquifer. It can be useful to compare the significance of intrusion problems in

  6. Superhot fluids circulating close to magma intrusions: a contribution from analogue modelling (United States)

    Montanari, Domenico; Agostini, Andrea; Bonini, Marco; Corti, Giacomo


    Magma overpressure at the time of the emplacement at shallow crustal levels may lead to deformation (i.e. forced folding, fracturing and faulting) in the country rock, both at local and regional scale. To get insights into this process, we reproduced and analysed in the laboratory the fracture/fault network associated with the emplacement of magma at shallow crustal levels. We used a mixture of quartz sand and K-feldspar fine sand as an analogue for the brittle crust, and polyglycerols for the magma. The models were able to reproduce complex 3D architectures of deformation resulting from magma emplacement, with different deformation patterns -invariably dominated by forced folding and associated brittle faulting/fracturing- resulting from variable parameters. These results provide useful hints into geothermal researches. Fractures and faults associated with magma emplacement are indeed expected to significantly influence the distribution and migration of superhot geothermal fluids near the edge of the magma intrusion. These structures can therefore be considered as potential targets for geothermal or mineral deposits exploration. In this perspective, the results of analogue models may provide useful geometric and conceptual constraints for field work, numerical modeling, and particularly seismic interpretation for achieving a better understanding and tuning of the integrated conceptual model concerning the circulation of supercritical fluids. The research leading to these results has received funding from the European Community's Seventh Framework Programme under grant agreement No. 608553 (Project IMAGE).

  7. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    Energy Technology Data Exchange (ETDEWEB)

    Birkholzer, Jens; Apps, John; Zheng, Liange; Zhang, Yingqi; Xu, Tianfu; Tsang, Chin-Fu


    One promising approach to reduce greenhouse gas emissions is injecting CO{sub 2} into suitable geologic formations, typically depleted oil/gas reservoirs or saline formations at depth larger than 800 m. Proper site selection and management of CO{sub 2} storage projects will ensure that the risks to human health and the environment are low. However, a risk remains that CO{sub 2} could migrate from a deep storage formation, e.g. via local high-permeability pathways such as permeable faults or degraded wells, and arrive in shallow groundwater resources. The ingress of CO{sub 2} is by itself not typically a concern to the water quality of an underground source of drinking water (USDW), but it will change the geochemical conditions in the aquifer and will cause secondary effects mainly induced by changes in pH, in particular the mobilization of hazardous inorganic constituents present in the aquifer minerals. Identification and assessment of these potential effects is necessary to analyze risks associated with geologic sequestration of CO{sub 2}. This report describes a systematic evaluation of the possible water quality changes in response to CO{sub 2} intrusion into aquifers currently used as sources of potable water in the United States. Our goal was to develop a general understanding of the potential vulnerability of United States potable groundwater resources in the event of CO{sub 2} leakage. This goal was achieved in two main tasks, the first to develop a comprehensive geochemical model representing typical conditions in many freshwater aquifers (Section 3), the second to conduct a systematic reactive-transport modeling study to quantify the effect of CO{sub 2} intrusion into shallow aquifers (Section 4). Via reactive-transport modeling, the amount of hazardous constituents potentially mobilized by the ingress of CO{sub 2} was determined, the fate and migration of these constituents in the groundwater was predicted, and the likelihood that drinking water

  8. Coupled human-water system dynamics of saltwater intrusion in the low coastal plain of the Po River, Ravenna, Italy (United States)

    Lauriola, Ilaria; Ciriello, Valentina; Antonellini, Marco; Pande, Saket


    Human activities affect the whole hydrological cycle with possible severe consequences on ecosystem services. Human-water interaction follows complex dynamics that can't be addressed only through the analysis of water withdrawals and contamination processes. As such, comprehensive analysis strategies based on a socio-hydrology approach may allow to deeply understand the co-evolution of human and water systems. Here, we focus on the low coastal plain of the Po river in the south of Ravenna (Italy), which is adjacent to the North Adriatic sea. In particular, our study regards a basin characterized by a land reclamation drainage system, given the low topography which reaches in some places 1 m below sea level. In this area, the thin phreatic coastal aquifer is affected by a relevant salinization process and characterized by the presence of valuable water-dependent ecosystems such as pine forests and wetlands. Groundwater salinization is mainly caused by seawater intrusion due to the hydraulic gradient landwards that is enhanced by land subsidence, land use and drainage allowing for agriculture and settlements. Such a complex scenario involves environmental, social and economic interests. We study the intricate system of relationships occurring between a set of socio-hydrological state variables of interest based on the dynamic analysis of land use changes in the study area that mainly affect groundwater recharge and the availability of freshwater for ecosystem and agriculture activities.

  9. Insights into saline intrusion and freshwater resources in coastal karstic aquifers using a lumped Rainfall-Discharge-Salinity model (the Port-Miou brackish spring, SE France) (United States)

    Arfib, Bruno; Charlier, Jean-Baptiste


    The aim of this study was to develop a conceptual model of saline intrusion within coastal karst aquifers by analyzing Rainfall-Discharge-Salinity data and to assess freshwater resources using a lumped modeling approach. In a first step, we analyzed 4 years of data (rainfall, discharge and salinity times series) of the Port-Miou brackish submarine spring in South France (400 km2). A conceptual model of the aquifer was then designed to differentiate a deep brackish reservoir and a shallower fresh one. Salinity variations at the spring are assumed to be controlled mainly by dilution originating from the fresh water in the shallower reservoir. In a second step, a lumped modeling approach was developed based on the conceptual model to simulate discharge as well as salinity over time. We proposed a reservoir-model to take into account slow and fast components in the shallower part of the aquifer and a saline intrusion in the deeper one. This Rainfall-Discharge-Salinity model was calibrated and validated for two periods of 1.5 years at a daily time step and was also tested to reproduce a multi-annual evolution of the available discharge and salinity time series. Good simulation results were obtained to reproduce water and mass budgets as well as discharge and salinity dynamics during several hydrological cycles. The simultaneous modeling of hydrodynamics and quality data showed the robustness of the model in addition to its easy implementation. Our results led us to propose a new type of seawater mixing mechanism for brackish springs: the dilution type, in addition to the well-known Ventury suction and Head balance types. The application of the lumped model on the Port-Miou brackish spring validated the hydrogeological processes deduced from experimental data, given an initial quantification of the freshwater resources available in such complex brackish karstic aquifers.

  10. Delineation of salt water intrusion through use of electromagnetic-induction logging: A case study in Southern Manhattan Island, New York (United States)

    Stumm, Frederick; Como, Michael D.


    Groundwater with chloride concentrations up to 15,000 mg/L has intruded the freshwater aquifer underlying southern Manhattan Island, New York. Historical (1940–1950) chloride concentration data of glacial aquifer wells in the study area indicate the presence of four wedges of saltwater intrusion that may have been caused by industrial pumpage. The limited recharge capability of the aquifer, due to impervious surfaces and the 22.7 million liters per day (mld) of reported industrial pumpage early in the 20th Century was probably the cause for the saltwater intrusion and the persistence of the historical saltwater intrusion wedges over time. Recent drilling of wells provided new information on the hydrogeology and extent of saltwater intrusion of the glacial aquifer overlying bedrock. The new observation wells provided ground-water level, chloride concentration, hydraulic conductivity, and borehole geophysical data of the glacial aquifer. The glacial sediments range in thickness from less than 0.3 m to more than 76.2 m within the study area. A linear relation between Electromagnetic-induction (EM) conductivity log response and measured chloride concentration was determined. Using this relation, chloride concentration was estimated in parts of the glacial aquifer where sampling was not possible. EM logging is an effective tool to monitor changes in saltwater intrusion wedges.

  11. Impact of chemical lateral boundary conditions in a regional air quality forecast model on surface ozone predictions during stratospheric intrusions (United States)

    Pendlebury, Diane; Gravel, Sylvie; Moran, Michael D.; Lupu, Alexandru


    A regional air quality forecast model, GEM-MACH, is used to examine the conditions under which a limited-area air quality model can accurately forecast near-surface ozone concentrations during stratospheric intrusions. Periods in 2010 and 2014 with known stratospheric intrusions over North America were modelled using four different ozone lateral boundary conditions obtained from a seasonal climatology, a dynamically-interpolated monthly climatology, global air quality forecasts, and global air quality reanalyses. It is shown that the mean bias and correlation in surface ozone over the course of a season can be improved by using time-varying ozone lateral boundary conditions, particularly through the correct assignment of stratospheric vs. tropospheric ozone along the western lateral boundary (for North America). Part of the improvement in surface ozone forecasts results from improvements in the characterization of near-surface ozone along the lateral boundaries that then directly impact surface locations near the boundaries. However, there is an additional benefit from the correct characterization of the location of the tropopause along the western lateral boundary such that the model can correctly simulate stratospheric intrusions and their associated exchange of ozone from stratosphere to troposphere. Over a three-month period in spring 2010, the mean bias was seen to improve by as much as 5 ppbv and the correlation by 0.1 depending on location, and on the form of the chemical lateral boundary condition.

  12. Intrusion Detection: Generics and State-of-the-Art (la Detection de l’intrusion: Modeles generiques et etat de l’art) (United States)


    font accroı̂tre le risque d’intrusions et d’autres irrégularités. La transmission d’alertes avancées, ou en temps réel en cas d’intrusions dans les...seuls les IDS dits “fondés sur les anomalies” sont en mesure de détecter des intrusions nouvelles et inconnues. Cependant, à présent, les IDS...fondés sur les anomalies posent des problèmes d’applicabilité en raison de leurs taux de fausse alarme élevés. • Les IDS fondés sur l’emploi abusif

  13. Analogue modelling on the interaction between shallow magma intrusion and a strike-slip fault: Application on the Middle Triassic Monzoni Intrusive Complex (Dolomites, Italy) (United States)

    Michail, Maria; Coltorti, Massimo; Gianolla, Piero; Riva, Alberto; Rosenau, Matthias; Bonadiman, Costanza; Galland, Olivier; Guldstrand, Frank; Thordén Haug, Øystein; Rudolf, Michael; Schmiedel, Tobias


    The southwestern part of the Dolomites in Northern Italy has undergone a short-lived Ladinian (Middle Triassic) tectono-magmatic event, forming a series of significant magmatic features. These intrusive bodies deformed and metamorphosed the Permo-Triassic carbonate sedimentary framework. In this study we focus on the tectono-magmatic evolution of the shallow shoshonitic Monzoni Intrusive Complex of this Ladinian event (ca 237 Ma), covering an area of 20 km^2. This NW-SE elongated intrusive structure (5 km length) shows an orogenic magmatic affinity which is in contrast to the tectonic regime at the time of intrusion. Strain analysis shows anorogenic transtensional displacement in accordance with the ENE-WSW extensional pattern in the central Dolomites during the Ladinian. Field interpretations led to a detailed description of the regional stratigraphic sequence and the structural features of the study area. However, the geodynamic context of this magmatism and the influence of the inherited strike-slip fault on the intrusion, are still in question. To better understand the specific natural prototype and the general mechanisms of magma emplacement in tectonically active areas, we performed analogue experiments defined by, but not limited to, first order field observations. We have conducted a systematic series of experiments in different tectonic regimes (static conditions, strike-slip, transtension). We varied the ratio of viscous to brittle stresses between magma and country rock, by injecting Newtonian fluids both of high and low viscosity (i.e. silicone oil/vegetable oil) into granular materials of varying cohesion (sand, silica flour, glass beads). The evolving surface and side view of the experiments were monitored by photogrammetric techniques for strain analyses and topographic evolution. In our case, the combination of the results from field and analogue experiments brings new insights regarding the tectonic regime, the geometry of the intrusive body, and

  14. Model for the intrusion of batholiths associated with the eruption of large-volume ash-flow tuffs. (United States)

    Whitney, J A; Stormer, J C


    Pyroclastic eruption and the intrusion of batholiths associated with large-volume ash-flow tuffs may be driven by a decrease in reservoir pressure caused by the low density of the magma column due to vesiculation. Batholithic intrusion would then be accomplished by the subsidence and settling of kilometer-sized crustal blocks through the magma chamber, resulting in eventual collapse to form large caldera structures at the surface. Such a model does not require the formation of a large, laterally extensive, shallow magma chamber before the onset of large-volume ash-flow eruptions. Eruption could commence directly from a deeper reservoir, with only a small channelway being opened to the surface before the onset of catastrophic ash-flow eruptions of the scale of Yellowstone or Long Valley. Such a model has wide-ranging implications, and explains many of the problems inherent in the simple collapse model involving shallow magna chambers as well as the process and timing of batholith intrusion in such cases.

  15. Model for the Intrusion of Batholiths Associated with the Eruption of Large-Volume Ash-Flow Tuffs (United States)

    Whitney, James A.; Stormer, John C.


    Pyroclastic eruption and the intrusion of batholiths associated with large-volume ashflow tuffs may be driven by a decrease in reservoir pressure caused by the low density of the magma column due to vesiculation. Batholithic intrusion would then be accomplished by the subsidence and settling of kilometer-sized crustal blocks through the magma chamber, resulting in eventual collapse to form large caldera structures at the surface. Such a model does not require the formation of a large, laterally extensive, shallow magma chamber before the onset of large-volume ash-flow eruptions. Eruption could commence directly from a deeper reservoir, with only a small channelway being opened to the surface before the onset of catastrophic ash-flow eruptions of the scale of Yellowstone or Long Valley. Such a model has wide-ranging implications, and explains many of the problems inherent in the simple collapse model involving shallow magma chambers as well as the process and timing of batholith intrusion in such cases.

  16. Development of a discrete-continuum VDFST-CFP numerical model for simulating seawater intrusion to a coastal karst aquifer with a conduit system (United States)

    Hu, Xiaolong; Xu, Zexuan


    A hybrid discrete-continuum numerical model, Variable-Density Flow and Solute Transport - Conduit Flow Process (VDFST-CFP), is developed to simulate seawater intrusion to a coastal karst aquifer with a conduit network. The Darcy-Weisbach equation is applied to simulate the non-laminar groundwater flow in the conduit system that is conceptualized as pipes, while the Darcy equation is used for laminar groundwater flow in the continuum porous medium. Density-dependent groundwater flow with appropriate additional density terms in the conduit is analytically derived. The flow equations are coupled with transport equations, and numerically solved by the finite difference method with an implicit iteration procedure. Two synthetic benchmarks are developed to compare the VDFST-CFP model results with other numerical models, such as the variable-density SEAWAT, constant-density continuum MODFLOW/MT3DMS and constant-density discrete-continuum CFPv2/UMT3D models. The VDFST-CFP model compares reasonably well with the other model results in both conduit and porous medium domains, and well describes water and salt exchanges between the two systems. Under turbulent flow conditions within the conduit, the Darcy-Weisbach equation calculates the flow rate more accurately without the overestimation by the Darcy equation . Sensitivity analysis indicates that conduit diameter, friction factor, matrix hydraulic conductivity, and effective porosity are important parameters in the VDFST-CFP model. The pros and cons of the VDFST-CFP model are discussed, including the model assumptions and simplifications, limitations of the discrete-continuum modeling method, and the convergence criteria. In general, the newly developed VDFST-CFP model provides a new numerical modeling method for simulating seawater intrusion in a coastal karst aquifer with conduits.

  17. Imaging high stage river-water intrusion into a contaminated aquifer along a major river corridor using 2-D time-lapse surface electrical resistivity tomography (United States)

    Wallin, E. L.; Johnson, T. C.; Greenwood, W. J.; Zachara, J. M.


    The Hanford 300 Area is located adjacent to the Columbia River in south-central Washington State, USA, and was a former site for nuclear fuel processing operations. Waste disposal practices resulted in persistent unsaturated zone and groundwater contamination, the primary contaminant of concern being uranium. Uranium behavior at the site is intimately linked with river stage driven groundwater-river water exchange such that understanding the nature of river water intrusion into the 300 Area is critical for predicting uranium desorption and transport. In this paper, we use 2-D surface-based time-lapse electrical resistivity tomography (ERT) to image the inland intrusion of river water during high stage conditions. We inverted approximately 1200 data sets (400 per line over three lines) using high performance computing resources to produce a time-lapse sequence of changes in bulk conductivity caused by river water intrusion during the 2011 spring runoff cycle over approximately 125 days. To invert the data, we use an image differencing approach that does not require regularization in the time dimension, enabling the inversion to accommodate the sharp, time varying contrasts in conductivity imposed by the moving water table. The resulting time series for each mesh element was then analyzed using common time series analysis to reveal the timing and location of river water intrusion beneath each line. The results reveal nonuniform flows characterized by preferred flow zones where river water enters and exits quickly with stage increase and decrease, and low permeability zones with broader bulk conductivity "break through" curves and longer river water residence times.

  18. The Torres del Paine intrusion as a model for a shallow magma chamber (United States)

    Baumgartner, Lukas; Bodner, Robert; Leuthold, Julien; Muntener, Othmar; Putlitz, Benita; Vennemann, Torsten


    The shallow magmatic Torres del Paine Intrusive Complex (TPIC) belongs to a series of sub-volcanic and plutonic igneous bodies in Southern Chile and Argentina. This trench-parallel belt is located in a transitional position between the Patagonia Batholith in the West, and the alkaline Cenozoic plateau lavas in the East. While volumetrically small amounts of magmatism started around 28 my ago in the Torres del Paine area, and a second period occurred between 17-16 Ma, it peaked with the TPIC 12.59-12.43 Ma ago. The spectacular cliffs of the Torres del Paine National park provide a unique opportunity to study the evolution of a very shallow magma chamber and the interaction with its host rocks. Intrusion depth can be estimated based on contact metamorphic assemblages and granite solidus thermobarometry to 750±250 bars, corresponding to an intrusion depth of ca. 3km, ca. 500m above the base of the intrusion. Hornblende thermobarometry in mafic rocks agrees well with these estimates (Leuthold et al., 2014). The TPIC is composed of a granitic laccolith emplaced over 90ka (Michel et al., 2008) in 3 major, several 100m thick sheets, forming an overall thickness of nearly 2 km. Contacts are sharp between sheets, with the oldest sheet on the top and the youngest on the bottom (Michel et al., 2008). The granitic laccolith is under-plated by a ca. 400m thick mafic laccolith, built up over ca. 50ka (Leuthold et al. 2012), constructed from the bottom up. Granitic and mafic sheets are themselves composed of multiple metric to decametric pulses, mostly with ductile contacts between them, resulting in outcrop patterns resembling braided stream sediments. The contact of the TPIC with the Cretaceous flysch sediments document intrusion mechanism. Pre-existing sub-horizontal fold axes are rotated in the roof of the TPIC, clearly demonstrating ballooning of the roof; no ballooning was observed in the footwall of the intrusion. Extension during ballooning of the roof is indicated by

  19. Computer Network Equipment for Intrusion Detection Research

    National Research Council Canada - National Science Library

    Ye, Nong


    .... To test the process model, the system-level intrusion detection techniques and the working prototype of the intrusion detection system, a set of computer and network equipment has been purchased...

  20. Technology Review of Nondestructive Methods for Examination of Water Intrusion Areas on Hanford’s Double-Shell Waste Tanks

    Energy Technology Data Exchange (ETDEWEB)

    Watkins, Michael L.; Pardini, Allan F.


    necessary to de-rate critical components. There are currently no tools that automatically convert the NDE data to formats compatible with structural analysis programs. While radiographic techniques still provide significant advantages in spatial resolution, non-ionizing techniques are still preferred. Radar imagining in the 1–5 GHz has become the most useful. Unfortunately the algorithms and underlying assumptions used in these reconstructions are proprietary, and it is not possible to assess the quality and limitations of the analytical methods used to generate the derived structural data. The hypothesis that water intrusion may contribute to potential rebar corrosion of the tank domes provided the primary guidance in reviewing and evaluating available NDE technologies. Of primary concern is the need to employ technologies that provide the best opportunity for visualizing the rebar and providing quantitative data that can be integrated into structural analysis efforts to better understand and quantify the structural capacity of the domes. The conclusion is that an imaging system capable of locating and quantifying the distribution and conditions of the cement, aggregate, and rebar will provide the most valuable baseline upon which to build a case for the integrity of the structure. If successful, such a system would fulfill the need to incorporate valuable data into current structural load capacity analysis.

  1. A Comprehensive evaluation of groundwater vulnerability to saltwater up-coning and sea water intrusion in a coastal aquifer (case study: Ghaemshahr-juybar aquifer) (United States)

    Motevalli, Alireza; Moradi, Hamid Reza; Javadi, Saman


    Aquifer salinization has recently increased significantly due to human activity and has caused irreparable environmental and economic effects. In this research, a new method is proposed for modeling the vulnerability to salinity for the Ghaemshahr-juybar aquifer. Specifically, the GALDIT (Sea water intrusion) and TAWLBIC (Saltwater up-coning) indices were combined to produce a map of vulnerability (Comprehensive Salinity Index or CSI) to seawater intrusion of a region near the coast and saltwater up-coning away from the coast, respectively. Single parameter and removal layer sensitivity analysis were performed in order to identify the sensitive parameters and achieve optimal weights (through the single-parameter method) of contributing factors in all three methods. The three optimized methods produced were GALDIT-Opt, TAWLBIC-Opt and CSI-Opt. To assess the accuracy of the original maps and optimal ones, the Pearson correlation was used. Results indicated that the Pearson correlation of the optimized GALDIT, TAWLBIC and CSI model was better than GALDIT, TAWLBIC and CSI. The results show that the increase in correlation between EC (Electrical Conductivity), TDS (Total Dissolved Solids) and SAR (Sodium Adsorption Ratio) from the GALDIT model to the CSI-Opt model from values of 0.64, 0.56 and 0.68 has improved to values of 0.81, 0.88 and 0.91, respectively. The highest concentration of EC, with a value of 7050 μs/cm, is sampled in the areas of the east and northwest of the Ghaemshahr-juybar aquifer, which are classified in the CSI-Opt model as high and very high vulnerability levels. The highest concentration of TDS and SAR has been found in the east, northwest and northeast of the Ghaemshahr-juybar aquifer with a value of 4724 ppm for TDS and 14 mg/l for SAR that have been modeled in the CSI-Opt index as highly vulnerable areas. Eventually, CSI mapping can be used as an efficient tool in prioritizing in terms of the vulnerability to aquifer salinity, carrying out

  2. SWIBANGLA: Managing salt water intrusion impacts in coastal groundwater systems of Bangladesh

    NARCIS (Netherlands)

    Faneca Sànchez, Marta; Bashar, Khairul; Janssen, Gijs; Vogels, Marjolein|info:eu-repo/dai/nl/413534960; Snel, Jan; Zhou, Yangxiao; Stuurman, Roelof J.; Oude Essink, Gualbert|info:eu-repo/dai/nl/147864801

    Bangladesh is densely populated and it is expected that the population increases significantly in the coming decade, up to 60% more by 2050 according to IIASA (2013). Demand for drinking water will increase accordingly. These developments may cause significant changes in the hydrological system,

  3. Environment-Sensitive Intrusion Detection

    National Research Council Canada - National Science Library

    Giffin, Jonathan T; Dagon, David; Jha, Somesh; Lee, Wenke; Miller, Barton P


    .... We improve the effectiveness of such model-based intrusion detection systems by incorporating into the model knowledge of the environment in which the program runs, and by increasing the accuracy...

  4. Intrusion of coastal waters into the pelagic eastern Mediterranean: in situ and satellite-based characterization

    Directory of Open Access Journals (Sweden)

    S. Efrati


    Full Text Available A combined dataset of near-real-time multi-satellite observations and in situ measurements from a high-resolution survey is used for characterizing physical-biogeochemical properties of a patch stretching from the coast to the open sea in the Levantine Basin (LB of the eastern Mediterranean (EM. Spatial analysis of the combined dataset indicates that the patch is a semi-enclosed system, bounded within the mixed layer and separated from ambient waters by transport barriers induced by horizontal stirring. As such, the patch is characterized by physical-biogeochemical properties that significantly differ from those of the waters surrounding it, with lower salinity and higher temperatures, concentrations of silicic acid and chlorophyll a, and abundance of Synechococcus and picoeukaryote cells. Based on estimates of patch dimensions (∼40 km width and ∼25 m depth and propagation speed (∼0.09 m s−1, the volume flux associated with the patch is found to be on the order of 0.1 Sv. Our observations suggest that horizontal stirring by surface currents is likely to have an important impact on the ultra-oligotrophic Levantine Basin ecosystem, through (1 transport of nutrients and coastally derived material, and (2 formation of local, dynamically isolated niches. In addition, this work provides a satellite-based framework for planning and executing high-resolution sampling strategies in the interface between the coast and the open sea.

  5. KERENTANAN PENYUSUPAN AIR LAUT DI PESISIR UTARA PULAU TERNATE (Vulnerability of Sea Water Intrusion in Northern Coastal of Ternate Island

    Directory of Open Access Journals (Sweden)

    Rahim Achmad


    Full Text Available ABSTRAK Penelitian ini dilakukan di wilayah pesisir bagian utara Pulau Ternate, dengan tujuan mengetahui kedalaman batas kontak airtanah dengan air laut dan menganalisis akuifer serta cara pengambilan airtanah sehingga tidak terjadi penyusupan air laut ke dalam tubuh airtanah. Sampel air sumur diukur untuk mengetahui kadar salinitas dan daya hantar listrik (DHL. Kedalaman batas kontak airtanah dengan air laut dukur dengan menggunakan metode geolistrik. Hasil pengukuran DHL dan salinitas airtanah di wilayah pesisir utara menunjukkan, terdapat penyusupan air laut di Desa Tobolo dan Sulamadaha, dengan rentang nilai masing-masing antara 0,5-3,3 mS/cm dan 0,2-1,7 ppt. Hasil pengukuran geolistrik menunjukkan batas kontak airtanah dengan air laut rata-rata antara 12-15 m dari permukaan. Nilai resistivitas air laut berkisar antara 0,01-20 Ωm. Hasil penelitian ini memberikan peringatan untuk tidak melakukan pengeboran sumur di wilayah pesisir. Sebagai contoh kasus, pengeboran sumur hingga 80 m dengan jarak sekitar 250 m dari garis pantai di Desa Takome, di mana batas kontak airtanah dengan air laut pada kedalaman 15 m. Pengukuran nilai DHL dan salinatas air dari sumur ini menunjukkan masing-masing 6,1 mS/cm dan 3,3 ppt. Nilai ini menunjukkan kedalaman sumur bor telah melewati zona pencampuran antara airtanah dengan air laut (interface.   ABSTRACT This research was conducted in the coastal areas of northern part of Ternate island, in order to know the depth of interface and to analyze the aquifers and to avoid seawater intrusion caused of groundwater extraction. Well water samples were measured to determine levels of salinity and DHL. The depth of interface was measured using geoelectric method. The results of electrical conductivity (EC and salinity of groundwater measurement in the northern coastal area showed that, there is infiltration of sea water in Tobolo and Sulamadaha. The EC and salinity values ranging between 0.5-3.3 mS/cm and 0.2-1.7 ppt

  6. SHRIMP U-Pb zircon geochronology and thermal modeling of multilayer granitoid intrusions. Implications for the building and thermal evolution of the Central System batholith, Iberian Massif, Spain (United States)

    Díaz Alvarado, Juan; Fernández, Carlos; Castro, Antonio; Moreno-Ventas, Ignacio


    This work shows the results of a U-Pb SHRIMP zircon geochronological study of the central part of the Gredos massif (Spanish Central System batholith). The studied batholith is composed of several granodiorite and monzogranite tabular bodies, around 1 km thick each, intruded into partially molten pelitic metasediments. Granodiorites and monzogranites, belonging to three distinct intrusive bodies, and samples of anatectic leucogranites have been selected for SHRIMP U-Pb zircon geochronology. Distinct age groups, separated by up to 20 Ma, have been distinguished in each sample. Important age differences have also been determined among the most representative age groups of the three analyzed granitoid bodies: 312.6 ± 2.8 Ma for the Circo de Gredos Bt-granodiorites (floor intrusive layer), 306.9 ± 1.5 Ma for the Barbellido-Plataforma granitoids (top intrusive layer) and 303.5 ± 2.8 Ma for Las Pozas Crd-monzogranites (middle intrusive layer). These age differences are interpreted in terms of sequential emplacement of the three intrusive bodies, contemporary with the Late Paleozoic D3 deformation phase. The anatectic leucogranites are coeval to slightly younger than the adjacent intrusive granodiorites and monzogranites (305.4 ± 1.6 Ma for Refugio del Rey leucogranites and 303 ± 2 Ma for migmatitic hornfelses). It is suggested that these anatectic magmas were generated in response to the thermal effects of granodiorite intrusions. Thermal modeling with COMSOL Multiphysics® reveals that sequential emplacement was able to keep the thermal conditions of the batholith around the temperature of zircon crystallization in granitic melts (around 750 °C) for several million of years, favoring the partial melting of host rocks and the existence of large magma chambers composed of crystal mush prone to be rejuvenated after new intrusions.

  7. A two-stage flow-based intrusion detection model for next-generation networks. (United States)

    Umer, Muhammad Fahad; Sher, Muhammad; Bi, Yaxin


    The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results.

  8. Recent advances in vapor intrusion site investigations. (United States)

    McHugh, Thomas; Loll, Per; Eklund, Bart


    Our understanding of vapor intrusion has evolved rapidly since the discovery of the first high profile vapor intrusion sites in the late 1990s and early 2000s. Research efforts and field investigations have improved our understanding of vapor intrusion processes including the role of preferential pathways and natural barriers to vapor intrusion. This review paper addresses recent developments in the regulatory framework and conceptual model for vapor intrusion. In addition, a number of innovative investigation methods are discussed. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  9. Arsenic, Boron, and Fluoride Concentrations in Ground Water in and Near Diabase Intrusions, Newark Basin, Southeastern Pennsylvania (United States)

    Senior, Lisa A.; Sloto, Ronald A.


    During an investigation in 2000 by the U.S. Environmental Protection Agency (USEPA) of possible contaminant releases from an industrial facility on Congo Road near Gilbertsville in Berks and Montgomery Counties, southeastern Pennsylvania, concentrations of arsenic and fluoride above USEPA drinking-water standards of 10 ?g/L and 4 mg/L, respectively, and of boron above the USEPA health advisory level of 600 ?g/L were measured in ground water in an area along the northwestern edge of the Newark Basin. In 2003, the USEPA requested technical assistance from the U.S. Geological Survey (USGS) to help identify sources of arsenic, boron, and fluoride in the ground water in the Congo Road area, which included possible anthropogenic releases and naturally occurring mineralization in the local bedrock aquifer, and to identify other areas in the Newark Basin of southeastern Pennsylvania with similarly elevated concentrations of these constituents. The USGS reviewed available data and collected additional ground-water samples in the Congo Road area and four similar hydrogeologic settings. The Newark Basin is the largest of the 13 major exposed Mesozoic rift basins that stretch from Nova Scotia to South Carolina. Rocks in the Newark Basin include Triassic through Jurassic-age sedimentary sequences of sandstones and shales that were intruded by diabase. Mineral deposits of hydrothermal origin are associated with alteration zones bordering intrusions of diabase and also occur as strata-bound replacement deposits of copper and zinc in sedimentary rocks. The USGS review of data available in 2003 showed that water from about 10 percent of wells throughout the Newark Basin of southeastern Pennsylvania had concentrations of arsenic greater than the USEPA maximum contaminant level (MCL) of 10 ?g/L; the highest reported arsenic concentration was at about 70 ?g/L. Few data on boron were available, and the highest reported boron concentration in well-water samples was 60 ?g/L in contrast

  10. Investigation of Ozone Sources in California Using AJAX Airborne Measurements and Models: Implications for Stratospheric Intrusion and Long Range Transport (United States)

    Ryoo, Ju-Mee; Johnson, Matthew S.; Iraci, Laura T.; Yates, Emma L.; Pierce, R. Bradley; Tanaka, Tomoaki; Gore, Warren


    High ozone concentrations at low altitudes near the surface were detected from airborne Alpha Jet Atmospheric eXperiment (AJAX) measurements on May 30, 2012. We investigate the causes of the elevated ozone concentrations using the airborne measurements and various models. GEOS-chem and WRF-STILT model simulations show that the contribution from local sources is small. From MERRA reanalysis, it is found that high potential vorticity (PV) is observed at low altitudes. This high PV appears to be only partially coming through the stratospheric intrusions because the air inside the high PV region is moist, which shows that mixing appears to be enhanced in the low altitudes. Considering that diabatic heating can also produce high PV in the lower troposphere, high ozone is partially coming through stratospheric intrusion, but this cannot explain the whole ozone concentration in the target areas of the western U.S. A back-trajectory model is utilized to see where the air masses originated. The air masses of the target areas came from the lower stratosphere (LS), upper (UT), mid- (MT), and lower troposphere (LT). The relative number of trajectories coming from LS and UT is low (7.7 and 7.6, respectively) compared to that from LT (64.1), but the relative ozone concentration coming from LS and UT is high (38.4 and 20.95, respectively) compared to that from LT (17.7). The air mass coming from LT appears to be mostly coming from Asia. Q diagnostics show that there is sufficient mixing along the trajectory to indicate that ozone from the different origins is mixed and transported to the western U.S. This study shows that high ozone concentrations can be detected by airborne measurements, which can be analyzed by integrated platforms such as models, reanalysis, and satellite data.

  11. Three-dimensional vapor intrusion modeling approach that combines wind and stack effects on indoor, atmospheric, and subsurface domains. (United States)

    Shirazi, Elham; Pennell, Kelly G


    Vapor intrusion (IV) exposure risks are difficult to characterize due to the role of atmospheric, building and subsurface processes. This study presents a three-dimensional VI model that extends the common subsurface fate and transport equations to incorporate wind and stack effects on indoor air pressure, building air exchange rate (AER) and indoor contaminant concentration to improve VI exposure risk estimates. The model incorporates three modeling programs: (1) COMSOL Multiphysics to model subsurface fate and transport processes, (2) CFD0 to model atmospheric air flow around the building, and (3) CONTAM to model indoor air quality. The combined VI model predicts AER values, zonal indoor air pressures and zonal indoor air contaminant concentrations as a function of wind speed, wind direction and outdoor and indoor temperature. Steady state modeling results for a single-story building with a basement demonstrate that wind speed, wind direction and opening locations in a building play important roles in changing the AER, indoor air pressure, and indoor air contaminant concentration. Calculated indoor air pressures ranged from approximately -10 Pa to +4 Pa depending on weather conditions and building characteristics. AER values, mass entry rates and indoor air concentrations vary depending on weather conditions and building characteristics. The presented modeling approach can be used to investigate the relationship between building features, AER, building pressures, soil gas concentrations, indoor air concentrations and VI exposure risks.

  12. How stratospheric are deep stratospheric intrusions?

    Directory of Open Access Journals (Sweden)

    T. Trickl


    Full Text Available Preliminary attempts of quantifying the stratospheric ozone contribution in the observations at the Zugspitze summit (2962 m a.s.l. next to Garmisch-Partenkirchen in the German Alps had yielded an approximate doubling of the stratospheric fraction of the Zugspitze ozone during the time period 1978 to 2004. These investigations had been based on data filtering by using low relative humidity (RH and elevated 7Be as the criteria for selecting half-hour intervals of ozone data representative of stratospheric intrusion air. To quantify the residual stratospheric component in stratospherically influenced air masses, however, the mixing of tropospheric air into the stratospheric intrusion layers must be taken into account. In fact, the dewpoint mirror instrument at the Zugspitze summit station rarely registers RH values lower than 10% in stratospheric air intrusions. Since 2007 a programme of routine lidar sounding of ozone, water vapour and aerosol has been conducted in the Garmisch-Partenkirchen area. The lidar results demonstrate that the intrusion layers are drier by roughly one order of magnitude than indicated in the in situ measurements. Even in thin layers RH values clearly below 1% have frequently been observed. These thin, undiluted layers present an important challenge for atmospheric modelling. Although the ozone values never reach values typical of the lower-stratosphere it becomes, thus, obvious that, without strong wind shear or convective processes, mixing of stratospheric and tropospheric air must be very slow in most of the free troposphere. As a consequence, the analysis the Zugspitze data can be assumed to be more reliable than anticipated. Finally, the concentrations of Zugspitze carbon monoxide rarely drop inside intrusion layers and normally stay clearly above full stratospheric values. This indicates that most of the CO, and thus the intrusion air mass, originates in the shallow "mixing layer" around the thermal tropopause. The


    Energy Technology Data Exchange (ETDEWEB)

    J.B. Case


    The drainage of water from the emplacement drift is essential for the performance of the EBS. The unsaturated flow properties of the surrounding rock matrix and fractures determine how well the water will be naturally drained. To enhance natural drainage, it may be necessary to introduce engineered drainage features (e.g. drilled holes in the drifts), that will ensure communication of the flow into the fracture system. The purpose of the Water Drainage Model is to quantify and evaluate the capability of the drift to remove water naturally, using the selected conceptual repository design as a basis (CRWMS M&O, 1999d). The analysis will provide input to the Water Distribution and Removal Model of the EBS. The model is intended to be used to provide postclosure analysis of temperatures and drainage from the EBS. It has been determined that drainage from the EBS is a factor important to the postclosure safety case.

  14. Intrusive upwelling in the Central Great Barrier Reef (United States)

    Benthuysen, Jessica A.; Tonin, Hemerson; Brinkman, Richard; Herzfeld, Michael; Steinberg, Craig


    In the Central Great Barrier Reef, the outer continental shelf has an open reef matrix that facilitates the exchange of waters with the Coral Sea. During austral summer, cool water intrudes onto the shelf along the seafloor. Temperature observations reveal cool, bottom intrusions during a 6 year period from the Queensland Integrated Marine Observing System's Palm Passage mooring. A metric is used to identify 64 intrusion events. These intrusions predominantly occur from October to March including the wet season. During an event, the outer-shelf's near-bottom temperature decreases by 1-3°C typically over 1 week. The near-bottom salinity tends to increase, while near-surface changes do not reflect these tendencies. Intrusion events occur predominantly with either weakening equatorward winds or poleward wind bursts. A regional hydrodynamic model for the Great Barrier Reef captures the timing and amplitude of these intrusions. During intrusion events, isotherms tend to uplift over the continental slope and onto the shelf and the East Australian Current intensifies poleward. Over the shelf, a bottom-intensified onshore current coincides with bottom cooling. For numerous events, the model diagnostics reveal that the cross-shelf flow is dominated by the geostrophic contribution. A vertical circulation tilts the isopycnals upward on the southern side of the passage, causing an along-shelf density gradient and geostrophic onshore flow with depth. While wind fluctuations play a major role in controlling the along-shelf currents, model results indicate that a concurrent topographically induced circulation can assist the onshore spread of cool water.

  15. Correction factor to account for dispersion in sharp-interface models of terrestrial freshwater lenses and active seawater intrusion (United States)

    Werner, Adrian D.


    In this paper, a recent analytical solution that describes the steady-state extent of freshwater lenses adjacent to gaining rivers in saline aquifers is improved by applying an empirical correction for dispersive effects. Coastal aquifers experiencing active seawater intrusion (i.e., seawater is flowing inland) are presented as an analogous situation to the terrestrial freshwater lens problem, although the inland boundary in the coastal aquifer situation must represent both a source of freshwater and an outlet of saline groundwater. This condition corresponds to the freshwater river in the terrestrial case. The empirical correction developed in this research applies to situations of flowing saltwater and static freshwater lenses, although freshwater recirculation within the lens is a prominent consequence of dispersive effects, just as seawater recirculates within the stable wedges of coastal aquifers. The correction is a modification of a previous dispersive correction for Ghyben-Herzberg approximations of seawater intrusion (i.e., stable seawater wedges). Comparison between the sharp interface from the modified analytical solution and the 50% saltwater concentration from numerical modelling, using a range of parameter combinations, demonstrates the applicability of both the original analytical solution and its corrected form. The dispersive correction allows for a prediction of the depth to the middle of the mixing zone within about 0.3 m of numerically derived values, at least on average for the cases considered here. It is demonstrated that the uncorrected form of the analytical solution should be used to calculate saltwater flow rates, which closely match those obtained through numerical simulation. Thus, a combination of the unmodified and corrected analytical solutions should be utilized to explore both the saltwater fluxes and lens extent, depending on the dispersiveness of the problem. The new method developed in this paper is simple to apply and offers a

  16. Effects of an Unusual Cold-Water Intrusion in 2008 on the Catch of Coastal Fishing Methods around Penghu Islands, Taiwan

    Directory of Open Access Journals (Sweden)

    Ming-An Lee


    Full Text Available Based upon long-term observations (1993 - 2010 of satellite-derived winter sea surface temperature (SST data, an exceptional cold-water intrusion into the southern Taiwan Strait (TS was noted in February 2008. In the winter of 2008, La Niña caused a strong and continuous northeasterly wind that drove the cold ocean current, the China Coastal Current, more southward to penetrate the southern TS north of the Chang-Yuen Ridge. A portion of this current turned eastward to the south of Penghu Islands (PHI. The low-SST event significantly impeded local marine aquaculture and wild fish, causing the death of more than 73 tons of fish around PHI. Comparing variations of the first quarterly catches in 2008 with the long-term averages from 1993 to 2010 (excluding 2008, we noted a 50 to 80% decrease in catches from pole-and-line, long-line, and gill-net fishery. Non-migratory species dominated the composition of the catches. We also noted a greater than 230% increase in the catches from set-net fishery, with the majority being migratory species. These results illustrate the positive and negative effects of cold-water intrusion on several fish communities and species.

  17. The use of airborne electromagnetic for efficient mapping of salt water intrusion and outflow to the sea

    DEFF Research Database (Denmark)

    Auken, Esben; Kirkegaard, Casper; Ribeiro, Joana


    Airborne electromagnetic (AEM) is an efficient tool for mapping groundwater resources in sedimentary environments. AEM delivers a very high data coverage and results in high-resolution electrical images of the subsurface. In particular the time domain methods (TEM) are well suited for mapping o0f...... moment than frequency domain methods (FEM). We discuss the advantages of using airborne systems in coastal area for understanding of saltwater intrusion problems. Examples are shown from surveys at the vest cost of Holland and in Denmark....

  18. Stream Water Quality Model (United States)

    U.S. Environmental Protection Agency — QUAL2K (or Q2K) is a river and stream water quality model that is intended to represent a modernized version of the QUAL2E (or Q2E) model (Brown and Barnwell 1987).

  19. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)


    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  20. Petroleum Vapor Intrusion (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  1. The Collapse of Super-isostacy: Volcanic Intrusions as an Alternative Model for Lunar Mascon Gravity Anomalies (United States)

    Kiefer, W. S.; McGovern, P. J.; Potter, R. W.; Collins, G. S.; Kring, D. A.


    contributor to the gravity anomaly as well as an important component of the Moon's total volcanic flux. Such a model is similar to our recent model for the free-air gravity anomaly in the Marius Hills volcanic dome complex but has not previously been considered as a mechanism for producing lunar mascons. For plausible values of the basalt density, crustal porosity, and rate of porosity closure with depth, a spherical cap of dense intrusives, 300 km in diameter and 15 km thick, can explain the Orientale gravity anomaly. The basalt intrusions may fill the pore space in most of the crustal column beneath Orientale, a condition that may be necessary to permit magma to rise buoyantly through the crust and erupt at the surface. Variations in the relative contributions of intrusive magmatism and of surface lava flows may explain the various types of mascon documented in gravity observations made by the Kaguya mission.

  2. Astrochemical models of water (United States)

    Aikawa, Yuri

    We will review the chemical reaction network models of water and its D/H ratio coupled with the dynamics of star formation. Infrared observations show that water ice is abundant even in molecular clouds with relatively low visual extinction (~ 3 mag), which indicates that water ice is formed in early stage of molecular clouds. We thus start from a possible formation site of molecular clouds, i.e. the converging flow of diffuse gas. Then we proceed to dense cloud cores and its gravitational collapse, during which a significant deuterium enrichment occurs. The gas and ice accrete onto the circumstellar disks, which evolve to protoplanetary disks in T Tauri phase. If the disks are turbulent, water could be photodissociated in the disk surface and re-formed in deeper layers. The cycle continues until the dust grains with ice mantle are decoupled from the turbulence and settle to the midplane. The water D/H ratio could thus vary within the disk.

  3. The roles of noradrenergic and glucocorticoid activation in the development of intrusive memories.

    Directory of Open Access Journals (Sweden)

    Richard A Bryant

    Full Text Available Intrusive memories are a common feature of many psychological disorders. Recent evidence has potentially extended cognitive models of intrusions by identifying the role of biological markers of arousal at the time of consolidation in subsequent memory for emotional events. This study investigated the role of arousal during consolidation in the development of intrusive memories. Seventy-eight university students (37 men and 41 women viewed 20 negative and 20 neutral images. Half the participants then underwent a cold pressor test (High Stress, immersing their hand in ice water, while the remaining participants immersed their hand in warm water (Low Stress. Samples of salivary alpha-amylase (sAA and cortisol were collected from participants at baseline and following the stressor challenge. Participants completed a delayed free recall test and intrusion questionnaires two days later. Participants in the High Stress condition reported more intrusions of negative images than participants in the Low Stress condition. An interaction variable in a linear regression of increased noradrenergic and cortisol values predicted intrusive memories of emotional stimuli for men but not women. These findings are consistent with recent evidence of the combined effects of noradrenaline and corticoid responses to stress on emotional memories, and also with increasing evidence of gender differences in how stress hormones influence formation of emotional memories. These findings point to possible mechanisms by which development of intrusions may be prevented after consolidation of traumatic experiences.

  4. An Evolutionary, Agent-Based Model to Aid in Computer Intrusion Detection and Prevention

    National Research Council Canada - National Science Library

    Shargel, Ben; Bonabeau, Eric; Budynek, Julien; Gaudiano, Paolo


    We have developed a realistic agent-based simulation model of hacker behavior. In the model, hacker scripts are generated using a simple but powerful hacker grammar that has the potential to cover all possible hacker scripts...

  5. Late-Hercynian intrusion-related gold deposits: An integrated model on the Tighza polymetallic district, central Morocco (United States)

    Éric, Marcoux; Khadija, Nerci; Yannick, Branquet; Claire, Ramboz; Gilles, Ruffet; Jean-Jacques, Peucat; Ross, Stevenson; Michel, Jébrak


    radiogenic isotope studies. Nd and Sr isotope compositions of scheelite and granites suggest the participation of a juvenile component while lead isotopes demonstrate a major participation of the basement. Both gold mineralization and zoning suggest that the system developed at the end of the magmatic activity, accompanying a major transition in magmatic fluid composition. The morphology of the gold-bearing mineralization is dependent of the permeability and the reactivity of host-rocks: focus circulation of fluids through pre-existing tectonic corridors, reactivated by late-Hercynian intrusions favor the formation of large W-type gold veins, while infiltration of fluid within reactive stratigraphic layers gives rise to skarn mineralization. A 40Ar/39Ar date (W1 north vein: 291.8 ± 0.3 Ma) indicates that hydrothermal circulation predates gold and tungsten deposition in open fractures as well as Mine granite emplacement. The W-Au mineralization preceded the onset of a large convective hydrothermal cell around the intrusion that led to the formation of the Pb-Ag-Zn mined veins. The Tighza polymetallic district displays numerous similarities with the R-IRG model that was defined in the American Cordillera, such as thermal and zonation patterns, carbonic hydrothermal fluids and chronology of intrusion and related deposits, but also provides new insight to the R-IRG model such as wide Au-quartz veins instead of sheeted Au-veins, oxidation state of the magma, and Sr-Nd isotopic data. These results establish a major magmatic contribution and discard a direct genetic relationship between gold mineralization and major neighboring Pb-Ag-Zn veins. A large number of classic Pb-Zn district of the Western Hercynides belong to the same clan.

  6. Potential for saltwater intrusion into the lower Tamiami aquifer near Bonita Springs, southwestern Florida (United States)

    Shoemaker, W. Barclay; Edwards, K. Michelle


    A study was conducted to examine the potential for saltwater intrusion into the lower Tamiami aquifer beneath Bonita Springs in southwestern Florida. Field data were collected, and constant- and variable-density ground-water flow simulations were performed that: (1) spatially quantified modern and seasonal stresses, (2) identified potential mechanisms of saltwater intrusion, and (3) estimated the potential extent of saltwater intrusion for the area of concern. MODFLOW and the inverse modeling routine UCODE were used to spatially quantify modern and seasonal stresses by calibrating a constant-density ground-water flow model to field data collected in 1996. The model was calibrated by assuming hydraulic conductivity parameters were accurate and by estimating unmonitored ground-water pumpage and potential evapotranspiration with UCODE. Uncertainty in these estimated parameters was quantified with 95-percent confidence intervals. These confidence intervals indicate more uncertainty (or less reliability) in the estimates of unmonitored ground-water pumpage than estimates of pan-evaporation multipliers, because of the nature and distribution of observations used during calibration. Comparison of simulated water levels, streamflows, and net recharge with field data suggests the model is a good representation of field conditions. Potential mechanisms of saltwater intrusion into the lower Tamiami aquifer include: (1) lateral inland movement of the freshwater-saltwater interface from the southwestern coast of Florida; (2) upward leakage from deeper saline water-bearing zones through natural upwelling and upconing, both of which could occur as diffuse upward flow through semiconfining layers, conduit flow through karst features, or pipe flow through leaky artesian wells; (3) downward leakage of saltwater from surface-water channels; and (4) movement of unflushed pockets of relict seawater. Of the many potential mechanisms of saltwater intrusion, field data and variable

  7. Heat exchange modeling in a multilayered karst aquifer affected by seawater intrusion


    Luca Vettorello; Roberto Pedron; Andrea Sottani; Michele Chieco


    A Feflow thermohaline model has been implemented in order to study borehole heat exchangers (BHEs) activity in a coastal aquifer in the South of Italy (Province of Lecce, Puglia Region). The modeled closed-loop system consists of two double u-pipe heat exchangers, installed in 200 meters deep boreholes. The main purpose of numerical modeling was to forecast thermal plume extension in groundwater after a long period of heat exchange, calculating temperature trends in observation points during ...


    The Johnson-Ettinger Model is widely used for assessing the impacts of contaminated vapors on residential air quality. Typical use of this model relies on a suite of estimated data, with few site-specific measurements. Software was developed to provide the public with automate...

  9. Inverse modeling for seawater intrusion in coastal aquifers: Insights about parameter sensitivities, variances, correlations and estimation procedures derived from the Henry problem (United States)

    Sanz, E.; Voss, C.I.


    Inverse modeling studies employing data collected from the classic Henry seawater intrusion problem give insight into several important aspects of inverse modeling of seawater intrusion problems and effective measurement strategies for estimation of parameters for seawater intrusion. Despite the simplicity of the Henry problem, it embodies the behavior of a typical seawater intrusion situation in a single aquifer. Data collected from the numerical problem solution are employed without added noise in order to focus on the aspects of inverse modeling strategies dictated by the physics of variable-density flow and solute transport during seawater intrusion. Covariances of model parameters that can be estimated are strongly dependent on the physics. The insights gained from this type of analysis may be directly applied to field problems in the presence of data errors, using standard inverse modeling approaches to deal with uncertainty in data. Covariance analysis of the Henry problem indicates that in order to generally reduce variance of parameter estimates, the ideal places to measure pressure are as far away from the coast as possible, at any depth, and the ideal places to measure concentration are near the bottom of the aquifer between the center of the transition zone and its inland fringe. These observations are located in and near high-sensitivity regions of system parameters, which may be identified in a sensitivity analysis with respect to several parameters. However, both the form of error distribution in the observations and the observation weights impact the spatial sensitivity distributions, and different choices for error distributions or weights can result in significantly different regions of high sensitivity. Thus, in order to design effective sampling networks, the error form and weights must be carefully considered. For the Henry problem, permeability and freshwater inflow can be estimated with low estimation variance from only pressure or only

  10. Influence of seawater intrusion on microbial communities in groundwater. (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J


    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  11. Heat exchange modeling in a multilayered karst aquifer affected by seawater intrusion

    National Research Council Canada - National Science Library

    Vettorello, Luca; Pedron, Roberto; Sottani, Andrea; Chieco, Michele

    ...) activity in a coastal aquifer in the South of Italy (Province of Lecce, Puglia Region). The modeled closed-loop system consists of two double u-pipe heat exchangers, installed in 200 meters deep boreholes...

  12. Analysis of Salinity Intrusion in the San Francisco Bay-Delta Using a GA-Optimized Neural Net, and Application of the Model to Prediction in the Elkhorn Slough Habitat (United States)

    Thompson, D. E.; Rajkumar, T.


    The San Francisco Bay Delta is a large hydrodynamic complex that incorporates the Sacramento and San Joaquin Estuaries, the Suisan Marsh, and the San Francisco Bay proper. Competition exists for the use of this extensive water system both from the fisheries industry, the agricultural industry, and from the marine and estuarine animal species within the Delta. As tidal fluctuations occur, more saline water pushes upstream allowing fish to migrate beyond the Suisan Marsh for breeding and habitat occupation. However, the agriculture industry does not want extensive salinity intrusion to impact water quality for human and plant consumption. The balance is regulated by pumping stations located along the estuaries and reservoirs whereby flushing of fresh water keeps the saline intrusion at bay. The pumping schedule is driven by data collected at various locations within the Bay Delta and by numerical models that predict the salinity intrusion as part of a larger model of the system. The Interagency Ecological Program (IEP) for the San Francisco Bay / Sacramento-San Joaquin Estuary collects, monitors, and archives the data, and the Department of Water Resources provides a numerical model simulation (DSM2) from which predictions are made that drive the pumping schedule. A problem with DSM2 is that the numerical simulation takes roughly 16 hours to complete a prediction. We have created a neural net, optimized with a genetic algorithm, that takes as input the archived data from multiple gauging stations and predicts stage, salinity, and flow at the Carquinez Straits (at the downstream end of the Suisan Marsh). This model seems to be robust in its predictions and operates much faster than the current numerical DSM2 model. Because the Bay-Delta is strongly tidally driven, we used both Principal Component Analysis and Fast Fourier Transforms to discover dominant features within the IEP data. We then filtered out the dominant tidal forcing to discover non-primary tidal effects

  13. The Partitioning of Carbon Biomass among the Pico- and Nano-plankton Community in the South Brazilian Bight during a Strong Summer Intrusion of South Atlantic Central Water

    Directory of Open Access Journals (Sweden)

    Natascha M. Bergo


    Full Text Available To investigate how pico- and nano-plankton respond to oceanographic conditions in the Southwestern Atlantic Ocean, we assessed the influence of a summer intrusion of the South Atlantic Central Water (SACW on the spatial and vertical dynamics of planktonic abundance and carbon biomass across environmental gradients. Seawater samples were collected from six depths within the euphotic zone at nine oceanographic stations in a transect on the Brazilian continental shelf in January 2013. The abundance of pico- and nano-plankton populations was determined by flow cytometry, and carbon biomass was calculated based on conversion factors from the literature. The autotrophic Synechococcus spp., picoeukaryotes, and nanoeukaryotes were more abundant in the surface layers of the innermost stations influenced by Coastal Water (maximum of 1.19 × 105, 1.5 × 104, and 8.61 × 103 cell·mL−1, respectively, whereas Prochlorococcus spp. dominated (max. of 6.57 × 104 cell·mL−1 at the outermost stations influenced by Tropical Water and in the uplifting layers of the SACW around a depth of 100 m. Numerically, heterotrophic bacterial populations were predominant, with maximum concentrations (2.11 × 106 cell·mL−1 recorded in the surface layers of the inner and mid shelves in Coastal Water and the upper limits of the SACW. Nutrient-rich (high silicate and phosphate and relatively less saline waters enhanced the picoeukaryotic biomass, while Synechococcus and heterotrophic bacteria were linked to higher temperatures, lower salinities, and higher inputs of ammonia and dissolved organic carbon. The relative importance of each group to carbon biomass partitioning under upwelling conditions is led by heterotrophic bacteria, followed by picoeukaryotes, Synechococcus and Prochlorococcus, and when the SACW is not as influential, the relative contribution of each phytoplanktonic group is more evenly distributed. In addition to habitat preferences, the physical structure

  14. Predictive uncertainty analysis of a saltwater intrusion model using null-space Monte Carlo

    DEFF Research Database (Denmark)

    Herckenrath, Daan; Langevin, Christian D.; Doherty, John


    Because of the extensive computational burden and perhaps a lack of awareness of existing methods, rigorous uncertainty analyses are rarely conducted for variable-density flow and transport models. For this reason, a recently developed null-space Monte Carlo (NSMC) method for quantifying prediction...

  15. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))


    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  16. A westward propagating slab tear model for Late Triassic Qinling Orogenic Belt geodynamic evolution: Insights from the petrogenesis of the Caoping and Shahewan intrusions, central China (United States)

    Hu, Fangyang; Liu, Shuwen; Zhang, Wanyi; Deng, Zhengbin; Chen, Xu


    temperature (TZr = 770-817 °C, comparing with Caoping intrusion of TZr = 727-773 °C), together with the magma mixing and isothermal decompression processes. Integrated with previous regional data, the SQB shows that mantle-derived magmatic activations initiated at 234 Ma near Wudang in the east, and westward systematically decreased to 222-219 Ma near Caoping and to 212-208 Ma near Yangba. We attribute this temporal-spatial distribution of mantle-derived magmatism within the SQB to the progressive tear of the subducted oceanic slab. Combined with sedimentary studies on the foreland basins, paleomagnetic studies as well as numerical and seismic tomography models of slab break-off, we propose that the 225-205 Ma magmatism in the SQB resulted from a westward slab tear following the collision between the NCC and YZC.

  17. Lotic Water Hydrodynamic Model

    Energy Technology Data Exchange (ETDEWEB)

    Judi, David Ryan [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Tasseff, Byron Alexander [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)


    Water-related natural disasters, for example, floods and droughts, are among the most frequent and costly natural hazards, both socially and economically. Many of these floods are a result of excess rainfall collecting in streams and rivers, and subsequently overtopping banks and flowing overland into urban environments. Floods can cause physical damage to critical infrastructure and present health risks through the spread of waterborne diseases. Los Alamos National Laboratory (LANL) has developed Lotic, a state-of-the-art surface water hydrodynamic model, to simulate propagation of flood waves originating from a variety of events. Lotic is a two-dimensional (2D) flood model that has been used primarily for simulations in which overland water flows are characterized by movement in two dimensions, such as flood waves expected from rainfall-runoff events, storm surge, and tsunamis. In 2013, LANL developers enhanced Lotic through several development efforts. These developments included enhancements to the 2D simulation engine, including numerical formulation, computational efficiency developments, and visualization. Stakeholders can use simulation results to estimate infrastructure damage and cascading consequences within other sets of infrastructure, as well as to inform the development of flood mitigation strategies.

  18. Exploring Cumulates in Small, Shallow Parts of a Large Mafic Magma System to Provide Baseline Models for Crystallization in Larger Intrusions (United States)

    Srogi, L.; Willis, K. V.; Lutz, T. M.; Plank, T. A.; Pollock, M.; Connolly, B.; Wood, A. M.


    Small, shallow portions of large magmatic systems cool more rapidly and potentially have less subsolidus overprinting than large mafic intrusions, but it is unclear whether they are small-scale analogs for the same crystallization processes. The Morgantown-Jacksonwald magmatic system (MJS), western Newark Basin, Pennsylvania, is part of the 201-Ma Central Atlantic Magmatic Province (CAMP) formed during Pangean rifting. The MJS consists of several interconnected intrusions exposed in cross-section from the Jacksonwald basalt at the paleosurface to 6 km depth (variably LREE-enriched rims; some negative Eu anomalies. REE patterns calculated for liquids in equilibrium with opx using published Kd values are roughly parallel to but significantly higher than REE in host chill margin diabase. CSDs of opx and matrix plagioclase from several samples within 10m of the basal contact will be used to evaluate models of crystal growth vs. mechanical sorting. Modes and mineral compositions are not consistent with MELTS fractionation models: opx crystallizes in place of pigeonite; pyroxenes are zoned in Ca not Fe-Mg; late-crystallizing quartz and K-feldspar are lacking. These features suggest crystallization buffered by earlier phases in the crystal mush with some melt migration, similar to processes that produce more extreme layering in large mafic intrusions.

  19. Water-resources optimization model for Santa Barbara, California (United States)

    Nishikawa, T.


    A simulation-optimization model has been developed for the optimal management of the city of Santa Barbara's water resources during a drought. The model, which links groundwater simulation with linear programming, has a planning horizon of 5 years. The objective is to minimize the cost of water supply subject to: water demand constraints, hydraulic head constraints to control seawater intrusion, and water capacity constraints. The decision variables are montly water deliveries from surface water and groundwater. The state variables are hydraulic heads. The drought of 1947-51 is the city's worst drought on record, and simulated surface-water supplies for this period were used as a basis for testing optimal management of current water resources under drought conditions. The simulation-optimization model was applied using three reservoir operation rules. In addition, the model's sensitivity to demand, carry over [the storage of water in one year for use in the later year(s)], head constraints, and capacity constraints was tested.


    Energy Technology Data Exchange (ETDEWEB)

    J.B. Case


    The distribution of seepage in the proposed repository will be highly variable due in part to variations in the spatial distribution of percolations. The performance of the drip shield and the backfill system may divert the water flux around the waste packages to the invert. Diversion will occur along the drift surface, within the backfill, at the drip shield, and at the Waste Package (WP) surface, even after the drip shield and WP have been breached by corrosion. The purpose and objective of this Analysis and Modeling Report (AMR) are to develop a conceptual model and constitutive properties for bounding the volume and rate of seepage water that flows around the drip shield (CRWMS M&O 1999c). This analysis model is to be compatible with the selected repository conceptual design (Wilkins and Heath, 1999) and will be used to evaluate the performance of the Engineered Barrier System (EBS), and to provide input to the EBS Water Distribution and Removal Model. This model supports the Engineered Barrier System (EBS) postclosure performance assessment for the Site Recommendation (SR). This document characterizes the hydrological constitutive properties of the backfill and invert materials (Section 6.2) and a third material that represents a mixture of the two. These include the Overton Sand which is selected as a backfill (Section 5.2), crushed tuff which is selected as the invert (Section 5.1), and a combined material (Sections 5.9 and 5.10) which has retention and hydraulic conductivity properties intermediate to the selected materials for the backfill and the invert. The properties include the grain size distribution, the dry bulk density and porosity, the moisture retention, the intrinsic permeability, the relative permeability, and the material thermal properties. The van Genuchten relationships with curve fit parameters are used to define the basic retention relationship of moisture potential to volumetric moisture content, and the basic relationship of unsaturated

  1. Development of a 3D numerical model to evaluate the Stromboli NW flank instability in relation to magma intrusion (United States)

    Apuani, T.; Merri, A.


    by means of the National Institute for Geophysics and Volcanology (INGV)-National Civil Protection Department (DPC), monitoring system. The results are expressed in terms of deformations and shear strain increments. The much unstable portion of the Sciara depression is evidenced by the highest value of the shear strain increments and is located on its upper right portion. The strain distribution is coherent with the ground motion recorded by the GB-InSAR monitoring system installed by the University of Florence thanks to the INGV-DPC 2004-2006 research program. Superficial displacements of metric amount are developed in this sector and indicate local instability, but are not sufficient to expect deep seated collapse of the volcano's flanks. A mechanism for sub horizontal sill intrusion starting from a vertical dike was proposed, and modelled, to explain the formation of the eruptive vent appeared on the Sciara slope at an altitude of about 400 meters a.s.l.. The results indicate an highly stressed and disturbed band extended transversally to the Sciara at the same elevation; furthermore the maximum value of the shear strain increments is located in correspondence with the actual position of the eruptive vents. The obtained results are very coherent with the field evidences, and could represent one possible explanation of the observed 2007 events.

  2. Intrusion of the Bay of Bengal water into the Arabian Sea during winter monsoon and associated chemical and biological response

    Digital Repository Service at National Institute of Oceanography (India)

    PrasannaKumar, S.; Narvekar, J.; Kumar, A.; Shaji, C.; Anand, P.; Sabu, P.; Rijomon, G.; Josia, J.; Jayaraj, K.A.; Radhika, A.; Nair, K.K.C.

    Cat21C176N. Below 60 m thermal structure showed stratification, which was stronger, and at least 3C176C colder in the north compared to the southern shelf. The salinity distribution showed very low salinity waters (34 psu) in the upper 20 m at 8C176N...

  3. Modelling Ballast Water Transport

    Digital Repository Service at National Institute of Oceanography (India)

    Jayakumar, S.; Babu, M.T.; Vethamony, P.

    Ballast water discharges in the coastal environs have caused a great concern over the recent periods as they account for transporting marine organisms from one part of the world to the other. The movement of discharged ballast water as well...

  4. Influence of ambient water intrusion on coral reef acidification in the Chuuk lagoon, located in the coral‐rich western Pacific Ocean

    National Research Council Canada - National Science Library

    Ko, Young Ho; Lee, Kitack; Noh, Jae Hoon; Lee, Charity M; Kleypas, Joan A; Jeong, Hae Jin; Kim, Kwang Young


    ...) of the Federated States of Micronesia, located in the western Pacific Ocean, were analyzed. The results showed that, during periods of weak intrusion of ambient seawater from the surrounding open ocean, two internal biological processes...

  5. Modeling fluid flow in sedimentary basins with sill intrusions: Implications for hydrothermal venting and global climate change (United States)

    Iyer, K. H.; Rupke, L.


    may still be trapped beneath an impermeable sill. (3) The model results demonstrate that although the total quantity of methane that may be potentially generated within the contact aureole may have indeed influenced past climate variations, the rate at which this methane is released into the atmosphere is too slow to trigger, by itself, the negative δ13C excursions observed in the fossil record over short time scales (characterized by a δ13C incursion of -2 to -3‰ over 10,000 years. The model results demonstrate that with a TOC content of 5 wt%, ~2200 Gt of methane is released within 10,000 years from the Vøring and Møre basins and results in a δ13C excursion of only -1.2‰. It is, therefore, likely that methane from organic cracking in sediments during sill intrusion in conjunction with other processes such as volcanic degassing and the destabilization of sub-surface methane hydrate is responsible for such short term catastrophic climate change.

  6. A deposit model for carbonatite and peralkaline intrusion-related rare earth element deposits: Chapter J in Mineral deposit models for resource assessment (United States)

    Verplanck, Philip L.; Van Gosen, Bradley S.; Seal, Robert R.; McCafferty, Anne E.


    Carbonatite and alkaline intrusive complexes, as well as their weathering products, are the primary sources of rare earth elements. A wide variety of other commodities have been exploited from carbonatites and alkaline igneous rocks including niobium, phosphate, titanium, vermiculite, barite, fluorite, copper, calcite, and zirconium. Other elements enriched in these deposits include manganese, strontium, tantalum, thorium, vanadium, and uranium. Carbonatite and peralkaline intrusion-related rare earth element deposits are presented together in this report because of the spatial, and potentially genetic, association between carbonatite and alkaline rocks. Although these rock types occur together at many locations, carbonatite and peralkaline intrusion-related rare earth element deposits are not generally found together.

  7. Computer Intrusions and Attacks. (United States)

    Falk, Howard


    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  8. Evaluation of Seawater Intrusion Potential into a Coastal Underground Oil Storage Cavern in Korea (United States)

    Lee, E.; Lim, J.; Moon, H.; Lee, K.


    Underground oil storage caverns have been operated in Korea since 1990s, and the facility at Yeosu, south coast of Korea, is one of the largest underground oil storage facilities in Korea. Hydrologic and water quality monitoring of the facility has been performed to find out whether the facility maintains secure containment condition and long-term stability. Recently, seawater intrusion into the base of the storage cavern was suspected based on the long-term monitoring of water levels and chemical analyses of seepage water pumped out from cavern bottom. The sudden decrease of water pressure during the construction of storage tunnel seems to cause the inland movement of saline water. In this study, numerical analysis was performed to estimate the potential of seawater intrusion into underground oil storage cavern using a three dimensional groundwater simulation model, FEFLOW (Diersch, 2005). The geometry of the cavern and water curtain was represented by using the implemented functions. The groundwater flow field and seawater intrusion in response to construction activity was also estimated. The simulation results were validated by comparing EC and salinity of seepage water monitoring data. Sensitivity analyses on hydraulic conductivity and water pressure from the water curtain or injection well were also conducted. Relatively high groundwater level was observed at this site due to the low hydraulic conductivity of base rock and high altitude of the mountains. Therefore, the amount of intruded seawater does not seem to be significant. However, apparent decrease of water level was observed along the main fracture zone and seawater could be intruded along these paths. Simulation results show that the seawater intrusion to the cavern is mainly controlled by the fracture zone, which would be the main channel of groundwater movement. The injection of fresh water to the injection wells along the coast may retard the intrusion of seawater.



    Tosi, Luigi; Teatini, Pietro; Strozzi, Tazio; Rizzetto, Federica; Carbognin, Laura; Putti, Mario


    The catchment south of the Venice Lagoon is threatened by shallow aquifer salinization and land subsidence. Although the area is not experiencing everywhere saline contamination and high sinking rates, a very serious situation has been brought to light in a large portion of the coastal farmland. The salt water contamination, recently investigated within a series of research projects, i.e. ISES, BRENTA, Co.Ri.La. 3.10-3.16, extends up to 20 km inland from the coast (Carbognin and Tosi, 2003; R...


    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot


    -chemical environment and seepage water alteration by reaction with intruded basalt. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the waste package pallet. The results of this model report will be used in TSPA for several parameters including (1) temperature of magma (used for the temperature of the waste form after an intrusion) (2) temperature increase in Zone 2 due to intrusion to evaluate impact to Zone 2 waste packages; (3) effects of exsolved gases reaching Zone 2 to evaluate impact to Zone 2 waste packages; and (4) pH and ionic strength of water reacted with basalt to be used in conjunction with ''Dissolved Concentration Limits of Radioactive Elements'' (BSC 2003 [DIRS: 163152]) to determine solubility of spent fuel within the basalt. Ionic strength will also be used in conjunction with ''Waste Form and In-Drift Colloids-Associated Radionuclide Concentrations: Abstraction and Summary'' (BSC 2003 [DIRS: 166845]) for stability of colloids.

  11. Miniscrew supported Burstone intrusion arch. (United States)

    Kalra, Shilpa; Tripathi, Tulika


    Miniscrew supported Burstone intrusion arch is a novel method for achieving maxillary incisor intrusion. It offers the advantage of true incisor intrusion without causing reciprocal effects on the posterior teeth. In this article, we present an intrusion arch which is a modification of Burstone Intrusion arch taking posterior anchorage from buccal interradicular mini-screws instead of molar teeth and detailed description of the advantages offered by this technique.

  12. Vapor intrusion risk of fuel ether oxygenates methyl tert-butyl ether (MTBE), tert-amyl methyl ether (TAME) and ethyl tert-butyl ether (ETBE): A modeling study. (United States)

    Ma, Jie; Xiong, Desen; Li, Haiyan; Ding, Yi; Xia, Xiangcheng; Yang, Yongqi


    Vapor intrusion of synthetic fuel additives represents a critical yet still neglected problem at sites contaminated by petroleum fuel releases. This study used an advanced numerical model to investigate the vapor intrusion potential of fuel ether oxygenates methyl tert-butyl ether (MTBE), tert-amyl methyl ether (TAME), and ethyl tert-butyl ether (ETBE). Simulated indoor air concentration of these compounds can exceed USEPA indoor air screening level for MTBE (110μg/m 3 ). Our results also reveal that MTBE has much higher chance to cause vapor intrusion problems than TAME and ETBE. This study supports the statements made by USEPA in the Petroleum Vapor Intrusion (PVI) Guidance that the vertical screening criteria for petroleum hydrocarbons may not provide sufficient protectiveness for fuel additives, and ether oxygenates in particular. In addition to adverse impacts on human health, ether oxygenate vapor intrusion may also cause aesthetic problems (i.e., odour and flavour). Overall, this study points out that ether oxygenates can cause vapor intrusion problems. We recommend that USEPA consider including the field measurement data of synthetic fuel additives in the existing PVI database and possibly revising the PVI Guidance as necessary. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. Modelling water temperature in TOXSWA

    NARCIS (Netherlands)

    Jacobs, C.M.J.; Deneer, J.W.; Adriaanse, P.I.


    A reasonably accurate estimate of the water temperature is necessary for a good description of the degradation of plant protection products in water which is used in the surface water model TOXSWA. Based on a consideration of basic physical processes that describe the influence of weather on the

  14. A synthetic study on constaining a 2D density-dependent saltwater intrusion model using electrical imaging data

    DEFF Research Database (Denmark)

    Antonsson, Arni Valur; Nguyen, Frederic; Engesgaard, Peter Knudegaard

    of obtainable data. These factors can seriously hinder a successful monitoring strategy and consequently limit the reliability of the calibrated model. An effective alternative to conventional measurements is the use of geophysical methods to monitor changes in the subsurface e.g. salinity distribution....... Compared to conventional methods, which only give (few) point information, electrical images can give data over large spatial distances but that can be of great value for groundwater modeling purposes. The aim of this study is to investigate in a synthetic way, the applicability of using electrical images...... of the synthetic model, basically a salinity distribution in the coastal aquifer, was converted to resistivity distribution by assuming a certain petrophysical relation between water salinity and electrical conductivity. The obtained resistivity distribution was then used when electrical data acquisition...

  15. Water Stress Projection Modeling (United States)


    En gi ne er in g R es ea rc h La bo ra to ry Juliana M. Wilhoit, Grace M. Díaz-Estrada, James P. Miller, and James Westervelt September 2016...Raster Grids. Recharge rates and land use data were available in raster Geographic Information System ( GIS ) grids (1-km and 30-meter, respec- tively...climatic drivers (Roy et al. 2012). Shifts in ag- ricultural water withdrawals may be affected by factors such as water rights, crops being irrigated

  16. Cluster Based Cost Efficient Intrusion Detection System For Manet


    Kumarasamy, Saravanan; B, Hemalatha; P, Hashini


    Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process. Two types of intrusion detection systems are available. They are anomaly detection and signature based detection model. The anomaly detection model uses the historica...

  17. Managing saltwater intrusion in coastal arid regions and its societal implications for agriculture (United States)

    Grundmann, Jens; Al-Khatri, Ayisha; Schütze, Niels


    Coastal aquifers in arid and semiarid regions are particularly at risk due to intrusion of salty marine water. Since groundwater is predominantly used in irrigated agriculture, its excessive pumping - above the natural rate of replenishment - strengthen the intrusion process. Using this increasingly saline water for irrigation, leads to a destruction of valuable agricultural resources and the economic basis of farmers and their communities. The limitation of resources (water and soil) in these regions requires a societal adaptation and change in behaviour as well as the development of appropriate management strategies for a transition towards stable and sustainable future hydrosystem states. Besides a description of the system dynamics and the spatial consequences of adaptation on the resources availability, the contribution combines results of an empirical survey with stakeholders and physically based modelling of the groundwater-agriculture hydrosystem interactions. This includes an analysis of stakeholders' (farmers and decision makers) behaviour and opinions regarding several management interventions aiming on water demand and water resources management as well as the thinking of decision makers how farmers will behave. In this context, the technical counter measures to manage the saltwater intrusion by simulating different groundwater pumping strategies and scenarios are evaluated from the economic and social point of view and if the spatial variability of the aquifer's hydrogeology is taken into consideration. The study is exemplarily investigated for the south Batinah region in the Sultanate of Oman, which is affected by saltwater intrusion into a coastal aquifer system due to excessive groundwater withdrawal for irrigated agriculture.

  18. Saltwater intrusion and water management in the unconfined coastal aquifer of Ravenna (Italy): a numerical model

    NARCIS (Netherlands)

    Giambastiani, Beatrice Maria Sole; Antonellini, Marco; Oude Essink, Gualbert|info:eu-repo/dai/nl/147864801; Stuurman, Roelof J.


    The Ravenna pine forests represent an historical landmark in the Po River Plain. They have great environmental, historical and tourist value. The San Vitale pine for- est is located 10 km north of the town. It is surrounded by an urban area, the city indus- trial infrastructure and the waterworks of

  19. Stochastic Still Water Response Model

    DEFF Research Database (Denmark)

    Friis-Hansen, Peter; Ditlevsen, Ove Dalager


    In this study a stochastic field model for the still water loading is formulated where the statistics (mean value, standard deviation, and correlation) of the sectional forces are obtained by integration of the load field over the relevant part of the ship structure. The objective of the model...... water bending moment is compared to statistics from available regression formulas. It is found that the suggested model predicts a coefficient of variation of the maximum still water bending moment that is a factor of two to three times lower than that obtained by use of the regression formula. It turns...

  20. Development and evaluation of a decision-supporting model for identifying the source location of microbial intrusions in real gravity sewer systems. (United States)

    Kim, Minyoung; Choi, Christopher Y; Gerba, Charles P


    Assuming a scenario of a hypothetical pathogenic outbreak, we aimed this study at developing a decision-support model for identifying the location of the pathogenic intrusion as a means of facilitating rapid detection and efficient containment. The developed model was applied to a real sewer system (the Campbell wash basin in Tucson, AZ) in order to validate its feasibility. The basin under investigation was divided into 14 sub-basins. The geometric information associated with the sewer network was digitized using GIS (Geological Information System) and imported into an urban sewer network simulation model to generate microbial breakthrough curves at the outlet. A pre-defined amount of Escherichia coli (E. coli), which is an indicator of fecal coliform bacteria, was hypothetically introduced into 56 manholes (four in each sub-basin, chosen at random), and a total of 56 breakthrough curves of E. coli were generated using the simulation model at the outlet. Transport patterns were classified depending upon the location of the injection site (manhole), various known characteristics (peak concentration and time, pipe length, travel time, etc.) extracted from each E. coli breakthrough curve and the layout of sewer network. Using this information, we back-predicted the injection location once an E. coli intrusion was detected at a monitoring site using Artificial Neural Networks (ANNs). The results showed that ANNs identified the location of the injection sites with 57% accuracy; ANNs correctly recognized eight out of fourteen expressions with relying on data from a single detection sensor. Increasing the available sensors within the basin significantly improved the accuracy of the simulation results (from 57% to 100%). Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. Modeling Water Filtration (United States)

    Parks, Melissa


    Model-eliciting activities (MEAs) are not new to those in engineering or mathematics, but they were new to Melissa Parks. Model-eliciting activities are simulated real-world problems that integrate engineering, mathematical, and scientific thinking as students find solutions for specific scenarios. During this process, students generate solutions…

  2. Bounded Error Approximation Algorithms for Risk-Based Intrusion Response (United States)


    AFRL-AFOSR-VA-TR-2015-0324 Bounded Error Approximation Algorithms for Risk-Based Intrusion Response K Subramani West Virginia University Research...2015. 4. TITLE AND SUBTITLE Bounded Error Approximation Algorithms for Risk-Based Intrusion Response 5a. CONTRACT NUMBER FA9550-12-1-0199. 5b. GRANT...SUPPLEMENTARY NOTES 14. ABSTRACT Our research consisted of modeling the intrusion response problem as one of finding a partial vertex cover in

  3. Oceanic thermohaline intrusions: theory (United States)

    Ruddick, Barry; Kerr, Oliver


    This is a review of theories governing growth and evolution of thermohaline intrusive motions. We discuss theories based on eddy coefficients and salt finger flux ratios and also on molecular Fickian diffusion, drawing relationships and parallels where possible. We discuss linear theories of various physical configurations, effects of rotation and shear, and nonlinear theories. A key requirement for such theories to become quantitatively correct is the development and field testing of relationships between double-diffusive fluxes and average vertical gradients of temperature and salinity. While we have some ideas about the functional dependencies and rough observational constraints on the magnitudes of such flux/gradient relationships, many questions will not be answered until usable ‘flux laws’ exist. Furthermore, numerical experiments on double-diffusive intrusions are currently feasible, but will have more quantitative meaning when fluxes are parameterised with such laws. We conclude that more work needs to be done in at least two areas. Firstly, tests of linear theory against observations should continue, particularly to discover the extent to which linear theories actually explain the genesis of intrusions. Secondly, theoretical studies are needed on the nonlinear effects that control the evolution and finite amplitude state of intrusions, since these determine the lateral fluxes of salt, heat, and momentum.

  4. Zone of intrusion study. (United States)


    The Midwest Roadside Safety Facility (MwRSF) performed an analysis using LS-DYNA simulation to investigate the zone of intrusion (ZOI) of an NCHRP Report No. 350 2000p pickup truck when impacting a 40-in. high F-shape parapet. : The ZOI for the 40-in...

  5. Storm Water Management Model (SWMM) (United States)

    EPA's Storm Water Management Model (SWMM) is used throughout the world for planning, analysis and design related to stormwater runoff, combined and sanitary sewers, and other drainage systems in urban areas.

  6. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking. (United States)

    Kalivas, Benjamin C; Kalivas, Peter W


    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  7. An automatically tuning intrusion detection system. (United States)

    Yu, Zhenwei; Tsai, Jeffrey J P; Weigert, Thomas


    An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been deployed for intrusion detection. An IDS is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. In this paper, an automatically tuning IDS (ATIDS) is presented. The proposed system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered. The system is evaluated using the KDDCup'99 intrusion detection dataset. Experimental results show that the system achieves up to 35% improvement in terms of misclassification cost when compared with a system lacking the tuning feature. If only 10% false predictions are used to tune the model, the system still achieves about 30% improvement. Moreover, when tuning is not delayed too long, the system can achieve about 20% improvement, with only 1.3% of the false predictions used to tune the model. The results of the experiments show that a practical system can be built based on ATIDS: system operators can focus on verification of predictions with low confidence, as only those predictions determined to be false will be used to tune the detection model.

  8. River water quality modelling: II

    DEFF Research Database (Denmark)

    Shanahan, P.; Henze, Mogens; Koncsos, L.


    The U.S. EPA QUAL2E model is currently the standard for river water quality modelling. While QUAL2E is adequate for the regulatory situation for which it was developed (the U.S. wasteload allocation process), there is a need for a more comprehensive framework for research and teaching. Moreover......, and to achieve robust model calibration. Mass balance problems arise from failure to account for mass in the sediment as well as in the water column and due to the fundamental imprecision of BOD as a state variable. (C) 1998 IAWQ Published by Elsevier Science Ltd. All rights reserved....

  9. Oceanic dispersion of radioactive cesium in the western North Pacific - Eastward dispersion in surface water and southward intrusion with mode water

    Energy Technology Data Exchange (ETDEWEB)

    Kaeriyama, Hideki; Ambe, Daisuke; Shigenobu, Yuya; Fujimoto, Ken; Ono, Tsuneo; Watanabe, Tomowo [National Research Institute of Fisheries Science, Fisheries Research Agency, 2-12-4, Fukuura, Kanazawa, Yokohama, Kanagawa 236-8648 (Japan); Morita, Takami [Fisheries Research Agency, 2-3-3, Minato Mirai, Nishi-ku, Yokohama, Kanagawa 220-6115 (Japan)


    The Fukushima Dai-ichi Nuclear Power Plant (FNPP) accident after the Great East Japan Earthquake and tsunami on 11 March 2011 resulted in elevation of the level of anthropogenic radioactivity in the marine environment in the western North Pacific from atmospheric fallout and direct discharges of highly radioactive liquid waters. Intensive monitoring on iodine-131, cesium-134 (Cs-134) and cesium-137 (Cs-137) in seawater near offshore FNPP, and those in marine organisms in the broad area around Japan were conducted, while the information of radioactive contamination in the North Pacific is still limited due to the limitation of the observational data. In this study, we report the concentrations of Cs-134 and Cs-137 in seawater collected from western North Pacific during June 2011 and November 2012. The eastward dispersion of FNPP-derived radioactive cesium in the surface water has been observed with prevention of southward dispersion due to the strong eastward current (Kuroshio Extension; KE) in the North Pacific. Although the concentrations of Cs-134 and Cs-137 were remarkably decreased between 2011 and 2012 at 145 deg. E and 155 deg. E, they were almost comparable between these two years at 175 deg. E. The inventories of Cs-137 between 0-500 m around KE at 147 deg. E were ranged from 3800 to 11000 Bq/m{sup 2} in October 2011, and from 1000 to 2400 Bq/m{sup 2} in November 2012. Surface water had the highest concentration of radioactive Cs at northern part of KE, subsurface peak of radioactive Cs were observed at KE and south of KE in both years. Furthermore, the southward dispersion of FNPP-derived radioactive Cs in the subsurface waters were also observed south of Japan Islands. We found the FNPP-derived Cs-134 (1.8-6.8 mBq/kg) at southernmost 18 deg. N, 135 deg. deg. E in September 2012. The potential density at the subsurface peaks of Cs-134 and increase of water column inventories of Cs-137 after the winter season of 2011-2012, suggested that the main water mass

  10. Heavy metal contamination in bore water due to industrial pollution and polluted and non polluted sea water intrusion in Thoothukudi and Tirunelveli of South Tamil Nadu, India. (United States)

    Puthiyasekar, C; Neelakantan, M A; Poongothai, S


    This study investigates the pollution vulnerability of bore water in the coastal region of Tirunelveli and Thoothukudi in the state of Tamilnadu, India. There are no industries in the Tirunelveli Coastal area whereas there are many industries in SIPCOT (State Industries Promotion Corporation of Tamilnadu) Thoothukudi, and coastal area of Thoothukudi. Bore water from the SIPCOT, coastal area of Thoothukudi and Tirunelveli were collected periodically from July 2006 to May 2008 for this study. These samples were tested and analyzed to find the concentrations of sodium, magnesium, aluminium, potassium, calcium, copper, cadmium, mercury and lead. The toxic cadmium concentration was found in the range of 0.00-0.22 mg Kg⁻¹ at SIPCOT 2 in November 2007, mercury 0.00-0.024 mg Kg⁻¹ and lead 0.00-0.02 mg Kg⁻¹ in SIPCOT 2 in January 2008. The level of contamination is higher than the WHO limits of drinking water standards; but copper and aluminium content are within the limit. On the other hand, the samples taken from bores in Tirunelveli coastal area are non-polluted, and the analysis shows that all the metals are within the limits of WHO standard.

  11. The interplay between rumination and intrusions in the prediction of concurrent and prospective depression symptoms in two non-clinical samples

    NARCIS (Netherlands)

    Smets, J.; Wessel, I.; Schreurs, E.; Raes, F.


    Depressed patients commonly experience intrusive memories. There is some evidence that ruminative responses to those intrusions are important for maintaining depressive symptoms. Three models concerning the interplay of intrusions and rumination in the prediction of depressive symptoms were tested

  12. Wireless Intrusion Prevention Systems

    Directory of Open Access Journals (Sweden)

    Jack TIMOFTE


    Full Text Available The wireless networks have changed the way organizations work and offered a new range of possibilities, but at the same time they introduced new security threats. While an attacker needs physical access to a wired network in order to launch an attack, a wireless network allows anyone within its range to passively monitor the traffic or even start an attack. One of the countermeasures can be the use of Wireless Intrusion Prevention Systems.

  13. 3D numerical modelling of negative apparent conductivity anomalies in loop-loop electromagnetic measurements: a case study at a dacite intrusion in Sugisawa, Akita Prefecture, Japan (United States)

    Selepeng, Ame Thato; Sakanaka, Shin'ya; Nishitani, Tadashi


    Under certain geological conditions, low induction number electromagnetic (LIN-EM) instruments are known to produce negative apparent conductivity (σa) responses. This is particularly the case when the shallow subsurface is characterised by highly conductive bodies, however little attention has been given to this issue in the research literature. To analyse negative σa anomalies and their causative structures, we make use of a 3D integral equation forward modelling technique based on a 3D weighting function. We present 3D numerical modelling results over a volcanic tuff body intruded by several dacite dikes, in Sugisawa, Akita Prefecture, Japan. Apparent conductivity data were acquired using a Geonics EM-34-3 system in the horizontal magnetic dipole (HMD) and vertical magnetic dipole (VMD) operating modes. Our 3D model resolved the horizontal and vertical extent of the dacite dikes and also delineated a high conductive zone between the volcanic tuff and the intrusive dacite dikes. This zone is the causative structure for negative σa responses in the VMD data, and is interpreted to be an alteration zone. Interestingly, the negative σa response was absent when the instrument alignment azimuth was changed, implying an anisotropic effect on the EM signature in the study area. The true conductivity model achieved by 3D forward modelling is shown to compare favourably with the DC resistivity data acquired in the same area.

  14. Simulation of salinity intrusion along the Georgia and South Carolina coasts using climate-change scenarios (United States)

    Conrads, Paul; Roehl, Edwin A.; Daamen, Ruby C.; Cook, John B.


    Potential changes in climate could alter interactions between environmental and societal systems and adversely affect the availability of water resources in many coastal communities. Changes in streamflow patterns in conjunction with sea-level rise may change the salinity-intrusion dynamics of coastal rivers. Several municipal water-supply intakes are located along the Georgia and South Carolina coast that are proximal to the present day saltwater-freshwater interface of tidal rivers. Increases in the extent of salinity intrusion resulting from climate change could threaten the availability of freshwater supplies in the vicinity of these intakes. To effectively manage these supplies, water-resource managers need estimates of potential changes in the frequency, duration, and magnitude of salinity intrusion near their water-supply intakes that may occur as a result of climate change. This study examines potential effects of climate change, including altered streamflow and sea-level rise, on the dynamics of saltwater intrusion near municipal water-supply intakes in two coastal areas. One area consists of the Atlantic Intracoastal Waterway (AIW) and the Waccamaw River near Myrtle Beach along the Grand Strand of the South Carolina Coast, and the second area is on or near the lower Savannah River near Savannah, Georgia. The study evaluated how future sea-level rise and a reduction in streamflows can potentially affect salinity intrusion and threaten municipal water supplies and the biodiversity of freshwater tidal marshes in these two areas. Salinity intrusion occurs as a result of the interaction between three principal forces—streamflow, mean coastal water levels, and tidal range. To analyze and simulate salinity dynamics at critical coastal gaging stations near four municipal water-supply intakes, various data-mining techniques, including artificial neural network (ANN) models, were used to evaluate hourly streamflow, salinity, and coastal water-level data collected

  15. A methodological framework to assess the environmental and economic effects of injection barriers against seawater intrusion. (United States)

    Siarkos, Ilias; Latinopoulos, Dionysis; Mallios, Zisis; Latinopoulos, Pericles


    Seawater intrusion is responsible for the progressive deterioration of groundwater quality in numerous coastal aquifers worldwide. As a consequence, seawater intrusion may constitute a serious threat to local groundwater resources, as well as to the regional economy of coastal areas. To alleviate these negative effects, a number of well-designed protective measures could be implemented. The implementation of these measures is usually associated with significant benefits for the environment and the local economy. In this perspective, the present study investigates the particular case of constructing injection barriers for controlling seawater intrusion by developing a methodological framework that combines numerical modeling with spatial and cost-benefit analyses. To this task, we introduce a novel approach, which considers the socio-economic aspects of seawater intrusion in the modeling procedure, and at the same time focuses on the spatial and temporal relationships between water salinity and farmers' income. To test the proposed methodology two alternative artificial recharge scenarios - with different volumes of water used for injection - are assessed. According to the results of this analysis, both scenarios are likely to have a positive impact on groundwater quality, as well as, a net economic benefit to local society. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu


    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  17. Groundwater Vulnerability to Seawater Intrusion along Coastal Urban Areas: A Quantitative Comparative Assessment of EPIK and DRASTIC (United States)

    Momjian, Nanor; Abou Najm, Majdi; Alameddine, Ibrahim; El-Fadel, Mutasem


    Groundwater vulnerability assessment models are invariably coupled with Geographic Information Systems to provide decision makers with easier visualization of complex systems. In this study, we examine the uncertainty associated with such models (DRASTIC, EPIK) in assessing seawater intrusion, a growing threat along coastal urban cities due to overexploitation of groundwater resources associated with population growth and more recently, exacerbated by climate change impacts. For this purpose, a mapping of groundwater vulnerability was first conducted at a country level (Lebanon) and coupled with a groundwater quality monitoring program in three coastal cities for cross-validation. Then, six water quality categories were defined and mapped based on water quality standards ranging from drinking to seawater with weighted scores assigned for each category in both DRASTIC and EPIK for cross-validation. Finally, the results of groundwater quality tests were compared with vulnerability predictions at sampling points using two indicators (Chloride and TDS). While field measurements demonstrated the high vulnerability to seawater intrusion in coastal urbanized areas, the modelling results exhibited variations from field measurements reaching up to two water quality categories. Vertical-based vulnerability models demonstrated poor correlation when the anthropogenic impact was introduced through a process that depends on lateral groundwater flow thus highlighting (1) the limited ability of such models to capture vulnerability to lateral seawater intrusion induced primarily by vertical groundwater withdrawal, and (2) the need to incorporate depth and underlying lithology into the layers of groundwater vulnerability models when examining horizontally induced contamination such as seawater intrusion.

  18. Water Distribution and Removal Model

    Energy Technology Data Exchange (ETDEWEB)

    Y. Deng; N. Chipman; E.L. Hardin


    The design of the Yucca Mountain high level radioactive waste repository depends on the performance of the engineered barrier system (EBS). To support the total system performance assessment (TSPA), the Engineered Barrier System Degradation, Flow, and Transport Process Model Report (EBS PMR) is developed to describe the thermal, mechanical, chemical, hydrological, biological, and radionuclide transport processes within the emplacement drifts, which includes the following major analysis/model reports (AMRs): (1) EBS Water Distribution and Removal (WD&R) Model; (2) EBS Physical and Chemical Environment (P&CE) Model; (3) EBS Radionuclide Transport (EBS RNT) Model; and (4) EBS Multiscale Thermohydrologic (TH) Model. Technical information, including data, analyses, models, software, and supporting documents will be provided to defend the applicability of these models for their intended purpose of evaluating the postclosure performance of the Yucca Mountain repository system. The WD&R model ARM is important to the site recommendation. Water distribution and removal represents one component of the overall EBS. Under some conditions, liquid water will seep into emplacement drifts through fractures in the host rock and move generally downward, potentially contacting waste packages. After waste packages are breached by corrosion, some of this seepage water will contact the waste, dissolve or suspend radionuclides, and ultimately carry radionuclides through the EBS to the near-field host rock. Lateral diversion of liquid water within the drift will occur at the inner drift surface, and more significantly from the operation of engineered structures such as drip shields and the outer surface of waste packages. If most of the seepage flux can be diverted laterally and removed from the drifts before contacting the wastes, the release of radionuclides from the EBS can be controlled, resulting in a proportional reduction in dose release at the accessible environment. The purposes

  19. The prediction of intrusions following an analogue traumatic event: peritraumatic cognitive processes and anxiety-focused rumination versus rumination in response to intrusions. (United States)

    Laposa, Judith M; Rector, Neil A


    Intrusions are often considered the hallmark of posttraumatic stress disorder (PTSD). Despite this, relatively little is known about factors that give rise to intrusions. Cognitive models of PTSD highlight the importance of pre-existing cognitive vulnerabilities, cognitive processing and anxiety during a traumatic event, as well as negative responses to trauma sequelae. However, few studies have examined multiple forms of peritraumatic processes, and rumination in response to trauma intrusions using analogue trauma tasks, and none have examined whether broader anxious ruminative processes contribute to intrusion development. In addition, little work has investigated the role of post-state anxiety in intrusions, and anxiety may be related to both peritraumatic processing and rumination. The current study employed a distressing film paradigm to examine key tenets of cognitive models of PTSD. Ninety-one female university students completed measures of anxiety, rumination in response to anxious symptoms, peritraumatic dissociation, data driven processing, lack of self referent processing, intrusions, and rumination in response to intrusions of the distressing film. Results revealed that peritraumatic dissociation, data driven processing, and self referent processing were associated with intrusion development, with lack of self referent processing being a strong predictor of intrusion development. Post-state anxiety and rumination in response to intrusions also predicted intrusion development. Discussion focuses on implications of cognitive processes and anxiety in theories of intrusion development. Copyright © 2012 Elsevier Ltd. All rights reserved.

  20. Intrusive Memories of Distressing Information: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Eva Battaglini

    Full Text Available Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42 viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13 demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13. Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC and dorsolateral prefrontal cortex (dlPFC, inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories.

  1. Unsteady Flow and Saline Intrusion in Long Sea Outfalls

    DEFF Research Database (Denmark)

    Larsen, Torben; Borrows, Richard


    The internal hydraulics of the multiport diffuser section in long sea outfalls has been studied by laboratory experiments and numerical modelling. The study has run for five years as a coordinated effort at both the University of Liverpool and the University of Aalborg. The investigations have co...... interesting phenomena, in particular the wave induced saline intrusion, can now be modelled satisfactorily. Some aspects of the behaviour relating to very low fresh water discharges, e.g. unsteady flow when saline wedges are present, are still not very well described.......The internal hydraulics of the multiport diffuser section in long sea outfalls has been studied by laboratory experiments and numerical modelling. The study has run for five years as a coordinated effort at both the University of Liverpool and the University of Aalborg. The investigations have...... covered such phenomena as saline intrusion, wave influence and unsteady flow caused by pump operation. Results show that numerous flow regimes exist depending on the boundary conditions. Numerical models have been developed to simulate the flow field in the diffuser section and some of the most...

  2. Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning

    Directory of Open Access Journals (Sweden)

    Indah Yulia Prafitaning Tiyas


    Full Text Available Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system. We need a reliable network security system that is resistant to a variety of attacks against the system. Therefore, Intrusion Detection System (IDS required to overcome the problems of intrusions. Many researches have been done on intrusion detection using classification methods. Classification methodshave high precision, but it takes efforts to determine an appropriate classification model to the classification problem. In this paper, we propose a new reinforced approach to detect intrusion with On-line Clustering using Reinforcement Learning. Reinforcement Learning is a new paradigm in machine learning which involves interaction with the environment.It works with reward and punishment mechanism to achieve solution. We apply the Reinforcement Learning to the intrusion detection problem with considering competitive learning using Pursuit Reinforcement Competitive Learning (PRCL. Based on the experimental result, PRCL can detect intrusions in real time with high accuracy (99.816% for DoS, 95.015% for Probe, 94.731% for R2L and 99.373% for U2R and high speed (44 ms.The proposed approach can help network administrators to detect intrusion, so the computer network security systembecome reliable. Keywords: Intrusion Detection System, On-Line Clustering, Reinforcement Learning, Unsupervised Learning.

  3. Modeling Water Pollution of Soil

    Directory of Open Access Journals (Sweden)

    V. Doležel


    depth of 220–300 m below the terrain. As an alternative, thinner stoppers were considered, but this option was discarded.The aim of this paper is to describe the design of the stoppers applied to separate the two types of water along the contact horizon using Desai’s DSC theory (Distinct State Concept, and generalized plane strain in the multiphase problem of water flow in a porous medium. In addition, a comparison of some results from scale experimental models with numerical solutions was carried out. The intrinsic material properties of stoppers for numerical computations were obtained from physical and chemical laboratory tests. The models were evaluated for the complete underground work, particularly in its final stage of construction. 

  4. Oscillating water column structural model

    Energy Technology Data Exchange (ETDEWEB)

    Copeland, Guild [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bull, Diana L [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jepsen, Richard Alan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gordon, Margaret Ellen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)


    An oscillating water column (OWC) wave energy converter is a structure with an opening to the ocean below the free surface, i.e. a structure with a moonpool. Two structural models for a non-axisymmetric terminator design OWC, the Backward Bent Duct Buoy (BBDB) are discussed in this report. The results of this structural model design study are intended to inform experiments and modeling underway in support of the U.S. Department of Energy (DOE) initiated Reference Model Project (RMP). A detailed design developed by Re Vision Consulting used stiffeners and girders to stabilize the structure against the hydrostatic loads experienced by a BBDB device. Additional support plates were added to this structure to account for loads arising from the mooring line attachment points. A simplified structure was designed in a modular fashion. This simplified design allows easy alterations to the buoyancy chambers and uncomplicated analysis of resulting changes in buoyancy.

  5. An overview to Software Architecture in Intrusion Detection System


    Bahrami, Mehdi; Bahrami, Mohammad


    Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network. The IDS could detect and block attack-related network traffic. The network control is a complex model. Implementation of an IDS could make delay in the network. Several software-based network intrusion detection systems are developed. However, the model has a problem with high spee...

  6. Accounting for Water Insecurity in Modeling Domestic Water Demand (United States)

    Galaitsis, S. E.; Huber-lee, A. T.; Vogel, R. M.; Naumova, E.


    Water demand management uses price elasticity estimates to predict consumer demand in relation to water pricing changes, but studies have shown that many additional factors effect water consumption. Development scholars document the need for water security, however, much of the water security literature focuses on broad policies which can influence water demand. Previous domestic water demand studies have not considered how water security can affect a population's consumption behavior. This study is the first to model the influence of water insecurity on water demand. A subjective indicator scale measuring water insecurity among consumers in the Palestinian West Bank is developed and included as a variable to explore how perceptions of control, or lack thereof, impact consumption behavior and resulting estimates of price elasticity. A multivariate regression model demonstrates the significance of a water insecurity variable for data sets encompassing disparate water access. When accounting for insecurity, the R-squaed value improves and the marginal price a household is willing to pay becomes a significant predictor for the household quantity consumption. The model denotes that, with all other variables held equal, a household will buy more water when the users are more water insecure. Though the reasons behind this trend require further study, the findings suggest broad policy implications by demonstrating that water distribution practices in scarcity conditions can promote consumer welfare and efficient water use.

  7. Intrusive growth of sclerenchyma fibers

    NARCIS (Netherlands)

    Snegireva, A.V.; Ageeva, M.V.; Amenitskii, S.I.; Chernova, T.E.; Ebskamp, M.; Gorshkova, T.A.


    Intrusive growth is a type of cell elongation when the rate of its longitudinal growth is higher than that of surrounding cells; therefore, these cells intrude between the neighboring cells penetrating the middle lamella. The review considers the classical example of intrusive growth, e.g.,

  8. Motion effects on intrusion development

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Holmes, E.A.; Becker, E.S.


    Analogue studies on intrusion development have found that visuospatial tasks performed during the encoding of aversive information reduce subsequent intrusion development. However, these studies cannot rule out a physical explanation in terms of simple movement. In the current study we addressed

  9. SALVAGE D2.2 Description of the developed algorithms for intrusion detection in smart grid components

    DEFF Research Database (Denmark)

    Kosek, Anna Magdalena; Korman, Matus; Heussen, Kai


    This report presents developed model-based anomaly detection techniques used for intrusion detection in smart grid.......This report presents developed model-based anomaly detection techniques used for intrusion detection in smart grid....

  10. Mathematical analysis of a viscoelastic-gravitational layered earth model for magmatic intrusion in the dynamic case

    Directory of Open Access Journals (Sweden)

    Alicia Arjona


    Full Text Available Volcanic areas present a lower effective viscosity than usually in the Earth's crust. It makes necessary to consider inelastic properties in deformation modelling. As a continuation of work done previously by some of the authors, this work is concerned with the proof that the perturbed equations representing the viscoelastic-gravitational displacements resulting from body forces embedded in a layered Earth model leads to a well-posed problem even for any kind of domains, with the natural boundary and transmission conditions. A homogeneous or stratified viscoelastic half-space has often been used as a simple earth model to calculate the displacements and gravity changes. Here we give a constructive proof of the existence of weak solutions and we show the uniqueness and the continuous dependence with respect to the initial data of weak solutions of the dynamic coupled viscoelastic-gravitational field equations.

  11. Passive intrusion detection system (United States)

    Laue, E. G. (Inventor)


    An intrusion detection system is described in which crystal oscillators are used to provide a frequency which varies as a function of fluctuations of a particular environmental property of the atmosphere, e.g., humidity, in the protected volume. The system is based on the discovery that the frequency of an oscillator whose crystal is humidity sensitive, varies at a frequency or rate which is within a known frequency band, due to the entry of an intruder into the protected volume. The variable frequency is converted into a voltage which is then filtered by a filtering arrangement which permits only voltage variations at frequencies within the known frequency band to activate an alarm, while inhibiting the alarm activation when the voltage frequency is below or above the known frequency band.

  12. Vapor Intrusion from Entrapped NAPL Sources and Groundwater Plumes: Process Understanding and Improved Modeling Tools for Pathway Assessment (United States)


    imaging for engineering site investigation in a crystalline basement terrain, southwestern Nigeria. Journ. Environ. Earth Scien ., DOI: 10.1007/s12665... library NumDwarf that is being developed by the author and verified against another model built using the COMSOL Multiphysics commercial software...transport in the porous medium. In the following section, we show how the NumDwarf computational library is used to discretize and solve the

  13. Water System Adaptation To Hydrological Changes: Module 6, Synchronous Management of Storm Surge, Sea Level Rise, and Salt Water Intrusion: Case Study in Mattapoisett, Massachusetts, U.S.A. (United States)

    This course will introduce students to the fundamental principles of water system adaptation to hydrological changes, with emphasis on data analysis and interpretation, technical planning, and computational modeling. Starting with real-world scenarios and adaptation needs, the co...

  14. Drinking Water Temperature Modelling in Domestic Systems


    Moerman, A.; Blokker, M.; Vreeburg, J.; van der Hoek, J.P.


    Domestic water supply systems are the final stage of the transport process to deliver potable water to the customers’ tap. Under the influence of temperature, residence time and pipe materials the drinking water quality can change while the water passes the domestic drinking water system. According to the Dutch Drinking Water Act the drinking water temperature may not exceed the 25 °C threshold at point-of-use level. This paper provides a mathematical approach to model the heating of drinking...

  15. One-Water Hydrologic Flow Model (MODFLOW-OWHM) (United States)

    Hanson, Randall T.; Boyce, Scott E.; Schmid, Wolfgang; Hughes, Joseph D.; Mehl, Steffen W.; Leake, Stanley A.; Maddock, Thomas; Niswonger, Richard G.


    The One-Water Hydrologic Flow Model (MF-OWHM) is a MODFLOW-based integrated hydrologic flow model (IHM) that is the most complete version, to date, of the MODFLOW family of hydrologic simulators needed for the analysis of a broad range of conjunctive-use issues. Conjunctive use is the combined use of groundwater and surface water. MF-OWHM allows the simulation, analysis, and management of nearly all components of human and natural water movement and use in a physically-based supply-and-demand framework. MF-OWHM is based on the Farm Process for MODFLOW-2005 (MF-FMP2) combined with Local Grid Refinement (LGR) for embedded models to allow use of the Farm Process (FMP) and Streamflow Routing (SFR) within embedded grids. MF-OWHM also includes new features such as the Surface-water Routing Process (SWR), Seawater Intrusion (SWI), and Riparian Evapotrasnpiration (RIP-ET), and new solvers such as Newton-Raphson (NWT) and nonlinear preconditioned conjugate gradient (PCGN). This IHM also includes new connectivities to expand the linkages for deformation-, flow-, and head-dependent flows. Deformation-dependent flows are simulated through the optional linkage to simulated land subsidence with a vertically deforming mesh. Flow-dependent flows now include linkages between the new SWR with SFR and FMP, as well as connectivity with embedded models for SFR and FMP through LGR. Head-dependent flows now include a modified Hydrologic Flow Barrier Package (HFB) that allows optional transient HFB capabilities, and the flow between any two layers that are adjacent along a depositional or erosional boundary or displaced along a fault. MF-OWHM represents a complete operational hydrologic model that fully links the movement and use of groundwater, surface water, and imported water for consumption by irrigated agriculture, but also of water used in urban areas and by natural vegetation. Supply and demand components of water use are analyzed under demand-driven and supply

  16. Managing saltwater intrusion in coastal arid regions and its societal implications for agriculture

    Directory of Open Access Journals (Sweden)

    J. Grundmann


    Full Text Available Coastal aquifers in arid and semiarid regions are particularly at risk due to intrusion of salty marine water. Since groundwater is predominantly used in irrigated agriculture, its excessive pumping – above the natural rate of replenishment – strengthen the intrusion process. Using this increasingly saline water for irrigation, leads to a destruction of valuable agricultural resources and the economic basis of farmers and their communities. The limitation of resources (water and soil in these regions requires a societal adaptation and change in behaviour as well as the development of appropriate management strategies for a transition towards stable and sustainable future hydrosystem states. Besides a description of the system dynamics and the spatial consequences of adaptation on the resources availability, the contribution combines results of an empirical survey with stakeholders and physically based modelling of the groundwater-agriculture hydrosystem interactions. This includes an analysis of stakeholders' (farmers and decision makers behaviour and opinions regarding several management interventions aiming on water demand and water resources management as well as the thinking of decision makers how farmers will behave. In this context, the technical counter measures to manage the saltwater intrusion by simulating different groundwater pumping strategies and scenarios are evaluated from the economic and social point of view and if the spatial variability of the aquifer's hydrogeology is taken into consideration. The study is exemplarily investigated for the south Batinah region in the Sultanate of Oman, which is affected by saltwater intrusion into a coastal aquifer system due to excessive groundwater withdrawal for irrigated agriculture.

  17. Modern Modeling of Water Hammer

    Directory of Open Access Journals (Sweden)

    Urbanowicz Kamil


    Full Text Available Hydraulic equipment on board ships is common. It assists in the work of: steering gear, pitch propellers, watertight doors, cargo hatch covers, cargo and mooring winches, deck cranes, stern ramps etc. The damage caused by transient flows (which include among others water hammer are often impossible to repair at sea. Hence, it is very important to estimate the correct pressure runs and associated side effects during their design. The presented study compares the results of research on the impact of a simplified way of modeling the hydraulic resistance and simplified effective weighting functions build of two and three-terms on the estimated results of the pressure changes. As it turns out, simple effective two-terms weighting functions are able to accurately model the analyzed transients. The implementation of the presented method will soon allow current automatic protection of hydraulic systems of the adverse effects associated with frequent elevated and reduced pressures.

  18. Relationship between vapor intrusion and human exposure to trichloroethylene. (United States)

    Archer, Natalie P; Bradford, Carrie M; Villanacci, John F; Crain, Neil E; Corsi, Richard L; Chambers, David M; Burk, Tonia; Blount, Benjamin C


    Trichloroethylene (TCE) in groundwater has the potential to volatilize through soil into indoor air where it can be inhaled. The purpose of this study was to determine whether individuals living above TCE-contaminated groundwater are exposed to TCE through vapor intrusion. We examined associations between TCE concentrations in various environmental media and TCE concentrations in residents. For this assessment, indoor air, outdoor air, soil gas, and tap water samples were collected in and around 36 randomly selected homes; blood samples were collected from 63 residents of these homes. Additionally, a completed exposure survey was collected from each participant. Environmental and blood samples were analyzed for TCE. Mixed model multiple linear regression analyses were performed to determine associations between TCE in residents' blood and TCE in indoor air, outdoor air, and soil gas. Blood TCE concentrations were above the limit of quantitation (LOQ; ≥ 0.012 µg L(-1)) in 17.5% of the blood samples. Of the 36 homes, 54.3%, 47.2%, and >84% had detectable concentrations of TCE in indoor air, outdoor air, and soil gas, respectively. Both indoor air and soil gas concentrations were statistically significantly positively associated with participants' blood concentrations (P = 0.0002 and P = 0.04, respectively). Geometric mean blood concentrations of residents from homes with indoor air concentrations of >1.6 µg m(-3) were approximately 50 times higher than geometric mean blood TCE concentrations in participants from homes with no detectable TCE in indoor air (P intrusion and demonstrates the magnitude of exposure from vapor intrusion of TCE in a residential setting.

  19. Network Intrusion Forensic Analysis Using Intrusion Detection System


    Manish Kumar; Dr. M. Hanumanthappa; Dr. T.V. Suresh Kumar


    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investi...

  20. Assimilation of preexisting Pleistocene intrusions at Long Valley by periodic magma recharge accelerates rhyolite generation: rethinking the remelting model (United States)

    Simon, Justin I.; Weis, Dominique; DePaolo, Donald J.; Renne, Paul R.; Mundil, Roland; Schmitt, Axel K.


    Rhyolite flows and tuffs from the Long Valley area of California, which were erupted over a two-million-year time period, exhibit systematic trends in Nd, Hf, and Pb isotopes, trace element composition, erupted volume, and inferred magma residence time that provide evidence for a new model for the production of large volumes of silica-rich magma. Key constraints come from geochronology of zircon crystal populations combined with a refined eruption chronology from Ar-Ar geochronology; together these data give better estimates of magma residence time that can be evaluated in the context of changing magma compositions. Here, we report Hf, Nd, and Sr isotopes, major and trace element compositions, 40Ar/39Ar ages, and U-Pb zircon ages that combined with existing data suggest that the chronology and geochemistry of Long Valley rhyolites can be explained by a dynamic interaction of crustal and mantle-derived magma. The large volume Bishop Tuff represents the culmination of a period of increased mantle-derived magma input to the Long Valley volcanic system; the effect of this input continued into earliest postcaldera time. As the postcaldera evolution of the system continued, new and less primitive crustal-derived magmas dominated the system. A mixture of varying amounts of more mafic mantle-derived and felsic crustal-derived magmas with recently crystallized granitic plutonic materials offers the best explanation for the observed chronology, secular shifts in Hf and Nd isotopes, and the apparently low zircon crystallization and saturation temperatures as compared to Fe-Ti oxide eruption temperatures. This scenario in which transient crustal magma bodies remained molten for varying time periods, fed eruptions before solidification, and were then remelted by fresh recharge provides a realistic conceptual framework that can explain the isotopic and geochemical evidence. General relationships between crustal residence times and magma sources are that: (1) precaldera rhyolites

  1. Multilayer Statistical Intrusion Detection in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Noureddine Boudriga


    Full Text Available The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs. This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  2. Modeling water demand when households have multiple sources of water (United States)

    Coulibaly, Lassina; Jakus, Paul M.; Keith, John E.


    A significant portion of the world's population lives in areas where public water delivery systems are unreliable and/or deliver poor quality water. In response, people have developed important alternatives to publicly supplied water. To date, most water demand research has been based on single-equation models for a single source of water, with very few studies that have examined water demand from two sources of water (where all nonpublic system water sources have been aggregated into a single demand). This modeling approach leads to two outcomes. First, the demand models do not capture the full range of alternatives, so the true economic relationship among the alternatives is obscured. Second, and more seriously, economic theory predicts that demand for a good becomes more price-elastic as the number of close substitutes increases. If researchers artificially limit the number of alternatives studied to something less than the true number, the price elasticity estimate may be biased downward. This paper examines water demand in a region with near universal access to piped water, but where system reliability and quality is such that many alternative sources of water exist. In extending the demand analysis to four sources of water, we are able to (i) demonstrate why households choose the water sources they do, (ii) provide a richer description of the demand relationships among sources, and (iii) calculate own-price elasticity estimates that are more elastic than those generally found in the literature.

  3. Realistic computer network simulation for network intrusion detection dataset generation (United States)

    Payer, Garrett


    The KDD-99 Cup dataset is dead. While it can continue to be used as a toy example, the age of this dataset makes it all but useless for intrusion detection research and data mining. Many of the attacks used within the dataset are obsolete and do not reflect the features important for intrusion detection in today's networks. Creating a new dataset encompassing a large cross section of the attacks found on the Internet today could be useful, but would eventually fall to the same problem as the KDD-99 Cup; its usefulness would diminish after a period of time. To continue research into intrusion detection, the generation of new datasets needs to be as dynamic and as quick as the attacker. Simply examining existing network traffic and using domain experts such as intrusion analysts to label traffic is inefficient, expensive, and not scalable. The only viable methodology is simulation using technologies including virtualization, attack-toolsets such as Metasploit and Armitage, and sophisticated emulation of threat and user behavior. Simulating actual user behavior and network intrusion events dynamically not only allows researchers to vary scenarios quickly, but enables online testing of intrusion detection mechanisms by interacting with data as it is generated. As new threat behaviors are identified, they can be added to the simulation to make quicker determinations as to the effectiveness of existing and ongoing network intrusion technology, methodology and models.

  4. Nationwide water availability data for energy-water modeling

    Energy Technology Data Exchange (ETDEWEB)

    Tidwell, Vincent Carroll [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Zemlick, Katie M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Klise, Geoffrey Taylor [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)


    The purpose of this effort is to explore where the availability of water could be a limiting factor in the siting of new electric power generation. To support this analysis, water availability is mapped at the county level for the conterminous United States (3109 counties). Five water sources are individually considered, including unappropriated surface water, unappropriated groundwater, appropriated water (western U.S. only), municipal wastewater and brackish groundwater. Also mapped is projected growth in non-thermoelectric consumptive water demand to 2035. Finally, the water availability metrics are accompanied by estimated costs associated with utilizing that particular supply of water. Ultimately these data sets are being developed for use in the National Renewable Energy Laboratories' (NREL) Regional Energy Deployment System (ReEDS) model, designed to investigate the likely deployment of new energy installations in the U.S., subject to a number of constraints, particularly water.

  5. Intrusion detection using rough set classification. (United States)

    Zhang, Lian-hua; Zhang, Guan-hua; Zhang, Jie; Bai, Ying-cai


    Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learning algorithm, is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of "IF-THEN" rules, which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set).

  6. Mapping saltwater intrusion in the Biscayne Aquifer, Miami-Dade County, Florida using transient electromagnetic sounding (United States)

    Fitterman, David V.


    Saltwater intrusion in southern Florida poses a potential threat to the public drinking-water supply that is typically monitored using water samples and electromagnetic induction logs collected from a network of wells. Transient electromagnetic (TEM) soundings are a complementary addition to the monitoring program because of their ease of use, low cost, and ability to fill in data gaps between wells. TEM soundings have been used to map saltwater intrusion in the Biscayne aquifer over a large part of south Florida including eastern Miami-Dade County and the Everglades. These two areas are very different with one being urban and the other undeveloped. Each poses different conditions that affect data collection and data quality. In the developed areas, finding sites large enough to make soundings is difficult. The presence of underground pipes further restricts useable locations. Electromagnetic noise, which reduces data quality, is also an issue. In the Everglades, access to field sites is difficult and working in water-covered terrain is challenging. Nonetheless, TEM soundings are an effective tool for mapping saltwater intrusion. Direct estimates of water quality can be obtained from the inverted TEM data using a formation factor determined for the Biscayne aquifer. This formation factor is remarkably constant over Miami-Dade County owing to the uniformity of the aquifer and the absence of clay. Thirty-six TEM soundings were collected in the Model Land area of southeast Miami-Dade County to aid in calibration of a helicopter electromagnetic (HEM) survey. The soundings and HEM survey revealed an area of saltwater intrusion aligned with canals and drainage ditches along U.S. Highway 1 and the Card Sound Road. These canals and ditches likely reduced freshwater levels through unregulated drainage and provided pathways for seawater to flow at least 12.4 km inland.

  7. Gas intrusion into SPR caverns

    Energy Technology Data Exchange (ETDEWEB)

    Hinkebein, T.E.; Bauer, S.J.; Ehgartner, B.L.; Linn, J.K.; Neal, J.T.; Todd, J.L.; Kuhlman, P.S.; Gniady, C.T. [Sandia National Labs., Albuquerque, NM (United States). Underground Storage Technology Dept.; Giles, H.N. [Dept. of Energy, Washington, DC (United States). Strategic Petroleum Reserve


    The conditions and occurrence of gas in crude oil stored in Strategic Petroleum Reserve, SPR, caverns is characterized in this report. Many caverns in the SPR show that gas has intruded into the oil from the surrounding salt dome. Historical evidence and the analyses presented here suggest that gas will continue to intrude into many SPR caverns in the future. In considering why only some caverns contain gas, it is concluded that the naturally occurring spatial variability in salt permeability can explain the range of gas content measured in SPR caverns. Further, it is not possible to make a one-to-one correlation between specific geologic phenomena and the occurrence of gas in salt caverns. However, gas is concluded to be petrogenic in origin. Consequently, attempts have been made to associate the occurrence of gas with salt inhomogeneities including anomalies and other structural features. Two scenarios for actual gas intrusion into caverns were investigated for consistency with existing information. These scenarios are gas release during leaching and gas permeation through salt. Of these mechanisms, the greater consistency comes from the belief that gas permeates to caverns through the salt. A review of historical operating data for five Bryan Mound caverns loosely supports the hypothesis that higher operating pressures reduce gas intrusion into caverns. This conclusion supports a permeability intrusion mechanism. Further, it provides justification for operating the caverns near maximum operating pressure to minimize gas intrusion. Historical gas intrusion rates and estimates of future gas intrusion are given for all caverns.

  8. Water balance model for Kings Creek (United States)

    Wood, Eric F.


    Particular attention is given to the spatial variability that affects the representation of water balance at the catchment scale in the context of macroscale water-balance modeling. Remotely sensed data are employed for parameterization, and the resulting model is developed so that subgrid spatial variability is preserved and therefore influences the grid-scale fluxes of the model. The model permits the quantitative evaluation of the surface-atmospheric interactions related to the large-scale hydrologic water balance.

  9. Coupled surface-water and ground-water model (United States)

    Swain, Eric D.; Wexler, Eliezer J.


    In areas with dynamic and hydraulically well connected ground-water and surface-water systems, it is desirable that stream-aquifer interaction be simulated with models of equal sophistication and accuracy. Accordingly, a new, coupled ground-water and surface-water model was developed by combining the U.S. Geological Survey models MODFLOW and BRANCH. MODFLOW is the widely used modular three-dimensional, finite-difference, ground-water model and BRANCH is a one-dimensional numerical model commonly used to simulate flow in open-channel networks. Because time steps used in ground-water modeling commonly are much longer than those used in surface-water simulations, provision has been made for handling multiple BRANCH time steps within one MODFLOW time step. Verification testing of the coupled model was done using data from previous studies and by comparing results with output from a simpler four-point implicit open-channel flow model linked with MODFLOW.

  10. Sensitivity analysis on parameters and processes affecting vapor intrusion risk

    KAUST Repository

    Picone, Sara


    A one-dimensional numerical model was developed and used to identify the key processes controlling vapor intrusion risks by means of a sensitivity analysis. The model simulates the fate of a dissolved volatile organic compound present below the ventilated crawl space of a house. In contrast to the vast majority of previous studies, this model accounts for vertical variation of soil water saturation and includes aerobic biodegradation. The attenuation factor (ratio between concentration in the crawl space and source concentration) and the characteristic time to approach maximum concentrations were calculated and compared for a variety of scenarios. These concepts allow an understanding of controlling mechanisms and aid in the identification of critical parameters to be collected for field situations. The relative distance of the source to the nearest gas-filled pores of the unsaturated zone is the most critical parameter because diffusive contaminant transport is significantly slower in water-filled pores than in gas-filled pores. Therefore, attenuation factors decrease and characteristic times increase with increasing relative distance of the contaminant dissolved source to the nearest gas diffusion front. Aerobic biodegradation may decrease the attenuation factor by up to three orders of magnitude. Moreover, the occurrence of water table oscillations is of importance. Dynamic processes leading to a retreating water table increase the attenuation factor by two orders of magnitude because of the enhanced gas phase diffusion. © 2012 SETAC.

  11. Forced-folding by laccolith and saucer-shaped sill intrusions on the Earth, planets and icy satellites (United States)

    Michaut, Chloé


    Horizontal intrusions probably initially start as cracks, with negligible surface deformation. Once their horizontal extents become large enough compared to their depths, they make room for themselves by lifting up their overlying roofs, creating characteristic surface deformations that can be observed at the surface of planets. We present a model where magma flows below a thin elastic overlying layer characterized by a flexural wavelength Λ and study the dynamics and morphology of such a magmatic intrusion. Our results show that, depending on its size, the intrusion present different shapes and thickness-to-radius relationships. During a first phase, elastic bending of the overlying layer is the main source of driving pressure in the flow; the pressure decreases as the flow radius increases, the intrusion is bell-shaped and its thickness is close to being proportional to its radius. When the intrusion radius becomes larger than 4 times Λ, the flow enters a gravity current regime and progressively develops a pancake shape with a flat top. We study the effect of topography on flow spreading in particular in the case where the flow is constrained by a lithostatic barrier within a depression, such as an impact crater on planets or a caldera on Earth. We show that the resulting shape for the flow depends on the ratio between the flexural wavelength of the layer overlying the intrusion and the depression radius. The model is tested against terrestrial data and is shown to well explain the size and morphology of laccoliths and saucer-shaped sills on Earth. We use our results to detect and characterize shallow solidified magma reservoirs in the crust of terrestrial planets and potential shallow water reservoirs in the ice shell of icy satellites.


    Directory of Open Access Journals (Sweden)

    Siti Sundari Miswadi


    Hnya naik. Kadar N03 menunjukkan pada minggu ketiga dan minggu keenam didapatkan hasil yang sarna, yaitu 16,66% sumur naik, dan 83,30 % turun. Kadar PO43- pada minggu ketiga lerdeteksi sebesar 100% jumlah sumur turun, sedangkan pada minggu keenam 16,66% turun, dan 83,30 % naik. Nilai kekeruhan pada minggu ketiga terdeteksi 16,66% sumur naik, dan 83,30 % turun, sedangkan pada minggu keenam 49,98 % sumur naik kekeruhannya, dan 49,98 % turun. Berdasarkan hasil penelitian dapat disimpulkan, setelah penggunaan LRB pada minggu ketiga, sebanyak 82,41 % sumur mengalami penurunan dan 17,59% mengalami kenaikan pada ketujuh parameter, sedangkan pada minggu keenam sebanyak 54,75% sumur mengalami penurunan, dan 45,25 % sumur mengalami kenaikan pada ketujuh parameter. Hasil optimal penggunaan LRB sebagai adsorben diperoleh pada minggu keenam.   ABSTRACT Flood becomes annual agenda for the people who live in the coastal area of Semarang. But now, the regions which far from the coast are now no longer free from the flood and sea water intrusion. It happens because the water already exceeds the amount of soil replenishment (recharge, and the land has lost its function in absorbing water due to uncontrolled construction of buildings and housing which are not environmentally friendly. This study aims to map the level of sea water intrusion in the dug wells based on “Chloride-Bicarbonate Ratio”, and electrical conductivity (DHL and salinity in the city of Semarang. Research conducted on 30 dug wells owned by residents of the distance from the coast between 0,5-5 (five kilometers. Sea water intrusion rate was calculated based on the ratio of chloride to carbonate and bicarbonate, and the results were plotted on base maps. The results showed the level of sea water intrusion and the value of DHL in the eastern part of Semarang city much worse than the west coast area of Semarang, while the levels of salinity in most areas of research were in average levels. The results of studies

  13. Tagging Water Sources in Atmospheric Models (United States)

    Bosilovich, M.


    Tagging of water sources in atmospheric models allows for quantitative diagnostics of how water is transported from its source region to its sink region. In this presentation, we review how this methodology is applied to global atmospheric models. We will present several applications of the methodology. In one example, the regional sources of water for the North American Monsoon system are evaluated by tagging the surface evaporation. In another example, the tagged water is used to quantify the global water cycling rate and residence time. We will also discuss the need for more research and the importance of these diagnostics in water cycle studies.

  14. Transboundary geophysical mapping of geological elements and salinity distribution critical for the assessment of future sea water intrusion in response to sea level rise

    Directory of Open Access Journals (Sweden)

    F. Jørgensen


    Full Text Available Geophysical techniques are increasingly being used as tools for characterising the subsurface, and they are generally required to develop subsurface models that properly delineate the distribution of aquifers and aquitards, salt/freshwater interfaces, and geological structures that affect groundwater flow. In a study area covering 730 km2 across the border between Germany and Denmark, a combination of an airborne electromagnetic survey (performed with the SkyTEM system, a high-resolution seismic survey and borehole logging has been used in an integrated mapping of important geological, physical and chemical features of the subsurface. The spacing between flight lines is 200–250 m which gives a total of about 3200 line km. About 38 km of seismic lines have been collected. Faults bordering a graben structure, buried tunnel valleys, glaciotectonic thrust complexes, marine clay units, and sand aquifers are all examples of geological structures mapped by the geophysical data that control groundwater flow and to some extent hydrochemistry. Additionally, the data provide an excellent picture of the salinity distribution in the area and thus provide important information on the salt/freshwater boundary and the chemical status of groundwater. Although the westernmost part of the study area along the North Sea coast is saturated with saline water and the TEM data therefore are strongly influenced by the increased electrical conductivity there, buried valleys and other geological elements are still revealed. The mapped salinity distribution indicates preferential flow paths through and along specific geological structures within the area. The effects of a future sea level rise on the groundwater system and groundwater chemistry are discussed with special emphasis on the importance of knowing the existence, distribution and geometry of the mapped geological elements, and their control on the groundwater salinity distribution is assessed.

  15. Rapid laccolith intrusion driven by explosive volcanic eruption. (United States)

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves


    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km3. Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  16. Magmatic ore deposits in layered intrusions - Descriptive model for reef-type PGE and contact-type Cu-Ni-PGE deposits (United States)

    Zientek, Michael L.


    Layered, ultramafic to mafic intrusions are uncommon in the geologic record, but host magmatic ore deposits containing most of the world's economic concentrations of platinum-group elements (PGE) (figs. 1 and 2). These deposits are mined primarily for their platinum, palladium, and rhodium contents (table 1). Magmatic ore deposits are derived from accumulations of crystals of metallic oxides, or immiscible sulfide, or oxide liquids that formed during the cooling and crystallization of magma, typically with mafic to ultramafic compositions. "PGE reefs" are stratabound PGE-enriched lode mineralization in mafic to ultramafic layered intrusions. The term "reef" is derived from Australian and South African literature for this style of mineralization and used to refer to (1) the rock layer that is mineralized and has distinctive texture or mineralogy (Naldrett, 2004), or (2) the PGE-enriched sulfide mineralization that occurs within the rock layer. For example, Viljoen (1999) broadly defined the Merensky Reef as "a mineralized zone within or closely associated with an unconformity surface in the ultramafic cumulate at the base of the Merensky Cyclic Unit." In this report, we will use the term PGE reef to refer to the PGE-enriched mineralization, not the host rock layer. Within a layered igneous intrusion, reef-type mineralization is laterally persistent along strike, extending for the length of the intrusion, typically tens to hundreds of kilometers. However, the mineralized interval is thin, generally centimeters to meters thick, relative to the stratigraphic thickness of layers in an intrusion that vary from hundreds to thousands of meters. PGE-enriched sulfide mineralization is also found near the contacts or margins of layered mafic to ultramafic intrusions (Iljina and Lee, 2005). This contact-type mineralization consists of disseminated to massive concentrations of iron-copper-nickel-PGE-enriched sulfide mineral concentrations in zones that can be tens to hundreds

  17. Non-intrusive measurement of tritium activity in waste drums by modelling a {sup 3}He leak quantified by mass spectrometry; Mesure non intrusive de l'activite de futs de dechets trities par modelisation d'une fuite {sup 3}He et sa quantification par spectrometrie de masse

    Energy Technology Data Exchange (ETDEWEB)

    Demange, D


    This study deals with a new method that makes it possible to measure very low tritium quantities inside radioactive waste drums. This indirect method is based on measuring the decaying product, {sup 3}He, and requires a study of its behaviour inside the drum. Our model considers {sup 3}He as totally free and its leak through the polymeric joint of the drum as two distinct phenomena: permeation and laminar flow. The numerical simulations show that a pseudo-stationary state takes place. Thus, the {sup 3}He leak corresponds to the tritium activity inside the drum but it appears, however, that the leak peaks when the atmospheric pressure variations induce an overpressure in the drum. Nevertheless, the confinement of a drum in a tight chamber makes it possible to quantify the {sup 3}He leak. This is a non-intrusive measurement of its activity, which was experimentally checked by using reduced models, representing the drum and its confinement chamber. The drum's confinement was optimised to obtain a reproducible {sup 3}He leak measurement. The gaseous samples taken from the chamber were purified using selective adsorption onto activated charcoals at 77 K to remove the tritium and pre-concentrate the {sup 3}He. The samples were measured using a leak detector mass spectrometer. The adaptation of the signal acquisition and the optimisation of the analysis parameters made it possible to reach the stability of the external calibrations using standard gases with a {sup 3}He detection limit of 0.05 ppb. Repeated confinement of the reference drums demonstrated the accuracy of this method. The uncertainty of this non-intrusive measurement of the tritium activity in 200-liter drums is 15% and the detection limit is about 1 GBq after a 24 h confinement. These results led to the definition of an automated tool able to systematically measure the tritium activity of all storage waste drums. (authors)

  18. Formation dynamics of subsurface hydrocarbon intrusions following the Deepwater Horizon blowout (United States)

    Socolofsky, Scott A.; Adams, E. Eric; Sherwood, Christopher R.


    Hydrocarbons released following the Deepwater Horizon (DH) blowout were found in deep, subsurface horizontal intrusions, yet there has been little discussion about how these intrusions formed. We have combined measured (or estimated) observations from the DH release with empirical relationships developed from previous lab experiments to identify the mechanisms responsible for intrusion formation and to characterize the DH plume. Results indicate that the intrusions originate from a stratification-dominated multiphase plume characterized by multiple subsurface intrusions containing dissolved gas and oil along with small droplets of liquid oil. Unlike earlier lab measurements, where the potential density in ambient water decreased linearly with elevation, at the DH site it varied quadratically. We have modified our method for estimating intrusion elevation under these conditions and the resulting estimates agree with observations that the majority of the hydrocarbons were found between 800 and 1200 m.


    Directory of Open Access Journals (Sweden)

    Dmitri Olegovitch Sivakov


    Full Text Available As it is known, the water law regulates dynamic social relationships concerning study, usage and protection of water objects, as well as their transformation. The water law explicitly regulates water economic activities. The regulatory method of the water law has a mixed nature and thus is not distinctive. It predetermines in some cases equality and independence of subjects of relationships (water usage agreement and in other – power and submission (permissive nature of water usage. The aim of the publication is to promote scientific ideas about the fate of the water law in order to make a further polygonal and productive discussion in which the reader is invited to participate. Scientific novelty. In 2016 the monograph of D.O. Sivakov “Water law: dynamics, problems, perspectives: monograph” (second edition, reviewed and updated. Moscow: Stolitsa, 2016. 540 p. was published. In 2017 the author reconsidered some conclusions of his monograph and applied scientific achievements of theory of state and law in water sphere. In accordance with this, it is important to mention research of Petrov D.E. related to issues of differentiation and integration of structural formations of Russian legal system. The scientific novelty of the article includes the synthesis of ideas of the monograph and some achievements of theory of state and law. Methods of research. The author of the article relies on some collective and individual monographic studies in the sphere of theory of state and law, natural resource law, arctic law, financial law. Basic results of research. The author promotes the model of responsible water usage. This model shall be based not on the unstable balance of economic and environmental interests (which shall practically lead to the domination of economic interests, but on the obligatory combination of economic activities with technologies, ensuring maximal preservation of water resources. Responsible water usage shall mean a system of

  20. Nambe Pueblo Water Budget and Forecasting model.

    Energy Technology Data Exchange (ETDEWEB)

    Brainard, James Robert


    This report documents The Nambe Pueblo Water Budget and Water Forecasting model. The model has been constructed using Powersim Studio (PS), a software package designed to investigate complex systems where flows and accumulations are central to the system. Here PS has been used as a platform for modeling various aspects of Nambe Pueblo's current and future water use. The model contains three major components, the Water Forecast Component, Irrigation Scheduling Component, and the Reservoir Model Component. In each of the components, the user can change variables to investigate the impacts of water management scenarios on future water use. The Water Forecast Component includes forecasting for industrial, commercial, and livestock use. Domestic demand is also forecasted based on user specified current population, population growth rates, and per capita water consumption. Irrigation efficiencies are quantified in the Irrigated Agriculture component using critical information concerning diversion rates, acreages, ditch dimensions and seepage rates. Results from this section are used in the Water Demand Forecast, Irrigation Scheduling, and the Reservoir Model components. The Reservoir Component contains two sections, (1) Storage and Inflow Accumulations by Categories and (2) Release, Diversion and Shortages. Results from both sections are derived from the calibrated Nambe Reservoir model where historic, pre-dam or above dam USGS stream flow data is fed into the model and releases are calculated.

  1. Poleward intrusion in the northern Galician shelf (United States)

    Alvarez, I.; Ospina-Alvarez, N.; deCastro, M.; Varela, M.; Gomez-Gesteira, M.; Prego, R.


    The evolution of a warm water mass related to the Iberian Poleward Current (IPC) was characterized along the northern Galician shelf in November 2008 by means of Sea Surface Temperature and wind data. It was observed that under upwelling favorable conditions water temperature decreased along the northern coast and a temperature break appeared between Cape Vilano and Cape Ortegal showing a relaxation of the poleward intrusion. The effect of the IPC was also analyzed inside the Northern Galician Rias taking into account the hydrographical and biogeochemical properties measured on November 18. Water driven by the IPC was observed close to the mouth of the rias, around Cape Estaca de Bares, causing a nutrient salts decrease. Inside the rias a slight biological activity was found near surface resulting from fluvial contributions.

  2. Numerical simulation and analysis of saltwater intrusion lengths in the Pearl River Delta, China

    NARCIS (Netherlands)

    Zhang, W.; Feng, H.; Zheng, J.; Hoitink, A.J.F.; Vegt, van der M.; Zhu, Y.; Cai, H.


    In recent years, large-scale saltwater intrusion has been threatening the freshwater supply in the metropolitan cities surrounding the Pearl River delta (PRD). Therefore, a better understanding of the saltwater intrusion process in this region is necessary for local water resource management. In


    African Journals Online (AJOL)

    STREAMFLOW AND WATER QUALITY REGRESSION MODELING OF IMO RIVER SYSTEM: A CASE STUDY. ... Journal of Modeling, Design and Management of Engineering Systems ... Possible sources of contamination of Imo-river system within Nekede and Obigbo hydrological stations watershed were traced.

  4. A theoretical model of water and trade (United States)

    Dang, Qian; Konar, Megan; Reimer, Jeffrey J.; Di Baldassarre, Giuliano; Lin, Xiaowen; Zeng, Ruijie


    Water is an essential input for agricultural production. Agriculture, in turn, is globalized through the trade of agricultural commodities. In this paper, we develop a theoretical model that emphasizes four tradeoffs involving water-use decision-making that are important yet not always considered in a consistent framework. One tradeoff focuses on competition for water among different economic sectors. A second tradeoff examines the possibility that certain types of agricultural investments can offset water use. A third tradeoff explores the possibility that the rest of the world can be a source of supply or demand for a country's water-using commodities. The fourth tradeoff concerns how variability in water supplies influences farmer decision-making. We show conditions under which trade liberalization affect water use. Two policy scenarios to reduce water use are evaluated. First, we derive a target tax that reduces water use without offsetting the gains from trade liberalization, although important tradeoffs exist between economic performance and resource use. Second, we show how subsidization of water-saving technologies can allow producers to use less water without reducing agricultural production, making such subsidization an indirect means of influencing water use decision-making. Finally, we outline conditions under which riskiness of water availability affects water use. These theoretical model results generate hypotheses that can be tested empirically in future work.

  5. Water sound recognition based on physical models


    Guyot, Patrice; PINQUIER, Julien; André-Obrecht, Régine


    This article describes an audio signal processing algorithm to detect water sounds, built in the context of a larger system aiming to monitor daily activities of elderly people. While previous proposals for water sound recognition relied on classical machine learning and generic audio features to characterize water sounds as a flow texture, we describe here a recognition system based on a physical model of air bubble acoustics. This system is able to recognize a wide variety of water sounds a...

  6. Integrated water resources modelling for assessing sustainable water governance (United States)

    Skoulikaris, Charalampos; Ganoulis, Jacques; Tsoukalas, Ioannis; Makropoulos, Christos; Gkatzogianni, Eleni; Michas, Spyros


    Climatic variations and resulting future uncertainties, increasing anthropogenic pressures, changes in political boundaries, ineffective or dysfunctional governance of natural resources and environmental degradation are some of the most fundamental challenges with which worldwide initiatives fostering the "think globally, act locally" concept are concerned. Different initiatives target the protection of the environment through sustainable development; Integrated Water Resources Management (IWRM) and Transboundary Water Resources Management (TWRM) in the case of internationally shared waters are frameworks that have gained wide political acceptance at international level and form part of water resources management planning and implementation on a global scale. Both concepts contribute in promoting economic efficiency, social equity and environmental sustainability. Inspired by these holistic management approaches, the present work describes an effort that uses integrated water resources modelling for the development of an integrated, coherent and flexible water governance tool. This work in which a sequence of computer based models and tools are linked together, aims at the evaluation of the sustainable operation of projects generating renewable energy from water as well as the sustainability of agricultural demands and environmental security in terms of environmental flow under various climatic and operational conditions. More specifically, catchment hydrological modelling is coupled with dams' simulation models and thereafter with models dedicated to water resources management and planning,while the bridging of models is conducted through geographic information systems and custom programming tools. For the case of Mesta/Nestos river basin different priority rules in the dams' operational schedule (e.g. priority given to power production as opposed to irrigation needs and vice versa), as well as different irrigation demands, e.g. current water demands as opposed to

  7. Modeling Benthic Sediment Processes to Predict Water ... (United States)

    The benthic sediment acts as a huge reservoir of particulate and dissolved material (within interstitial water) which can contribute to loading of contaminants and nutrients to the water column. A benthic sediment model is presented in this report to predict spatial and temporal benthic fluxes of nutrients and chemicals in Narragansett Bay. A benthic sediment model is presented in this report to identify benthic flux into the water column in Narragansett Bay. Benthic flux is essential to properly model water quality and ecology in estuarine and coastal systems.


    African Journals Online (AJOL)

    The upper reaches of Imo-river system between Nekede and Obigbo hydrological stations (a stretch of 24km) have been studied for the purpose of water quality and streamflow modeling. Model's applications on water supply to Nekede and Obigbo communities were equally explored with the development of mass curves.

  9. A Theoretical Model of Water and Trade (United States)

    Dang, Q.; Konar, M.; Reimer, J.; Di Baldassarre, G.; Lin, X.; Zeng, R.


    Water is an essential factor of agricultural production. Agriculture, in turn, is globalized through the trade of food commodities. In this paper, we develop a theoretical model of a small open economy that explicitly incorporates water resources. The model emphasizes three tradeoffs involving water decision-making that are important yet not always considered within the existing literature. One tradeoff focuses on competition for water among different sectors when there is a shock to one of the sectors only, such as trade liberalization and consequent higher demand for the product. A second tradeoff concerns the possibility that there may or may not be substitutes for water, such as increased use of sophisticated irrigation technology as a means to increase crop output in the absence of higher water availability. A third tradeoff explores the possibility that the rest of the world can be a source of supply or demand for a country's water-using products. A number of propositions are proven. For example, while trade liberalization tends to increase water use, increased pressure on water supplies can be moderated by way of a tax that is derivable with observable economic phenomena. Another example is that increased riskiness of water availability tends to cause water users to use less water than would be the case under profit maximization. These theoretical model results generate hypotheses that can be tested empirically in future work.


    Directory of Open Access Journals (Sweden)

    Adetayo F. Adetayo F.


    Full Text Available Vertical electrical sounding (VES and Induced Polarisation (IP methods of geophysical survey were incorporated with  physiochemical analysis of well water samples to determine vertical extent of petroleum-product contamination in subsurface soils and groundwater from bulk-fuel storage and distribution terminals in Iganmu area of Lagos. Interpreted results of VES and IP revealed four geoelectric layers. Clay with resistivity and IP values ranging from 1.5 - 14 m and 50 - 400mV/V respectively was encountered at the last layer penetrated by the survey except in four VES stations where the clay horizon was delineated at the third layer. This implies that subsurface aquifer is sealed by impervious layer which possibly prevents it from being contaminated by hydrocarbon and other refuse materials from the surface. Borehole log and electrical resistivity survey from a control site within the area were also incorporated with the geophysical measurements and these confirm lithologic similarity and the presence of a sealant above the aquifer layer. In addition to this, the results of the physical and geochemical analyses carried out on groundwater samples from shallow wells within the pack show very negligible level of hydrocarbon contamination which has no serious environmental implications on subsurface water in the area. However, electrical conductivity, salinity and TDS values obtained show high level of dissolved minerals (salts making the water highly saline and unsuitable for drinking being far above recommended values for drinking water. We thus inferred that Lagos lagoon must haveinvaded the aquifer in some places leading to high salinity observed.

  11. Characteristics of active seawater intrusion (United States)

    Badaruddin, Sugiarto; Werner, Adrian D.; Morgan, Leanne K.


    The inland migration of seawater in coastal aquifers, known as seawater intrusion (SWI), can be categorised as passive or active, depending on whether the hydraulic gradient slopes downwards towards the sea or the land, respectively. Despite active SWI occurring in many locations, it has received considerably less attention than passive SWI. In this study, active SWI caused by an inland freshwater head decline (FHD) is characterised using numerical modelling of various idealised unconfined coastal aquifer settings. Relationships between key features of active SWI (e.g., interface characteristics and SWI response time-scales) and the parameters of the problem (e.g., inland FHD, freshwater-seawater density contrast, dispersivity, hydraulic conductivity, porosity and aquifer thickness) are explored for the first time. Sensitivity analyses show that the SWI response time-scales under active SWI situations are influenced by both the initial and final boundary head differences. The interface is found to be steeper under stronger advection (i.e., caused by the inland FHD), higher dispersivity and hydraulic conductivity, and lower aquifer thickness, seawater density and porosity. The interface movement is faster and the mixing zone is wider with larger hydraulic conductivity, seawater-freshwater density difference, and aquifer thickness, and with lower porosity. Dimensionless parameters (Peclet number and mixed convection ratio) from previous steady-state analyses offer only limited application to the controlling factors of passive SWI, and are not applicable to active SWI. The current study of active SWI highlights important functional relationships that improve the general understanding of SWI, which has otherwise been founded primarily on steady-state and passive SWI.

  12. MOVIH-IDS: A mobile-visualization hybrid intrusion detection system


    Herrero Cosío, Álvaro; Corchado Rodríguez, Emilio; Pellicer Figueras, María A.; Abraham, Ajith P.


    A novel hybrid artificial intelligent system for Intrusion Detection, called MOVIH-IDS, is presented in this study. A hybrid model built by means of a multiagent system that incorporates an unsupervised connectionist Intrusion Detection System (IDS) has been defined to guaranty an efficient computer network security architecture. This hybrid IDS facilitates the intrusion detection in dynamic networks, in a more flexible and adaptable manner. The proposed improvement of the system in this pape...

  13. Tracking salinity intrusions in a coastal forested freshwater wetland system (United States)

    Anand D. Jayakaran; Thomas M. Williams; William H. Conner


    Coastal forested freshwater wetlands are sentinel sites for salinity intrusions associated with large, tidally influenced, storm-driven or drought-induced incursions of estuarine waters into freshwater ecosystems. These incursions may also be exacerbated by rising sea levels associated with climate change.

  14. An Experimental Study of Contaminant Intrusion Through Pipe Cracks (United States)

    This report describes a series of experiments conducted at U.S. EPA’s Test and Evaluation Facility in 2013-2014 to study the intrusion of contaminated soil water into a pipe crack during simulated backflow events. A test rig was used consisting of a 3’ x 3’ x 3’ acrylic soil bo...

  15. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    Abstract. An experimental realization of a simple non-intrusive refractometer sensor is demonstrated in this communication. The working principle of the sensor is based on intensity modulation of the back-reflected light when output light from an optical fibre end focusses onto air–medium interface. The change in the ...

  16. Non-Intrusive Appliance Recognition

    NARCIS (Netherlands)

    Hoogsteen, G; Hoogsteen, Gerwin; Krist, J.O.; Bakker, Vincent; Smit, Gerardus Johannes Maria


    Energy conservation becomes more important nowadays. The use of smart meters and, in the near future, smart appliances, are the key to achieve reduction in energy consumption. This research proposes a non-intrusive appliance monitor and recognition system for implementation on an embedded system.

  17. A software tool for network intrusion detection

    CSIR Research Space (South Africa)

    Van der Walt, C


    Full Text Available This presentation illustrates how a recently developed software tool enables operators to easily monitor a network and detect intrusions without requiring expert knowledge of network intrusion detections....

  18. Water quality modelling of Jadro spring. (United States)

    Margeta, J; Fistanic, I


    Management of water quality in karst is a specific problem. Water generally moves very fast by infiltration processes but far more by concentrated flows through fissures and openings in karst. This enables the entire surface pollution to be transferred fast and without filtration into groundwater springs. A typical example is the Jadro spring. Changes in water quality at the spring are sudden, but short. Turbidity as a major water quality problem for the karst springs regularly exceeds allowable standards. Former practice in problem solving has been reduced to intensive water disinfection in periods of great turbidity without analyses of disinfection by-products risks for water users. The main prerequisite for water quality control and an optimization of water disinfection is the knowledge of raw water quality and nature of occurrence. The analysis of monitoring data and their functional relationship with hydrological parameters enables establishment of a stochastic model that will help obtain better information on turbidity in different periods of the year. Using the model a great number of average monthly and extreme daily values are generated. By statistical analyses of these data possibility of occurrence of high turbidity in certain months is obtained. This information can be used for designing expert system for water quality management of karst springs. Thus, the time series model becomes a valuable tool in management of drinking water quality of the Jadro spring.

  19. A system model for water management. (United States)

    Schenk, Colin; Roquier, Bastien; Soutter, Marc; Mermoud, André


    Although generally accepted as a necessary step to improve water management and planning, integrated water resources management (IWRM) methodology does not provide a clear definition of what should be integrated. The various water-related issues that IWRM might encompass are well documented in the literature, but they are generally addressed separately. Therefore, water management lacks a holistic, systems-based description, with a special emphasis on the interrelations between issues. This article presents such a system model for water management, including a graphical representation and textual descriptions of the various water issues, their components, and their interactions. This model is seen as an aide-memoire and a generic reference, providing background knowledge helping to elicit actual system definitions, in possible combination with other participatory systems approaches. The applicability of the model is demonstrated through its application to two test case studies.

  20. Excess water generation during reaction-inducing intrusion of granitic melts into ultramafic rocks at crustal P-T conditions in the Sør Rondane Mountains of East Antarctica (United States)

    Uno, Masaoki; Okamoto, Atsushi; Tsuchiya, Noriyoshi


    Arc magmas are one of the main sources of aqueous geofluids in the crust, and the movement of fluids above magma chambers has been geophysically imaged. Here, we constrain the water budget (i.e., supply, consumption and release of H2O) in these areas above magma chamber by examining the hydration caused by crust-melt reactions in the Sør Rondane Mountains of East Antarctica. The study area contains a phlogopite-pargasite-peridotite unit that has been intruded by numerous granitic dikes, creating hydration reaction zones at the dike-peridotite boundary. These reactions occurred at 0.5 GPa and 700 °C, corresponding to middle crustal conditions, and generated a series of reaction zones with distance from the granitic dikes as follows: (i) granitic dike, (ii) pargasite-actinolite zone, (iii) tremolite-phlogopite zone, (iv) anthophyllite-phlogopite zone, (v) phlogopite-olivine-orthopyroxene zone, and (vi) unaltered pargasite-phlogopite peridotite. The presence of amphiboles with a preferred orientation perpendicular to the dike margins and an absence of Cr-rich magnetite indicate that the pargasite-actinolite zone [zone (ii)] grew from the dike margins as a result of the dike reacting with the host rock, with an initial melt/rock boundary located between zones (ii) and (iii). The H2O contents of reaction zones (ii)-(v) are higher than the content in the hosting pargasite-phlogopite peridotite, suggesting that the intrusion of the dike was associated with hydration reactions. Geochemical analysis along a profile through the reaction zones indicates Mg and Fe depletion, and Si enrichment in zones (iii)-(iv), and Ca depletion and K enrichment in zones (iv)-(v) relative to the hosting pargasite-phlogopite peridotite. In contrast, zone (ii) is characterized by Ca, Fe, and Mg enrichments relative to the granitic dike. These observations suggest that the reaction zone sequence was formed by the elemental transfer between granitic dike and parasite-phlogopite peridotite: Ca

  1. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection. (United States)

    Hu, Weiming; Gao, Jun; Wang, Yanguo; Wu, Ou; Maybank, Stephen


    Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.

  2. Introduction to gravity currents and intrusions

    CERN Document Server

    Ungarish, Marius


    The whole book is well written in a clear and pedagogical general style. … the author has, in my opinion, produced the first comprehensive book entirely devoted to the modeling of gravity currents and intrusions. This book will be particularly useful to graduate and PhD students, as well as to academics and research engineers working in this field. It may be used as a self-consistent document to get a detailed idea of the state of knowledge about a given problem or a guide toward more specialized papers. It is rich with ideas regarding the direction in which further research is warranted. This

  3. Sulfide intrusion and detoxification in Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne


    Sulfide intrusion in seagrasses represents a global threat to seagrasses. In contrast seegrasses grow in hostile sediments, where they are constantly exposed to sulfide intrusion. Little is known about the strategies to survive sulfide intrusion, if there are detoxification mechanisms and sulfur ...

  4. Estimating salinity intrusion effects due to climate change along the Grand Strand of the South Carolina coast (United States)

    Conrads, Paul; Roehl, Edwin A.; Sexton, Charles T.; Tufford, Daniel L.; Carbone, Gregory J.; Dow, Kristin; Cook, John B.


    The ability of water-resource managers to adapt to future climatic change is especially challenging in coastal regions of the world. The East Coast of the United States falls into this category given the high number of people living along the Atlantic seaboard and the added strain on resources as populations continue to increase, particularly in the Southeast. Increased temperatures, changes in regional precipitation regimes, and potential increased sea level would have a great impact on existing hydrological systems in the region. Six reservoirs in North Carolina discharge into the Pee Dee River, which flows 160 miles through South Carolina to the coastal communities near Myrtle Beach, SC. During the Southeast’s record-breaking drought from 1998 to 2002, salinity intrusions inundated a coastal municipal freshwater intake, limiting water supplies. Salinity intrusion results from the interaction of three principal forces - streamflow, mean tidal water levels, and tidal range. To analyze, model, and simulate hydrodynamic behaviors at critical coastal streamgages along the Atlantic Intracoastal Waterway (AIW) near Myrtle Beach, SC, data-mining techniques were applied to over 20 years of hourly streamflow, coastal water-quality, and water-level data. Artificial neural network (ANN) models were trained to learn the variable interactions that cause salinity intrusions. Streamflow from the 12,700 square-mile Pee Dee River Basin that flows into the AIW are input to the model as time-delayed variables and accumulated tributary inflows. Tidal inputs to the models were obtained by decomposing tidal water-level data into a “periodic” signal of tidal range and a “chaotic” signal of mean water levels. The ANN models were able to convincingly reproduce historical behaviors and generate alternative scenarios of interest. To evaluate the impact of climate change on salinity intrusion, inputs of streamflows and mean tidal water levels were modified to incorporate estimated

  5. Molecular Gut Content Profiling to Investigate the In Situ Grazing and Selectivity of Dolioletta gegenbauri in Summer Continental Shelf Intrusion Waters of the South Atlantic Bight, USA (United States)

    Walters, T. L.; Frazier, L.; Gibson, D. M.; Paffenhofer, G. A.; Frischer, M. E.


    Gelatinous metazooplankton play a crucial role in marine planktonic food webs and it has been suggested that they may become increasingly important in the Future Ocean. However, largely due to methodological challenges and reliance on laboratory cultivation approaches, the in situ diet of zooplankton with complex life histories and diverse prey choices remains poorly investigated. This is particularly true for the gelatinous zooplankton including the pelagic tunicate, Dolioletta gegenbauri that form large blooms in productive subtropical continental shelf environments. To investigate the diet of D. gegenbauri we developed a molecular gut profiling approach based on the use of a Peptide Nucleic Acid (PNA) PCR blocker. Using a doliolid-specific PNA blocker, it was possible to enrich the amplification of prey and parasite DNA from whole animal DNA extracts of doliolids. Gut contents from the water column, wild and captive-fed doliolids were profiled after PNA-PCR by denaturing HPLC (dHPLC), clone library and next generation sequencing (NGS) approaches. Studies were conducted during 5 summer cruises in the mid-shelf of the South Atlantic Bight. Comparison of gut profiles to available prey in the water column revealed evidence of prey selection towards larger prey species, including diatoms, dinoflagelletes and also metazoan prey that were likely captured as larvae and eggs. Wild-caught doliolids contained significantly more metazoan sequences than did the captive-fed doliolids. Ingestion of metazoan prey suggests that metazoans may contribute both the nutrition of doliolids and the potential role of doliolids as trophic cascade agents in continental shelf pelagic food webs.

  6. Storm Water Management Model Reference Manual Volume ... (United States)

    SWMM is a dynamic rainfall-runoff simulation model used for single event or long-term (continuous) simulation of runoff quantity and quality from primarily urban areas. The runoff component of SWMM operates on a collection of subcatchment areas that receive precipitation and generate runoff and pollutant loads. The routing portion of SWMM transports this runoff through a system of pipes, channels, storage/treatment devices, pumps, and regulators. SWMM tracks the quantity and quality of runoff generated within each subcatchment, and the flow rate, flow depth, and quality of water in each pipe and channel during a simulation period comprised of multiple time steps. The reference manual for this edition of SWMM is comprised of three volumes. Volume I describes SWMM’s hydrologic models, Volume II its hydraulic models, and Volume III its water quality and low impact development models. Reference manual presenting underlying mathematics of the Storm Water Management Model - Volume III Water Quality Modules

  7. Modelling stable water isotopes: Status and perspectives

    Directory of Open Access Journals (Sweden)

    Werner M.


    Full Text Available Modelling of stable water isotopes H2 18O and HDO within various parts of the Earth’s hydrological cycle has clearly improved our understanding of the interplay between climatic variations and related isotope fractionation processes. In this article key principles and major research results of stable water isotope modelling studies are described. Emphasis is put on research work using explicit isotope diagnostics within general circulation models as this highly complex model setup bears many resemblances with studies using simpler isotope modelling approaches.

  8. The role of compassion, suffering, and intrusive thoughts in dementia caregiver depression. (United States)

    Schulz, Richard; Savla, Jyoti; Czaja, Sara J; Monin, Joan


    Exposure to suffering of a relative or friend increases the risk for psychological and physical morbidity. However, little is known about the mechanisms that account for this effect. We test a theoretical model that identifies intrusive thoughts as a mediator of the relation between perceived physical and psychological suffering of the care recipient and caregiver depression. We also assess the role of compassion as a moderator of the relation between perceived suffering and intrusive thoughts. Hispanic and African American caregivers (N = 108) of persons with dementia were assessed three times within a one-year period. Using multilevel modeling, we assessed the mediating role of intrusive thoughts in the relation between perceived physical and psychological suffering and CG depression, and we tested moderated mediation to assess the role of caregiver compassion in the relation between perceived suffering and intrusive thoughts. The effects of perceived physical suffering on depression were completely mediated through intrusive thoughts, and compassion moderated the relation between physical suffering and intrusive thoughts. Caregivers who had greater compassion reported more intrusive thoughts even when perceived physical suffering of the CR was low. For perceived psychological suffering, the effects of suffering on depression were partially mediated through intrusive thoughts. Understanding the role of intrusive thoughts and compassion in familial relationships provides new insights into mechanisms driving caregiver well-being and presents new opportunities for intervention.

  9. Management of aquifer recharge in Lebanon by removing seawater intrusion from coastal aquifers. (United States)

    Masciopinto, Costantino


    This study investigates the feasibility of management of aquifer recharge (MAR) in Lebanon by designing well barriers to remove seawater intrusion from the fractured carbonate aquifers. Groundwater flow and saltwater/freshwater 50% sharp interface have been modeled along the coastal area using the Ghyben-Herzberg theory. The groundwater flow simulations have been supported by field transmissivity estimations and depth measurements carried out on 44 wells during 2003. Results have shown the seawater intrusion in coastal aquifers at Jieh and Damour regions. Three well-injection barriers have been proposed. The water volumes for recharge and the barrier positions have been defined by means of groundwater flow simulations. MAR can provide a valuable contribution to colloid (even pathogen) removal from injectant water, although during water infiltration in subsoil the reduction of aquifer permeability causes clogging. A simple new model for estimating the soil-rock permeability reduction due to the well clogging has been presented. The MAR, including the soil aquifer treatment at Damour and Jieh regions, has been studied by considering aquifer transmissivity (and soil porosity) reduction caused by clogging. Furthermore, the appropriate mixing of the injectant water by using reclaimed water, groundwater and surface water can be simulated using the proposed models. The time required to achieve 5% of rock permeability reduction at the proposed well barriers ranged from 71 to 935 d, by changing water quality and flow rate for recharge. This study can assist regional governments with water management in areas affected by scarcity of freshwater by implementing appropriate well-barrier projects. Copyright © 2013 Elsevier Ltd. All rights reserved.

  10. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    seawater intrusion phenomenon in coastal aquifers within a management model, and. (iii) motivate the future formulation of ... simulation model was applied to an aquifer system and the aquifer responses were analysed. These aquifer responses are ..... CPU time required for a single steady state simulation, on the average, ...

  11. Modelling anisotropic water transport in polymer composite ...

    Indian Academy of Sciences (India)

    This work reports anisotropic water transport in a polymer composite consisting of an epoxy matrix reinforced with aligned triangular bars made of vinyl ester. By gravimetric experiments, water diffusion in resin and polymer composites were characterized. Parameters for Fickian diffusion and polymer relaxation models were ...

  12. Seawater intrusion and pumping wells in coastal aquifers (United States)

    Nadjafzadeh Anvar, Amir; Riva, Monica


    Coastal aquifers are affected by seawater intrusion (SWI), this problem is exacerbated by groundwater extractions. In this work, we analyze key parameters affecting pumping wells contamination in costal aquifers. The USGS SUTRA code is employed to solve numerically flow and transport and to characterize SWI under diverse groundwater withdrawal scenarios. We developed two- and three-dimensional variable-density flow and solute transport models, respectively representing the existence of a pumping well barrier and of a single pumping well. The impact of the joint extraction of fresh- and salt- water has also been considered. We then analyzed the effect of (i) the location and pumping rate of fresh- and salt- water pumping wells (ii) the permeability of the aquifer as well as (iii) the transverse and longitudinal dispersivity on the maximum pumping time, tmax. The latter is defined as the maximum freshwater pumping time preventing the well to be contaminated by salt water. Finally we derived empirical equations to be used in practical applications to evaluate tmax as a function of key parameters highlighted.

  13. Development of Ensemble Model Based Water Demand Forecasting Model (United States)

    Kwon, Hyun-Han; So, Byung-Jin; Kim, Seong-Hyeon; Kim, Byung-Seop


    In recent years, Smart Water Grid (SWG) concept has globally emerged over the last decade and also gained significant recognition in South Korea. Especially, there has been growing interest in water demand forecast and optimal pump operation and this has led to various studies regarding energy saving and improvement of water supply reliability. Existing water demand forecasting models are categorized into two groups in view of modeling and predicting their behavior in time series. One is to consider embedded patterns such as seasonality, periodicity and trends, and the other one is an autoregressive model that is using short memory Markovian processes (Emmanuel et al., 2012). The main disadvantage of the abovementioned model is that there is a limit to predictability of water demands of about sub-daily scale because the system is nonlinear. In this regard, this study aims to develop a nonlinear ensemble model for hourly water demand forecasting which allow us to estimate uncertainties across different model classes. The proposed model is consist of two parts. One is a multi-model scheme that is based on combination of independent prediction model. The other one is a cross validation scheme named Bagging approach introduced by Brieman (1996) to derive weighting factors corresponding to individual models. Individual forecasting models that used in this study are linear regression analysis model, polynomial regression, multivariate adaptive regression splines(MARS), SVM(support vector machine). The concepts are demonstrated through application to observed from water plant at several locations in the South Korea. Keywords: water demand, non-linear model, the ensemble forecasting model, uncertainty. Acknowledgements This subject is supported by Korea Ministry of Environment as "Projects for Developing Eco-Innovation Technologies (GT-11-G-02-001-6)

  14. Incorporation of salinity in Water Availability Modeling (United States)

    Wurbs, Ralph A.; Lee, Chihun


    SummaryNatural salt pollution from geologic formations in the upper watersheds of several large river basins in the Southwestern United States severely constrains the use of otherwise available major water supply sources. The Water Rights Analysis Package modeling system has been routinely applied in Texas since the late 1990s in regional and statewide planning studies and administration of the state's water rights permit system, but without consideration of water quality. The modeling system was recently expanded to incorporate salinity considerations in assessments of river/reservoir system capabilities for supplying water for environmental, municipal, agricultural, and industrial needs. Salinity loads and concentrations are tracked through systems of river reaches and reservoirs to develop concentration frequency statistics that augment flow frequency and water supply reliability metrics at pertinent locations for alternative water management strategies. Flexible generalized capabilities are developed for using limited observed salinity data to model highly variable concentrations imposed upon complex river regulation infrastructure and institutional water allocation/management practices.

  15. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot


    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  16. Sustainable conjunctive water management in irrigated agriculture: Model formulation and application to the Yaqui Valley, Mexico (United States)

    Schoups, Gerrit; Addams, C. Lee; Minjares, José Luis; Gorelick, Steven M.


    This paper investigates strategies to alleviate the effects of droughts on the profitability and sustainability of irrigated agriculture. These strategies include conjunctive management of surface water and groundwater resources, and engineered improvements such as lining of irrigation canals and addition of regional pumping well capacity. A spatially distributed simulation-optimization model was developed for an irrigated system consisting of multiple surface water reservoirs and an alluvial aquifer. The simulation model consists of an agronomic component and simulators describing the hydrologic system. The physical models account for storage and flow through the reservoirs, routing through the irrigation canals, and regional groundwater flow. The agronomic model describes crop productivity as a function of irrigation quantity and salinity, and determines agricultural profit. A profit maximization problem was formulated and solved using large-scale constrained gradient-based optimization. The model was applied to a real-world conjunctive surface water/groundwater management problem in the Yaqui Valley, an irrigated agricultural region in Sonora, Mexico. The model reproduces recorded reductions in agricultural production during a historical drought. These reductions were caused by a decline in surface water availability and limited installed pumping capacity. Results indicate that the impact of the historical 8-year drought could have been significantly reduced without affecting profit in wet years by better managing surface water and groundwater resources. Namely, groundwater could have been more heavily relied upon and surface water allocation capped at a sustainable level as an operating rule. Lining the irrigation canals would have resulted in water savings of 30% of historical reservoir releases during wet years, which could have been used in subsequent drier years to increase agricultural production. The benefits of a greater reliance on groundwater pumping

  17. Longitudinal Relations of Intrusive Parenting and Effortful Control to Ego-Resiliency during Early Childhood (United States)

    Taylor, Zoe E.; Eisenberg, Nancy; Spinrad, Tracy L.; Widaman, Keith F.


    Longitudinal relations among ego-resiliency (ER), effortful control (EC), and observed intrusive parenting were examined at 18, 30, and 42 months of age ("Ns" = 256, 230, and 210) using structural equation modeling. Intrusive parenting at 18 and 30 months negatively predicted EC a year later, over and above earlier levels. EC at…

  18. Numerical Simulations, Mean Field Theory and Modulational Stability Analysis of Thermohaline Intrusions (United States)


    the temporal and spatial variability of the ocean circulation (Schmitt, 2003). This signifies that these thermohaline intrusions cannot be ignored...still calculating the net effects of double diffusion via crude parameterizations, the study showed that the thermohaline circulations in the model...SIMULATIONS, MEAN FIELD THEORY AND MODULATIONAL STABLITY ANALYSIS OF THERMOHALINE INTRUSIONS by Mark A. Hebert September 2011 Thesis Advisor

  19. WaterSense Program: Methodology for National Water Savings Analysis Model Indoor Residential Water Use

    Energy Technology Data Exchange (ETDEWEB)

    Whitehead, Camilla Dunham; McNeil, Michael; Dunham_Whitehead, Camilla; Letschert, Virginie; della_Cava, Mirka


    The U.S. Environmental Protection Agency (EPA) influences the market for plumbing fixtures and fittings by encouraging consumers to purchase products that carry the WaterSense label, which certifies those products as performing at low flow rates compared to unlabeled fixtures and fittings. As consumers decide to purchase water-efficient products, water consumption will decline nationwide. Decreased water consumption should prolong the operating life of water and wastewater treatment facilities.This report describes the method used to calculate national water savings attributable to EPA?s WaterSense program. A Microsoft Excel spreadsheet model, the National Water Savings (NWS) analysis model, accompanies this methodology report. Version 1.0 of the NWS model evaluates indoor residential water consumption. Two additional documents, a Users? Guide to the spreadsheet model and an Impacts Report, accompany the NWS model and this methodology document. Altogether, these four documents represent Phase One of this project. The Users? Guide leads policy makers through the spreadsheet options available for projecting the water savings that result from various policy scenarios. The Impacts Report shows national water savings that will result from differing degrees of market saturation of high-efficiency water-using products.This detailed methodology report describes the NWS analysis model, which examines the effects of WaterSense by tracking the shipments of products that WaterSense has designated as water-efficient. The model estimates market penetration of products that carry the WaterSense label. Market penetration is calculated for both existing and new construction. The NWS model estimates savings based on an accounting analysis of water-using products and of building stock. Estimates of future national water savings will help policy makers further direct the focus of WaterSense and calculate stakeholder impacts from the program.Calculating the total gallons of water the

  20. Why seawater intrusion has not yet occurred in the Kaluvelli-Pondicherry basin, Tamil Nadu, India (United States)

    Vincent, Aude; Violette, Sophie


    Worldwide, coastal aquifers are threatened by seawater intrusion. The threat is greatest when aquifers are overexploited or when recharge is low due to a semi-arid or arid climate. The Kaluvelli-Pondicherry sedimentary basin in Tamil Nadu (India) presents both these characteristics. Groundwater levels in the Vanur aquifer can reach 50 m below sea level at less than 20 km inland. This groundwater depletion is due to an exponential increase in extraction for irrigation over 35 years. No seawater intrusion has yet been detected, but a sulphate-rich mineralization is observed, the result of upward vertical leakage from the underlying Ramanathapuram aquifer. To characterize the mechanisms involved, and to facilitate effective water management, hydrogeological numerical modelling of this multi-layered system has been conducted. Existing and acquired geological and hydrodynamic data have been applied to a quasi-3D hydrogeological model, NEWSAM. Recharge had been previously quantified through the inter-comparison of hydrological models, based on climatological and surface-flow field measurements. Sensitivity tests on parameters and boundary conditions associated with the sea were performed. The resulting water balances for each aquifer led to hypotheses of (1) an offshore fresh groundwater stock, and (2) a reversal and increase of the upward leakage from the Ramanathapuram aquifer, thus corroborating the hypothesis proposed to explain geochemical results of the previous study, and denying a seawater intrusion. Palaeo-climate review supports the existence of favourable hydro-climatological conditions to replenish an offshore groundwater stock of the Vanur aquifer in the past. The extent of this fresh groundwater stock was calculated using the Kooi and Groen method.

  1. Coastal Marsh Monitoring for Persistent Saltwater Intrusion (United States)

    Hall, Callie M.


    This viewgraph presentation reviews NASA's work on the project that supports the Gulf of Mexico Alliance (GOMA) Governors Action Plan to monitor the coastal wetlands for saltwater intrusion. The action items that relate to the task are: (1) Obtain information on projected relative sea level rise, subsidence, and storm vulnerability to help prioritize conservation projects, including restoration, enhancement, and acquisition, and (2) Develop and apply ecosystem models to forecast the habitat structure and succession following hurricane disturbance and changes in ecological functions and services that impact vital socio-economic aspects of coastal systems. The objectives of the program are to provide resource managers with remote sensing products that support ecosystem forecasting models requiring salinity and inundation data. Specifically, the proposed work supports the habitat-switching modules in the Coastal Louisiana Ecosystem Assessment and Restoration (CLEAR) model, which provides scientific evaluation for restoration management.

  2. Modeling climate change impacts on water trading. (United States)

    Luo, Bin; Maqsood, Imran; Gong, Yazhen


    This paper presents a new method of evaluating the impacts of climate change on the long-term performance of water trading programs, through designing an indicator to measure the mean of periodic water volume that can be released by trading through a water-use system. The indicator is computed with a stochastic optimization model which can reflect the random uncertainty of water availability. The developed method was demonstrated in the Swift Current Creek watershed of Prairie Canada under two future scenarios simulated by a Canadian Regional Climate Model, in which total water availabilities under future scenarios were estimated using a monthly water balance model. Frequency analysis was performed to obtain the best probability distributions for both observed and simulated water quantity data. Results from the case study indicate that the performance of a trading system is highly scenario-dependent in future climate, with trading effectiveness highly optimistic or undesirable under different future scenarios. Trading effectiveness also largely depends on trading costs, with high costs resulting in failure of the trading program. (c) 2010 Elsevier B.V. All rights reserved.

  3. Robustness of river basin water quality models

    NARCIS (Netherlands)

    de Blois, Chris; Wind, H.G.; de Kok, Jean-Luc; Koppeschaar, K.


    In this paper the concept of robustness is introduced and applied to a model for the analysis of the impacts of spatially distributed policy measures on the surface water quality on a river basin scale. In this model the influence of precipitation on emissions and resuspension of pollutants in the

  4. New challenges in integrated water quality modelling

    NARCIS (Netherlands)

    Rode, M.; Arhonditsis, G.; Balin, D.; Kebede, T.; Krysanova, V.; Griensven, A.; Zee, van der S.E.A.T.M.


    There is an increasing pressure for development of integrated water quality models that effectively couple catchment and in-stream biogeochemical processes. This need stems from increasing legislative requirements and emerging demands related to contemporary climate and land use changes. Modelling

  5. Modeling terahertz heating effects on water

    DEFF Research Database (Denmark)

    Kristensen, Torben T.L.; Withayachumnankul, Withawat; Jepsen, Peter Uhd


    We apply Kirchhoff’s heat equation to model the influence of a CW terahertz beam on a sample of water, which is assumed to be static. We develop a generalized model, which easily can be applied to other liquids and solids by changing the material constants. If the terahertz light source is focused...

  6. Storm Water Management Model Applications Manual (United States)

    The EPA Storm Water Management Model (SWMM) is a dynamic rainfall-runoff simulation model that computes runoff quantity and quality from primarily urban areas. This manual is a practical application guide for new SWMM users who have already had some previous training in hydrolog...

  7. Modelling water uptake efficiency of root systems (United States)

    Leitner, Daniel; Tron, Stefania; Schröder, Natalie; Bodner, Gernot; Javaux, Mathieu; Vanderborght, Jan; Vereecken, Harry; Schnepf, Andrea


    Water uptake is crucial for plant productivity. Trait based breeding for more water efficient crops will enable a sustainable agricultural management under specific pedoclimatic conditions, and can increase drought resistance of plants. Mathematical modelling can be used to find suitable root system traits for better water uptake efficiency defined as amount of water taken up per unit of root biomass. This approach requires large simulation times and large number of simulation runs, since we test different root systems under different pedoclimatic conditions. In this work, we model water movement by the 1-dimensional Richards equation with the soil hydraulic properties described according to the van Genuchten model. Climatic conditions serve as the upper boundary condition. The root system grows during the simulation period and water uptake is calculated via a sink term (after Tron et al. 2015). The goal of this work is to compare different free software tools based on different numerical schemes to solve the model. We compare implementations using DUMUX (based on finite volumes), Hydrus 1D (based on finite elements), and a Matlab implementation of Van Dam, J. C., & Feddes 2000 (based on finite differences). We analyse the methods for accuracy, speed and flexibility. Using this model case study, we can clearly show the impact of various root system traits on water uptake efficiency. Furthermore, we can quantify frequent simplifications that are introduced in the modelling step like considering a static root system instead of a growing one, or considering a sink term based on root density instead of considering the full root hydraulic model (Javaux et al. 2008). References Tron, S., Bodner, G., Laio, F., Ridolfi, L., & Leitner, D. (2015). Can diversity in root architecture explain plant water use efficiency? A modeling study. Ecological modelling, 312, 200-210. Van Dam, J. C., & Feddes, R. A. (2000). Numerical simulation of infiltration, evaporation and shallow

  8. The use of data-mining techniques for developing effective decisionsupport systems: A case study of simulating the effects ofclimate change on coastal salinity intrusion (United States)

    Conrads, Paul; Edwin Roehl, Jr.


    Natural-resource managers and stakeholders face difficult challenges when managing interactions between natural and societal systems. Potential changes in climate could alter interactions between environmental and societal systems and adversely affect the availability of water resources in many coastal communities. The availability of freshwater in coastal streams can be threatened by saltwater intrusion. Even though the collective interests and computer skills of the community of managers, scientists and other stakeholders are quite varied, there is an overarching need for equal access by all to the scientific knowledge needed to make the best possible decisions. This paper describes a decision support system, PRISM-2, developed to evaluate salinity intrusion due to potential climate change along the South Carolina coast in southeastern USA. The decision support system is disseminated as a spreadsheet application and integrates the output of global circulation models, watershed models and salinity intrusion models with real-time databases for simulation, graphical user interfaces, and streaming displays of results. The results from PRISM-2 showed that a 31-cm and 62-cm increase in sea level reduced the daily availability of freshwater supply to a coastal municipal intake by 4% and 12% of the time, respectively. Future climate change projections by a global circulation model showed a seasonal change in salinity intrusion events from the summer to the fall for the majority of events.

  9. The Community Water Model (CWATM) / Development of a community driven global water model (United States)

    Burek, Peter; Satoh, Yusuke; Greve, Peter; Kahil, Taher; Wada, Yoshihide


    With a growing population and economic development, it is expected that water demands will increase significantly in the future, especially in developing regions. At the same time, climate change is expected to alter spatial patterns of hydrological cycle and will have global, regional and local impacts on water availability. Thus, it is important to assess water supply, water demand and environmental needs over time to identify the populations and locations that will be most affected by these changes linked to water scarcity, droughts and floods. The Community Water Model (CWATM) will be designed for this purpose in that it includes an accounting of how future water demands will evolve in response to socioeconomic change and how water availability will change in response to climate. CWATM represents one of the new key elements of IIASA's Water program. It has been developed to work flexibly at both global and regional level at different spatial resolutions. The model is open source and community-driven to promote our work amongst the wider water community worldwide and is flexible enough linking to further planned developments such as water quality and hydro-economic modules. CWATM will be a basis to develop a next-generation global hydro-economic modeling framework that represents the economic trade-offs among different water management options over a basin looking at water supply infrastructure and demand managements. The integrated modeling framework will consider water demand from agriculture, domestic, energy, industry and environment, investment needs to alleviate future water scarcity, and will provide a portfolio of economically optimal solutions for achieving future water management options under the Sustainable Development Goals (SDG) for example. In addition, it will be able to track the energy requirements associated with the water supply system e.g., pumping, desalination and interbasin transfer to realize the linkage with the water-energy economy. In

  10. Predicting salt intrusion into freshwater aquifers resulting from CO2 injection – A study on the influence of conservative assumptions

    DEFF Research Database (Denmark)

    Walter, Lena; Binning, Philip John; Class, Holger


    . A crucial task is to choose an appropriate conceptual model and relevant scenarios. Overly conservative assumptions may lead to estimation of unacceptably high risks, and thus prevent the implementation of a CO2 storage project unnecessarily. On the other hand, risk assessment should not lead...... to an underestimation of hazards. This study compares two conceptual model approaches for the numerical simulation of brine-migration scenarios through a vertical fault and salt intrusion into a fresh water aquifer. The first approach calculates salt discharge into freshwater using an immiscible two-phase model......-phase model is applied in the CO2 storage reservoir and spatially coupled to a single-phase (water) two-component (water, salt) model, where salt mass fraction is a variable. A Dirichlet–Neumann technique is used for the coupling conditions at the interface of the two models. The results show...

  11. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    The complete semantic intrusion detection system is developed using JAVA. JAVA based rule engine ESPER is used for modelling the complex events. The system has two modes of opera- tions namely Simulation mode, and Real time mode. In the Simulation mode the system supports and handles the data generated by a ...

  12. Drastic change of the intrusion-extrusion behavior of electrolyte solutions in pure silica *BEA-type zeolite. (United States)

    Ryzhikov, A; Khay, I; Nouali, H; Daou, T J; Patarin, J


    High pressure water and electrolyte solutions intrusion-extrusion experiments in pure-silica *BEA-type zeolite (zeosil β) were performed in order to study the performances of these systems in energy absorption and storage. The "zeosil β-water" system displays a bumper behavior with an intrusion pressure of 53 MPa and an absorbed energy of 8.3 J g(-1). For the "zeosil β-LiCl aqueous solutions" systems the intrusion pressure increases with the LiCl concentration to 95, 111 and 115 MPa for 10, 15 and 20 M solution, respectively. However, for concentrations above 10 M, a transformation of the system behavior from bumper to shock-absorber is observed. The zeolite samples were characterized by several structural and physicochemical methods (XRD, TGA, solid-state NMR, N2 physisorption, ICP-OES) before and after intrusion-extrusion experiments in order to understand the influence of the LiCl concentration on the intrusion-extrusion behavior. It is shown that the intrusion of water and LiCl solutions with low concentration leads to the formation of Si-(OSi)3OH groups, whereas no defects are observed under intrusion of concentrated LiCl solutions. A possible mechanism of LiCl solution intrusion based on separate intrusion of H2O molecules and Li(H2O)x(+) ions is proposed.

  13. Dual integral porosity shallow water model for urban flood modelling (United States)

    Guinot, Vincent; Sanders, Brett F.; Schubert, Jochen E.


    With CPU times 2 to 3 orders of magnitude smaller than classical shallow water-based models, the shallow water equations with porosity are a promising tool for large-scale modelling of urban floods. In this paper, a new model formulation called the Dual Integral Porosity (DIP) model is presented and examined analytically and computationally with a series of benchmark tests. The DIP model is established from an integral mass and momentum balance whereby both porosity and flow variables are defined separately for control volumes and boundaries, and a closure scheme is introduced to link control volume- and boundary-based flow variables. Previously developed Integral Porosity (IP) models were limited to a single set of flow variables. A new transient momentum dissipation model is also introduced to account for the effects of sub-grid scale wave action on porosity model solutions, effects which are validated by fine-grid solutions of the classical shallow-water equations and shown to be important for achieving similarity in dam-break solutions. One-dimensional numerical test cases show that the proposed DIP model outperforms the IP model, with significantly improved wave propagation speeds, water depths and discharge calculations. A two-dimensional field scale test case shows that the DIP model performs better than the IP model in mapping the floods extent and is slightly better in reproducing the anisotropy of the flow field when momentum dissipation parameters are calibrated.

  14. Modeling of the Global Water Cycle - Analytical Models (United States)

    Yongqiang Liu; Roni Avissar


    Both numerical and analytical models of coupled atmosphere and its underlying ground components (land, ocean, ice) are useful tools for modeling the global and regional water cycle. Unlike complex three-dimensional climate models, which need very large computing resources and involve a large number of complicated interactions often difficult to interpret, analytical...

  15. Applying the WEAP Model to Water Resource

    DEFF Research Database (Denmark)

    Gao, Jingjing; Christensen, Per; Li, Wei

    in assessing the effects on water resources using a case study on a Coal Industry Development Plan in an arid region in North Western China. In the case the WEAP model (Water Evaluation And Planning System) were used to simulate various scenarios using a diversity of technological instruments like irrigation...... thus providing a good basis for an SEA that can support the choice among different alternative scenarios and contribute to adjusting and optimizing the original plan....

  16. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O


    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development.......  Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial...

  17. Urban Runoff and Water Quality Models

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jong Tae [Kyonggi University, Suwon (Korea)


    The characteristics of storm and water quality are investigated based on the measuring data of the test river, the Hongje. The water quality of the test river is generally good comparing to other urban rivers in Seoul, because of the interception of sewer flow. But this system makes the river dry up for 3-4 months in winter. On the other hand, in rainy period the storm from the combined sewer system causes rapid increasing pollutants loads. In order to simulate the urban storm and water quality of the test basin, the models such as SWMM, ILLUDAS, STORM, HEC-1 were applied and the results are compared in its applicability and accuracy aspects. All models discussed here have shown good results and it seems that SWMM is the most effective model in simulating both quantity and quality. Also, regression relations between the water quantity and quality were derived and their applicabilities were discussed. This regression model is a simple effective tool for estimating the pollutant loads in the rainy period, but if the amount of discharge is bigger than measuring range of raw data, the accuracy becomes poor. This model could be supplemented by expanding the range of collecting data and introducing the river characteristics. The HEC-1 would be another effective model to simulate storm runoff of a river basin including urban area. (author). 15 refs., 13 tabs., 13 figs.

  18. Modelling batch microwave heating of water (United States)

    Yeong, S. P.; Law, M. C.; Lee, C. C. Vincent; Chan, Y. S.


    A numerical model of the microwave heating of distilled water is developed using COMSOL Multiphysics software to investigate the microwave effects on the heating rate. Three frequencies (0.915GHz, 2GHz and 2.45 GHz) have been applied in the model in order to study their influences on the water temperature. It is found that the water heats up at 2GHz and 2.45GHz, however, there is no sign of heating at 915MHz. This is supported with the figures of the electric field distribution in the microwave cavity. The results shown in the developed model is validated with the experimental results obtained at 2.45 GHz.

  19. Klang River water quality modelling using music (United States)

    Zahari, Nazirul Mubin; Zawawi, Mohd Hafiz; Muda, Zakaria Che; Sidek, Lariyah Mohd; Fauzi, Nurfazila Mohd; Othman, Mohd Edzham Fareez; Ahmad, Zulkepply


    Water is an essential resource that sustains life on earth; changes in the natural quality and distribution of water have ecological impacts that can sometimes be devastating. Recently, Malaysia is facing many environmental issues regarding water pollution. The main causes of river pollution are rapid urbanization, arising from the development of residential, commercial, industrial sites, infrastructural facilities and others. The purpose of the study was to predict the water quality of the Connaught Bridge Power Station (CBPS), Klang River. Besides that, affects to the low tide and high tide and. to forecast the pollutant concentrations of the Biochemical Oxygen Demand (BOD) and Total Suspended Solid (TSS) for existing land use of the catchment area through water quality modeling (by using the MUSIC software). Besides that, to identifying an integrated urban stormwater treatment system (Best Management Practice or BMPs) to achieve optimal performance in improving the water quality of the catchment using the MUSIC software in catchment areas having tropical climates. Result from MUSIC Model such as BOD5 at station 1 can be reduce the concentration from Class IV to become Class III. Whereas, for TSS concentration from Class III to become Class II at the station 1. The model predicted a mean TSS reduction of 0.17%, TP reduction of 0.14%, TN reduction of 0.48% and BOD5 reduction of 0.31% for Station 1 Thus, from the result after purposed BMPs the water quality is safe to use because basically water quality monitoring is important due to threat such as activities are harmful to aquatic organisms and public health.

  20. [Analysis of intrusion errors in free recall]. (United States)

    Diesfeldt, H F A


    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  1. Interactive Water Resources Modeling and Model Use: An Overview (United States)

    Loucks, Daniel P.; Kindler, Janusz; Fedra, Kurt


    This serves as an introduction for the following sequence of five papers on interactive water resources and environmental management, policy modeling, and model use. We review some important shortcomings of many management and policy models and argue for improved human-computer-model interaction and communication. This interaction can lead to more effective model use which in turn should facilitate the exploration, analysis, and synthesis of alternative designs, plans, and policies by those directly involved in the planning, management, or policy making process. Potential advantages of interactive modeling and model use, as well as some problems and research needs, are discussed.

  2. Modelling of water potential and water uptake rate of tomato plants in the greenhouse: preliminary results.

    NARCIS (Netherlands)

    Bruggink, G.T.; Schouwink, H.E.; Gieling, Th.H.


    A dynamic model is presented which predicts water potential and water uptake rate of greenhouse tomato plants using transpiration rate as input. The model assumes that water uptake is the resultant of water potential and hydraulic resistance, and that water potential is linearly related to water

  3. Global modelling of Cryptosporidium in surface water (United States)

    Vermeulen, Lucie; Hofstra, Nynke


    Introduction Waterborne pathogens that cause diarrhoea, such as Cryptosporidium, pose a health risk all over the world. In many regions quantitative information on pathogens in surface water is unavailable. Our main objective is to model Cryptosporidium concentrations in surface waters worldwide. We present the GloWPa-Crypto model and use the model in a scenario analysis. A first exploration of global Cryptosporidium emissions to surface waters has been published by Hofstra et al. (2013). Further work has focused on modelling emissions of Cryptosporidium and Rotavirus to surface waters from human sources (Vermeulen et al 2015, Kiulia et al 2015). A global waterborne pathogen model can provide valuable insights by (1) providing quantitative information on pathogen levels in data-sparse regions, (2) identifying pathogen hotspots, (3) enabling future projections under global change scenarios and (4) supporting decision making. Material and Methods GloWPa-Crypto runs on a monthly time step and represents conditions for approximately the year 2010. The spatial resolution is a 0.5 x 0.5 degree latitude x longitude grid for the world. We use livestock maps ( combined with literature estimates to calculate spatially explicit livestock Cryptosporidium emissions. For human Cryptosporidium emissions, we use UN population estimates, the WHO/UNICEF JMP sanitation country data and literature estimates of wastewater treatment. We combine our emissions model with a river routing model and data from the VIC hydrological model ( to calculate concentrations in surface water. Cryptosporidium survival during transport depends on UV radiation and water temperature. We explore pathogen emissions and concentrations in 2050 with the new Shared Socio-economic Pathways (SSPs) 1 and 3. These scenarios describe plausible future trends in demographics, economic development and the degree of global integration. Results and

  4. Groundwater salinity in a floodplain forest impacted by saltwater intrusion (United States)

    Kaplan, David A.; Muñoz-Carpena, Rafael


    Coastal wetlands occupy a delicate position at the intersection of fresh and saline waters. Changing climate and watershed hydrology can lead to saltwater intrusion into historically freshwater systems, causing plant mortality and loss of freshwater habitat. Understanding the hydrological functioning of tidally influenced floodplain forests is essential for advancing ecosystem protection and restoration goals, however finding direct relationships between hydrological inputs and floodplain hydrology is complicated by interactions between surface water, groundwater, and atmospheric fluxes in variably saturated soils with heterogeneous vegetation and topography. Thus, an alternative method for identifying common trends and causal factors is required. Dynamic factor analysis (DFA), a time series dimension reduction technique, models temporal variation in observed data as linear combinations of common trends, which represent unexplained common variability, and explanatory variables. DFA was applied to model shallow groundwater salinity in the forested floodplain wetlands of the Loxahatchee River (Florida, USA), where altered watershed hydrology has led to changing hydroperiod and salinity regimes and undesired vegetative changes. Long-term, high-resolution groundwater salinity datasets revealed dynamics over seasonal and yearly time periods as well as over tidal cycles and storm events. DFA identified shared trends among salinity time series and a full dynamic factor model simulated observed series well (overall coefficient of efficiency, Ceff = 0.85; 0.52 ≤ Ceff ≤ 0.99). A reduced multilinear model based solely on explanatory variables identified in the DFA had fair to good results (Ceff = 0.58; 0.38 ≤ Ceff ≤ 0.75) and may be used to assess the effects of restoration and management scenarios on shallow groundwater salinity in the Loxahatchee River floodplain.

  5. Groundwater salinity in a floodplain forest impacted by saltwater intrusion. (United States)

    Kaplan, David A; Muñoz-Carpena, Rafael


    Coastal wetlands occupy a delicate position at the intersection of fresh and saline waters. Changing climate and watershed hydrology can lead to saltwater intrusion into historically freshwater systems, causing plant mortality and loss of freshwater habitat. Understanding the hydrological functioning of tidally influenced floodplain forests is essential for advancing ecosystem protection and restoration goals, however finding direct relationships between hydrological inputs and floodplain hydrology is complicated by interactions between surface water, groundwater, and atmospheric fluxes in variably saturated soils with heterogeneous vegetation and topography. Thus, an alternative method for identifying common trends and causal factors is required. Dynamic factor analysis (DFA), a time series dimension reduction technique, models temporal variation in observed data as linear combinations of common trends, which represent unexplained common variability, and explanatory variables. DFA was applied to model shallow groundwater salinity in the forested floodplain wetlands of the Loxahatchee River (Florida, USA), where altered watershed hydrology has led to changing hydroperiod and salinity regimes and undesired vegetative changes. Long-term, high-resolution groundwater salinity datasets revealed dynamics over seasonal and yearly time periods as well as over tidal cycles and storm events. DFA identified shared trends among salinity time series and a full dynamic factor model simulated observed series well (overall coefficient of efficiency, Ceff=0.85; 0.52≤Ceff≤0.99). A reduced multilinear model based solely on explanatory variables identified in the DFA had fair to good results (Ceff=0.58; 0.38≤Ceff≤0.75) and may be used to assess the effects of restoration and management scenarios on shallow groundwater salinity in the Loxahatchee River floodplain. Copyright © 2014 Elsevier B.V. All rights reserved.

  6. Tell me more: Can a memory test reduce analogue traumatic intrusions? (United States)

    Krans, Julie; Näring, Gérard; Holmes, Emily A; Becker, Eni S


    Information processing theories of post-traumatic stress disorder (PTSD) state that intrusive images emerge due to a lack of integration of perceptual trauma representations in autobiographical memory. To test this hypothesis experimentally, participants were shown an aversive film to elicit intrusive images. After viewing, they received a recognition test for just one part of the film. The test contained neutrally formulated items to rehearse information from the film. Participants reported intrusive images for the film in an intrusion diary during one week after viewing. In line with expectations, the number of intrusive images decreased only for the part of the film for which the recognition test was given. Furthermore, deliberate cued-recall memory after one week was selectively enhanced for the film part that was in the recognition test a week before. The findings provide new evidence supporting information processing models of PTSD and have potential implications for early interventions after trauma.

  7. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic


    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  8. Installed water resource modelling systems for catchment ...

    African Journals Online (AJOL)

    Following international trends there are a growing number of modelling systems being installed for integrated water resource management, in Southern Africa. Such systems are likely to be installed for operational use in ongoing learning, research, strategic planning and consensus-building amongst stakeholders in the ...

  9. Impacts of seawater intrusion on soil salinity and alkalinity in Bafra Plain, Turkey. (United States)

    Arslan, Hakan; Demir, Yusuf


    This study was carried out to investigate possible seawater intrusion into groundwater along the coastal lines of the Bafra Plain and salinity-alkalinity problems over land areas irrigated with water exposed to seawater intrusion were evaluated. For this purpose, 32 groundwater wells were selected over the plain, water samples were taken from these wells between October 2007 and September 2008, and chemical analyses were performed over these samples. Soil samples were taken from the fields irrigated with this water at 32 different locations at the end of the irrigation season in September 2008 from 0-30, 30-60, 60-90, and 90-120 cm soil depths and textures. EC, pH, Na, Ca, Mg, and K analyses were performed over these samples. Excessive seawater intrusion was observed in some parts of the plain and impacts of seawater intrusion decreased with the distance from the coastal line. It was determined that groundwater quality was significantly affected from seawater intrusion. Salinity and especially alkalinity problems were observed in land areas irrigated with this water and alkalinity increased with the rate of intrusion.

  10. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and....... Forward modeling of closed system fractional crystallization constrained by cumulate volumes, whole rock and mineral compositions, mineral modes and independent constraints on Fe isotope fractionation factors account for the stratigraphic relations, except during the final stages of differentiation...

  11. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña


    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  12. Enhanced Chlorophyll Concentrations Induced by Kuroshio Intrusion Fronts in the Northern South China Sea (United States)

    Guo, Lin; Xiu, Peng; Chai, Fei; Xue, Huijie; Wang, Dongxiao; Sun, Jun


    New evidences were provided that Kuroshio intrusion in winter is able to increase phytoplankton growth in the open ocean of the northern South China Sea (SCS) based on multiple data sources. Strong fronts due to Kuroshio intrusion and interactions with the SCS water are associated with intense upwelling, supplying high nutrients from the subsurface SCS water and increasing phytoplankton productivity in the frontal region. High chlorophyll is more dynamically related to these fronts than to the alongshore wind, wind stress curl, and eddy kinetic energy on interannual time scale. Further examinations suggest that fronts associated with Kuroshio intrusion into the SCS are linked with large-scale climate variability. During El Niño years, stronger Kuroshio intrusion results in stronger fronts that generate intensified local upwelling and enhanced Luzon winter blooms.

  13. A new physical barrier system for seawater intrusion control (United States)

    Abdoulhalik, Antoifi; Ahmed, Ashraf; Hamill, G. A.


    The construction of subsurface physical barriers is one of various methods used to control seawater intrusion (SWI) in coastal aquifers. This study proposes the mixed physical barrier (MPB) as a new barrier system for seawater intrusion control, which combines an impermeable cutoff wall and a semi-permeable subsurface dam. The effect of the traditionally-used physical barriers on transient saltwater wedge dynamics was first explored for various hydraulic gradients, and the workability of the MPB was thereafter thoroughly analysed. A newly developed automated image analysis based on light-concentration conversion was used in the experiments, which were completed in a porous media tank. The numerical code SEAWAT was used to assess the consistency of the experimental data and examine the sensitivity of the performance of the barriers to various key parameters. The results show that the MPB induced a visible lifting of the dense saline flux upward towards the outlet by the light freshwater. This saltwater lifting mechanism, observed for the first time, induced significant reduction to the saline water intrusion length. The use of the MPB yielded up to 62% and 42% more reduction of the saltwater intrusion length than the semi-permeable dam and the cutoff wall, respectively. The performance achieved by the MPB with a wall depth of 40% of the aquifer thickness was greater than that of a single cutoff wall with a penetration depth of 90% of the aquifer thickness (about 13% extra reduction). This means that the MPB could produce better seawater intrusion reduction than the traditionally used barriers at even lower cost.

  14. A comparison study of water impact and water exit models

    Directory of Open Access Journals (Sweden)

    Korobkin Alexander


    Full Text Available In problems of global hydroelastic ship response in severe seas including the whipping problem, we need to know the hydrodynamic forces acting on the ship hull during almost arbitrary ship motions. In terms of ship sections, some of them can enter water but others exit from water. Computations of nonlinear free surface flows, pressure distributions and hydrodynamic forces in parallel with the computations of the ship motions including elastic vibrations of the ship hull are time consuming and are suitable only for research purposes but not for practical calculations. In this paper, it is shown that the slamming forces can be decomposed in two components within three semi-analytical models of water entry. Only heave motion is considered. The first component is proportional to the entry speed squared and the second one to the body acceleration. The coefficients in these two components are functions of the penetration depth only and can be precomputed for given shape of the body. During the exit stage the hydrodynamic force is proportional to the acceleration of the body and independent of the body shape for bodies with small deadrise angles.

  15. Intrusive thoughts and theory of mind

    Directory of Open Access Journals (Sweden)

    Đorđević Mirjana


    Full Text Available Intrusive thoughts represent the cognitive construct which is manifested through internal, repetitive, unwanted and unacceptable thoughts, images or impulses. Intrusive thoughts may be present both in clinical and general population. Usual intrusive thoughts that occur in typical population can turn into pathological and lead to the occurrence of psychiatric disorders due to mistaken beliefs about an individual's intrusive thoughts, as well as due to the use of inappropriate strategies as a reaction to these thoughts. The aim of this paper is to emphasize the importance of the cohesion of theory of mind construct and the ability to understand the intrusive thoughts by reviewing the available literature. The theory of mind is the ability to understand and attribute different mental states to oneself and others - thoughts, wishes, desires intentions, etc. The research results show that the knowledge of thoughts is associated with the reporting on intrusive thoughts, and that people who have better results on theory of mind tasks at the same time effectively report on their own intrusive thoughts. Failure to report on intrusive thoughts and limited ability to understand the possibilities of consciousness control may adversely affect the therapeutic process.

  16. Intrusive images in grief : An exploratory study

    NARCIS (Netherlands)

    Boelen, Paul A.; Huntjens, Rafaele J. C.


    The relevance of intrusive mental imagery to the understanding and treatment of psychological disorders is increasingly acknowledged. Little research has been done on intrusive imagery in grief. Using a sample of 131 mourners, recruited from professional and lay mental health care workers, the

  17. Intrusion detection using secure signatures (United States)

    Nelson, Trent Darnel; Haile, Jedediah


    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  18. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song


    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  19. Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks. (United States)

    Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae


    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  20. Extension by faulting, stretching and magma intrusion in Ethiopia (United States)

    Bastow, I. D.; Keir, D.


    The 2001-2004 Ethiopia Afar Geoscientific Lithospheric Experiment showed that high seismic wavespeed, dense, mafic crustal intrusions exist beneath many zones of Quaternary magmatism in the Main Ethiopian rift, and that crustal thinning is minimal. From these observations, a consensus quickly emerged that extension presently occurs not by ductile stretching and brittle faulting but by magma intrusion. Striking InSAR images and accompanying seismic data from the 2005 Afar diking episode provided further compelling evidence in support of the magma assisted rifting hypothesis. Patterns of mantle seismic anisotropy, constrained by a combination of body and surface-wave analysis showed that melt intrusion likely also plays an important role in accommodating extension at greater depths in the extending plate. Evidence from further north in Afar, however, where crustal thickness decreases abruptly into the Danakil Depression, is not so easily explained by the magma assisted rifting hypothesis. Subsidence of the newly forming margin towards and below sea level, and eruption of voluminous basalt flows, is likely the result of late-stage thinning of the heavily intruded, weakened plate just before the onset of seafloor spreading. Faulting, stretching and magma intrusion are thus each important, but at different times during breakup. Combining, not isolating, these mechanisms of strain in new rifting models and appreciating how plate strength varies during rifting is essential in developing a clearer understanding of the incomplete geological record that documents continental breakup over time.

  1. Intrusion of the Kuroshio into the South and East China Seas. (United States)

    Wu, Chau-Ron; Wang, You-Lin; Lin, Yong-Fu; Chao, Shenn-Yu


    The northward-flowing Kuroshio often intrudes westward and modulates the water masses of the South and East China Seas. These intrusions transcend multiple scales in time and space, which we demonstrate here using various independent data sets. There are two hot spots of intrusion, one in the Luzon Strait and the other off northeast Taiwan, which occur synchronously when the upstream Kuroshio weakens during winter. Beyond seasonal time scales, the two intrusions were not synchronous during 1993-2013. While intrusions into the South China Sea echoed the Pacific Decadal Oscillation, the intrusion northeast of Taiwan decreased markedly before 2002 but regularly reached the shelf thereafter. This change was due to the influence of westward impingements of cyclonic eddies from the open ocean on the Kuroshio main stream in place of anticyclonic eddies. During 1993-2001, decreasing cyclonic eddy impingements moved the Kuroshio away from northeast Taiwan, weakening the Kuroshio intrusion onto the East China Sea shelf. Thereafter, enhanced cyclonic eddy impingement during 2002-2013 weakened the Kuroshio transport, moving it closer to the shelf and enhancing its intrusion into the East China Sea.

  2. Modeling of soil-water-structure interaction

    DEFF Research Database (Denmark)

    Tang, Tian

    in the surrounding water, are calculated using a linear elastic solver. Finally, the direct wave loads on the seabed and the indirect wave loads on the seabed-structure interface through the structure are provided as input for a dynamic soil response calculation. Simulation results in general demonstrate that...... to dynamic ocean waves. The goal of this research project is to develop numerical soil models for computing realistic seabed response in the interacting offshore environment, where ocean waves, seabed and offshore structure highly interact with each other. The seabed soil models developed are based...... as the developed nonlinear soil displacements and stresses under monotonic and cyclic loading. With the FVM nonlinear coupled soil models as a basis, multiphysics modeling of wave-seabed-structure interaction is carried out. The computations are done in an open source code environment, OpenFOAM, where FVM models...

  3. Integrated Water Resources Simulation Model for Rural Community (United States)

    Li, Y.-H.; Liao, W.-T.; Tung, C.-P.


    The purpose of this study is to develop several water resources simulation models for residence houses, constructed wetlands and farms and then integrate these models for a rural community. Domestic and irrigation water uses are the major water demand in rural community. To build up a model estimating domestic water demand for residence houses, the average water use per person per day should be accounted first, including water uses of kitchen, bathroom, toilet and laundry. On the other hand, rice is the major crop in the study region, and its productive efficiency sometimes depends on the quantity of irrigation water. The water demand can be estimated by crop water use, field leakage and water distribution loss. Irrigation water comes from rainfall, water supply system and reclaimed water which treated by constructed wetland. In recent years, constructed wetlands play an important role in water resources recycle. They can purify domestic wastewater for water recycling and reuse. After treating from constructed wetlands, the reclaimed water can be reused in washing toilets, watering gardens and irrigating farms. Constructed wetland is one of highly economic benefits for treating wastewater through imitating the processing mechanism of natural wetlands. In general, the treatment efficiency of constructed wetlands is determined by evapotranspiration, inflow, and water temperature. This study uses system dynamics modeling to develop models for different water resource components in a rural community. Furthermore, these models are integrated into a whole system. The model not only is utilized to simulate how water moves through different components, including residence houses, constructed wetlands and farms, but also evaluates the efficiency of water use. By analyzing the flow of water, the water resource simulation model can optimizes water resource distribution under different scenarios, and the result can provide suggestions for designing water resource system of a

  4. The modeling of response indicators of integrated water resources ...

    African Journals Online (AJOL)

    models were used to model and predict the relationship between water resources mobilization WRM and ... (WRM) and response variables were applied to ... of water management and education ... ANN models are mathematical tools,.

  5. Understanding transport in model water desalination membranes (United States)

    Chan, Edwin

    Polyamide based thin film composites represent the the state-of-the-art nanofiltration and reverse osmosis membranes used in water desalination. The performance of these membranes is enabled by the ultrathin (~100 nm) crosslinked polyamide film in facilitating the selective transport of water over salt ions. While these materials have been refined over the last several decades, understanding the relationships between polyamide structure and membrane performance remains a challenge because of the complex and heterogeneous nature of the polyamide film. In this contribution, we present our approach to addressing this challenge by studying the transport properties of model polyamide membranes synthesized via molecular layer-by-layer (mLbL) assembly. First, we demonstrate that mLbL can successfully construct polyamide membranes with well-defined nanoscale thickness and roughness using a variety of monomer formulations. Next, we present measurement tools for characterizing the network structure and transport of these model polyamide membranes. Specifically, we used X-ray and neutron scattering techniques to characterize their structure as well as a recently-developed indentation based poromechanics approach to extrapolate their water diffusion coefficient. Finally, we illustrate how these measurements can provide insight into the original problem by linking the key polyamide network properties, i.e. water-polyamide interaction parameter and characteristic network mesh size, to the membrane performance.

  6. Lattice model for water-solute mixtures. (United States)

    Furlan, A P; Almarza, N G; Barbosa, M C


    A lattice model for the study of mixtures of associating liquids is proposed. Solvent and solute are modeled by adapting the associating lattice gas (ALG) model. The nature of interaction of solute/solvent is controlled by tuning the energy interactions between the patches of ALG model. We have studied three set of parameters, resulting in, hydrophilic, inert, and hydrophobic interactions. Extensive Monte Carlo simulations were carried out, and the behavior of pure components and the excess properties of the mixtures have been studied. The pure components, water (solvent) and solute, have quite similar phase diagrams, presenting gas, low density liquid, and high density liquid phases. In the case of solute, the regions of coexistence are substantially reduced when compared with both the water and the standard ALG models. A numerical procedure has been developed in order to attain series of results at constant pressure from simulations of the lattice gas model in the grand canonical ensemble. The excess properties of the mixtures, volume and enthalpy as the function of the solute fraction, have been studied for different interaction parameters of the model. Our model is able to reproduce qualitatively well the excess volume and enthalpy for different aqueous solutions. For the hydrophilic case, we show that the model is able to reproduce the excess volume and enthalpy of mixtures of small alcohols and amines. The inert case reproduces the behavior of large alcohols such as propanol, butanol, and pentanol. For the last case (hydrophobic), the excess properties reproduce the behavior of ionic liquids in aqueous solution.

  7. Modeling regulated water utility investment incentives (United States)

    Padula, S.; Harou, J. J.


    This work attempts to model the infrastructure investment choices of privatized water utilities subject to rate of return and price cap regulation. The goal is to understand how regulation influences water companies' investment decisions such as their desire to engage in transfers with neighbouring companies. We formulate a profit maximization capacity expansion model that finds the schedule of new supply, demand management and transfer schemes that maintain the annual supply-demand balance and maximize a companies' profit under the 2010-15 price control process in England. Regulatory incentives for costs savings are also represented in the model. These include: the CIS scheme for the capital expenditure (capex) and incentive allowance schemes for the operating expenditure (opex) . The profit-maximizing investment program (what to build, when and what size) is compared with the least cost program (social optimum). We apply this formulation to several water companies in South East England to model performance and sensitivity to water network particulars. Results show that if companies' are able to outperform the regulatory assumption on the cost of capital, a capital bias can be generated, due to the fact that the capital expenditure, contrarily to opex, can be remunerated through the companies' regulatory capital value (RCV). The occurrence of the 'capital bias' or its entity depends on the extent to which a company can finance its investments at a rate below the allowed cost of capital. The bias can be reduced by the regulatory penalties for underperformances on the capital expenditure (CIS scheme); Sensitivity analysis can be applied by varying the CIS penalty to see how and to which extent this impacts the capital bias effect. We show how regulatory changes could potentially be devised to partially remove the 'capital bias' effect. Solutions potentially include allowing for incentives on total expenditure rather than separately for capex and opex and allowing

  8. Non-intrusive Load Disaggregation Based on Kernel Density Estimation (United States)

    Sen, Wang; Dongsheng, Yang; Chuchen, Guo; Shengxian, Du


    Aiming at the problem of high cost and difficult implementation of high frequency non-intrusive load decomposition method, this paper proposes a new method based on kernel density estimation(KDE) for low frequency NILM (Non-intrusive load monitoring). The method establishes power reference model of electricity load in different working conditions and appliance’s possible combinations first, then probability distribution is calculated as appliances features by kernel density estimation. After that, target power data is divided by step changes, whose distributions will be compared with reference models, and the most similar reference model will be chosen as the decomposed consequence. The proposed approach was tested with data from the GREEND public data set, it showed better performance in terms of energy disaggregation accuracy compared with many traditional NILM approaches. Our results show good performance which can achieve more than 93% accuracy in simulation.

  9. Water Quality Modeling System for Coastal Archipelagos (United States)

    Tuomi, L.; Miettunen, E.; Lukkari, K.; Puttonen, I.; Ropponen, J.; Tikka, K.; Piiparinen, J.; Lignell, R.


    Coastal seas are encountering pressures from eutrophication, fishing, ship emissions and coastal construction. Sustainable development and use of these areas require science-based guidance with high quality data and efficient tools. Our study area, the Archipelago Sea, is located in the northern part of the semi-enclosed and brackish water Baltic Sea. It is a shallow, topographically heterogeneous and eutrophic sub-basin, covered with thousands of small islands and islets. The catchment area is 8950 km2and has ca. 500 000 inhabitants. We are developing a modeling system that can be used by local authorities and in ministry level decision making to evaluate the environmental impacts that may result from decisions and changes made both in the watershed and in the coastal areas. The modeling system consists of 3D hydrodynamic model COHERENS and water quality model FICOS, both applied to the area with high spatial resolution. Models use river discharge and nutrient loading data supplied by watershed model VEMALA and include loading from multiple point sources located in the Archipelago Sea. An easy-to-use interface made specifically to answer the end-user needs, includes possibility to modify the nutrient loadings and perform model simulations to selected areas and time periods. To ensure the quality and performance of the modeling system, comprehensive measurement dataset including hydrographic, nutrient, chlorophyll-a and bottom sediment data, was gathered based on monitoring and research campaigns previously carried out in the Archipelago Sea. Verification showed that hydrodynamic model was able to simulate surface temperature and salinity fields and their seasonal variation with good accuracy in this complex area. However, the dynamics of the deeper layers need to be improved, especially in areas that have sharp bathymetric gradients. The preliminary analysis of the water quality model results showed that the model was able to reproduce the basic characteristics of

  10. The differential effect of child age on the illness intrusiveness--parent distress relationship in juvenile rheumatic disease. (United States)

    Andrews, Nicole R; Chaney, John M; Mullins, Larry L; Wagner, Janelle L; Hommel, Kevin A; Jarvis, James N


    Examine age-related patterns of association between parent-reported illness intrusiveness and parent distress in parents of youth with juvenile rheumatic diseases (JRDs). Cross-sectional multiple regression analysis tested child age as a moderator in the illness intrusiveness-distress relationship. Fifty-two parents of children ages 9-17 diagnosed with JRD. The Illness Intrusiveness Scale--Parent Version and the Brief Symptom Inventory. Parent-reported illness intrusiveness demonstrated a significant main effect on distress for all parents in the sample. This was qualified by an Illness Intrusiveness x Child Age interaction. Illness intrusiveness was found to be significantly related to distress among parents of older youth, but was only marginally related to distress for parents of younger children. Results are consistent with family life cycle development models of adjustment to childhood chronic illness. The clinical implications of the findings are also discussed.

  11. Storm Water Management Model (SWMM) | Science Inventory ... (United States)

    Stormwater discharges continue to cause impairment of our Nation’s waterbodies. Regulations that require the retention and/or treatment of frequent, small storms that dominate runoff volumes and pollutant loads are becoming more common. The U.S. Environmental Protection Agency (EPA) developed the Storm Water Management Model (SWMM) to help support local, state, and national stormwater management objectives to reduce runoff through infiltration and retention. SWMM was first developed in 1971 and has undergone several major upgrades since then. To inform the public on EPA's green infrastructure models.

  12. Negative appraisals and cognitive avoidance of intrusive memories in depression: a replication and extension. (United States)

    Williams, Alishia D; Moulds, Michelle L


    Recent research has demonstrated that intrusive negative autobiographical memories represent a shared phenomenological feature of posttraumatic stress disorder (PTSD) and depression. A preliminary investigation (Starr and Moulds, 2006) successfully applied a cognitive appraisal model of PTSD to the maintenance of intrusive memories in depression. The current investigation sought to replicate and extend these findings. Two hundred and fifty first-year undergraduate students were interviewed to assess for the presence of a negative autobiographical memory that had spontaneously intruded in the past week. Participants completed self-report inventories assessing trait and situational employment of cognitive avoidance mechanisms in response to these memories. Consistent with Starr and Moulds, intrusion-related distress correlated with dysphoria, irrespective of intrusion frequency. Assigning negative appraisals to one's intrusive memory and attempts to control the memory were positively associated with intrusion-related distress, level of depression, and cognitive avoidance mechanisms. Additionally, negative appraisals and control influenced the employment rumination as an avoidant response to a greater degree than the corresponding trait tendency. Finally, negative appraisals and the use of cognitive mechanisms were predictive of depression concurrently. The results support the validity of borrowing from PTSD models to elucidate the cognitive mechanisms that maintain intrusive memories in depressed samples.

  13. Seawater intrusion risk analysis under climate change conditions for the Gaza Strip aquifer (Palestine) (United States)

    Dentoni, Marta; Deidda, Roberto; Paniconi, Claudio; Marrocu, Marino; Lecca, Giuditta


    Seawater intrusion (SWI) has become a major threat to coastal freshwater resources, particularly in the Mediterranean basin, where this problem is exacerbated by the lack of appropriate groundwater resources management and with serious potential impacts from projected climate changes. A proper analysis and risk assessment that includes climate scenarios is essential for the design of water management measures to mitigate the environmental and socio-economic impacts of SWI. In this study a methodology for SWI risk analysis in coastal aquifers is developed and applied to the Gaza Strip coastal aquifer in Palestine. The method is based on the origin-pathway-target model, evaluating the final value of SWI risk by applying the overlay principle to the hazard map (representing the origin of SWI), the vulnerability map (representing the pathway of groundwater flow) and the elements map (representing the target of SWI). Results indicate the important role of groundwater simulation in SWI risk assessment and illustrate how mitigation measures can be developed according to predefined criteria to arrive at quantifiable expected benefits. Keywords: Climate change, coastal aquifer, seawater intrusion, risk analysis, simulation/optimization model. Acknowledgements. The study is partially funded by the project "Climate Induced Changes on the Hydrology of Mediterranean Basins (CLIMB)", FP7-ENV-2009-1, GA 244151.

  14. Monthly Water Balance Model Hydrology Futures (United States)

    Bock, Andy; Hay, Lauren E.; Markstrom, Steven; Atkinson, R. Dwight


    A monthly water balance model (MWBM) was driven with precipitation and temperature using a station-based dataset for current conditions (1950 to 2010) and selected statistically-downscaled general circulation models (GCMs) for current and future conditions (1950 to 2099) across the conterminous United States (CONUS) using hydrologic response units from the Geospatial Fabric for National Hydrologic Modeling ( Six MWBM output variables (actual evapotranspiration (AET), potential evapotranspiration (PET), runoff (RO), streamflow (STRM), soil moisture storage (SOIL), and snow water equivalent (SWE)) and the two MWBM input variables (atmospheric temperature (TAVE) and precipitation (PPT)) were summarized for hydrologic response units and aggregated at points of interest on a stream network. Results were then organized into the Monthly Water Balance Hydrology Futures database, an open-access database using netCDF format (  Methods used to calibrate and parameterize the MWBM are detailed in the Hydrology and Earth System Sciences (HESS)  paper "Parameter regionalization of a monthly water balance model for the conterminous United States" by Bock and others (2016).  See the discussion paper link in the "Related External Resources" section for access.  Supplemental data files related to the plots and data analysis in Bock and others (2016) can be found in the folder in the "Attached Files" section.  Detailed information on the files and data can be found in the ReadMe.txt contained within the zipped folder. Recommended citation of discussion paper:Bock, A.R., Hay, L.E., McCabe, G.J., Markstrom, S.L., and Atkinson, R.D., 2016, Parameter regionalization of a monthly water balance model for the conterminous United States: Hydrology and Earth System Sciences, v. 20, 2861-2876, doi:10.5194/hess-20-2861-2016, 2016

  15. Emplacement mechanisms and structural influences of a younger granite intrusion into older wall rocks - a principal study with application to the Goetemar and Uthammar granites. Site-descriptive modelling SDM-Site Laxemar

    Energy Technology Data Exchange (ETDEWEB)

    Cruden, Alexander R. (Dept. of Geology, Univ. of Toronto (Canada))


    The c. 1.80 Ga old bedrock in the Laxemar-Simpevarp area, which is the focus of the site investigation at Oskarshamn, is dominated by intrusive rocks belonging to the c. 1.86-1.65 Ga Transscandinavian Igneous Belt (TIB). However, the site investigation area is situated in between two c. 1.45 Ga old anorogenic granites, the Goetemar granite in the north and the Uthammar granite in the south. This study evaluates the emplacement mechanism of these intrusions and their structural influence on the older bedrock. Field observations and structural measurements indicate that both the Goetemar and the Uthammar granites are discordant and have not imposed any significant ductile deformation on their wall-rocks. The apparent conformity of geological contacts and fabrics in the wall rocks and the southern margin of the Goetemar granite is coincidental and inherited from the pattern of Svecokarelian deformation of the TIB. However, interpretation of regional aeromagnetic data suggests that the granites occur within a broad, NNE-SSW trending linear belt, pointing to deep seated tectonic control on their generation, ascent and emplacement. Thermochronology indicates that the granites were emplaced at depths between 4 and 8 km into brittle wall rocks. The 3-D shape of the Goetemar and Uthammar plutons has been investigated by 2.75D forward modelling of the residual gravity anomalies due to both granites. Both granites are associated with strong residual gravity anomalies of up to -10 mgal. Constraints on the geometry of the plutons at the surface are provided from surface geology maps and several deep boreholes located on or close to the model profiles. A further variable in the gravity modelling is introduced by either allowing the upper contact of the plutons to assume the most suitable orientation to produce the best fit between the modelled and observed gravity ('unconstrained models') or by forcing the near surface orientation of the contacts to be vertical (&apos

  16. Towards Reliable Evaluation of Anomaly-Based Intrusion Detection Performance (United States)

    Viswanathan, Arun


    This report describes the results of research into the effects of environment-induced noise on the evaluation process for anomaly detectors in the cyber security domain. This research was conducted during a 10-week summer internship program from the 19th of August, 2012 to the 23rd of August, 2012 at the Jet Propulsion Laboratory in Pasadena, California. The research performed lies within the larger context of the Los Angeles Department of Water and Power (LADWP) Smart Grid cyber security project, a Department of Energy (DoE) funded effort involving the Jet Propulsion Laboratory, California Institute of Technology and the University of Southern California/ Information Sciences Institute. The results of the present effort constitute an important contribution towards building more rigorous evaluation paradigms for anomaly-based intrusion detectors in complex cyber physical systems such as the Smart Grid. Anomaly detection is a key strategy for cyber intrusion detection and operates by identifying deviations from profiles of nominal behavior and are thus conceptually appealing for detecting "novel" attacks. Evaluating the performance of such a detector requires assessing: (a) how well it captures the model of nominal behavior, and (b) how well it detects attacks (deviations from normality). Current evaluation methods produce results that give insufficient insight into the operation of a detector, inevitably resulting in a significantly poor characterization of a detectors performance. In this work, we first describe a preliminary taxonomy of key evaluation constructs that are necessary for establishing rigor in the evaluation regime of an anomaly detector. We then focus on clarifying the impact of the operational environment on the manifestation of attacks in monitored data. We show how dynamic and evolving environments can introduce high variability into the data stream perturbing detector performance. Prior research has focused on understanding the impact of this

  17. Computational benefits using artificial intelligent methodologies for the solution of an environmental design problem: saltwater intrusion. (United States)

    Papadopoulou, Maria P; Nikolos, Ioannis K; Karatzas, George P


    Artificial Neural Networks (ANNs) comprise a powerful tool to approximate the complicated behavior and response of physical systems allowing considerable reduction in computation time during time-consuming optimization runs. In this work, a Radial Basis Function Artificial Neural Network (RBFN) is combined with a Differential Evolution (DE) algorithm to solve a water resources management problem, using an optimization procedure. The objective of the optimization scheme is to cover the daily water demand on the coastal aquifer east of the city of Heraklion, Crete, without reducing the subsurface water quality due to seawater intrusion. The RBFN is utilized as an on-line surrogate model to approximate the behavior of the aquifer and to replace some of the costly evaluations of an accurate numerical simulation model which solves the subsurface water flow differential equations. The RBFN is used as a local approximation model in such a way as to maintain the robustness of the DE algorithm. The results of this procedure are compared to the corresponding results obtained by using the Simplex method and by using the DE procedure without the surrogate model. As it is demonstrated, the use of the surrogate model accelerates the convergence of the DE optimization procedure and additionally provides a better solution at the same number of exact evaluations, compared to the original DE algorithm.

  18. Integrated hydrologic modeling as a key for sustainable urban water resources planning. (United States)

    Eshtawi, Tamer; Evers, Mariele; Tischbein, Bernhard; Diekkrüger, Bernd


    In this study, a coupling of surface water (SWAT), groundwater (MODFLOW) and solute transport (MT3DMS) models was performed to quantify surface-groundwater and quantity-quality interactions under urban area expansion. The responses of groundwater level, nitrate concentrations (related to human activities) and chloride concentrations (related to seawater intrusion) to urban area expansion and corresponding changes in the urban water budget were examined on a macro-scale level. The potentials of non-conventional water resources scenarios, namely desalination, stormwater harvesting and treated wastewater (TWW) reuse were investigated. In a novel analysis, groundwater improvement and deterioration under each scenario were defined in spatial-temporal approach. The quality deterioration cycle index was estimated as the ratio between the amounts of low and high quality recharge components within the Gaza Strip boundary predicted for year 2030. The improvement index for groundwater level (IIL) and the improvement index for groundwater quality (IIQ) were developed for the scenarios as measures of the effectiveness toward sustainable groundwater planning. Even though the desalination and TWW reuse scenarios reflect a noticeable improvement in the groundwater level, the desalination scenario shows a stronger tendency toward sustainable groundwater quality. The stormwater harvesting scenario shows a slight improvement in both groundwater quality and quantity. This study provides a 'corridor of options', which could facilitate future studies focusing on developing a micro-level assessment of the above scenarios. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. Intrusion Detection Systems with Live Knowledge System (United States)


    AFRL-AFOSR-JP-TR-2016-0058 Intrusion Detection Systems with Live Knowledge System Byeong Ho Kang UNIVERSITY OF TASMANIA Final Report 05/31/2016...COVERED (From - To) 20 May 2015 to 19 May 2016 4. TITLE AND SUBTITLE Intrusion Detection Systems with Live Knowledge System 5a.  CONTRACT NUMBER 5b...298 10/26/2016 Final Report for AOARD Grant FA2386-15-1-4061 “ Intrusion Detection Systems with

  20. Research on artificial neural network intrusion detection photochemistry based on the improved wavelet analysis and transformation (United States)

    Li, Hong; Ding, Xue


    This paper combines wavelet analysis and wavelet transform theory with artificial neural network, through the pretreatment on point feature attributes before in intrusion detection, to make them suitable for improvement of wavelet neural network. The whole intrusion classification model gets the better adaptability, self-learning ability, greatly enhances the wavelet neural network for solving the problem of field detection invasion, reduces storage space, contributes to improve the performance of the constructed neural network, and reduces the training time. Finally the results of the KDDCup99 data set simulation experiment shows that, this method reduces the complexity of constructing wavelet neural network, but also ensures the accuracy of the intrusion classification.

  1. Asymptotic growth laws for intrusion tongues in lock-exchange flows (United States)

    Goncharov, V. P.; Pavlov, V. I.


    The heuristic Fermi-Neumann box model is used to study the non-Boussinesq lock exchange flows in an infinite horizontal channel. This allowed us to find the asymptotic growth laws for intrusion tongues at a late stage of their development. It is shown that these laws are essentially different. The classical scenario of the linear growth x1∝t is supported only by the lower (heavy) intrusion tongue. The same is not true for the upper (light) intrusion tongue that obeys the law x2∝t /lnt .

  2. Density maximum and polarizable models of water (United States)

    Kiss, Péter T.; Baranyai, András


    To estimate accurately the density of water over a wide range of temperatures with a density maximum at 4 °C is one of the most stringent tests of molecular models. The shape of the curve influences the ability to describe critical properties and to predict the freezing temperature. While it was demonstrated that with a proper parameter fit nonpolarizable models can approximate this behavior accurately, it is much more difficult to do this for polarizable models. We provide a short overview of ρ-T diagrams for existing models, then we give an explanation of this difficulty. We present a version of the BK model [A. Baranyai and P. T. Kiss, J. Chem. Phys. 133, 144109 (2010), 10.1063/1.3490660; A. Baranyai and P. T. Kiss, J. Chem. Phys. 135, 234110 (2011)], 10.1063/1.3670962 which is capable to predict the density of water over a wide range of temperature. The BK model uses the charge-on-spring method with three Gaussian charges. Since the experimental dipole moment and the geometry is fixed, and the quadrupole moment is approximated by a least mean square procedure, parameters of the repulsion and dispersive attraction forces remained as free tools to match experimental properties. Relying on a simplified but plausible justification, the new version of the model uses repulsion and attraction as functions of the induced dipole moment of the molecule. The repulsive force increases, while the attractive force decreases with the size of the molecular dipole moment. At the same time dipole moment dependent dispersion forces are taking part in the polarization of the molecule. This scheme iterates well and, in addition to a reasonable density-temperature function, creates dipole distributions with accurate estimation of the dielectric constant of the liquid.

  3. Modeling terahertz heating effects on water. (United States)

    Kristensen, Torben T L; Withayachumnankul, Withawat; Jepsen, Peter U; Abbott, Derek


    We apply Kirchhoff's heat equation to model the influence of a CW terahertz beam on a sample of water, which is assumed to be static. We develop a generalized model, which easily can be applied to other liquids and solids by changing the material constants. If the terahertz light source is focused down to a spot with a diameter of 0.5 mm, we find that the steady-state temperature increase per milliwatt of transmitted power is 1.8?C/mW. A quantum cascade laser can produce a CW beam in the order of several milliwatts and this motivates the need to estimate the effect of beam power on the sample temperature. For THz time domain systems, we indicate how to use our model as a worst-case approximation based on the beam average power. It turns out that THz pulses created from photoconductive antennas give a negligible increase in temperature. As biotissue contains a high water content, this leads to a discussion of worst-case predictions for THz heating of the human body in order to motivate future detailed study. An open source Matlab implementation of our model is freely available for use at

  4. Modelling trihalomethanes formation in water supply systems. (United States)

    Di Cristo, Cristiana; Esposito, Giovanni; Leopardi, Angelo


    Chlorination is the most widely used method for disinfection of drinking water, but there are concerns about the formation of by-products, such as trihalomethanes (THMs), since the chronic exposure to them may pose risks to human health. For these reasons regulations fix maximum acceptable THMs levels throughout distribution networks, so it is very important to be able to correctly reproduce their formation. In the literature many models for predicting THMs formation have been developed, both based on empirical relationships and on kinetics involved during chlorine reactions. In this work the use of some of these models and their reliability in real situations is investigated through the application to the Aurunci-Valcanneto Water Supply System in Southern Lazio (Italy). The comparison of the performances of 18 selected literature empirical models furnishes interesting observations, indicating that the formula, developed using field data, results in being more suitable for reproducing THMs formation for the presented case study. Other considerations are also offered from the comparison with the results obtained using a simple first order kinetic model, calibrated using measured data.

  5. Modelling Shallow Water Wakes Using a Hybrid Turbulence Model

    Directory of Open Access Journals (Sweden)

    Clemente Rodriguez-Cuevas


    Full Text Available A numerical research with different turbulence models for shallow water equations was carried out. This was done in order to investigate which model has the ability to reproduce more accurately the wakes produced by the shock of the water hitting a submerged island inside a canal. The study of this phenomenon is important for the numerical methods application advancement in the simulation of free surface flows since these models involve a number of simplifications and assumptions that can have a significant impact on the numerical solutions quality and thus can not reproduce correctly the physical phenomenon. The numerical experiments were carried out on an experimental case under controlled conditions, consisting of a channel with a submerged conical island. The numerical scheme is based on the Eulerian-Lagrangian finite volume method with four turbulence models, three mixing lengths (ml, and one joining k-ϵ on the horizontal axis with a mixing-length model (ml on the vertical axis. The experimental results show that a k-ϵ with ml turbulence model makes it possible to approach the experimental results in a more qualitative manner. We found that when using only a k-ϵ model in the vertical and horizontal direction, the numerical results overestimate the experimental data. Additionally the computing time is reduced by simplifying the turbulence model.

  6. A web-based examination of experiences with intrusive thoughts across the adult lifespan (United States)

    Magee, Joshua C.; Smyth, Frederick L.; Teachman, Bethany A.


    Objectives Intrusive thoughts and images are common across the adult lifespan, but vary in their consequences. Understanding age-related experiences with intrusive thoughts is important for identifying risk and protective factors for intrusive thought problems across the adult lifespan. This study characterized age trajectories for six aspects of experiences with intrusive thoughts using Internet data collection. Method Participants (N=1427; ages 18–87) were randomly assigned to suppress (i.e., keep out of mind) or monitor an intrusive thought for one minute, and then later to monitor the thought for a second minute. Participants tracked thought recurrences during each thinking period, then reported their positive and negative affect following each thinking period, as well as their effort expended suppressing the thought, and perceived difficulty controlling the intrusive thought. Multilevel modeling and generalized estimating equations modeled the continuous relationships between age and each dependent variable. Results As expected, older age was associated with less decline in positive affect while engaging with an intrusive thought. Interestingly, older age was also associated with a sharper rise and fall of negative affect. Suppression effort increased linearly with age (though perceived difficulty did not). Finally, no age differences were found in either the frequency or duration of the thought’s recurrence, adding to previous evidence that older adults function similarly to younger adults in their control of intrusive thoughts, despite certain age-related declines in cognitive functioning. Conclusion These findings suggest a dissociation between age-related changes in emotional versus cognitive characteristics of engaging with intrusive thoughts. PMID:24460223

  7. Stratigraphic controls on saltwater intrusion in the Dominguez Gap area of coastal Los Angeles (United States)

    Edwards, B.D.; Ehman, K.D.; Ponti, D.J.; Reichard, E.G.; Tinsley, J.C.; Rosenbauer, R.J.; Land, M.


    The Los Angeles Basin is a densely populated coastal area that significantly depends on groundwater. A part of this groundwater supply is at risk from saltwater intrusion-the impetus for this study. High-resolution seismic-reflection data collected from the Los Angeles-Long Beach Harbor Complex have been combined with borehole geophysical and descriptive geological data from four nearby ??400-m-deep continuously cored wells and with borehole geophysical data from adjacent water and oil wells to characterize the Pliocene to Holocene stratigraphy of the Dominguez Gap coastal aquifer system. The new data are shown as a north-south, two- dimensional, sequence-stratigraphic model that is compared to existing lithostratigraphic models of the Los Angeles Basin in an attempt to better understand pathways of saltwater intrusion into coastal aquifers. Intrusion of saltwater into the coastal aquifer system generally is attributed to over-pumping that caused the hydraulic gradient to reverse during the mid-1920s. Local water managers have used the existing lithostratigraphic model to site closely spaced injection wells of freshwater (barrier projects) attempting to hydraulically control the saltwater intrusion. Improved understanding of the stratigraphic relationships can guide modifications to barrier design that will allow more efficient operation. Allostratigraphic nomenclature is used to define a new sequence-stratigraphic model for the area because the existing lithostratigraphic correlations that have been used to define aquifer systems are shown not to be time-correlative. The youngest sequence, the Holocene Dominguez sequence, contains the Gaspur aquifer at its base. The Gaspur aquifer is intruded with saltwater and consists of essentially flat-lying gravelly sands deposited by the ancestral Los Angeles River as broad channels that occupied a paleovalley incised into the coastal plain during the last glacio-eustatic highstand. The underlying sequences are deformed into

  8. Modelling of water permeability in cementitious materials

    DEFF Research Database (Denmark)

    Guang, Ye; Lura, Pietro; van Breugel, K.


    This paper presents a network model to predict the permeability of cement paste from a numerical simulation of its microstructure. Based on a linked list pore network structure, the effective hydraulic conductivity is estimated and the fluid flow is calculated according to the Hagen-Poiseuille law....... The pressure gradient at all nodes is calculated with the Gauss elimination method and the absolute permeability of the pore network is calculated directly from Darcy's law. Finally, the permeability model is validated by comparison with direct water permeability measurements. According to this model...... and by the connectivity of the pore structure, regardless of w/c ratio and curing age. The permeability of cement pastes could be predicted reasonably well when a minimum particle size 1 mu m was chosen for the cement....

  9. Alpha intrusion on ovenight polysomnogram

    Directory of Open Access Journals (Sweden)

    Nahapetian R


    Full Text Available No abstract available. Article truncated after 150 words. A 30 year-old Army veteran with a past medical history significant for chronic lumbar back pain stemming from a fall-from-height injury sustained in 2006 was referred to the sleep laboratory for evaluation of chronic fatigue and excessive daytime hypersomnolence. His Epworth sleepiness scale score was 16. He denied a history of snoring and witnessed apnea. Body Mass Index (BMI was 25.7 kg/m2. His main sleep related complaints were frequent nocturnal arousals, poor sleep quality, un-refreshing sleep, prolonged latency to sleep onset, and nightmares. An In-lab attended diagnostic polysomnogram was performed. Sleep efficiency was reduced (73% and overall arousal index was not significantly elevated (3.2 events/hour. The sleep study showed rapid eye movement (REM related sleep disordered breathing that did not meet diagnostic criteria for sleep apnea. There was no evidence for period limb movement disorder. However, the study was significant for alpha wave intrusion in stage N2 non-REM and stage ...

  10. Accounting for intrusive thoughts in PTSD: Contributions of cognitive control and deliberate regulation strategies. (United States)

    Bomyea, Jessica; Lang, Ariel J


    Persistent, trauma-related intrusive thoughts are common in individuals with posttraumatic stress disorder (PTSD). Automatic aspects of cognitive functioning (including executive functioning) and maladaptive deliberate attempts at cognitive regulation have been proposed as individual difference factors that may perpetuate intrusive thoughts. The current study sought to examine the joint contribution of these two factors on intrusive thoughts in PTSD. Forty-two women with PTSD completed an executive functioning assessment followed by a thought suppression task. Intrusive thoughts (frequency and duration), as well as participants' use of specific cognitive regulation strategies (avoidance-based thought regulation strategies; TRS), were measured during the task. Hierarchical linear regression was used to examine the interaction of executive functioning and TRS on intrusive thoughts. Greater use of TRS was associated with greater intrusive thought persistence for those with low executive functioning, but not those with high executive functioning. Data was collected cross-sectionally and the laboratory thought suppression task may not correspond to naturalistic thought regulation. Results are consistent with prior literature suggesting that certain responses deployed by individuals to control intrusive thoughts may be unhelpful, but that a higher level of cognitive capacity may mitigate this effect. Implications of these findings for recent models of cognition in PTSD are discussed. Published by Elsevier B.V.

  11. Intrusion-extrusion spring performance of -COK-14 zeolite enhanced by structural changes. (United States)

    Kirschhock, Christine E A; De Prins, Michiel; Verheijen, Elke; Ryzhikov, Andrey; Jean Daou, T; Nouali, Habiba; Taulelle, Francis; Martens, Johan A; Patarin, Joël


    -COK-14 zeolite, the variant of COK-14 (OKO topology) with a systematically interrupted framework, exhibits unusual behaviour in high pressure intrusion-extrusion cycles of 20 M LiCl solution. After the first cycle with deviating behaviour and partially irreversible intrusion, subsequent cycles show stable reversible behaviour. The system behaves like a spring with unique progressive intrusion in the range of 10-120 MPa followed by enhanced uptake before saturation. While the intrusion-extrusion cycling leads to fragmented crystals, powder diffraction reveals high crystallinity of the fragments. Based on the detailed characterisation of the zeolite samples with XRD, Rietveld refinement, N2 adsorption, TGA and (29)Si MAS NMR before and after intrusion-extrusion experiments, a model of the structure of the intruded -COK-14 samples is proposed. Intrusion-extrusion of LiCl solution systematically breaks the most strained bonds in the structure which results in a new framework connectivity with enhanced stability, which persists during the harsh intrusion-extrusion conditions.

  12. Assessing impacts of climate change, sea level rise, and drainage canals on saltwater intrusion to coastal aquifer

    Directory of Open Access Journals (Sweden)

    P. Rasmussen


    Full Text Available Groundwater abstraction from coastal aquifers is vulnerable to climate change and sea level rise because both may potentially impact saltwater intrusion and hence groundwater quality depending on the hydrogeological setting. In the present study the impacts of sea level rise and changes in groundwater recharge are quantified for an island located in the Western Baltic Sea. The low-lying central area of the investigated part of the island was extensively drained and reclaimed during the second half of the 19th century by a system of artificial drainage canals that significantly affects the flow dynamics of the area. The drinking water, mainly for summer cottages, is abstracted from 11 wells drilled to a depth of around 20 m into the upper 5–10 m of a confined chalk aquifer, and the total pumping is only 5–6% of the drainage pumping. Increasing chloride concentrations have been observed in several abstraction wells and in some cases the WHO drinking water standard has been exceeded. Using the modeling package MODFLOW/MT3D/SEAWAT the historical, present and future freshwater-sea water distribution is simulated. The model is calibrated against hydraulic head observations and validated against geochemical and geophysical data from new investigation wells, including borehole logs, and from an airborne transient electromagnetic survey. The impact of climate changes on saltwater intrusion is found to be sensitive to the boundary conditions of the investigated system. For the flux-controlled aquifer to the west of the drained area only changes in groundwater recharge impacts the freshwater–sea water interface whereas sea level rise does not result in increasing sea water intrusion. However, on the barrier islands to the east of the reclaimed area, below which the sea is hydraulically connected to the drainage canals, and the boundary of the flow system therefore controlled, the projected changes in sea level, groundwater recharge and stage of the

  13. Hydrologic and water quality modeling: spatial and temporal considerations (United States)

    Hydrologic and water quality models are used to help manage water resources by investigating the effects of climate, land use, land management, and water management on water resources. Each water-related issue is better investigated at a specific scale, which can vary spatially from point to watersh...

  14. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic


    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  15. Adapting safety requirements analysis to intrusion detection (United States)

    Lutz, R.


    Several requirements analysis techniques widely used in safety-critical systems are being adapted to support the analysis of secure systems. Perhaps the most relevant system safety techique for Intrusion Detection Systems is hazard analysis.

  16. Intrusion Detection Architecture Utilizing Graphics Processors

    Directory of Open Access Journals (Sweden)

    Branislav Madoš


    Full Text Available With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS. Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.

  17. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani


    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  18. A Citizen's Guide to Vapor Intrusion Mitigation (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  19. Indoor Air Vapor Intrusion Mitigation Approaches (United States)

    The National Risk Management Research Laboratory has developed a technology transfer document regarding management and treatment of vapor intrusion into building structures. This document describes the range of mitigation technologies available.

  20. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley


    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  1. A generalized flow path model for water distribution optimization (United States)

    Hsu, N.; Cheng, W.; Yeh, W. W.


    A generalized flow path model is developed for optimizing a water distribution system. The model simultaneously describes a water distribution system in two parts: (1) the water delivery relationships between suppliers and receivers and (2) the physical water delivery system. In the first part, the model considers waters from different suppliers as multiple commodities. This helps the model to clearly describe water deliveries by identifying the relationships between suppliers and receivers. The second part characterizes a physical water distribution network by all possible flow paths. The advantages of the proposed model are that: (1) it is a generalized methodology to optimize water distribution, delivery scheduling, water trade, water transfer, and water exchange under existing reservoir operation rules, contracts, and agreements; (2) it can consider water as multiple commodities if needed; and (3) no simplifications are made for either the physical system or the delivery relationships. The model can be used as a tool for decision making for scheduling optimization. The model optimizes not only the suppliers to each receiver but also their associated flow paths for supplying water. This characteristic leads to the optimum solution that contains the optimal scheduling results and detailed information of water distribution in the physical system. That is, the water right owner, water quantity and its associated flow path of each delivery action are represented explicitly in the results rather than merely an optimized total flow quantity in each arc of a distribution network. The proposed model is first verified by a hypothetical water distribution system. Then, the model is applied to the water distribution system of the Tou-Qian River Basin in northern Taiwan. The results show that the flow path model has the ability to optimize the quantity of each water delivery, the associated flow paths of the delivery, and the strategies of water transfer while considering

  2. Integrated modeling of ozonation for optimization of drinking water treatment

    NARCIS (Netherlands)

    van der Helm, A.W.C.


    Drinking water treatment plants automation becomes more sophisticated, more on-line monitoring systems become available and integration of modeling environments with control systems becomes easier. This gives possibilities for model-based optimization. In operation of drinking water treatment

  3. Cloud Intrusion Detection and Repair (CIDAR) (United States)


    AFRL-RY-WP-TR-2015-0183 CLOUD INTRUSION DETECTION AND REPAIR (CIDAR) Stelios Sidiroglou, Jeff Perkins, and Martin Rinard Massachusetts...September 2015 4. TITLE AND SUBTITLE CLOUD INTRUSION DETECTION AND REPAIR (CIDAR) 5a. CONTRACT NUMBER FA8650-11-C-7192 5b. GRANT NUMBER 5c...resulting out-of-bounds writes can easily enable code injection attacks [34]. Figure 25: System Overview Test Input Generation Error Detection Target

  4. Imaging Saltwater Intrusion Along the Coast of Monterey Bay Using Long-Offset Electrical Resistivity Tomography (United States)

    Goebel, M.; Knight, R. J.; Pidlisecky, A.


    Coastal regions represent a complex dynamic interface where saltwater intrusion moves seawater landward and groundwater discharge moves freshwater seaward. These processes can have a dramatic impact on water quality, affecting both humans and coastal ecosystems. The ability to map the subsurface distribution of fresh and salt water is a critical step in predicting and managing water quality in coastal regions. This is commonly accomplished using wells, which are expensive and provide point information, which may fail to capture the spatial complexity in subsurface conditions. We present an alternate method for acquiring data, long-offset Electrical Resistivity Tomography (ERT), which is non-invasive, cost effective, and can address the problem of poor spatial sampling. This geophysical method can produce continuous profiles of subsurface electrical resistivity to a depth of 300 m, with spatial resolution on the order of tens of meters. Our research focuses on the Monterey Bay region, where sustained groundwater extraction over the past century has led to significant saltwater intrusion. ERT was acquired along 40 kilometers of the coast using the roll along method, allowing for continuous overlap in data acquisition. Electrodes were spaced every 22.2 m, with a total of 81 electrodes along the 1.8 km active cable length. The data show a complex distribution of fresh and salt water, influenced by geology, groundwater pumping, recharge, and land-use. While the inverted ERT resistivity profiles correspond well with existing data sets and geologic interpretations in the region, the spatial complexity revealed through the ERT data goes beyond what is known from traditional data sources alone. This leads us to conclude that this form of data can be extremely useful in informing and calibrating groundwater flow models, making targeted management decisions, and monitoring changes in subsurface salinities over time.

  5. 10 CFR 63.322 - Human intrusion scenario. (United States)


    ... 10 Energy 2 2010-01-01 2010-01-01 false Human intrusion scenario. 63.322 Section 63.322 Energy... REPOSITORY AT YUCCA MOUNTAIN, NEVADA Postclosure Public Health and Environmental Standards Human Intrusion Standard § 63.322 Human intrusion scenario. For the purposes of the analysis of human intrusion, DOE must...

  6. Trajectories of illness intrusiveness domains following a diagnosis of breast cancer. (United States)

    Sohl, Stephanie J; Levine, Beverly; Case, L Douglas; Danhauer, Suzanne C; Avis, Nancy E


    To identify trajectories of illness intrusiveness over the first 2 years after a breast cancer diagnosis and describe associated patient and treatment characteristics. Illness intrusiveness, or how much an illness disrupts life domains, has been shown to be highly related to quality of life. Women recruited within 8 months of a breast cancer diagnosis (n = 653) completed questionnaires at baseline and 6, 12, and 18 months postbaseline. Group-based trajectory modeling was used to identify trajectories in three established domains of illness intrusiveness: instrumental, intimacy, and relationships and personal development. Bivariate analyses identified contextual, disease/treatment, psychological, and social characteristics of women in trajectory groups. Forty-one percent of women fell into a trajectory of consistently low illness intrusiveness (Low) across all three domains. Other women varied such that some reported illness intrusiveness that decreased over time on at least one domain (9-34%), and others reported consistently high intrusiveness on at least one domain (11-17%). A fourth trajectory of increased illness intrusiveness emerged in the relationship and personal development domain (9%). Characteristics of women in the Low group were being older; being less likely to have children at home; and having stage I cancer, fewer symptoms, and better psychosocial status. Women experienced different patterns of illness intrusiveness in the first 2 years after a diagnosis of breast cancer with a high percentage reporting Low intrusiveness. However, women differentially followed the other trajectory patterns by domain, suggesting that the effect of breast cancer on some women's lives may be specific to certain areas. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  7. Long distance seawater intrusion through a karst conduit network in the Woodville Karst Plain, Florida (United States)

    Xu, Zexuan; Bassett, Seth Willis; Hu, Bill; Dyer, Scott Barrett


    Five periods of increased electrical conductivity have been found in the karst conduits supplying one of the largest first magnitude springs in Florida with water. Numerous well-developed conduit networks are distributed in the Woodville Karst Plain (WKP), Florida and connected to the Gulf of Mexico. A composite analysis of precipitation and electrical conductivity data provides strong evidence that the increases in conductivity are directly tied to seawater intrusion moving inland and traveling 11 miles against the prevailing regional hydraulic gradient from from Spring Creek Spring Complex (SCSC), a group of submarine springs at the Gulf Coast. A geochemical analysis of samples from the spring vent rules out anthropogenic contamination and upwelling regional recharge from the deep aquifer as sources of the rising conductivity. The interpretation is supported by the conceptual model established by prior researchers working to characterize the study area. This paper documents the first and longest case of seawater intrusion in the WKP, and also indicates significant possibility of seawater contamination through subsurface conduit networks in a coastal karst aquifer.

  8. The neural representation of intrusive thoughts (United States)

    Schmiedek, Florian; Brose, Annette; Schott, Björn H.; Lindenberger, Ulman; Lövden, Martin


    Based on the philosophical notion that language embodies thought we investigated whether a habitual tendency for intrusive thought that younger and older participants report over a period of 100 sessions, spread out over about 6 months, is associated with brain regions related to language production. In favour of this hypothesis, we found that individual differences in habitual intrusive thoughts are correlated with activity in the left inferior frontal gyrus (IFG, Broca’s area) as well as the cingulate cortex (CC) during a two-choice reaction-time task in fMRI. Participants who habitually tended to experience intrusive thoughts showed greater activity during task-free (baseline) compared to task periods in brain regions involved in language production. Task performance was unrelated to individual differences in intrusive thoughts. We conclude that intrusive thoughts may be represented in a language-like format and that individuals reporting a habitually higher tendency for intrusive thoughts may have stronger and more habitual inner speech processes. PMID:22563007

  9. Drinking Water Temperature Modelling in Domestic Systems

    NARCIS (Netherlands)

    Moerman, A.; Blokker, M.; Vreeburg, J.; Van der Hoek, J.P.


    Domestic water supply systems are the final stage of the transport process to deliver potable water to the customers’ tap. Under the influence of temperature, residence time and pipe materials the drinking water quality can change while the water passes the domestic drinking water system. According

  10. Water institutions and governance models for the funding, financing ...

    African Journals Online (AJOL)

    ... Model 3: SPV housing dedicated water infrastructure cash-flows, Model 4: stand-alone water institution with strong balance sheet, Model 5: public-private partnership (PPP) with equity, Model 6: private concession, and Model 7: private development. Various institutional options for consideration for the future management ...

  11. Tampa Bay Water Clarity Model (TBWCM): As a Predictive Tool (United States)

    The Tampa Bay Water Clarity Model was developed as a predictive tool for estimating the impact of changing nutrient loads on water clarity as measured by secchi depth. The model combines a physical mixing model with an irradiance model and nutrient cycling model. A 10 segment bi...

  12. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou


    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  13. Geospatial scenario based modelling of urban and agricultural intrusions in Ramsar wetland Deepor Beel in Northeast India using a multi-layer perceptron neural network (United States)

    Mozumder, Chitrini; Tripathi, Nitin K.


    In recent decades, the world has experienced unprecedented urban growth which endangers the green environment in and around urban areas. In this work, an artificial neural network (ANN) based model is developed to predict future impacts of urban and agricultural expansion on the uplands of Deepor Beel, a Ramsar wetland in the city area of Guwahati, Assam, India, by 2025 and 2035 respectively. Simulations were carried out for three different transition rates as determined from the changes during 2001-2011, namely simple extrapolation, Markov Chain (MC), and system dynamic (SD) modelling, using projected population growth, which were further investigated based on three different zoning policies. The first zoning policy employed no restriction while the second conversion restriction zoning policy restricted urban-agricultural expansion in the Guwahati Municipal Development Authority (GMDA) proposed green belt, extending to a third zoning policy providing wetland restoration in the proposed green belt. The prediction maps were found to be greatly influenced by the transition rates and the allowed transitions from one class to another within each sub-model. The model outputs were compared with GMDA land demand as proposed for 2025 whereby the land demand as produced by MC was found to best match the projected demand. Regarding the conservation of Deepor Beel, the Landscape Development Intensity (LDI) Index revealed that wetland restoration zoning policies may reduce the impact of urban growth on a local scale, but none of the zoning policies was found to minimize the impact on a broader base. The results from this study may assist the planning and reviewing of land use allocation within Guwahati city to secure ecological sustainability of the wetlands.

  14. Acquisition of an Integrated System for Laser-Assisted Non-Intrusive Experimentation and Data-Driven Reduced-Order Modeling (United States)


    consists of three components: (i) a 1D scanning laser vibrometer for structural vibration tests; (ii) a 3D particle image velocimetry (PIV) system for...modeling of multidisciplinary phenomena in structural and fluid dynamics. The system consists of three components: (i) a 1D scanning laser vibrometer for... Vibrometer , LaVision 3D PIV System, and COMET L3D Laser Scanner System, respectively installed in the Aerospace Structural Dynamics Laboratory, the Wind

  15. Abstracting massive data for lightweight intrusion detection in computer networks

    KAUST Repository

    Wang, Wei


    Anomaly intrusion detection in big data environments calls for lightweight models that are able to achieve real-time performance during detection. Abstracting audit data provides a solution to improve the efficiency of data processing in intrusion detection. Data abstraction refers to abstract or extract the most relevant information from the massive dataset. In this work, we propose three strategies of data abstraction, namely, exemplar extraction, attribute selection and attribute abstraction. We first propose an effective method called exemplar extraction to extract representative subsets from the original massive data prior to building the detection models. Two clustering algorithms, Affinity Propagation (AP) and traditional . k-means, are employed to find the exemplars from the audit data. . k-Nearest Neighbor (k-NN), Principal Component Analysis (PCA) and one-class Support Vector Machine (SVM) are used for the detection. We then employ another two strategies, attribute selection and attribute extraction, to abstract audit data for anomaly intrusion detection. Two http streams collected from a real computing environment as well as the KDD\\'99 benchmark data set are used to validate these three strategies of data abstraction. The comprehensive experimental results show that while all the three strategies improve the detection efficiency, the AP-based exemplar extraction achieves the best performance of data abstraction.

  16. Modelling global fresh surface water temperature

    NARCIS (Netherlands)

    Beek, L.P.H. van; Eikelboom, T.; Vliet, M.T.H. van; Bierkens, M.F.P.


    Temperature directly determines a range of water physical properties including vapour pressure, surface tension, density and viscosity, and the solubility of oxygen and other gases. Indirectly water temperature acts as a strong control on fresh water biogeochemistry, influencing sediment

  17. An Analysis Model for Water Cone Subsidence in Bottom Water Drive Reservoirs (United States)

    Wang, Jianjun; Xu, Hui; Wu, Shucheng; Yang, Chao; Kong, lingxiao; Zeng, Baoquan; Xu, Haixia; Qu, Tailai


    Water coning in bottom water drive reservoirs, which will result in earlier water breakthrough, rapid increase in water cut and low recovery level, has drawn tremendous attention in petroleum engineering field. As one simple and effective method to inhibit bottom water coning, shut-in coning control is usually preferred in oilfield to control the water cone and furthermore to enhance economic performance. However, most of the water coning researchers just have been done on investigation of the coning behavior as it grows up, the reported studies for water cone subsidence are very scarce. The goal of this work is to present an analytical model for water cone subsidence to analyze the subsidence of water cone when the well shut in. Based on Dupuit critical oil production rate formula, an analytical model is developed to estimate the initial water cone shape at the point of critical drawdown. Then, with the initial water cone shape equation, we propose an analysis model for water cone subsidence in bottom water reservoir reservoirs. Model analysis and several sensitivity studies are conducted. This work presents accurate and fast analytical model to perform the water cone subsidence in bottom water drive reservoirs. To consider the recent interests in development of bottom drive reservoirs, our approach provides a promising technique for better understanding the subsidence of water cone.

  18. Lake St. Clair: Storm Wave and Water Level Modeling (United States)


    levels at St. Clair Shores and Windmill Point. The ADCIRC model was tightly coupled with four near-shore Full-Plane STWAVE model grids using CSTORM...levels at St. Clair Shores. ............... 71  Figure 4-6. Comparison of Storm 002 observed and modeled water levels at Windmill Point...observed and modeled water levels at Windmill Point. ................. 74  Figure 4-9. Comparison of Storm 004 observed and modeled water levels at St

  19. Estimating salinity intrusion effects due to climate change on the Lower Savannah River Estuary (United States)

    Conrads, Paul; Roehl, Edwin A.; Daamen, Ruby C.; Cook, John B.; Sexton, Charles T.; Tufford, Daniel L.; Carbone, Gregory J.; Dow, Kristin


    The ability of water-resource managers to adapt to future climatic change is especially challenging in coastal regions of the world. The East Coast of the United States falls into this category given the high number of people living along the Atlantic seaboard and the added strain on resources as populations continue to increase, particularly in the Southeast. Increased temperatures, changes in regional precipitation regimes, and potential increased sea level may have a great impact on existing hydrological systems in the region. The Savannah River originates at the confluence of the Seneca and Tugaloo Rivers, near Hartwell, Ga., and forms the state boundary between South Carolina and Georgia. The J. Strom Thurmond Dam and Lake, located 238 miles upstream from the Atlantic Ocean, is responsible for most of the flow regulation that affects the Savannah River from Augusta, Ga., to the coast. The Savannah Harbor experiences semi-diurnal tides of two low and two high tides in a 24.8-hour period with pronounced differences in tidal range between neap and spring tides occurring on a 14-day and 28-day lunar cycle. Salinity intrusion results from the interaction of three principal forces - streamflow, mean tidal water levels, and tidal range. To analyze, model, and simulate hydrodynamic behaviors at critical coastal streamgages in the Lower Savannah River Estuary, data-mining techniques were applied to over 15 years of hourly streamflow, coastal water-quality, and water-level data. Artificial neural network (ANN) models were trained to learn the variable interactions that cause salinity intrusions. Streamflow data from the 9,850 square-mile Savannah River Basin were input into the model as time-delayed variables. Tidal inputs to the models were obtained by decomposing tidal water-level data into a “periodic” signal of tidal range and a “chaotic” signal of mean water levels. The ANN models were able to convincingly reproduce historical behaviors and generate

  20. An Integrated Risk Management Model for Source Water Protection Areas


    Chiueh, Pei-Te; Shang, Wei-Ting; Lo, Shang-Lien


    Watersheds are recognized as the most effective management unit for the protection of water resources. For surface water supplies that use water from upstream watersheds, evaluating threats to water quality and implementing a watershed management plan are crucial for the maintenance of drinking water safe for humans. The aim of this article is to establish a risk assessment model that provides basic information for identifying critical pollutants and areas at high risk for degraded water qual...

  1. The relationship between loss of parents in the holocaust, intrusive memories, and distress among child survivors. (United States)

    Letzter-Pouw, Sonia; Werner, Perla


    The prevalence of intrusive memories of the Holocaust and their relationship to distress was examined among 272 child survivors in Israel. Using attachment theory as a conceptual framework, the authors also examined the effects of type of experience and loss of parents in the Holocaust, psychological resources, other life events, and sociodemographic characteristics on distress and symptomatic behavior. Eighty five percent of the participants reported suffering from intrusive memories. Structural equation modeling showed that survivors who lost one or both parents in the Holocaust suffered more distress because of more intrusive memories. These findings suggest that intrusive memories may be part of unfinished mourning processes related to the loss of parents in the Holocaust. © 2012 American Orthopsychiatric Association.

  2. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei


    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  3. Formation of continental crust by intrusive magmatism (United States)

    Rozel, A. B.; Golabek, G. J.; Jain, C.; Tackley, P. J.; Gerya, T.


    How were the continents formed in the Earth? No global numerical simulation of our planet ever managed to generate continental material self-consistently. In the present study, we show that the latest developments of the convection code StagYY enable to estimate how to produce the early continents, more than 3 billion years ago. In our models, melting of pyrolitic rocks generates a basaltic melt and leaves behind a depleted solid residue (a harzburgite). The melt generated in the mantle is transported to the surface. Only basaltic rocks melting again can generate continental crust. Should the basaltic melt always reach the open air and cool down? Should the melt be intruded warm in the pre-existing crust? The present study shows that both processes have to be considered to produce continents. Indeed, granitoids can only be created in a tight window of pressure-temperature. If all basalt is quickly cooled by surface volcanism, the lithosphere will be too cold. If all basalt is intruded warm below the crust then the lithosphere will be too warm. The key is to have both volcanism and plutonism (intrusive magmatism) to reach the optimal temperature and form massive volumes of continental material.

  4. Modeling root water uptake with root mediated soil water content redistribution (United States)

    Dohnal, M.; Votrubova, J.; Vogel, T.; Tesar, M.


    The main objective of this study was to develop and test a simple root water uptake parameterization applicable in numerical models of soil water movement. The suggested approach was implemented in a one-dimensional dual-continuum model of soil water flow based on Richards' equation. The model was used to simulate soil water movement at an experimental forest site. The performance of the model was evaluated using observed soil water pressure and soil water content data. Several episodes, during which the root mediated soil water content redistribution effects played an important role, were detected. Differences between the model responses and observations, as well as differences between the traditional and newly developed root water uptake modeling approaches, were analyzed. The research was supported by the Czech Science Foundation project No. 205/08/1174.

  5. Lateral intrusion and vertical inflation of sills in the Trachyte Mesa intrusion, Henry Mountains, Utah (United States)

    Wilson, Penelope; McCaffrey, Ken; Wilson, Robert; Jarvis, Ian; Holdsworth, Robert


    Deformation structures developed in the host rocks of shallow crustal igneous intrusions provide a record of how magma was emplaced and accommodated. Here we present field observations from sill and laccolith intrusions exposed in the Henry Mountains, Utah. Trachyte Mesa is comprised of a series of stacked sheets. Deformation structures imply a two-stage growth mechanism for individual intrusive units, with radial growth of a thin sheet followed by vertical inflation. Syn-emplacement structures localised at the intrusion lateral margins consist of prolific deformation bands and dip-slip faults located at the tips of individual sheets due to strain localisation during vertical inflation. Magma tends to preferentially exploit these faults, initiating sill climbing. The order in which sheets are stacked impacts on the intrusion geometry and thus the associated build-up of deformation. Host-rock lithology also plays an important role in intrusion tip-geometry and associated deformation. Various styles of sill tip termination are observed (bulbous, steep-faulted, sill-climbing). Sill sheets with bulbous terminations appear to develop preferentially in muddy red sandstone units, whereas sheets with faulted terminations, and those exhibiting sill-climbing, appear most common in sheets directly below massive (competent) sandstone units. Shales behave in a more ductile manner, inhibiting brittle fault development; while the more massive, competent sandstones are prone to the development of faults as sill sheets inflate. Extensional roof faulting and sill climbing are consistent with a two-stage growth history for the overall intrusion. Not only do the deformation structures record the strain evolution, and thus mode of emplacement of the intrusion, they also control the subsequent propagation of the intrusive body (e.g. sill climbing). Much can be learnt about intrusion geometries and emplacement through the detailed analysis of syn-emplacement deformation structures

  6. Sewer Gas: An Indoor Air Source of PCE to Consider During Vapor Intrusion Investigations. (United States)

    Pennell, Kelly G; Scammell, Madeleine Kangsen; McClean, Michael D; Ames, Jennifer; Weldon, Brittany; Friguglietti, Leigh; Suuberg, Eric M; Shen, Rui; Indeglia, Paul A; Heiger-Bernays, Wendy J


    The United States Environmental Protection Agency (USEPA) is finalizing its vapor intrusion guidelines. One of the important issues related to vapor intrusion is background concentrations of volatile organic chemicals (VOCs) in indoor air, typically attributed to consumer products and building materials. Background concentrations can exist even in the absence of vapor intrusion and are an important consideration when conducting site assessments. In addition, the development of accurate conceptual models that depict pathways for vapor entry into buildings is important during vapor intrusion site assessments. Sewer gas, either as a contributor to background concentrations or as part of the site conceptual model, is not routinely evaluated during vapor intrusion site assessments. The research described herein identifies an instance where vapors emanating directly from a sanitary sewer pipe within a residence were determined to be a source of tetrachloroethylene (PCE) detected in indoor air. Concentrations of PCE in the bathroom range from 2.1 to 190 ug/m(3) and exceed typical indoor air concentrations by orders of magnitude resulting in human health risk classified as an "Imminent Hazard" condition. The results suggest that infiltration of sewer gas resulted in PCE concentrations in indoor air that were nearly two-orders of magnitude higher as compared to when infiltration of sewer gas was not known to be occurring. This previously understudied pathway whereby sewers serve as sources of PCE (and potentially other VOC) vapors is highlighted. Implications for vapor intrusion investigations are also discussed.

  7. FCAAIS: Anomaly based network intrusion detection through feature correlation analysis and association impact scale

    Directory of Open Access Journals (Sweden)

    V. Jyothsna


    Full Text Available Due to the sensitivity of the information required to detect network intrusions efficiently, collecting huge amounts of network transactions is inevitable and the volume and details of network transactions available in recent years have been high. The meta-heuristic anomaly based assessment is vital in an exploratory analysis of intrusion related network transaction data. In order to forecast and deliver predictions about intrusion possibility from the available details of the attributes involved in network transaction. In this regard, a meta-heuristic assessment model called the feature correlation analysis and association impact scale is explored to estimate the degree of intrusion scope threshold from the optimal features of network transaction data available for training. With the motivation gained from the model called “network intrusion detection by feature association impact scale” that was explored in our earlier work, a novel and improved meta-heuristic assessment strategy for intrusion prediction is derived. In this strategy, linear canonical correlation for feature optimization is used and feature association impact scale is explored from the selected optimal features. The experimental result indicates that the feature correlation has a significant impact towards minimizing the computational and time complexity of measuring the feature association impact scale.

  8. Locating the zone of saline intrusion in a coastal karst aquifer using springflow data. (United States)

    Arfib, Bruno; de Marsily, Ghislain; Ganoulis, Jacques


    Coastal fresh water aquifers are an increasingly desirable resource. In a karstic aquifer, sea water intrusion occurs as a salt water wedge, like in porous media. However, preferential flow conduits may alter the spatial and temporal distribution of the salt water. This is typically the case when the outlet of the aquifer is a brackish spring. This paper shows that salinity and flow rate variations at a spring, where salinity is inversely proportional to discharge, can help to understand the hydrodynamic functioning of the aquifer and to locate the fresh water-sea water mixing zone deep inside the aquifer. The volume of water-filled conduit between the sea water intrusion zone and the spring outlet is calculated by the integral over time of the flow rate during the time lag between the flow rate increase and the salinity decrease as measured at the spring. In the example of the spring at Almyros of Heraklio (Crete, Greece), this time lag is variable, depending on the discharge, but the volume of water-filled conduit appears to be constant, which shows that the processes of salt water intrusion and mixing in the conduit are constant throughout the year. The distance between the spring and the zone where sea water enters the conduit is estimated and provides an indication of the position where only fresh water is present in the conduit.

  9. Validation of a spatial–temporal soil water movement and plant water uptake model

    KAUST Repository



    © 2014, (publisher). All rights reserved. Management and irrigation of plants increasingly relies on accurate mathematical models for the movement of water within unsaturated soils. Current models often use values for water content and soil parameters that are averaged over the soil profile. However, many applications require models to more accurately represent the soil–plant–atmosphere continuum, in particular, water movement and saturation within specific parts of the soil profile. In this paper a mathematical model for water uptake by a plant root system from unsaturated soil is presented. The model provides an estimate of the water content level within the soil at different depths, and the uptake of water by the root system. The model was validated using field data, which include hourly water content values at five different soil depths under a grass/herb cover over 1 year, to obtain a fully calibrated system for plant water uptake with respect to climate conditions. When compared quantitatively to a simple water balance model, the proposed model achieves a better fit to the experimental data due to its ability to vary water content with depth. To accurately model the water content in the soil profile, the soil water retention curve and saturated hydraulic conductivity needed to vary with depth.

  10. Treatment of Intrusive Suicidal Imagery Using Eye Movements

    Directory of Open Access Journals (Sweden)

    Jaël S. van Bentum


    Full Text Available Suicide and suicidal behavior are major public health concerns, and affect 3–9% of the population worldwide. Despite increased efforts for national suicide prevention strategies, there are still few effective interventions available for reducing suicide risk. In this article, we describe various theoretical approaches for suicide ideation and behavior, and propose to examine the possible effectiveness of a new and innovative preventive strategy. A model of suicidal intrusion (mental imagery related to suicide, also referred to as suicidal flash-forwards is presented describing one of the assumed mechanisms in the etiology of suicide and the mechanism of therapeutic change. We provide a brief rationale for an Eye Movement Dual Task (EMDT treatment for suicidal intrusions, describing techniques that can be used to target these suicidal mental images and thoughts to reduce overall behavior. Based on the available empirical evidence for the mechanisms of suicidal intrusions, this approach appears to be a promising new treatment to prevent suicidal behavior as it potentially targets one of the linking pins between suicidal ideation and suicidal actions.

  11. An Automata Based Intrusion Detection Method for Internet of Things

    Directory of Open Access Journals (Sweden)

    Yulong Fu


    Full Text Available Internet of Things (IoT transforms network communication to Machine-to-Machine (M2M basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.

  12. Mixing and intrusion of salt

    Digital Repository Service at National Institute of Oceanography (India)

    Shetye, S.R.; Michael, G.S.; Chavan, P.V.

    stratification due to salinity depended on the phase of the tide. During flow or ebb, when the water level rose or fell rapidly?- and, by inference, the tidal current was strong ?- vertical stratification remained negligible and the water column was well... of turbulence at the location. The second mechanism that leads to an asymmetry in stratification and in shear is tidal straining (Simpson et al. 1990). In estuaries that have an along-channel salinity gradient and have a vertical shear in the water column...

  13. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor


    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  14. Non-Intrusive Battery Health Monitoring

    Directory of Open Access Journals (Sweden)

    Gajewski Laurent


    Full Text Available The “Non-intrusive battery health monitoring”, developed by Airbus Defence and Space (ADS in cooperation with the CIRIMAT-CNRS laboratory and supported by CNES, aims at providing a diagnosis of the battery ageing in flight, called State of Health (SOH, using only the post-treatment of the battery telemetries. The battery current and voltage telemetries are used by a signal processing tool on ground to characterize and to model the battery at low frequencies which allows monitoring the evolution of its degradation with great accuracy. The frequential behaviour estimation is based on inherent disturbances on the current during the nominal functioning of the battery. For instance, on-board thermal control or equipment consumption generates random disturbances on battery current around an average current. The battery voltage response to these current random disturbances enables to model the low frequency impedance of the battery by a signal processing tool. The re-created impedance is then compared with the evolution model of the low frequencies impedance as a function of the battery ageing to estimate accurately battery degradation. Hence, this method could be applied to satellites which are already in orbit and whose battery telemetries acquisition system fulfils the constraints determined in the study. This innovative method is an improvement of present state-of-the-art and is important to have a more accurate in-flight knowledge of battery ageing which is crucial for mission and operation planning and also for possible satellite mission extension or deorbitation. This method is patented by Airbus Defence and Space and CNES.

  15. Fusion of arkosic sand by intrusive andesite (United States)

    Bailey, Roy A.


    An andesite dike in the Valles Mountains of northern New Mexico has intruded and partly fused arkosic sediments for a distance of 50 feet from its contacts. The dike is semi-circular in form, has a maximum width of about 100 feet, and is about 500 feet long. Small associated arcuate dikes are arranged in spiral fashion around the main dike, suggesting that they were intruded along shear fractures similar to those described by Burbank (1941). The fused rocks surrounding the andesite dike are of three general types: 1) partly fused arkosic sand, 2) fused clay, and 3) hybrid rocks. The fused arkosic sand consists of relict detrital grains of quartz, orthoclose, and plagioclase, imbedded in colorless glass containing microlites of tridymite, cordierite, and magnetite. The relict quartz grains are corroded and embayed by glass; the orthoclase is sanidinized and partly fused; and the plagioclase is inverted to the high temperature form and is partly fused. The fused clay, which was originally a mixture of montmorillonite and hydromica, consists primarily of cordierite but also contains needle-like crystals of sillimanite (?) or mullite (?). The hybrid rocks originated in part by intermixing of fused arkosic sediments and andesitic liquid and in part by diffusion of mafic constituents through the fused sediments. They are rich in cordierite and magnetite and also contain hypersthene, augite, and plagioclase. The composition of pigeonite in the andesite indicates that the temperature of the andesite at the time of intrusion probably did not exceed 1200?C. Samples of arkosic sand were fused in the presence of water in a Morey bomb at 1050?C. Stability relations of certain minerals in the fused sand suggest that fusion may have taken place at a lower temperature, however, and the fluxing action of volatiles from the andesite are thought to have made this possible.

  16. Ventilation of the Baltic Sea deep water: A brief review of present knowledge from observations and models

    Directory of Open Access Journals (Sweden)

    Hans Burchard


    Full Text Available The ventilation of the Baltic Sea deep wateris driven by either gale-forced barotropic or baroclinic salt water inflows.During the past two decades, the frequency of large barotropic inflows(mainly in winter has decreased and the frequency of medium-intensity baroclinic inflows(observed in summer has increased. As a result of entrainment of ambient oxygen-rich water,summer inflows are also important for the deep water ventilation.Recent process studies of salt water plumes suggest that the entrainmentrates are generally smaller than those predicted by earlier entrainment models.In addition to the entrance area, the Słupsk Sill andthe Słupsk Furrow are important locations for the transformation of water masses. Passing the Słupsk Furrow, both gravity-driven dense bottom flows and sub-surface cyclonic eddies,which are eroded laterally by thermohaline intrusions,ventilate the deep water of the eastern Gotland Basin.A recent study of the energy transfer from barotropic to baroclinicwave motion using a two-dimensional shallow water model suggests thatabout 30% of the energy needed below the halocline for deep water mixingis explained by the breaking of internal waves.In the deep water decade-long stagnation periods with decreasingoxygen and increasing hydrogen sulphide concentrations might be caused by anomalously largefreshwater inflows and anomalously high mean zonal wind speeds. In differentstudies the typical response time scale of average salinity was estimated tobe between approximately 20 and 30 years.The review summarizes recent research resultsand ends with a list of open questions and recommendations.

  17. Comparison of surrogate models with different methods in ...

    Indian Academy of Sciences (India)

    and sea water intrusion management problems. Hemker et al. (2008) used kriging method to build the surrogate model of simulation model to reduce optimization computation cost in ground- water management problem. It is difficult to say if one of these ..... on a 3.0 GHz AMD CPU and 2 GB RAM PC platform. 40 input data ...

  18. GPR-Based Water Leak Models in Water Distribution Systems

    Directory of Open Access Journals (Sweden)

    David Ayala–Cabrera


    Full Text Available This paper addresses the problem of leakage in water distribution systems through the use of ground penetrating radar (GPR as a nondestructive method. Laboratory tests are performed to extract features of water leakage from the obtained GPR images. Moreover, a test in a real-world urban system under real conditions is performed. Feature extraction is performed by interpreting GPR images with the support of a pre-processing methodology based on an appropriate combination of statistical methods and multi-agent systems. The results of these tests are presented, interpreted, analyzed and discussed in this paper.

  19. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha


    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  20. Model predictive control on open water systems

    NARCIS (Netherlands)

    Van Overloop, P.J.


    Human life depends on water daily, especially for drinking and food production. Also, human life needs to be protected against excess of water caused by heavy precipitation and floods. People have formed water management organizations to guarantee these necessities of life for communities. These


    EPANET is a Windows program that performs extended period simulation of hydraulic and water-quality behavior within pressurized pipe networks. It tracks the flow of water in each pipe, the pressure at each node, the height of water in each tank, and the concentration of a chemica...

  2. Modeling water clarity in oceans and coasts (United States)

    In oceans and coastal waters, phytoplankton is the primary producer of organic compounds which form the base for the food chain. The concentration of phytoplankton is a major factor controlling water clarity and the depth to which light penetrates in the water column. The light i...

  3. A Process Engineering Approach to the Development and Integration of Intrusion Detection Techniques

    National Research Council Canada - National Science Library

    Ye, Nong


    ...) investigate system-level intrusion detection techniques for the fusion and correlation of local information about intrusions, based on the integration infrastructure for intrusion detection; and (3...

  4. A Process Engineering Approach to the Development and Integration of Intrusion Detection Techniques

    National Research Council Canada - National Science Library

    Ye, Nong


    ...) investigate system-level intrusion detection techniques for the fusion and correlation of local information about intrusions, based on the integration infrastructure for intrusion detection; and (3...

  5. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic


    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  6. Wave Induced Saline Intrusion in Sea Outfalls

    DEFF Research Database (Denmark)

    Larsen, Torben; Burrows, Richard


    Experimental and numerical studies have shown that the influence of wave increases the tendency of saline intrusion in multi-riser sea outfalls. The flow field in the diffusor under such unsteady and inhomogeneous circumstances is in general very complex, but when sufficient wave energy is dissip......Experimental and numerical studies have shown that the influence of wave increases the tendency of saline intrusion in multi-riser sea outfalls. The flow field in the diffusor under such unsteady and inhomogeneous circumstances is in general very complex, but when sufficient wave energy...

  7. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala


    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  8. Preventing point-of-sale system intrusions


    Smith, David C.


    Approved for public release; distribution is unlimited Several major United States retailers have suffered large-scale thefts of payment card information as the result of intrusions against point-of-sale systems (smart cash registers). Point-of-sale attacks present a growing threat and can constitute a homeland-security problem due to a trans-national cyber crime element. This thesis presents results of a survey of point-of-sale intrusions that reached at least the start of criminal invest...

  9. The Diamond Model of Intrusion Analysis (United States)


    capability MD5 hash , and a defined adverarsy process Process1 We define the feature space, FS , as the set of all core-, meta-, and sub-features which...infrastructure IP and capability MD5 hash with at least medium confidence. Now that the data is organized to answer the analytic question, the groups...of events and threads are clustered based on a feature vector defined by: an adversary process (A → B → C), a matching capability MD5 hash , and

  10. Using System Dynamic Model and Neural Network Model to Analyse Water Scarcity in Sudan (United States)

    Li, Y.; Tang, C.; Xu, L.; Ye, S.


    Many parts of the world are facing the problem of Water Scarcity. Analysing Water Scarcity quantitatively is an important step to solve the problem. Water scarcity in a region is gauged by WSI (water scarcity index), which incorporate water supply and water demand. To get the WSI, Neural Network Model and SDM (System Dynamic Model) that depict how environmental and social factors affect water supply and demand are developed to depict how environmental and social factors affect water supply and demand. The uneven distribution of water resource and water demand across a region leads to an uneven distribution of WSI within this region. To predict WSI for the future, logistic model, Grey Prediction, and statistics are applied in predicting variables. Sudan suffers from severe water scarcity problem with WSI of 1 in 2014, water resource unevenly distributed. According to the result of modified model, after the intervention, Sudan’s water situation will become better.

  11. Path to Illness Intrusiveness: What Symptoms Affect the Life of People Living With Multiple Sclerosis? (United States)

    Bouchard, Vanessa; Duquette, Pierre; Mayo, Nancy E


    To determine the direct and indirect effects of physical, emotional, and cognitive impairments on illness intrusiveness in people with multiple sclerosis (MS). Secondary analysis of a cross-sectional data set collected in 2008 to identify sex differences in people living with MS. Three MS clinics. A random sample (N=189) of women and men diagnosed with MS after 1995 were recruited and evaluated in 2008. Not applicable. Illness Intrusiveness Rating Scale (updated version using Rasch analysis). Path analysis yielded a model that was significant (nonnormed fit index, .9913; normed fit index, .9846) with adequate fit of the data to the model (goodness of fit index, .9781; χ2=21.41; P=.2084). The model explained 55% of the variance of illness intrusiveness. Only emotional and physical aspects were represented in the model because no cognitive impairment stayed after variable reduction. The model showed the complete mediation effect of fatigue on the physical function variables. This project brings new evidence toward the conceptualization of illness intrusiveness as a construct allowing future interventions that wish to target illness intrusiveness or disease impact to be designed. It also presented statistical evidence of the importance of treating fatigue not only as a symptom but also as a consequence of other impairments. Copyright © 2016 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  12. Mathematical modelization of surface waters for drinking water; Modelizacion matematica de la potabilizacion de aguas superficiales

    Energy Technology Data Exchange (ETDEWEB)

    Marin Llanes, L.A.; Alvarez Rosell, S.


    The application of the general strategy of deterministic modelling to the water treatment for human consumption process for surface waters is treated in this paper. Deterministic models that describe the behaviour of clarification processes: coagulation-flocculation an filtration with respect to the principal parameters that define the water principal parameters that define the water quality: turbidity, color, pH, organic matter an presence of iron, manganese and aluminium cations were obtained. The models have been checked in actual operation conditions of water treatment plant for human consumption located in Campo Florido, Havana, cuba, named Planta Norte Habana. This plant receives water from three dams. The obtained results were good. The models are valid to describe the process, to corroborate the main theories related to water clarification and to know more about this process. The complexity of the models permits their rapid and efficient solution even without the aid of a digital computer. (Author) 5 refs.

  13. Reduction of Waste Water in Erhai Lake Based on MIKE21 Hydrodynamic and Water Quality Model


    Changjun Zhu; Qinag Liang; Feng Yan; Wenlong Hao


    In order to study the ecological water environment in Erhai Lake, different monitoring sections were set to research the change of hydrodynamics and water quality. According to the measured data, MIKE21 Ecolab, the water quality simulation software developed by DHI, is applied to simulate the water quality in Erhai Lake. The hydrodynamics model coupled with water quality is established by MIKE21FM software to simulate the current situation of Erhai Lake. Then through the comparison with the m...

  14. Analysis Model for Domestic Hot Water Distribution Systems: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Maguire, J.; Krarti, M.; Fang, X.


    A thermal model was developed to estimate the energy losses from prototypical domestic hot water (DHW) distribution systems for homes. The developed model, using the TRNSYS simulation software, allows researchers and designers to better evaluate the performance of hot water distribution systems in homes. Modeling results were compared with past experimental study results and showed good agreement.

  15. Funding models for financing water infrastructure in South Africa ...

    African Journals Online (AJOL)

    The research identified several funding models for financing water infrastructure development projects. The existing public provision model continues to characterise much of the publicly-provided water infrastructure in South Africa. These models see Government planning, installing and financing infrastructure with pricing ...

  16. Intrusion Detection in SCADA Networks

    NARCIS (Netherlands)

    Barbosa, R.R.R.; Pras, Aiko; Stiller, Burckhard; De Turck, Filip

    Supervisory Control and Data Acquisition (SCADA) sys- tems are a critical part of large industrial facilities, such as water dis- tribution infrastructures. With the goal of reducing costs and increas- ing efficiency, these systems are becoming increasingly interconnected. However, this has also

  17. Modelling Soil Water Retention for Weed Seed Germination Sensitivity to Water Potential

    Directory of Open Access Journals (Sweden)

    W. John Bullied


    Full Text Available Soil water retention is important for the study of water availability to germinating weed seeds. Six soil water retention models (Campbell, Brooks-Corey, four- and five-parameter van Genuchten, Tani, and Russo with residual soil water parameter derivations were evaluated to describe water retention for weed seed germination at minimum threshold soil water potential for three hillslope positions. The Campbell, Brooks-Corey, and four-parameter van Genuchten model with modified or estimated forms of the residual parameter had superior but similar data fit. The Campbell model underestimated water retention at a potential less than −0.5 MPa for the upper hillslope that could result in underestimating seed germination. The Tani and Russo models overestimated water retention at a potential less than −0.1 MPa for all hillslope positions. Model selection and residual parameter specification are important for weed seed germination by representing water retention at the level of minimum threshold water potential for germination. Weed seed germination models driven by the hydrothermal soil environment rely on the best-fitting soil water retention model to produce dynamic predictions of seed germination.

  18. Effectiveness of Two Water Conservation Policies: An Integrated Modeling Approach


    Das, Biswa R.; Willis, David B.; Johnson, Jeffrey W.


    Agriculture in the Texas High Plains depends entirely on the Ogallala Aquifer. Texas enacted water conservation legislation to address declining reserves in the aquifer. We developed an integrated regional water policy model that links a hydrology model with an economic optimization model to estimate policy impacts with respect to economic cost and water conservation. Testing the effectiveness of two policies, a groundwater extraction tax and extraction quotas, we observe that neither signifi...

  19. Measuring and Modeling the Displacement of Connate Water in Chalk Core Plugs during Water Injection

    DEFF Research Database (Denmark)

    Korsbech, Uffe C C; Aage, Helle Karina; Andersen, Bertel Lohmann


    The movement of connate water spiked with gamma emitting 22Na was studied during laboratory water flooding of oil saturated chalk from a North Sea oil reservoir. Using a one dimensional gamma monitoring technique is was observed that connate water is piled-up at the front of the injection water...... and forms a mixed water bank with almost 100% connate water in the front behind which a gradual transition to pure injection water occurs. This result underpins log interpretations from waterflooded chalk reservoirs. An ad hoc model was set up by use of the results, and the process was examined...

  20. [Watershed water environment pollution models and their applications: a review]. (United States)

    Zhu, Yao; Liang, Zhi-Wei; Li, Wei; Yang, Yi; Yang, Mu-Yi; Mao, Wei; Xu, Han-Li; Wu, Wei-Xiang


    Watershed water environment pollution model is the important tool for studying watershed environmental problems. Through the quantitative description of the complicated pollution processes of whole watershed system and its parts, the model can identify the main sources and migration pathways of pollutants, estimate the pollutant loadings, and evaluate their impacts on water environment, providing a basis for watershed planning and management. This paper reviewed the watershed water environment models widely applied at home and abroad, with the focuses on the models of pollutants loading (GWLF and PLOAD), water quality of received water bodies (QUAL2E and WASP), and the watershed models integrated pollutant loadings and water quality (HSPF, SWAT, AGNPS, AnnAGNPS, and SWMM), and introduced the structures, principles, and main characteristics as well as the limitations in practical applications of these models. The other models of water quality (CE-QUAL-W2, EFDC, and AQUATOX) and watershed models (GLEAMS and MIKE SHE) were also briefly introduced. Through the case analysis on the applications of single model and integrated models, the development trend and application prospect of the watershed water environment pollution models were discussed.

  1. Effect of volcanic dykes on coastal groundwater flow and saltwater intrusion: A field-scale multiphysics approach and parameter evaluation (United States)

    Comte, J.-C.; Wilson, C.; Ofterdinger, U.; González-Quirós, A.


    Volcanic dykes are common discrete heterogeneities in aquifers; however, there is a lack of field examples of, and methodologies for, comprehensive in situ characterization of their properties with respect to groundwater flow and solute transport. We have applied an integrated multiphysics approach to quantify the effect of dolerite dykes on saltwater intrusion in a coastal sandstone aquifer. The approach involved ground geophysical imaging (passive magnetics and electrical resistivity tomography), well hydraulic testing, and tidal propagation analysis, which provided constraints on the geometry of the dyke network, the subsurface saltwater distribution, and the sandstone hydrodynamic properties and connectivity. A three-dimensional variable-density groundwater model coupled with a resistivity model was further calibrated using groundwater and geophysical observations. A good agreement of model simulations with tide-induced head fluctuations, geophysically derived pore water salinities, and measured apparent resistivities was obtained when dykes' hydraulic conductivity, storativity, and effective porosity are respectively about 3, 1, and 1 orders of magnitude lower than the host aquifer. The presence of the dykes results in barrier-like alterations of groundwater flow and saltwater intrusion. Preferential flow paths occur parallel to observed dyke orientations. Freshwater inflows from upland recharge areas concentrate on the land-facing side of the dykes and saltwater penetration is higher on their sea-facing side. This has major implications for managing groundwater resources in dyke-intruded aquifers, including in coastal and island regions and provides wider insights on preferential pathways of groundwater flow and transport in highly heterogeneous aquifer systems.

  2. Surface water pesticide modelling for decision support in drinking water production (United States)

    Desmet, Nele; Dams, Jef; Bronders, Jan; Peleman, Gisèle; Verdickt, Liesbeth


    The occurrence of pesticides and other contaminants in river systems may compromise the use of surface water for drinking water production. To reduce the cost of removal of pesticides from the raw water, drinking water companies can: search for other raw water sources, invest in water storage capacity to overcome periods with high pesticide concentrations (often related to the application period), or impose measures to reduce the emission of pesticides to surface water (i.e. sustainable application strategies or use restrictions). To select the most appropriate water management options, the costs and effects of the aforementioned actions need to be evaluated. This evaluation requires knowledge on the concentrations and loads of pesticides at the point of drinking water abstraction, as well as insight in the contribution and the temporal variability of different sources or subbasins. In such a case, a modelling approach can assist in generating measurement-based datasets and to compare different scenarios for water management. We illustrate how a modelling approach can provide decision support for water management related to drinking water abstraction from surface water in a catchment that suffers from elevated pesticide concentrations. The study area is a water production center (WPC) located in northwestern Belgium. The WPC abstracts raw water from the river IJzer or from a natural pond and its connected streams. The available quantities as well as the quality of the water vary throughout the year. The WPC uses a reservoir of 3 million m³ to capture and store raw water to overcome periods with limited water availability and/or poor water quality. However, the pressure on water increases and in the future this buffering capacity might be no longer sufficient to fulfill the drinking water production demand. A surface water quality model for the area is set up using InfoWorks RS. The model is applied to obtain insight in the concentrations and loads at the different

  3. Modeling of Kinetics of Air Entrainment in Water Produced by Vertically Falling Water Flow

    Directory of Open Access Journals (Sweden)



    Full Text Available This study analyzes the process of air entrainment in water caused by vertically falling water flow in the free water surface. The new kinetic model of air entrainment in water was developed. This model includes the process of air entrapment, as well as air removal, water sputtering and resorption. For the experimental part of this study a new method based on digital image processing was developed. Theoretical and experimental methods were used for determining air concentration and its distribution in water below the air-water interface. A new presented mathematical model of air entrainment process allows determining of air bubbles and water droplets concentrations distribution. The obtained theoretical and experimental results were in good agreement. DOI:

  4. Evaluating water conservation and reuse policies using a dynamic water balance model. (United States)

    Qaiser, Kamal; Ahmad, Sajjad; Johnson, Walter; Batista, Jacimaria R


    A dynamic water balance model is created to examine the effects of different water conservation policies and recycled water use on water demand and supply in a region faced with water shortages and significant population growth, the Las Vegas Valley (LVV). The model, developed using system dynamics approach, includes an unusual component of the water system, return flow credits, where credits are accrued for returning treated wastewater to the water supply source. In LVV, Lake Mead serves as, both the drinking water source and the receiving body for treated wastewater. LVV has a consumptive use allocation from Lake Mead but return flow credits allow the water agency to pull out additional water equal to the amount returned as treated wastewater. This backdrop results in a scenario in which conservation may cause a decline in the available water supply. Current water use in LVV is 945 lpcd (250 gpcd), which the water agency aims to reduce to 752 lpcd (199 gpcd) by 2035, mainly through water conservation. Different conservation policies focused on indoor and outdoor water use, along with different population growth scenarios, are modeled for their effects on the water demand and supply. Major contribution of this study is in highlighting the importance of outdoor water conservation and the effectiveness of reducing population growth rate in addressing the future water shortages. The water agency target to decrease consumption, if met completely through outdoor conservation, coupled with lower population growth rate, can potentially satisfy the Valley's water demands through 2035.


    Directory of Open Access Journals (Sweden)

    Wojciech Kruszyński


    Full Text Available The paper presents the results of computer modeling of flowsand the age of the water in two rural communi-ties province Podlasie - Rutka and Jeleniewo. The model is made using Epanet. In the study, a series of variants of models simulating the behavior of existing distribution systems and water analyzes were performed century. Analysis of the age of the water in water works modeled showed areas where standing water is aging, not having the estuary and not giving way to fresh. Age of water in the pipes is an important indicator of its quality and shelf life. The longer standing water in the aqueduct, the more likely that it will develop dangerous bacteria and produce deposits which remain on the walls of the ducts.

  6. Petrogenesis and tectonomagmatic significance of Eocene mafic intrusions from the Neotethyan suture zone in the Muslim Bagh-Khanozai region, Pakistan


    Kerr, Andrew; Lavis, Owain; Kakar, M. Ishaq; McDonald, Iain


    New geochemical data for mafic intrusions within the Eocene Nisai Formation along the suture zone between the Indian and Eurasian plates are used to constrain their petrogenesis and assess the local tectonics and mantle dynamics. Petrological and geochemical data indicate that these alkalic intrusions have moderately enriched incompatible trace element compositions similar to ocean island basalt magmatism. Modelling suggests that these intrusions are the result of 1–5% melting of a deep, enri...

  7. Fact Sheets and Letter to Residents: St. Louis Park Vapor Intrusion Site (United States)

    Fact Sheets and letters to residents related to the St. Louis Park Vapor Intrusion site. Samples of ground water taken in St. Louis Park in 2005 and 2006 by the Minnesota Pollution Control Agency were found to contain volatile organic compounds, VOCs.

  8. Investigation of Seawater Intrusion into Coastal Groundwater ...

    African Journals Online (AJOL)


    quality of groundwater and accountable for lack of access to freshwater in the areas under study. The objective of this study is to use ... groundwater quality has been compromised by intrusion of saltwater. We conclude that there is potential of ..... Quality and Evolution in an Estuary. Environment: A Case Study of Burutu ...

  9. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  10. Investigation of Seawater Intrusion into Coastal Groundwater ...

    African Journals Online (AJOL)

    ADOWIE PERE Key words: Escravos, Vertical electrical sounding, Saltwater Intrusion, freshwater lenses, Aquifer, groundwater ... is one sure way of early detection. The reason is that remediation is quite ... systems, the depositional energy tends to decrease as the river approaches the mouth of the ...

  11. An Adaptive Database Intrusion Detection System (United States)

    Barrios, Rita M.


    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  12. Chemical Observations of a Polar Vortex Intrusion (United States)

    Schoeberl, M. R.; Kawa, S. R.; Douglass, A. R.; McGee, T. J.; Browell, E.; Waters, J.; Livesey, N.; Read, W.; Froidevaux, L.


    An intrusion of vortex edge air in D the interior of the Arctic polar vortex was observed on the January 31,2005 flight of the NASA DC-8 aircraft. This intrusion was identified as anomalously high values of ozone by the AROTAL and DIAL lidars. Our analysis shows that this intrusion formed when a blocking feature near Iceland collapsed, allowing edge air to sweep into the vortex interior. along the DC-8 flight track also shows the intrusion in both ozone and HNO3. Polar Stratospheric Clouds (PSCs) were observed by the DIAL lidar on the DC-8. The spatial variability of the PSCs can be explained using MLS HNO3 and H2O observations and meteorological analysis temperatures. We also estimate vortex denitrification using the relationship between N2O and HNO3. Reverse domain fill back trajectory calculations are used to focus on the features in the MLS data. The trajectory results improve the agreement between lidar measured ozone and MLS ozone and also improve the agreement between the HNO3 measurements PSC locations. The back trajectory calculations allow us to compute the local denitrification rate and reduction of HCl within the filament. We estimate a denitrification rate of about lO%/day after exposure to below PSC formation temperature. Analysis of Aura MLS observations made

  13. Brumalia Tholus: A magmatic intrusion on Vesta (United States)

    Buczkowski, D.; De Sanctis, M.; Raymond, C.; Wyrick, D.; Williams, D.; Toplis, M.; Ammannito, E.; Frigeri, A.; Tosi, F.; Nathues, A.; Hoffman, M.; Russell, C.


    Geologic mapping of the asteroid Vesta [1] resulted in the identification of an unusual hill, now named Brumalia Tholus. We here present our hypotheses that Brumalia Tholus represents a dike that formed due to magmatic intrusion into subsurface fractures under the Vestalia Terra plateau (VT).

  14. Vapor Intrusion Characterization Report (Revision 1.0) (United States)

    Vapor Intrusion Characterization Report (Revision 1) - February 5, 2015: This report, which was approved by the EPA on February 18, 2015, documents the results from implementation of the Final Vapor Intrusion Characterization Work Plan.

  15. On the Feasibility of Intrusion Detection Inside Workstation Disks

    National Research Council Canada - National Science Library

    Griffin, John L; Pennington, Adam; Bucy, John S; Choundappan, Deepa; Muralidharan, Nithya; Ganger, Gregory R


    Storage-based intrusion detection systems (IDSs) can be valuable tools in monitoring for and notifying administrators of malicious software executing on a host computer, including many common intrusion tool kits...

  16. Urban-Water Harmony model to evaluate the urban water management. (United States)

    Ding, Yifan; Tang, Deshan; Wei, Yuhang; Yin, Sun


    Water resources in many urban areas are under enormous stress due to large-scale urban expansion and population explosion. The decision-makers are often faced with the dilemma of either maintaining high economic growth or protecting water resources and the environment. Simple criteria of water supply and drainage do not reflect the requirement of integrated urban water management. The Urban-Water Harmony (UWH) model is based on the concept of harmony and offers a more integrated approach to urban water management. This model calculates four dimensions, namely urban development, urban water services, water-society coordination, and water environment coordination. And the Analytic Hierarchy Process has been used to determine the indices weights. We applied the UWH model to Beijing, China for an 11-year assessment. Our findings show that, despite the severe stress inherent in rapid development and water shortage, the urban water relationship of Beijing is generally evolving in a positive way. The social-economic factors such as the water recycling technologies contribute a lot to this change. The UWH evaluation can provide a reasonable analysis approach to combine various urban and water indices to produce an integrated and comparable evaluation index. This, in turn, enables more effective water management in decision-making processes.

  17. Discrete states of attention during active visual fixation revealed by Markovian analysis of the time series of intrusive saccades. (United States)

    Korda, Alexandra I; Koliaraki, Mariniki; Asvestas, Pantelis A; Matsopoulos, George K; Ventouras, Errikos M; Ktonas, Periklis Y; Smyrnis, Nikolaos


    The frequency of intrusive saccades during maintenance of active visual fixation has been used as a measure of sustained visual attention in studies of healthy subjects as well as of neuropsychiatric patient populations. In this study, the mechanism that generates intrusive saccades during active visual fixation was investigated in a population of young healthy men performing three sustained fixation tasks (fixation to a visual target, fixation to a visual target with visual distracters, and fixation straight ahead in the dark). Markov Chain modeling of inter-saccade intervals (ISIs) was utilized. First- and second-order Markov modeling provided indications for the existence of a non-random pattern in the production of intrusive saccades. Accordingly, the system of intrusive saccade generation may operate in two "attractor" states, one in which intrusive saccades occur at short consecutive ISIs and another in which intrusive saccades occur at long consecutive ISIs. These states might correspond to two distinct states of the attention system, one of low focused - high distractibility and another of high focused - low distractibility, such as those proposed in the adaptive gain theory for the control of attention by the noradrenergic system in the brain. To the authors knowledge, this is the first time that Markov Chain modeling has been applied to the analysis of the ISIs of intrusive saccades. Copyright © 2016 IBRO. Published by Elsevier Ltd. All rights reserved.

  18. Effects of spatially distributed sectoral water management on the redistribution of water resources in an integrated water model (United States)

    Voisin, Nathalie; Hejazi, Mohamad I.; Leung, L. Ruby; Liu, Lu; Huang, Maoyi; Li, Hong-Yi; Tesfa, Teklu


    Realistic representations of sectoral water withdrawals and consumptive demands and their allocation to surface and groundwater sources are important for improving modeling of the integrated water cycle. To inform future model development, we enhance the representation of water management in a regional Earth system (ES) model with a spatially distributed allocation of sectoral water demands simulated by a regional integrated assessment (IA) model to surface and groundwater systems. The integrated modeling framework (IA-ES) is evaluated by analyzing the simulated regulated flow and sectoral supply deficit in major hydrologic regions of the conterminous U.S, which differ from ES studies looking at water storage variations. Decreases in historical supply deficit are used as metrics to evaluate IA-ES model improvement in representating the complex sectoral human activities for assessing future adaptation and mitigation strategies. We also assess the spatial changes in both regulated flow and unmet demands, for irrigation and nonirrigation sectors, resulting from the individual and combined additions of groundwater and return flow modules. Results show that groundwater use has a pronounced regional and sectoral effect by reducing water supply deficit. The effects of sectoral return flow exhibit a clear east-west contrast in the hydrologic patterns, so the return flow component combined with the IA sectoral demands is a major driver for spatial redistribution of water resources and water deficits in the US. Our analysis highlights the need for spatially distributed sectoral representation of water management to capture the regional differences in interbasin redistribution of water resources and deficits.

  19. Geochemical Modeling of ILAW Lysimeter Water Extracts

    Energy Technology Data Exchange (ETDEWEB)

    Cantrell, Kirk J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)


    Geochemical modeling results of water extracts from simulated immobilized low-activity waste (ILAW) glasses, placed in lysimeters for eight years suggest that the secondary phase reaction network developed using product consistency test (PCT) results at 90°C may need to be modified for field conditions. For sediment samples that had been collected from near the glass samples, the impact of glass corrosion could be readily observed based upon the pH of their water extracts. For unimpacted sediments the pH ranged from 7.88 to 8.11 with an average of 8.04. Sediments that had observable impacts from glass corrosion exhibited elevated pH values (as high as 9.97). For lysimeter sediment samples that appear to have been impacted by glass corrosion to the greatest extent, saturation indices determined for analcime, calcite, and chalcedony in the 1:1 water extracts were near equilibrium and were consistent with the secondary phase reaction network developed using PCT results at 90°C. Fe(OH)3(s) also appears to be essentially at equilibrium in extracts impacted by glass corrosion, but with a solubility product (log Ksp) that is approximately 2.13 units lower than that used in the secondary phase reaction network developed using PCT results at 90°C. The solubilities of TiO2(am) and ZrO2(am) also appear to be much lower than that assumed in the secondary phase reaction network developed using PCT results at 90°C. The extent that the solubility of TiO2(am) and ZrO2(am) were reduced relative to that assumed in the secondary phase reaction network developed using PCT results at 90°C could not be quantified because the concentrations of Ti and Zr in the extracts were below the estimated quantification limit. Gibbsite was consistently highly oversaturated in the extract while dawsonite was at or near equilibrium. This suggests that dawsonite might be a more suitable phase for the secondary phase reaction network

  20. Integrating the simulation of domestic water demand behaviour to an urban water model using agent based modelling (United States)

    Koutiva, Ifigeneia; Makropoulos, Christos


    The urban water system's sustainable evolution requires tools that can analyse and simulate the complete cycle including both physical and cultural environments. One of the main challenges, in this regard, is the design and development of tools that are able to simulate the society's water demand behaviour and the way policy measures affect it. The effects of these policy measures are a function of personal opinions that subsequently lead to the formation of people's attitudes. These attitudes will eventually form behaviours. This work presents the design of an ABM tool for addressing the social dimension of the urban water system. The created tool, called Urban Water Agents' Behaviour (UWAB) model, was implemented, using the NetLogo agent programming language. The main aim of the UWAB model is to capture the effects of policies and environmental pressures to water conservation behaviour of urban households. The model consists of agents representing urban households that are linked to each other creating a social network that influences the water conservation behaviour of its members. Household agents are influenced as well by policies and environmental pressures, such as drought. The UWAB model simulates behaviour resulting in the evolution of water conservation within an urban population. The final outcome of the model is the evolution of the distribution of different conservation levels (no, low, high) to the selected urban population. In addition, UWAB is implemented in combination with an existing urban water management simulation tool, the Urban Water Optioneering Tool (UWOT) in order to create a modelling platform aiming to facilitate an adaptive approach of water resources management. For the purposes of this proposed modelling platform, UWOT is used in a twofold manner: (1) to simulate domestic water demand evolution and (2) to simulate the response of the water system to the domestic water demand evolution. The main advantage of the UWAB - UWOT model

  1. Photoelastic analysis of stress generated by Connecticut Intrusion Arch (CIA) (United States)

    Schwertner, Alessandro; de Almeida, Renato Rodrigues; Gonini, Alcides; de Almeida, Marcio Rodrigues


    ABSTRACT Objective: The present in vitro study evaluated, by means of the photoelastic technique, the effects generated by the Connecticut Intrusion Arch (CIA), with a 90o bend on the distal surface of molar tubes and using the 4 x 2 appliance on the anterior and posterior regions of the upper dental arch. Methods: Five models were manufactured, in which two different clinical situations were correlated: 1) use of intrusion arch not cinched back and transpalatal bar for anchorage (Group 1); 2) use of intrusion arch cinched back and transpalatal bar for anchorage (Group 2). Stress generated in the apical and middle regions of tooth roots of maxillary anterior teeth and maxillary first molars was evaluated. Results: Taking a reference value of 1.0 MPa = 100%, qualitative descriptive analysis was performed, which showed uniformity between stress values in the apical region of anterior teeth of both groups (G1 and G2). In the posterior region, for models with the arch cinched back (G2), stress remained within 100%. As for G1 models (with the arch not cinched back), variations in the mesial surface of first molars were observed, with an increase of 20% in the generated stress. The apical region did not undergo any changes, while in the distal region of molars there was a decrease of 20% in stress. Conclusion: Laboratory results revealed differences in stress between Groups 1 and 2 in the molar region, thereby indicating that there was a tendency towards mesial root tipping of first molars when the distal end of the CIA was not cinched back. PMID:28444014

  2. Maternal intrusiveness, family financial means, and anxiety across childhood in a large multiphase sample of community youth (United States)

    Cooper-Vince, Christine E.; Pincus, Donna B.; Comer, Jonathan S.


    Intrusive parenting has been positively associated with child anxiety, although examinations of this relationship to date have been largely confined to middle to upper middle class families and have rarely used longitudinal designs. With several leading interventions for child anxiety emphasizing the reduction of parental intrusiveness, it is critical to determine whether the links between parental intrusiveness and child anxiety broadly apply to families of all financial means, and whether parental intrusiveness prospectively predicts the development of child anxiety. This study employed latent growth curve analysis to evaluate the interactive effects of maternal intrusiveness and financial means on the developmental trajectory of child anxiety from 1st grade to age 15 in 1,121 children (50.7% male) and their parents from the NICHD SECCYD. The overall model was found to provide good fit, revealing that early maternal intrusiveness and financial means did not impact individual trajectories of change in child anxiety, which were stable from 1st to 5th grade, and then decrease from 5th grade to age 15. Cross-sectional analyses also examined whether family financial means moderated contemporaneous relationships between maternal intrusiveness and child anxiety in 3rd and 5th grades. The relationship between maternal intrusiveness and child anxiety was moderated by family financial means for 1st graders, with stronger links found among children of lower family financial means, but not for 3rd and 5th graders. Neither maternal intrusiveness nor financial means in 1st grade predicted subsequent changes in anxiety across childhood. Findings help elucidate for whom and when maternal intrusiveness has the greatest link with child anxiety and can inform targeted treatment efforts. PMID:23929005

  3. A novel water poverty index model for evaluation of Chinese regional water security (United States)

    Gong, L.; Jin, C. L.; Li, Y. X.; Zhou, Z. L.


    This study proposed an improved Water Poverty Index (WPI) model employed in evaluating Chinese regional water security. Firstly, the Chinese WPI index system was constructed, in which the indicators were obtained according to China River reality. A new mathematical model was then established for WPI values calculation on the basis of Center for Ecology and Hydrology (CEH) model. Furthermore, this new model was applied in Shiyanghe River (located in western China). It turned out that the Chinese index system could clearly reflect the indicators threatening security of river water and the Chinese WPI model is feasible. This work has also developed a Water Security Degree (WSD) standard which is able to be regarded as a scientific basis for further water resources utilization and water security warning mechanism formulation.

  4. Modelling highly variable daily maximum water temperatures in a ...

    African Journals Online (AJOL)

    ... hourly water temperatures were used to calculate daily maximum water temperatures for nine sites within the Sabie-Sand River system, Mpumalanga Province, South Africa. A suite of statistical models for simulating daily maximum water temperatures, of differing complexity and using inputs of air temperature, flow rates, ...

  5. Modelling Forest Water Consumption in The Netherlands

    NARCIS (Netherlands)

    Dolman, A.J.; Nonhebel, S.


    The water consumption of oak, beech, spruce and pine forest is predicted from routinely measured meteorological data for five locations in the Netherlands. Differences in water consumption are found to be primarily a result of differences in interception loss. Predicted interception loss was found

  6. Water Management in England: A Regional Model (United States)

    Okun, Daniel A.


    Reorganization of authorities resulting in sound direction, greater flexibility, and more attention to cost effectiveness has helped the British achieve a high quality of water service. The history and development of British water management are reviewed and more cooperation between federal and state agencies is encouraged. (BT)

  7. Geophysical modeling of the static water level

    Energy Technology Data Exchange (ETDEWEB)

    Bochicchio, R.


    The objective of this study is to determine if a geophysical investigation technique could be used to delineate depth to static water level to within 20 meters in several areas of the Nevada Test Site (NTS). Using noninvasive geophysical methods to obtain water-level data is potentially faster and more cost-effective than drilling wells, especially in the areas concerned, where water-level depths vary from approximately 200 to 600 meters. Electrical geophysical methods are well-suited for water-level delineation. The depth to the static water level is often related to that of the saturated zone, and the saturated zone often has a different electrical resistivity character than the adjacent unsaturated material. Most of the time, this will be a resistivity decrease, due to the presence of water instead of air in the pore spaces. However, a saturated zone with a resistive matrix may show a resistivity increase compared to an unsaturated layer composed of more conductive material, such as clay. The analytical method is to use known depths and electrical resistivities of the static water level to obtain simulated geophysical field data. These simulated data are referred to as the synthetic sounding curve. The synthetic sounding curve will be analyzed to see if it can be used to predict the static water level. 8 refs., 22 figs.

  8. Modelling anisotropic water transport in polymer composite ...

    Indian Academy of Sciences (India)

    Abstract. This work reports anisotropic water transport in a polymer composite consisting of an epoxy matrix reinforced with aligned triangular bars made of vinyl ester. By gravimetric experiments, water diffusion in resin and polymer composites were characterized. Parameters for Fickian diffusion and polymer relaxation ...

  9. Model predictive control of water management in PEMFC (United States)

    Zhang, Liyan; Pan, Mu; Quan, Shuhai

    Water management is critical for Proton Exchange Membrane Fuel Cells (PEMFC). An appropriate humidity condition not only can improve the performances and efficiency of the fuel cell, but can also prevent irreversible degradation of internal composition such as the catalyst or the membrane. In this paper we built the model of water management systems which consist of stack voltage model, water balance equation in anode and cathode, and water transport process in membrane. Based on this model, model predictive control mechanism was proposed by utilizing Recurrent Neural Network (RNN) optimization. The models and model predictive controller have been implemented in the MATLAB and SIMULINK environment. Simulation results showed that this approach can avoid fluctuation of water concentration in cathode and can extend the lifetime of PEM fuel cell stack.

  10. A model to assess water tariffs as part of water demand management

    African Journals Online (AJOL)

    Water Conservation and Water Demand Management (WC/WDM) forms part of integrated water resource management and can be used as an economically viable alternative to the upgrade of infrastructure to balance supply and demand. In order to enable effective decision-making, a model was developed in this study to ...

  11. Insights on the energy-water nexus through modeling of the integrated water cycle (United States)

    Leung, L. R.; Li, H. Y.; Zhang, X.; Wan, W.; Voisin, N.; Leng, G.


    For sustainable energy planning, understanding the impacts of climate change, land use change, and water management is essential as they all exert notable controls on streamflow and stream temperature that influence energy production. An integrated water model representing river processes, irrigation water use and water management has been developed and coupled to a land surface model to investigate the energy-water nexus. Simulations driven by two climate change projections with the RCP 4.5 and RCP 8.5 emissions scenarios, with and without water management, are analyzed to evaluate the individual and combined effects of climate change and water management on streamflow and stream temperature. The simulations revealed important impacts of climate change and water management on both floods and droughts. The simulations also revealed the dynamics of competition between changes in water demand and water availability in the climate mitigation (RCP 4.5) and business as usual (RCP 8.5) scenarios that influence streamflow and stream temperature, with important consequences to energy production. The integrated water model is being implemented to the Accelerated Climate Modeling for Energy (ACME) to enable investigation of the energy-water nexus in the fully coupled Earth system.

  12. Water supply and demand in an energy supply model

    Energy Technology Data Exchange (ETDEWEB)

    Abbey, D; Loose, V


    This report describes a tool for water and energy-related policy analysis, the development of a water supply and demand sector in a linear programming model of energy supply in the United States. The model allows adjustments in the input mix and plant siting in response to water scarcity. Thus, on the demand side energy conversion facilities can substitute more costly dry cooling systems for conventional evaporative systems. On the supply side groundwater and water purchased from irrigators are available as more costly alternatives to unappropriated surface water. Water supply data is developed for 30 regions in 10 Western states. Preliminary results for a 1990 energy demand scenario suggest that, at this level of spatial analysis, water availability plays a minor role in plant siting. Future policy applications of the modeling system are discussed including the evaluation of alternative patterns of synthetic fuels development.

  13. Clinical Evaluation of Efficacy of CIA and CNA Intrusion Arches. (United States)

    Sharma, Swati; Vora, Sambhav; Pandey, Vinisha


    Excessive overbite is one of the most common problems that confront the orthodontist. Deep bite can be due to infraocclusion of posterior teeth, supraocclusion of anterior teeth or a combination of the two. Correction of same can be carried out by extrusion of molars, intrusion of incisors or by a combination of both respectively. Various intrusion arches are recommended for correcting deep bite by true intrusion of anterior teeth, Utility arches, Segmental arch, Connecticut Intrusion Arch (CIA) and Connecticut New Arch (CNA). The purpose of this study was to evaluate clinical efficacy of CIA and CNA intrusion arches. Tracings recorded from pre and post-treatment lateral cephalograms of 25 patients treated by CIA (Group I) and another 25 patients treated by CNA (Group II) intrusion arches in deep bite cases after four months of treatment were analysed and findings were recorded. Paired t-test was used to compare pre and post-treatment changes within Groups I and II and unpaired t-test was used to compare treatment changes between Group I and Group II. A P-value of intrusion takes place with CIA intrusion arch and 1.3mm with CNA intrusion arch in a period of 4 months. Both intrusion arches do not affect the position of molar in vertical or anteroposterior plane. Both CIA and CNA intrusion arches are effective in bringing about intrusion of lower incisors.

  14. An evaluation of classification algorithms for intrusion detection ...

    African Journals Online (AJOL)

    Intrusion detection system is one of the main technologies that is urgently used to monitor network traffics and identify network intrusions. Most of the available IDSs use all the 41 features in the network to evaluate and search for intrusive pattern in which some of them are redundant and irrelevant and they also generate a ...

  15. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    CEP which is a push-based system can process streaming data to identify the intrusion patterns in near real time and respond to the threats. An Intrusion Detection System (IDS) based on single sensor may fail to give accurate identification of intrusion. Hence there is a need for multisensor based IDS. A multisensor-based ...

  16. Storm water modeling at Lawrence Livermore National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Veis, Christopher [Montana Tech of the Univ. of Montana, Butte, MT (United States)


    Storm water modeling is important to Lawrence Livermore National Laboratory (LLNL) for compliance with regulations that govern water discharge at large industrial facilities. Modeling is also done to study trend in contaminants and storm sewer infrastructure. The Storm Water Management Model (SWMM) was used to simulate rainfall events at LLNL. SWMM is a comprehensive computer model for simulation of urban runoff quantity and quality in storm and combined sewer systems. Due to time constraints and ongoing research, no modeling was completed at LLNL. With proper information about the storm sewers, a SWMM simulation of a rainfall event on site would be beneficial to storm sewer analyst.

  17. River water quality model no. 1 (RWQM1): I. Modelling approach

    DEFF Research Database (Denmark)

    Shanahan, P.; Borchardt, D.; Henze, Mogens


    Successful river water quality modelling requires the specification of an appropriate model structure and process formulation. Both must be related to the compartment structure of running water ecosystems including their longitudinal, vertical, and lateral zonation patterns. Furthermore...

  18. Water balance modelling of a uranium mill effluent management system (United States)

    Plagnes, Valérie; Schmid, Brad; Mitchell, Brett; Judd-Henrey, Ian


    A water balance model was developed to forecast the management strategy of a uranium mill effluent system, located in northern Saskatchewan, Canada. Mining and milling operations, such as pit dewatering or treated effluent release, can potentially influence the hydrology and the water quality downstream of the operations. This study presents the methodology used to predict water volumes and water quality discharging downstream in surface water bodies. A compartment model representing the three subsequent lakes included in the management system was set up using the software GoldSim®. The water balance allows predicting lake volumes at the daily time step. A mass balance model developed for conservative elements was also developed and allows validating the proportions of inputs and outputs issued from the water balance model. This model was then used as predictive tool to evaluate the impact of different scenarios of effluents management on volumes and chemistry of surface water for short and longer time periods. An additional significant benefit of this model is that it can be used as an input for geochemical modelling to predict the concentrations of all constituents of concern in the receiving surface water.

  19. On the relation between crustal deformation and seismicity during the 2012-2014 magmatic intrusions in El Hierro island. (United States)

    Domínguez Cerdeña, Itahiza; García-Cañada, Laura; Ángeles Benito Saz, María; Del Fresno, Carmen


    The last volcanic eruption in the Canary Islands took place in 2011 less than 2 km offshore El Hierro island, after 3 months of measuring surface deformation (up to 5 cm) and locating more than 10 000 earthquakes. In the two years following the end of the submarine eruption on 5 March 2012, six deep magmatic intrusions were recorded beneath the island. Despite the short time duration of these intrusions, these events have been more energetic that the 2011 pre-eruptive intrusive event but none of them ended in a new eruption. These post-eruptive reactivations are some of the few examples in the world of well monitored magmatic intrusions related with monogenetic volcanism. In order to understand these processes we have analyzed the geodetic and seismic data with different techniques. First, we did a joint hypocentral relocation of the six seismic swarms, including more than 6 300 events, to analyze the relative distribution of the earthquakes from different intrusions. The uncertainties of the earthquakes relocations was reduced to an average value of 300 m. New earthquakes' distribution shows the alignments of the different intrusions and a temporal migration of the events to larger depths. Moreover, we show the results of the ground deformation using GPS data from the network installed on the island (for each of the six intrusive events) and their inversion considering spherical models. In most of the intrusions the optimal source model was shallower and southern than the corresponding seismicity hypocenters. The intruded magma volume ranges from 0.02 to 0.13 km3. Finally, we also computed the b value from the Gutenberg Richter equation by means of a bootstrap method. The spatial and temporal evolution of the b value for the seismicity show a clear correlation with the temporal evolution of the crustal deformation. The six magma intrusions can be grouped, depending on their location, in three pairs each one associated with each of the three active rifts of El

  20. Numerical and Qualitative Contrasts of Two Statistical Models for Water Quality Change in Tidal Waters (United States)

    Two statistical approaches, weighted regression on time, discharge, and season and generalized additive models, have recently been used to evaluate water quality trends in estuaries. Both models have been used in similar contexts despite differences in statistical foundations and...

  1. Modeling Equity for Alternative Water Rate Structures (United States)

    Griffin, R.; Mjelde, J.


    The rising popularity of increasing block rates for urban water runs counter to mainstream economic recommendations, yet decision makers in rate design forums are attracted to the notion of higher prices for larger users. Among economists, it is widely appreciated that uniform rates have stronger efficiency properties than increasing block rates, especially when volumetric prices incorporate intrinsic water value. Yet, except for regions where water market purchases have forced urban authorities to include water value in water rates, economic arguments have weakly penetrated policy. In this presentation, recent evidence will be reviewed regarding long term trends in urban rate structures while observing economic principles pertaining to these choices. The main objective is to investigate the equity of increasing block rates as contrasted to uniform rates for a representative city. Using data from four Texas cities, household water demand is established as a function of marginal price, income, weather, number of residents, and property characteristics. Two alternative rate proposals are designed on the basis of recent experiences for both water and wastewater rates. After specifying a reasonable number (~200) of diverse households populating the city and parameterizing each household's characteristics, every household's consumption selections are simulated for twelve months. This procedure is repeated for both rate systems. Monthly water and wastewater bills are also computed for each household. Most importantly, while balancing the budget of the city utility we compute the effect of switching rate structures on the welfares of households of differing types. Some of the empirical findings are as follows. Under conditions of absent water scarcity, households of opposing characters such as low versus high income do not have strong preferences regarding rate structure selection. This changes as water scarcity rises and as water's opportunity costs are allowed to

  2. TAPWAT: Definition structure and applications for modelling drinking water treatment

    NARCIS (Netherlands)

    Versteegh JFM; Gaalen FW van; Rietveld LC; Evers EG; Aldenberg TA; Cleij P; Technische Universiteit Delft; LWD


    The 'Tool for the Analysis of the Production of drinking WATer' (TAPWAT) model has been developed for describing drinking-water quality in integral studies in the context of the Environmental Policy Assessment of the RIVM. The model consists of modules that represent individual steps in a treatment

  3. Water quality modelling and optimisation of wastewater treatment ...

    African Journals Online (AJOL)

    Instream water quality management encompasses field monitoring and utilisation of mathematical models. These models can be coupled with optimisation techniques to determine more efficient water quality management alternatives. Among these activities, wastewater treatment plays a crucial role. In this work, a ...

  4. Modelling the economic tradeoffs between allocating water for crop ...

    African Journals Online (AJOL)


    Jun 5, 2009 ... conditions of water scarcity a tradeoff exists between allocating water for salinity management and production. Currently no model in South Africa is able to model explicitly the impact of salinity management through leaching on the economic efficiency of ..... Resource constraints. Total production is ...

  5. The modeling of response indicators of integrated water resources ...

    African Journals Online (AJOL)

    category of Integrated Water Resources Management in the Saf-Safriver basin characterized by the fast growing demand of populations and economic sectors including industry and agriculture. The artificial neural networks models were used to model and predict the relationship between water resources mobilization WRM ...

  6. Offset Free Model Predictive Control of an Open Water Reach

    NARCIS (Netherlands)

    Aydin, B.E.; van Overloop, P.J.A.T.M.; Tian, X.; Piasecki, M.


    Model predictive control (MPC) is a powerful tool which is used more and more to managing water systems such as reservoirs over a short-term prediction horizon. However, due to unknown disturbances present in the water system and other uncertainties, there is always a mismatch between the model and

  7. A review of mathematical programming models of irrigation water ...

    African Journals Online (AJOL)

    Crops modelled influence water values, but there is no apparent relationship between objective function specification and average value. Nor does the number of irrigation options seem to influence water value either. The policy implication is that while similar models for the same region produce consistent estimates, each ...

  8. Macroscopic modeling of plant water uptake: soil and root resistances (United States)

    Vogel, Tomas; Votrubova, Jana; Dohnal, Michal; Dusek, Jaromir


    The macroscopic physically-based plant root water uptake (RWU) model, based on water-potential-gradient formulation (Vogel et al., 2013), was used to simulate the observed soil-plant-atmosphere interactions at a forest site located in a temperate humid climate of central Europe and to gain an improved insight into the mutual interplay of RWU parameters that affects the soil water distribution in the root zone. In the applied RWU model, the uptake rates are directly proportional to the potential gradient and indirectly proportional to the local soil and root resistances to water flow. The RWU algorithm is implemented in a one-dimensional dual-continuum model of soil water flow based on Richards' equation. The RWU model is defined by four parameters (root length density distribution, average active root radius, radial root resistance, and the threshold value of the root xylem potential). In addition, soil resistance to water extraction by roots is related to soil hydraulic conductivity function and actual soil water content. The RWU model is capable of simulating both the compensatory root water uptake, in situations when reduced uptake from dry layers is compensated by increased uptake from wetter layers, and the root-mediated hydraulic redistribution of soil water, contributing to more natural soil moisture distribution throughout the root zone. The present study focusses on the sensitivity analysis of the combined soil water flow and RWU model responses in respect to variations of RWU model parameters. Vogel T., M. Dohnal, J. Dusek, J. Votrubova, and M. Tesar. 2013. Macroscopic modeling of plant water uptake in a forest stand involving root-mediated soil-water redistribution. Vadose Zone Journal, 12, 10.2136/vzj2012.0154.

  9. Root water uptake model based on water potential gradient with water redistribution via roots: application to coniferous forest site (United States)

    Votrubova, Jana; Vogel, Tomas; Dohnal, Michal; Dusek, Jaromir; Tesar, Miroslav


    A simple macroscopic vertically distributed plant root water uptake (RWU) model based on traditional water-potential-gradient formulation (Vogel et al., 2013), in which the uptake rates are directly proportional to the potential gradient and indirectly proportional to the local soil and root resistances to water flow, was tested. This RWU modeling approach was implemented in a one-dimensional dual-continuum model of soil water flow based on Richards' equation and used to simulate soil water distribution changes during a vegetation season at a forest site located in a temperate humid climate of central Europe. The main objectives were to test the ability of the presented RWU model to simulate the observed soil-plant-atmosphere interactions, and to examine the differences between empirical and more physically-based RWU modeling approaches (accommodated in the same soil water flow model). The tested RWU model was capable of simulating both the compensatory root water uptake, in situations when reduced uptake from dry layers was compensated for by increased uptake from wetter layers, and the root-mediated hydraulic redistribution of soil water, contributing to more natural soil moisture distribution throughout the root zone. Comparison of the model results with the sap flow observed reveals some limitations related to the quasi-steady-state assumption for the plant xylem and zero transpiration rates prescribed during nights and precipitation. This stated, the model seems to simulate adequately both the regular nightly hydraulic redistribution, due to reduced night transpiration, and the episodic daytime hydraulic redistribution during wet canopy events. The model results were compared to simulations produced using the semi-empirical RWU model of Feddes. Based on both an improved agreement between the observed and simulated soil water pressure responses to daily variations of transpiration, and a more realistic seasonal distribution of the transpiration rate reduction

  10. Modelling Per Capita Water Demand Change to Support System Planning (United States)

    Garcia, M. E.; Islam, S.


    Water utilities have a number of levers to influence customer water usage. These include levers to proactively slow demand growth over time such as building and landscape codes as well as levers to decrease demands quickly in response to water stress including price increases, education campaigns, water restrictions, and incentive programs. Even actions aimed at short term reductions can result in long term water usage declines when substantial changes are made in water efficiency, as in incentives for fixture replacement or turf removal, or usage patterns such as permanent lawn watering restrictions. Demand change is therefore linked to hydrological conditions and to the effects of past management decisions - both typically included in water supply planning models. Yet, demand is typically incorporated exogenously using scenarios or endogenously using only price, though utilities also use rules and incentives issued in response to water stress and codes specifying standards for new construction to influence water usage. Explicitly including these policy levers in planning models enables concurrent testing of infrastructure and policy strategies and illuminates interactions between the two. The City of Las Vegas is used as a case study to develop and demonstrate this modeling approach. First, a statistical analysis of system data was employed to rule out alternate hypotheses of per capita demand decrease such as changes in population density and economic structure. Next, four demand sub-models were developed including one baseline model in which demand is a function of only price. The sub-models were then calibrated and tested using monthly data from 1997 to 2012. Finally, the best performing sub-model was integrated with a full supply and demand model. The results highlight the importance of both modeling water demand dynamics endogenously and taking a broader view of the variables influencing demand change.

  11. Assessing the urban water balance: the Urban Water Flow Model and its application in Cyprus. (United States)

    Charalambous, Katerina; Bruggeman, Adriana; Lange, Manfred A


    Modelling the urban water balance enables the understanding of the interactions of water within an urban area and allows for better management of water resources. However, few models today provide a comprehensive overview of all water sources and uses. The objective of the current paper was to develop a user-friendly tool that quantifies and visualizes all water flows, losses and inefficiencies in urban environments. The Urban Water Flow Model was implemented in a spreadsheet and includes a water-savings application that computes the contributions of user-selected saving options to the overall water balance. The model was applied to the coastal town of Limassol, Cyprus, for the hydrologic years 2003/04-2008/09. Data were collected from the different authorities and hydrologic equations and estimations were added to complete the balance. Average precipitation was 363 mm/yr, amounting to 25.4 × 10(6)m(3)/yr, more than double the annual potable water supply to the town. Surface runoff constituted 29.6% of all outflows, while evapotranspiration from impervious areas was 21.6%. Possible potable water savings for 2008/09 were estimated at 5.3 × 10(3) m(3), which is 50% of the total potable water provided to the area. This saving would also result in a 6% reduction of surface runoff.

  12. GlobWat - a global water balance model to assess water use in irrigated agriculture

    NARCIS (Netherlands)

    Hoogeveen, J.; Faures, J.M.; Peiser, L.; Burke, J.; Van de Giesen, N.C.


    GlobWat is a freely distributed, global soil water balance model that is used by the Food and Agriculture Organization (FAO) to assess water use in irrigated agriculture, the main factor behind scarcity of freshwater in an increasing number of regions. The model is based on spatially distributed

  13. An Agent Based Model of Household Water Use

    Directory of Open Access Journals (Sweden)

    Clinton J. Andrews


    Full Text Available Households consume a significant fraction of total potable water production. Strategies to improve the efficiency of water use tend to emphasize technological interventions to reduce or shift water demand. Behavioral water use reduction strategies can also play an important role, but a flexible framework for exploring the “what-ifs” has not been available. This paper introduces such a framework, presenting an agent-based model of household water-consuming behavior. The model simulates hourly water-using activities of household members within a rich technological and behavioral context, calibrated with appropriate data. Illustrative experiments compare the resulting water usage of U.S. and Dutch households and their associated water-using technologies, different household types (singles, families with children, and retired couples, different water metering regimes, and educational campaigns. All else equal, Dutch and metered households use less water. Retired households use more water because they are more often at home. Water-saving educational campaigns are effective for the part of the population that is receptive. Important interactions among these factors, both technological and behavioral, highlight the value of this framework for integrated analysis of the human-technology-water system.

  14. Stratospheric Intrusion-Influenced Ozone Air Quality Exceedances Investigated in the NASA MERRA-2 Reanalysis (United States)

    Knowland, K. E.; Ott, L. E.; Duncan, B. N.; Wargan, K.


    Stratospheric intrusions have been the interest of decades of research for their ability to bring stratospheric ozone (O3) into the troposphere with the potential to enhance surface O3 concentrations. However, these intrusions have been misrepresented in models and reanalyses until recently, as the features of a stratospheric intrusion are best identified in horizontal resolutions of 50 km or smaller. NASA's Modern-Era Retrospective Analysis for Research and Applications Version-2 (MERRA-2) reanalysis is a publicly available high-resolution data set (˜50 km) with assimilated O3 that characterizes O3 on the same spatiotemporal resolution as the meteorology. We demonstrate the science capabilities of the MERRA-2 reanalysis when applied to the evaluation of stratospheric intrusions that impact surface air quality. This is demonstrated through a case study analysis of stratospheric intrusion-influenced O3 exceedances in spring 2012 in Colorado, using a combination of observations, the MERRA-2 reanalysis and Goddard Earth Observing System Model, Version 5 simulations.

  15. Characteristics of Pressure Sensitive Paint Intrusiveness Effects on Aerodynamic Data (United States)

    Amer, Tahani R.; Liu, Tianshu; Oglesby, Donald M.


    One effect of using pressure sensitive paint (PSP) is the potential intrusiveness to the aerodynamic characteristics of the model. The paint thickness and roughness may affect the pressure distribution, and therefore, the forces and moments on the wind tunnel model. A study of these potential intrusive effects was carried out at NASA Langley Research Center where a series of wind tunnel tests were conducted using the Modem Design of Experiments (MDOE) test approach. The PSP effects on the integrated forces were measured on two different models at different test conditions in both the Low Turbulence Pressure Tunnel (LTPT) and the Unitary Plan Wind Tunnel (UPWT) at Langley. The paint effect was found to be very small over a range of Reynolds numbers, Mach numbers and angles of attack. This is due to the very low surface roughness of the painted surface. The surface roughness, after applying the NASA Langley developed PSP, was lower than that of the clean wing. However, the PSP coating had a localized effects on the pressure taps, which leads to an appreciable decrease in the pressure tap reading.

  16. Characterization of Pressure Sensitive Paint Intrusiveness Effects on Aerodynamic Data (United States)

    Amer, Tahani R.; Liu, Tianshu; Oglesby, Donald M.


    One effect of using pressure sensitive paint (PSP) is the potential intrusiveness to the aerodynamic characteristics of the model. The paint thickness and roughness may affect the pressure distribution. and therefore, the forces and moments on the wind tunnel model. A study of these potential intrusive effects was carried out at NASA Langley Research Center where a series of wind tunnel tests were conducted using the Modem Design of Experiments (MDOE) test approach. The PSP effects on the integrated forces were measured on two different models at different test conditions in both the Low Turbulence Pressure Tunnel (LTPT) and the Unitary Plan Wind Tunnel (UPWT) at Langley. The paint effect was found to be very small over a range of Reynolds numbers, Mach numbers and angles of attack. This is due to the very low surface roughness of the painted surface. The surface roughness, after applying the NASA Langley developed PSP, was lower than that of the clean wing. However, the PSP coating had a localized effects on the pressure taps, which leads to an appreciable decrease in the pressure tap reading.

  17. Research on IPv6 intrusion detection system Snort-based (United States)

    Shen, Zihao; Wang, Hui


    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  18. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan


    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  19. The Development of Agent Information for Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Bambang Sugiantoro


    Full Text Available As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has been gradually developed. Agent-based approach for intrusion detection system has developed from single to multi agent, and later developed mobile agents in order to increase system's capability to face with a more complex challenge and change. A number of studies had been identified that mobile agent can reduce network traffic, however the study related to intrusion detection using static and mobile agent for finding intruder has not been fully achieved.Keywords:  Information, Intrusion, mobile, networks

  20. A review of hydrological/water-quality models

    Directory of Open Access Journals (Sweden)

    Liangliang GAO,Daoliang LI


    Full Text Available Water quality models are important in predicting the changes in surface water quality for environmental management. A range of water quality models are wildly used, but every model has its advantages and limitations for specific situations. The aim of this review is to provide a guide to researcher for selecting a suitable water quality model. Eight well known water quality models were selected for this review: SWAT, WASP, QUALs, MIKE 11, HSPF, CE-QUAL-W2, ELCOM-CAEDYM and EFDC. Each model is described according to its intended use, development, simulation elements, basic principles and applicability (e.g., for rivers, lakes, and reservoirs and estuaries. Currently, the most important trends for future model development are: (1 combination models─individual models cannot completely solve the complex situations so combined models are needed to obtain the most appropriate results, (2 application of artificial intelligence and mechanistic models combined with non-mechanistic models will provide more accurate results because of the realistic parameters derived from non-mechanistic models, and (3 integration with remote sensing, geographical information and global position systems (3S ─3S can solve problems requiring large amounts of data.

  1. Better Insight Into Water Resources Management With Integrated Hydrodynamic And Water Quality Models (United States)

    Debele, B.; Srinivasan, R.; Parlange, J.


    Models have long been used in water resources management to guide decision making and improve understanding of the system. Numerous models of different scales -spatial and temporal - are available. Yet, very few models manage to bridge simulations of hydrological and water quality parameters from both upland watershed and riverine system. Most water quality models, such as QUAL2E and EPD-RIV1 concentrate on the riverine system while CE-QUAL-W2 and WASP models focus on larger waterbodies, such as lakes and reservoirs. On the other hand, the original SWAT model, HSPF and other upland watershed hydrological models simulate agricultural (diffuse) pollution sources with limited number of processes incorporated to handle point source pollutions that emanate from industrial sectors. Such limitations, which are common in most hydrodynamic and water quality models undermine better understanding that otherwise could be uncovered by employing integrated hydrological and water quality models for both upland watershed and riverine system. The SWAT model is a well documented and verified hydrological and water quality model that has been developed to simulate the effects of various management scenarios on the health of the environment in terms of water quantity and quality. Recently, the SWAT model has been extended to include the simulation of hydrodynamic and water quality parameters in the river system. The extended SWAT model (ESWAT) has been further extended to run using diurnally varying (hourly) weather data and produce outputs at hourly timescales. This and other improvements in the ESWAT model have been documented in the current work. Besides, the results from two case studies in Texas will be reported.

  2. Thermodynamic Model for the Ammonia-Water System

    DEFF Research Database (Denmark)

    Thomsen, Kaj; Rasmussen, Peter


    The ammonia-water system is described by the Extended UNIQUAC model, which is an electrolyte model, formed by combining the original UNIQUAC model, the Debye-Hückel law and the Soave-Redlich-Kwong equation of state. The model is limited to temperatures below the critical temperature of ammonia. V...

  3. Salt intrusion in tidal wetlands: European willow species tolerate oligohaline conditions (United States)

    Markus-Michalczyk, Heike; Hanelt, Dieter; Ludewig, Kristin; Müller, David; Schröter, Brigitte; Jensen, Kai


    Tidal wetlands experience salt intrusion due to the effects of climate change. This study clarifies that the European flood plain willows species Salix alba and Salix viminalis tolerate oligohaline conditions. Salix alba L. and Salix viminalis L. are distributed on flood plains up to transitional waters of the oligohaline to the mesohaline estuarine stretch in temperate climates. They experience spatial and temporal variations in flooding and salinity. In the past, willows dominated the vegetation above the mean high water line, attenuated waves and contributed to sedimentation. In recent centuries, human utilization reduced willow stands. Today, the Elbe estuary - a model system for an estuary in temperate zones - exhibits increasing flooding and salinity due to man-induced effects and climatic changes. Willows were described as having no salinity tolerance. In contrast, our soil water salinity measurements at willows in tidal wetlands prove that mature Salix individuals tolerate oligohaline conditions. To assess immature plant salinity tolerance, we conducted a hydroponic greenhouse experiment. Vegetative propagules originating from a freshwater and an oligohaline site were treated in four salinities. Related to growth rates and biomass production, we found interspecific similarities and a salinity tolerance up to salinity 2. Vitality and chlorophyll fluorescence indicated an acclimation of Salix viminalis to oligohaline conditions. We conclude, that the survival of S. alba and S. viminalis and the restoration of willow stands in estuarine flood plains - with regard to wave attenuation and sedimentation - might be possible, despite increasing salinity in times of climate change.

  4. A Structural Equation Modeling approach to water quality perceptions. (United States)

    Levêque, Jonas G; Burns, Robert C


    Researches on water quality perceptions have used various techniques and models to explain relationships between specific variables. Surprisingly, Structural Equation Modeling (SEM) has received little attention in water quality perceptions studies, and reporting has been inconsistent among existing studies. One objective of this article is to provide readers with a methodological example for conducting and reporting SEM. Another objective is to build a model that explains the different relationships among the diverse factors highlighted by previous studies on water quality perceptions. Our study focuses on the factors influencing people's perceptions of water quality in the Appalachian region. As such, researchers have conducted a survey in a mid-sized city in northcentral West Virginia to assess residents' perceptions of water quality for drinking and recreational purposes. Specifically, we aimed to understand the relationships between perceived water quality, health risk perceptions, organoleptic perceptions, environmental concern, area satisfaction and perceptions of surface water quality. Our model provided a good fit that explained about 50% of the variance in health risk perceptions and 43% of the variance in organoleptic perceptions. Environmental concern, area satisfaction and perceived surface water quality are important factors in explaining these variances. Perceived water quality was dismissed in our analysis due to multicollinearity. Our study demonstrates that risk communication needs to be better addressed by local decision-makers and water managers. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Global modelling of river water quality under climate change (United States)

    van Vliet, Michelle T. H.; Franssen, Wietse H. P.; Yearsley, John R.


    Climate change will pose challenges on the quality of freshwater resources for human use and ecosystems for instance by changing the dilution capacity and by affecting the rate of chemical processes in rivers. Here we assess the impacts of climate change and induced streamflow changes on a selection of water quality parameters for river basins globally. We used the Variable Infiltration Capacity (VIC) model and a newly developed global water quality module for salinity, temperature, dissolved oxygen and biochemical oxygen demand. The modelling framework was validated using observed records of streamflow, water temperature, chloride, electrical conductivity, dissolved oxygen and biochemical oxygen demand for 1981-2010. VIC and the water quality module were then forced with an ensemble of bias-corrected General Circulation Model (GCM) output for the representative concentration pathways RCP2.6 and RCP8.5 to study water quality trends and identify critical regions (hotspots) of water quality deterioration for the 21st century.

  6. Contextual representations of negative images modulate intrusion frequency in an intrusion provocation paradigm. (United States)

    Krans, J; Pearson, D G; Maier, B; Moulds, M L


    To understand how memories of negative events become highly accessible in the context of trauma, we tested the hypothesis that contextual information modulates how easily intrusions can be provoked by perceptual stimuli.. Healthy participants viewed pictures depicting trauma scenes either with or without accompanying moderate (i.e. survival, recovery) or severe (i.e. fatality, permanent injury) outcome information. All participants viewed the same depictions of trauma scenes. Involuntary memories for the pictures were assessed using self-report diaries and an adapted version of the Impact of Event Scales (IES). A blurred picture perceptual priming paradigm was adapted to be used as an intrusion provocation task. The severe outcome group experienced a significantly higher frequency of intrusions on the intrusion provocation task in comparison to both moderate outcome and control (no-context) conditions. The severe outcome condition did not increase intrusions on the self-report diaries or the adapted IES. There was no effect of condition on ratings for the emotionality, self-relevance, valence, or seriousness of the trauma scenes. The analogue method should not be generalized directly to incidences of real-life trauma. It was unclear why differences in intrusion frequency were found in the provocation task only. The relative amount of individual conceptual and data-driven processing adopted by the participants was not assessed. Manipulating contextual information that determines the meaning of sensory-perceptual features for a trauma scene can modulate subsequent intrusion frequency in response to visually similar cues. Copyright © 2015 Elsevier Ltd. All rights reserved.

  7. Modelling heterogeneous interfaces for solar water splitting (United States)

    Pham, Tuan Anh; Ping, Yuan; Galli, Giulia


    The generation of hydrogen from water and sunlight offers a promising approach for producing scalable and sustainable carbon-free energy. The key of a successful solar-to-fuel technology is the design of efficient, long-lasting and low-cost photoelectrochemical cells, which are responsible for absorbing sunlight and driving water splitting reactions. To this end, a detailed understanding and control of heterogeneous interfaces between photoabsorbers, electrolytes and catalysts present in photoelectrochemical cells is essential. Here we review recent progress and open challenges in predicting physicochemical properties of heterogeneous interfaces for solar water splitting applications using first-principles-based approaches, and highlights the key role of these calculations in interpreting increasingly complex experiments.

  8. Development of a Water Recovery System Resource Tracking Model (United States)

    Chambliss, Joe; Stambaugh, Imelda; Sargusingh, Miriam; Shull, Sarah; Moore, Michael


    A simulation model has been developed to track water resources in an exploration vehicle using Regenerative Life Support (RLS) systems. The Resource Tracking Model (RTM) integrates the functions of all the vehicle components that affect the processing and recovery of water during simulated missions. The approach used in developing the RTM enables its use as part of a complete vehicle simulation for real time mission studies. Performance data for the components in the RTM is focused on water processing. The data provided to the model has been based on the most recent information available regarding the technology of the component. This paper will describe the process of defining the RLS system to be modeled, the way the modeling environment was selected, and how the model has been implemented. Results showing how the RLS components exchange water are provided in a set of test cases.

  9. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    Sulfide intrusion in seagrasses represents a global threat to seagrasses and thereby an important parameter in resilience of seagrass ecosystems. In contrast seegrasses colonize and grow in hostile sediments, where they are constantly exposed to invasion of toxic gaseous sulfide. Remarkably little...... strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis, tracing sulfur compounds combined with ecosystem parameters we found different spatial, intraspecific and interspecific strategies to cope with sulfidic sediments. 1...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  10. In-situ trainable intrusion detection system (United States)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.


    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  11. Distributed fiber optic moisture intrusion sensing system (United States)

    Weiss, Jonathan D.


    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.


    Directory of Open Access Journals (Sweden)

    I. D. Rybkina


    Full Text Available The study of problem associated with water availability and its mapping is due to the need to solve urgent water problems of the Russian regions for their sustainable development. At the same time, sustainability is understood as rational use of water resources and their conservation to maintain the ecological balance of territories, and water security of regions is evaluated from the standpoint of water supply to municipalities. The shortage of water resources in Russia is perceived skeptically since our country is rich in water resources and the scarcity of fresh water threatens only a small part of its territory. However, the experts consider [Danilov-Danilyan, Galfan, 2015] that such a myopic point of view can lead in the long term to emergencies. The potential danger and risk of water use are already typical for the areas, which experience water stress. These are the territories with extremely low water availability per capita, less than 1.0-2.0 thousand m3/person/year [Shiklomanov, 2000; Danilov-Danilyan, Losev, 2006]. Geoinformation-cartographic modeling allows to differentiate the area under study according to water resource potential, to identify municipalities with low water availability and to estimate the population living in the area of potential danger and risk of water use.

  13. Moisture Absorption Model of Composites Considering Water Temperature Effect

    Directory of Open Access Journals (Sweden)

    HUI Li


    Full Text Available The influence of water temperature on composite moisture absorption parameters was investigated in temperature-controlled water bath. Experiments of carbon fiber/bismaleimide resin composites immersed in water of 60℃, 70℃and 80℃ were developed respectively. According to the moisture content-time curves obtained from the experimental results, the diffusion coefficient and the balanced moisture content of the composites immersed in different water temperature could be calculated. What's more, the effect of water temperature on the diffusion coefficient and the balanced moisture content were discussed too. According to the Arrhenius equation and the law of Fick, a moisture absorption model was proposed to simulate the hygroscopic behaviour of the composite laminates immersed in different water temperature which can predict the absorption rate of water of the composites immersed in distilled water of 95℃ at any time precisely and can calculate how long it will take to reach the specific absorption rate.

  14. Detailed Field Investigation of Vapor Intrusion Processes (United States)


    will be conducted and respiratory protective equipment used as needed, as described below. • Eating, drinking, smoking, gum chewing and oral tobacco use...FINAL REPORT Detailed Field Investigation of Vapor Intrusion Processes ESTCP Project ER-0423 September 2008 Thomas E. McHugh, Ph ...Thomas E. McHugh, Ph D. Tim N. Nickels 5d. PROJECT NUMBER ER-0423 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND

  15. Linking electricity and water models to assess electricity choices at water-relevant scales (United States)

    Sattler, S.; Macknick, J.; Yates, D.; Flores-Lopez, F.; Lopez, A.; Rogers, J.


    Hydrology/water management and electricity generation projections have been modeled separately, but there has been little effort in intentionally and explicitly linking the two sides of the water-energy nexus. This paper describes a platform for assessing power plant cooling water withdrawals and consumption under different electricity pathways at geographic and time scales appropriate for both electricity and hydrology/water management. This platform uses estimates of regional electricity generation by the Regional Energy Deployment System (ReEDS) as input to a hydrologic and water management model—the Water Evaluation and Planning (WEAP) system. In WEAP, this electricity use represents thermoelectric cooling water withdrawals and consumption within the broader, regional water resource context. Here we describe linking the electricity and water models, including translating electricity generation results from ReEDS-relevant geographies to the water-relevant geographies of WEAP. The result of this analysis is water use by the electric sector at the regional watershed level, which is used to examine the water resource implications of these electricity pathways.

  16. A Retroactive-Burst Framework for Automated Intrusion Response System

    Directory of Open Access Journals (Sweden)

    Alireza Shameli-Sendi


    Full Text Available The aim of this paper is to present an adaptive and cost-sensitive model to prevent security intrusions. In most automated intrusion response systems, response selection is performed locally based on current threat without using the knowledge of attacks history. Another challenge is that a group of responses are applied without any feedback mechanism to measure the response effect. We address these problems through retroactive-burst execution of responses and a Response Coordinator (RC mechanism, the main contributions of this work. The retroactive-burst execution consists of several burst executions of responses with, at the end of each burst, a mechanism for measuring the effectiveness of the applied responses by the risk assessment component. The appropriate combination of responses must be considered for each burst execution to mitigate the progress of the attack without necessarily running the next round of responses, because of the impact on legitimate users. In the proposed model, there is a multilevel response mechanism. To indicate which level is appropriate to apply based on the retroactive-burst execution, we get help from a Response Coordinator mechanism. The applied responses can improve the health of Applications, Kernel, Local Services, Network Services, and Physical Status. Based on these indexes, the RC gives a general overview of an attacker’s goal in a distributed environment.


    Residential wateer use is visualized as a customer-server interaction often encountered in queueing theory. Individual customers are assumed to arrive according to a nonhomogeneous Poisson process, then engage water servers for random lengths of time. Busy servers are assumed t...

  18. Predictors of Drinking Water Boiling and Bottled Water Consumption in Rural China: A Hierarchical Modeling Approach. (United States)

    Cohen, Alasdair; Zhang, Qi; Luo, Qing; Tao, Yong; Colford, John M; Ray, Isha


    Approximately two billion people drink unsafe water. Boiling is the most commonly used household water treatment (HWT) method globally and in China. HWT can make water safer, but sustained adoption is rare and bottled water consumption is growing. To successfully promote HWT, an understanding of associated socioeconomic factors is critical. We collected survey data and water samples from 450 rural households in Guangxi Province, China. Covariates were grouped into blocks to hierarchically construct modified Poisson models and estimate risk ratios (RR) associated with boiling methods, bottled water, and untreated water. Female-headed households were most likely to boil (RR = 1.36, p China's economy continues to grow then bottled water use will increase.

  19. Intrusion detection using pattern recognition methods (United States)

    Jiang, Nan; Yu, Li


    Today, cyber attacks such as worms, scanning, active attackers are pervasive in Internet. A number of security approaches are proposed to address this problem, among which the intrusion detection system (IDS) appears to be one of the major and most effective solutions for defending against malicious users. Essentially, intrusion detection problem can be generalized as a classification problem, whose goal is to distinguish normal behaviors and anomalies. There are many well-known pattern recognition algorithms for classification purpose. In this paper we describe the details of applying pattern recognition methods to the intrusion detection research field. Experimenting on the KDDCUP 99 data set, we first use information gain metric to reduce the dimensionality of the original feature space. Two supervised methods, the support vector machine as well as the multi-layer neural network have been tested and the results display high detection rate and low false alarm rate, which is promising for real world applications. In addition, three unsupervised methods, Single-Linkage, K-Means, and CLIQUE, are also implemented and evaluated in the paper. The low computational complexity reveals their application in initial data reduction process.

  20. Periodontal changes following molar intrusion with miniscrews. (United States)

    Bayani, Shahin; Heravi, Farzin; Radvar, Mehrdad; Anbiaee, Najmeh; Madani, Azam Sadat


    With the introduction of skeletal anchorage system, recently it is possible to successfully intrude molar teeth. On the other hand, there have been concerns about periodontal changes associated with intrusion and there are few studies on this topic, especially for posterior teeth. Ten female patients were enrolled in this study. Maxillary molar intrusion was achieved by inserting two miniscrews and a 17 × 25 titanium molybdenum alloy spring. Crestal height changes were evaluated at three intervals including: Baseline (T0), end of active treatment (T1) and 6 months after retention (T2). Other variables including probing depth, gingival recession, attachment level and bleeding on probing were evaluated by clinical measurements in the three above mentioned intervals. One-sample Kolmogrov-Smirnov test ascertained the normality of the data. For all patients, the changes in tooth position and crestal height were evaluated using one-sample t-test. (P intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.